On Jun 14, 2007, Rob Landley <[EMAIL PROTECTED]> wrote:

> On Thursday 14 June 2007 13:46:40 Alexandre Oliva wrote:

>> Well, then, ok: do all that loader and hardware signature-checking
>> dancing, sign the image, store it in the machine, and throw the
>> signing key away.  This should be good for the highly-regulated areas
>> you're talking about.  And then, since you can no longer modify the
>> program, you don't have to let the user do that any more.  Problem
>> solved.

> A) Does that actually satisfy the terms of GPLv3?

I think so:

  this requirement does not apply if neither you nor any third party
  retains the ability to install modified object code on the User
  Product

> If so, can't they just wait until they get sued and destroy the keys
> then?

I don't think this woulnd't satisfy the above.

-- 
Alexandre Oliva         http://www.lsd.ic.unicamp.br/~oliva/
FSF Latin America Board Member         http://www.fsfla.org/
Red Hat Compiler Engineer   [EMAIL PROTECTED], gcc.gnu.org}
Free Software Evangelist  [EMAIL PROTECTED], gnu.org}
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Reply via email to