Sameer Parekh [EMAIL PROTECTED] writes:
The DVD CCA does not have a strong case, but they will not
back down. They have too much riding on this. As Lucky has stated,
their entire existence is built upon licensing the CSS
technology. Since it is no longer a trade secret, they have
Date: Mon, 3 Jan 2000 18:43:52 -0800 (PST)
From: bram [EMAIL PROTECTED]
I'm a little confused. Are you saying that as of October it will be legal
to do any amount of reverse-engineering, publishing, and writing to APIs
you want without violating the original author's copyright? Does that
On Mon, Jan 03, 2000 at 11:46:48AM -0800, bram wrote:
On Wed, 29 Dec 1999, Lucky Green wrote:
1. CSS was reverse engineered from Xing's DVD player.
2. Xing's player requires the user to click on a button accepting a license
agreement prohibiting reverse engineering.
3. Reverse
No, October 28, 2000 is when the act of circumventing an effective
technological measure becomes a violation (with exceptions for fair
But if it was an "effective technological measure", it couldn't have
been circumvented. And by circumventing CSS, wasn't it shown to not be
an effective
No, October 28, 2000 is when the act of circumventing an effective
technological measure becomes a violation (with exceptions for fair
But if it was an "effective technological measure", it couldn't have
been circumvented. And by circumventing CSS, wasn't it shown to not be
an effective
On Tue, 4 Jan 2000, Ray Hirschfeld wrote:
Date: Mon, 3 Jan 2000 18:43:52 -0800 (PST)
From: bram [EMAIL PROTECTED]
I'm a little confused. Are you saying that as of October it will be legal
to do any amount of reverse-engineering, publishing, and writing to APIs
you want without
Is there a good solution to the problem of starting up a network server that
needs access to an encrypted database? For instance, a server that has its own
RSA key pair encrypted on disk, and needs to decrypt it during operation so
the private key is available in memory?
The only examples I've
- Forwarded message from Jeffrey M. Smith -
Date: Tue, 04 Jan 2000 16:40:40 -0500
From: "Jeffrey M. Smith" [EMAIL PROTECTED]
Subject: starting up servers that need access to secrets
Is there a good solution to the problem of starting up a network server that
needs access to an