--
On 2 Aug 2002 at 0:36, David Wagner wrote:
> For instance, suppose that, thanks to TCPA/Palladium, Microsoft
> could design Office 2005 so that it is impossible for StarOffice
> and other clones to read files created in Office 2005. Would
> some users object?
In an anarchic society, o
At 12:19 PM 8/2/02 +0200, Eugen Leitl wrote:
>While useful, they note that the other platforms lack at least one of
the
>Dreamcast's virtues. "It's innocuous. It looks like a toy," said Davis.
>"If you bring it into a company, they're going to go, 'Wow, look at the
>toy!'"
Damn, first they came
On Mon, Jul 29, 2002 at 03:35:32PM -0700, AARG! Anonymous wrote:
> Declan McCullagh writes at
> http://zdnet.com.com/2100-1107-946890.html:
>
>"The world is moving toward closed digital rights management systems
>where you may need approval to run programs," says David Wagner,
>an ass
On Thursday 01 August 2002 15:46, Major Variola (ret) wrote:
> Dress Code Keeps 9 Hells Angels Out of Fair in Ventura
> Security: The new policy is enforced after biker club members refuse
> to remove vests marked with group's insignia. Their leader says he
> will sue.
Is it just me, or does "I'
On Fri, 2 Aug 2002, Jay Sulzberger wrote:
> To deal with the tiny bit of truth in the claims of AARG! that some
> capabilities of DRM might be beneficial to me: Yes, of coures, there are
> few things that have zero benefits. But this is hardly relevant. A more
> relevant question here is: Can w
Looks useful for P2P infrastructure.
http://online.securityfocus.com/news/558
When Dreamcasts Attack
White hat hackers use game consoles, handheld PCs to crack networks from
the inside out.
By Kevin Poulsen, Jul 31 2002 5:26PM
LAS VEGAS--Cyberpunks will be toting cheap game consoles on their
--
On 2 Aug 2002 at 3:31, Sampo Syreeni wrote:
> More generally, as long as we have computers which allow data to
> be addressed as code and vice versa, the ability to control use
> of data will necessarily entail ability to control use of code.
> So, either we will get systems where circumven
--
In an anarchist society, or in a world where government had given
up on copyright and intellectual property, TCPA/Palladium would be
a great thing, a really good substitute for law, much more
effectual, much cheaper, and much less dangerous than law.
In a world where we have anticircumve
Jon Callas wrote:
> On 8/1/02 1:14 PM, "Trei, Peter" <[EMAIL PROTECTED]> wrote:
>
>
>>So my question is: What is your reason for shielding your identity?
>>You do so at the cost of people assuming the worst about your
>>motives.
>
>
> Is this a tacit way to suggest that the only people who nee
http://www.forbes.com/newswire/2002/08/02/rtr684925.html
Internet security firm pulls planned IPO
Reuters, 08.02.02, 8:52 AM ET
MONTREAL, August 2 (Reuters) - Zero-Knowledge Systems Inc. pulled the plug
on Friday on a planned initial public offering, saying it will instead use
a recently complet
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
At 10:03 AM -0400 on 8/2/02, Somebody wrote:
> Wow.
>
> Why am I not surprised?
Yup. The rubble still bounces, though there are bits of grass poking
through. I'm getting queries about stuff from perfect strangers,
mostly researchers, for the first t
> Jon Callas[SMTP:[EMAIL PROTECTED]]
>
>
> On 8/1/02 1:14 PM, "Trei, Peter" <[EMAIL PROTECTED]> wrote:
>
> > So my question is: What is your reason for shielding your identity?
> > You do so at the cost of people assuming the worst about your
> > motives.
>
> Is this a tacit way to suggest tha
Mr AARG! writes...
> Eric Murray writes:
> > Yes, the spec says that it can be turned off. At that point you
> > can run anything that doesn't need any of the protected data or
> > other TCPA services. But, why would a software vendor that wants
> > the protection that TCPA provides allow his
> AARG! Anonymous[SMTP:[EMAIL PROTECTED]] writes
[...]
> Now, there is an optional function which does use the manufacturer's key,
> but it is intended only to be used rarely. That is for when you need to
> transfer your sealed data from one machine to another (either because you
> have b
First off, let me say that in general, I am against almost everything that
the DCMA stands for and am no fan of DRM either. But I do think that
we will lose credibility if we can't substantiate our claims, and part
of that means recognizing and acknowledging what appears to be legitimate
claims fr
On 8/1/02 1:14 PM, "Trei, Peter" <[EMAIL PROTECTED]> wrote:
> So my question is: What is your reason for shielding your identity?
> You do so at the cost of people assuming the worst about your
> motives.
Is this a tacit way to suggest that the only people who need anonymity or
pseudonymity are
--
On 2 Aug 2002 at 10:43, Trei, Peter wrote:
> Since the position argued involves nothing which would invoke
> the malign interest of government powers or corporate legal
> departments, it's not that. I can only think of two reasons why
> our corrospondent may have decided to go undercover...
On Fri, 2 Aug 2002, Wall, Kevin wrote:
> First off, let me say that in general, I am against almost everything
> that the DCMA stands for and am no fan of DRM either. But I do think that
> we will lose credibility if we can't substantiate our claims, and part of
> that means recognizing and ackno
On Fri, 2 Aug 2002, James A. Donald wrote:
> --
> On 2 Aug 2002 at 10:43, Trei, Peter wrote:
> > Since the position argued involves nothing which would invoke
> > the malign interest of government powers or corporate legal
> > departments, it's not that. I can only think of two reasons why
>
Sampo Syreeni writes:
> On 2002-08-01, AARG!Anonymous uttered to [EMAIL PROTECTED],...:
>
> >It does this by taking hashes of the software before transferring
> >control to it, and storing those hashes in its internal secure
> >registers.
>
> So, is there some sort of guarantee that the transfer
20 matches
Mail list logo