Re: Other uses of TCPA

2002-08-04 Thread James A. Donald
-- On Sat, 3 Aug 2002, Nomen Nescio wrote: As an exercise, try thinking of ways you could use TCPA to promote good guy applications. What could you do in a P2P network if you could trust that all participants were running approved software? And if you I can only see one application for

Re: Other uses of TCPA

2002-08-04 Thread Nomen Nescio
James Donald writes: I can only see one application for voluntary TCPA, and that is the application it was designed to perform: Make it possible run software or content which is encrypted so that it will only run on one computer for one time period. You've said this a few times, and while

Re: Other uses of TCPA

2002-08-04 Thread Eugen Leitl
On Sat, 3 Aug 2002, AARG! Anonymous wrote: But you won't now say that TCPA is OK, will you? You just learned some information which objectively should make you feel less bad about it, and yet you either don't feel that way, or you won't admit it. I am coming to doubt that people's feelings

Re: Other uses of TCPA

2002-08-04 Thread Tim May
On Saturday, August 3, 2002, at 09:10 AM, James A. Donald wrote: -- On Sat, 3 Aug 2002, Nomen Nescio wrote: As an exercise, try thinking of ways you could use TCPA to promote good guy applications. What could you do in a P2P network if you could trust that all participants were

Re: Other uses of TCPA

2002-08-04 Thread AARG! Anonymous
James Donald writes: James Donald writes: I can only see one application for voluntary TCPA, and that is the application it was designed to perform: Make it possible run software or content which is encrypted so that it will only run on one computer for one time period. On 3

Re: Other uses of TCPA

2002-08-04 Thread Eugen Leitl
On Sat, 3 Aug 2002, James A. Donald wrote: The TPM has its own secret key, it makes the corresponding public key widely available to everyone, and its own internal good known time. So when your customer's payment goes through, you then Trusted time is a useful concept. I presume the time

Re: Other uses of TCPA

2002-08-04 Thread James A. Donald
-- James Donald writes: I can only see one application for voluntary TCPA, and that is the application it was designed to perform: Make it possible run software or content which is encrypted so that it will only run on one computer for one time period. On 3 Aug 2002 at 20:10,

Other uses of TCPA

2002-08-03 Thread Nomen Nescio
I think that people are beginning to understand that TCPA is not a black and white issue. It is neither the overwhelming threat that some activists are describing, nor the panacea that the vendors are selling. It is a technology with strengths and weaknesses. As an exercise, try thinking of