--
On Sat, 3 Aug 2002, Nomen Nescio wrote:
As an exercise, try thinking of ways you could use TCPA to
promote good guy applications. What could you do in a P2P
network if you could trust that all participants were running
approved software? And if you
I can only see one application for
Mike Rosing wrote:
On Fri, 2 Aug 2002, AARG! Anonymous wrote:
You don't have to send your data to Intel, just a master storage key.
This key encrypts the other keys which encrypt your data. Normally this
master key never leaves your TPM, but there is this optional feature
where it can
On Sat, 3 Aug 2002, AARG!Anonymous wrote:
... /
Now for a simple example of what can be done: a distributed poker game.
Of course there are a number of crypto protocols for playing poker on the
net, but they are quite complicated. Even though they've been around
for almost 20 years, I've
James Donald writes:
I can only see one application for voluntary TCPA, and that is the
application it was designed to perform: Make it possible run
software or content which is encrypted so that it will only run on
one computer for one time period.
You've said this a few times, and while
--- begin forwarded text
Status: RO
Delivered-To: [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
From: Fearghas McKay [EMAIL PROTECTED]
Subject: [Mac_crypto] Security Update 2002-08-02 for OpenSSL, Sun RPC,
mod_ssl does
not verify
Sender: [EMAIL PROTECTED]
Date: Sat, 3 Aug 2002 08:38:50 +0100
**A
At 12:48 PM 8/3/02 +0200, Eugen Leitl wrote:
On Sat, 3 Aug 2002, Morlock Elloi wrote:
Ah, the computers. Well, those that want computers will have them.
They may not be as cheap as today and there will not be as many of
them, but I think that all people *I* deal with will have them, so I
On Sat, 3 Aug 2002, AARG! Anonymous wrote:
But you won't now say that TCPA is OK, will you? You just learned
some information which objectively should make you feel less bad about
it, and yet you either don't feel that way, or you won't admit it. I
am coming to doubt that people's feelings
On Saturday 03 August 2002 05:12 pm, Morlock Elloi wrote:
UUCP will work as long as people can talk over telephone and there are
modems available. The harder and more inconvenient it becomes to connect
the higher average IQ of participants will be.
There is hope.
Just imagine the absence
On Sat, 3 Aug 2002, Morlock Elloi wrote:
Ah, the computers. Well, those that want computers will have them.
They may not be as cheap as today and there will not be as many of
them, but I think that all people *I* deal with will have them, so I
don't really care.
Sure, people will have
On Saturday, August 3, 2002, at 09:10 AM, James A. Donald wrote:
--
On Sat, 3 Aug 2002, Nomen Nescio wrote:
As an exercise, try thinking of ways you could use TCPA to
promote good guy applications. What could you do in a P2P
network if you could trust that all participants were
James Donald writes:
James Donald writes:
I can only see one application for voluntary TCPA, and that is
the application it was designed to perform: Make it possible
run software or content which is encrypted so that it will
only run on one computer for one time period.
On 3
On Sat, 3 Aug 2002, James A. Donald wrote:
The TPM has its own secret key, it makes the corresponding public
key widely available to everyone, and its own internal good known
time. So when your customer's payment goes through, you then
Trusted time is a useful concept. I presume the time
Here are some alternative applications for TCPA/Palladium technology which
could actually promote privacy and freedom. A few caveats, though: they
do depend on a somewhat idealized view of the architecture. It may be
that real hardware/software implementations are not sufficiently secure
for
--
James Donald writes:
I can only see one application for voluntary TCPA, and that is
the application it was designed to perform: Make it possible
run software or content which is encrypted so that it will
only run on one computer for one time period.
On 3 Aug 2002 at 20:10,
14 matches
Mail list logo