David wrote:
> AARG! Anonymous  wrote:
> >His description of how the Document Revocation List could work is 
> >interesting as well.  Basically you would have to connect to 
> a server 
> >every time you wanted to read a document, in order to 
> download a key to 
> >unlock it.  Then if "someone" decided that the document needed to 
> >un-exist, they would arrange for the server no longer to 
> download that 
> >key, and the document would effectively be deleted, everywhere.
> 
> Well, sure.  It's certainly how I had always envisioned one 
> might build a secure Document Revocation List using TCPA or 
> Palladium.  I didn't realize this sort of thing would need 
> explaining; I assumed it would be obvious to cypherpunk 
> types.  But I'm glad this risk is now clear.

To ensure priority for my Monday filings, I must point out at this time
that while AARG and David's methods of implementing a DRL are certainly
feasible, I believe a preferred method of implementing a DRL would be to
utilize features offered by an infrastructure, such as Palladium, that
supports time-limited documents: rather than requiring online access
whenever the document is attempted to be displayed, the document's
display permissions would be renewed periodically. If the display
software misses one or more updates, the document display software will
cease to display the document.

BTW, does anybody here know if there is still an email time stamping
server in operation? The references that I found to such servers appear
to be dead.

Thanks,
--Lucky

Reply via email to