Re: Other uses of TCPA

2002-08-04 Thread James A. Donald
-- On Sat, 3 Aug 2002, Nomen Nescio wrote: As an exercise, try thinking of ways you could use TCPA to promote good guy applications. What could you do in a P2P network if you could trust that all participants were running approved software? And if you I can only see one application for

RE: Challenge to David Wagner on TCPA

2002-08-04 Thread AARG! Anonymous
Mike Rosing wrote: On Fri, 2 Aug 2002, AARG! Anonymous wrote: You don't have to send your data to Intel, just a master storage key. This key encrypts the other keys which encrypt your data. Normally this master key never leaves your TPM, but there is this optional feature where it can

Re: Privacy-enhancing uses for TCPA

2002-08-04 Thread Jay Sulzberger
On Sat, 3 Aug 2002, AARG!Anonymous wrote: ... / Now for a simple example of what can be done: a distributed poker game. Of course there are a number of crypto protocols for playing poker on the net, but they are quite complicated. Even though they've been around for almost 20 years, I've

Re: Other uses of TCPA

2002-08-04 Thread Nomen Nescio
James Donald writes: I can only see one application for voluntary TCPA, and that is the application it was designed to perform: Make it possible run software or content which is encrypted so that it will only run on one computer for one time period. You've said this a few times, and while

Apple's Security Update Message Fails PGP Authentication

2002-08-04 Thread R. A. Hettinga
--- begin forwarded text Status: RO Delivered-To: [EMAIL PROTECTED] To: [EMAIL PROTECTED] From: Fearghas McKay [EMAIL PROTECTED] Subject: [Mac_crypto] Security Update 2002-08-02 for OpenSSL, Sun RPC, mod_ssl does not verify Sender: [EMAIL PROTECTED] Date: Sat, 3 Aug 2002 08:38:50 +0100 **A

Simmering frogs with a drop of technology and a dash of law

2002-08-04 Thread Major Variola (ret)
At 12:48 PM 8/3/02 +0200, Eugen Leitl wrote: On Sat, 3 Aug 2002, Morlock Elloi wrote: Ah, the computers. Well, those that want computers will have them. They may not be as cheap as today and there will not be as many of them, but I think that all people *I* deal with will have them, so I

Re: Other uses of TCPA

2002-08-04 Thread Eugen Leitl
On Sat, 3 Aug 2002, AARG! Anonymous wrote: But you won't now say that TCPA is OK, will you? You just learned some information which objectively should make you feel less bad about it, and yet you either don't feel that way, or you won't admit it. I am coming to doubt that people's feelings

Re: Challenge to David Wagner on TCPA

2002-08-04 Thread Roy M.Silvernail
On Saturday 03 August 2002 05:12 pm, Morlock Elloi wrote: UUCP will work as long as people can talk over telephone and there are modems available. The harder and more inconvenient it becomes to connect the higher average IQ of participants will be. There is hope. Just imagine the absence

RE: Challenge to David Wagner on TCPA

2002-08-04 Thread Eugen Leitl
On Sat, 3 Aug 2002, Morlock Elloi wrote: Ah, the computers. Well, those that want computers will have them. They may not be as cheap as today and there will not be as many of them, but I think that all people *I* deal with will have them, so I don't really care. Sure, people will have

Re: Other uses of TCPA

2002-08-04 Thread Tim May
On Saturday, August 3, 2002, at 09:10 AM, James A. Donald wrote: -- On Sat, 3 Aug 2002, Nomen Nescio wrote: As an exercise, try thinking of ways you could use TCPA to promote good guy applications. What could you do in a P2P network if you could trust that all participants were

Re: Other uses of TCPA

2002-08-04 Thread AARG! Anonymous
James Donald writes: James Donald writes: I can only see one application for voluntary TCPA, and that is the application it was designed to perform: Make it possible run software or content which is encrypted so that it will only run on one computer for one time period. On 3

Re: Other uses of TCPA

2002-08-04 Thread Eugen Leitl
On Sat, 3 Aug 2002, James A. Donald wrote: The TPM has its own secret key, it makes the corresponding public key widely available to everyone, and its own internal good known time. So when your customer's payment goes through, you then Trusted time is a useful concept. I presume the time

Privacy-enhancing uses for TCPA

2002-08-04 Thread AARG! Anonymous
Here are some alternative applications for TCPA/Palladium technology which could actually promote privacy and freedom. A few caveats, though: they do depend on a somewhat idealized view of the architecture. It may be that real hardware/software implementations are not sufficiently secure for

Re: Other uses of TCPA

2002-08-04 Thread James A. Donald
-- James Donald writes: I can only see one application for voluntary TCPA, and that is the application it was designed to perform: Make it possible run software or content which is encrypted so that it will only run on one computer for one time period. On 3 Aug 2002 at 20:10,