On Tue, Jan 02, 2001 at 04:15:02PM -0800, Andre Hedrick wrote:
> However each key is to broadcasts its identity for the authorized
> host/application. This every license that uses CPRM is trackable. Since
> the method is exotic enough and you can only get the matrix pillars from
> the LC4
I will explain later...
However each key is to broadcasts its identity for the authorized
host/application. This every license that uses CPRM is trackable. Since
the method is exotic enough and you can only get the matrix pillars from
the LC4 people, crack will be tough. There is a 1Meg
Andre Hedrick wrote:
>
> On Tue, 2 Jan 2001, Rob Landley wrote:
>
> > And we all remember how the pirates got around this, don't we? The easy
> > way: crack the program.
>
> Nope...it is embedded to the vender portion of the media.
My point was that using this kind of thing to protect
On Tue, 2 Jan 2001, Rob Landley wrote:
> And we all remember how the pirates got around this, don't we? The easy
> way: crack the program.
Nope...it is embedded to the vender portion of the media.
> There's nothing new under the sun, and the "zero day warez" people never
> even broke stride
> Its probably very hard to defeat. It also in its current form means
> you can throw disk defragmenting tools out. Dead, gone. Welcome to
> the United Police State Of America.
Doesn't anybody remember the days of "dongle keys" on the Commodore 64?
Plug a special circuit into the joystick port
Its probably very hard to defeat. It also in its current form means
you can throw disk defragmenting tools out. Dead, gone. Welcome to
the United Police State Of America.
Doesn't anybody remember the days of "dongle keys" on the Commodore 64?
Plug a special circuit into the joystick port in
On Tue, 2 Jan 2001, Rob Landley wrote:
And we all remember how the pirates got around this, don't we? The easy
way: crack the program.
Nope...it is embedded to the vender portion of the media.
There's nothing new under the sun, and the "zero day warez" people never
even broke stride
Andre Hedrick wrote:
On Tue, 2 Jan 2001, Rob Landley wrote:
And we all remember how the pirates got around this, don't we? The easy
way: crack the program.
Nope...it is embedded to the vender portion of the media.
My point was that using this kind of thing to protect applications
I will explain later...
However each key is to broadcasts its identity for the authorized
host/application. This every license that uses CPRM is trackable. Since
the method is exotic enough and you can only get the matrix pillars from
the LC4 people, crack will be tough. There is a 1Meg
On Tue, Jan 02, 2001 at 04:15:02PM -0800, Andre Hedrick wrote:
However each key is to broadcasts its identity for the authorized
host/application. This every license that uses CPRM is trackable. Since
the method is exotic enough and you can only get the matrix pillars from
the LC4 people,
> Does anyone have any details on this? I presume that the drive
> firmware is capable of identifying copy-protected data during
> a write. I also presume that nobody on lkml would condone
It seems to be very similar to the DVD stuff, including ideas for play once
only blocks and the like. Pay
I read this article on theregister today:
http://www.theregister.co.uk/content/2/15620.html
Does anyone have any details on this? I presume that the drive
firmware is capable of identifying copy-protected data during
a write. I also presume that nobody on lkml would condone
such a terrible idea.
I read this article on theregister today:
http://www.theregister.co.uk/content/2/15620.html
Does anyone have any details on this? I presume that the drive
firmware is capable of identifying copy-protected data during
a write. I also presume that nobody on lkml would condone
such a terrible idea.
Does anyone have any details on this? I presume that the drive
firmware is capable of identifying copy-protected data during
a write. I also presume that nobody on lkml would condone
It seems to be very similar to the DVD stuff, including ideas for play once
only blocks and the like. Pay per
14 matches
Mail list logo