On 25 Feb 2010, at 01:41, Greg Parker wrote:

> On Feb 24, 2010, at 5:27 PM, Graham Lee wrote:
>> On 24 Feb 2010, at 22:57, Michael A. Crawford wrote:
>>> Part of your response suggests that if there was an existing framework that 
>>> was openly available, it wouldn't do me any good because the bad guys would 
>>> have the source code.
>> 
>> I disagree. If it's based on a tried and tested (and occasionally formally 
>> verified) crypto system, knowing the algorithm doesn't lead to a crack. 
>> Weaknesses would come through bugs in the framework (or incorrect 
>> application of it), and the more people who can see the source the greater 
>> chance there is that good people as well as bad can find the issues. Good 
>> people fix 'em.
> 
> Except in the standalone piracy-prevention case, the algorithm is already 
> known to be broken. Formally, the attacker already has in hand all of the 
> information they need: they have the executable and all of the data accessed 
> by the executable. The only information the attacker lacks is the algorithm. 
> Once they know the algorithm, they know how to rewrite your executable to 
> bypass the protection system. 

They don't even need to know the algorithm, if they have access to kernel 
memory - at some point the code has to end up in a state the OS can execute. 
Believing that DRM provides confidentiality is the most common "incorrect 
application" I come across :-)

Graham.
-- 
Graham Lee
http://blog.securemacprogramming.com/
http://www.mac-developer-network.com/category/columns/security/

_______________________________________________

Cocoa-dev mailing list (Cocoa-dev@lists.apple.com)

Please do not post admin requests or moderator comments to the list.
Contact the moderators at cocoa-dev-admins(at)lists.apple.com

Help/Unsubscribe/Update your Subscription:
http://lists.apple.com/mailman/options/cocoa-dev/archive%40mail-archive.com

This email sent to arch...@mail-archive.com

Reply via email to