Challenge to David Wagner on TCPA

2002-07-29 Thread AARG! Anonymous

Declan McCullagh writes at
http://zdnet.com.com/2100-1107-946890.html:

   "The world is moving toward closed digital rights management systems
   where you may need approval to run programs," says David Wagner,
   an assistant professor of computer science at the University of
   California at Berkeley.  "Both Palladium and TCPA incorporate features
   that would restrict what applications you could run."

But both Palladium and TCPA deny that they are designed to restrict what
applications you run.  The TPM FAQ at
http://www.trustedcomputing.org/docs/TPM_QA_071802.pdf reads, in
answer #1:

: The TPM can store measurements of components of the user's system, but
: the TPM is a passive device and doesn't decide what software can or
: can't run on a user's system.

An apparently legitimate but leaked Palladium White Paper at
http://www.neowin.net/staff/users/Voodoo/Palladium_White_Paper_final.pdf
says, on the page shown as number 2:

: A Palladium-enhanced computer must continue to run any existing
: applications and device drivers.

and goes on,

: In addition, Palladium does not change what can be programmed or run
: on the computing platform; it simply changes what can be believed about
: programs, and the durability of those beliefs.

Of course, white papers and FAQs are not technical documents and may not
be completely accurate.  To really answer the question, we need to look
at the spec.  Unfortunately there is no Palladium spec publicly available
yet, but we do have one for TCPA, at
http://www.trustedcomputing.org/docs/main%20v1_1b.pdf.

Can you find anything in this spec that would do what David Wagner says
above, restrict what applications you could run?  Despite studying this
spec for many hours, no such feature has been found.

So here is the challenge to David Wagner, a well known and justifiably
respected computer security expert: find language in the TCPA spec to
back up your claim above, that TCPA will restrict what applications
you can run.  Either that, or withdraw the claim, and try to get Declan
McCullagh to issue a correction.  (Good luck with that!)

And if you want, you can get Ross Anderson to help you.  His reports are
full of claims about Palladium and TCPA which seem equally unsupported
by the facts.  When pressed, he claims secret knowledge.  Hopefully David
Wagner will have too much self-respect to fall back on such a convenient
excuse.




Re: What happened to cypherpunks?

2002-07-29 Thread Eric Murray

On Fri, Jul 26, 2002 at 04:56:31PM +0100, Ken Brown wrote:
> This is just a test message to see if it gets back to me.
> 
> No traffic on lne or ssz though here for 24 hours.
> Which after a few 100 in previous 2 days seems odd.


Ssz seems to have gotten itself put in most of the open
relay blacklists recently.  Your ISP may be blocking
mail from Ssz to you.  Received cpunks traffic here at lne
has been pretty light over the last four days
or so.  Perhaps everyone is taking a break?


--
Eric (who doesn't use other people's blacklists)




Learning to love Big Brother: George W. Bush channels George Orwell

2002-07-29 Thread Steve Schear

[Might be funnier if it weren't so true...]

Learning to love Big Brother
George W. Bush channels George Orwell
Daniel Kurtzman
Sunday, July 28, 2002
)2002 San Francisco Chronicle.
URL: 
http://sfgate.com/cgi-bin/article.cgi?f=/chronicle/a/2002/07/28/IN244190.DTL

Here's a question for constitutional scholars: Can a sitting president be 
charged with plagiarism?
As President Bush wages his war against terrorism and moves to create a 
huge homeland security apparatus, he appears to be borrowing heavily, if 
not ripping off ideas outright, from George Orwell. The work in question is 
"1984, " the prophetic novel about a government that controls the masses by 
spreading propaganda, cracking down on subversive thought and altering 
history to suit its needs. It was intended to be read as a warning about 
the evils of totalitarianism -- not a how-to manual.




Re: What happened to cypherpunks?

2002-07-29 Thread Jim Choate

On Mon, 29 Jul 2002, Eric Murray wrote:

> Ssz seems to have gotten itself put in most of the open
> relay blacklists recently.

It was on them before, we changed IP's and they're back.

Sorry assed socialist rat bastards. Hypocrites too since the spammers use 
them as a easy source of Open Relay info - otherwise they'd have to hunt
for it themselves. The cost of doing spam would be much higher.

>  Your ISP may be blocking mail from Ssz to you.

Sue their ass your right to free association is being violated!

> Received cpunks traffic here at lne
> has been pretty light over the last four days
> or so.  Perhaps everyone is taking a break?

The list traffic has been light.


 --


  When I die, I would like to be born again as me.

Hugh Hefner
 [EMAIL PROTECTED] www.ssz.com
 [EMAIL PROTECTED]  www.open-forge.org






Hollywood Hackers

2002-07-29 Thread Duncan Frissell

Congressman Wants to Let Entertainment Industry Get Into Your Computer

  Rep. Howard L. Berman, D-Calif., formally proposed
  legislation that would give the industry unprecedented new
  authority to secretly hack into consumers' computers or knock
  them off-line entirely if they are caught downloading
  copyrighted material.

I've been reading things like this for a while but I wonder how practical
such an attack would be. They won't be able to hack into computers with
reasonable firewalls and while they might try DOS attacks, upstream
connectivity suppliers might object. Under current P2P software they may
be able to do a little hacking but the opposition will rewrite the
software to block. DOS attacks and phony file uploads can be defeated
with digital signatures and reputation systems (including third party
certification). Another problem -- Napster had 55 million customers.
That's a lot of people to attack. I don't think Hollywood has the troops.

DCF




Re: Hollywood Hackers

2002-07-29 Thread AARG! Anonymous

On Mon, 29 Jul 2002 14:25:37 -0400 (EDT), you wrote:
>
> Congressman Wants to Let Entertainment Industry Get Into Your Computer
>
>   Rep. Howard L. Berman, D-Calif., formally proposed
>   legislation that would give the industry unprecedented new
>   authority to secretly hack into consumers' computers or knock
>   them off-line entirely if they are caught downloading
>   copyrighted material.
>
> I've been reading things like this for a while but I wonder how practical
> such an attack would be. They won't be able to hack into computers with
> reasonable firewalls and while they might try DOS attacks, upstream
> connectivity suppliers might object. Under current P2P software they may
> be able to do a little hacking but the opposition will rewrite the
> software to block. DOS attacks and phony file uploads can be defeated
> with digital signatures and reputation systems (including third party
> certification). Another problem -- Napster had 55 million customers.
> That's a lot of people to attack. I don't think Hollywood has the troops.

I like this scenario: Adam places his copyrighted content on his web site. His friend, 
Eve, 
violates his copyright and places Adam's copyrighted content on her site. Hollywood 
downloads the 
copyright-infringing content from Eve's site. Eve confesses that Hollywood did so, in 
a good faith 
effort to repent from her copyright infringement. Now Adam hacks Hollywood, as 
authorized by the 
proposed law. Lawsuits all around.




RE: crime control before it happens: thought control

2002-07-29 Thread Blanc

Quoth Major Variola:

>She even conceives of developing algorithms so advanced that society
>might intervene, to get people liable to be recruited into cells back
>on track before they can be seduced by elements like Al Qaeda. "There is a
>possibility that with sufficient information about known terrorists we
>could evolve to the point where we could spot terrorists in the making,"
she
>argues.
..



Like, while in training by the CIA . . .

  ..
Blanc




crime control before it happens: thought control

2002-07-29 Thread Major Variola (ret)

She even conceives of developing algorithms so advanced that society
 might intervene, to get people liable to be recruited into cells back
on track
before they can be seduced by elements like Al Qaeda. "There is a
possibility that with sufficient information about known terrorists we
could
evolve to the point where we could spot terrorists in the making," she
argues. "We believe that individuals can be at risk of becoming drug
addicts, or joining gangs, or having affairs, or any number of things at

certain times and under certain conditions in their lives. . . .
Thorough and
continued algorithmic investigation of terrorist behavior is very likely
to
shed light on their origins, and possibly lead to proactive efforts."

http://villagevoice.com/issues/0230/baard.php




re: How to Defeat DVD Zone Controls

2002-07-29 Thread mean-green

Most players cannot be hacked.  And many hacks do not operate properly.  How about 
just rent or borrow DVDs, reprocess to remove the region controls and reburn to a 
DVD-R?  DVD-Rs are only about $1.25 or less each.  Test burn on a DVD-RW to help 
prevent expensive coasters. See http://mpucoder.dynodns.net/derrow/copy.html



Communicate in total privacy.
Get your free encrypted email at https://www.hushmail.com/?l=2

Looking for a good deal on a domain name? 
http://www.hush.com/partners/offers.cgi?id=domainpeople