--
On Sat, 3 Aug 2002, Nomen Nescio wrote:
As an exercise, try thinking of ways you could use TCPA to
promote good guy applications. What could you do in a P2P
network if you could trust that all participants were running
approved software? And if you
I can only see one application for
James Donald writes:
I can only see one application for voluntary TCPA, and that is the
application it was designed to perform: Make it possible run
software or content which is encrypted so that it will only run on
one computer for one time period.
You've said this a few times, and while
On Sat, 3 Aug 2002, AARG! Anonymous wrote:
But you won't now say that TCPA is OK, will you? You just learned
some information which objectively should make you feel less bad about
it, and yet you either don't feel that way, or you won't admit it. I
am coming to doubt that people's feelings
On Saturday, August 3, 2002, at 09:10 AM, James A. Donald wrote:
--
On Sat, 3 Aug 2002, Nomen Nescio wrote:
As an exercise, try thinking of ways you could use TCPA to
promote good guy applications. What could you do in a P2P
network if you could trust that all participants were
James Donald writes:
James Donald writes:
I can only see one application for voluntary TCPA, and that is
the application it was designed to perform: Make it possible
run software or content which is encrypted so that it will
only run on one computer for one time period.
On 3
On Sat, 3 Aug 2002, James A. Donald wrote:
The TPM has its own secret key, it makes the corresponding public
key widely available to everyone, and its own internal good known
time. So when your customer's payment goes through, you then
Trusted time is a useful concept. I presume the time
--
James Donald writes:
I can only see one application for voluntary TCPA, and that is
the application it was designed to perform: Make it possible
run software or content which is encrypted so that it will
only run on one computer for one time period.
On 3 Aug 2002 at 20:10,
I think that people are beginning to understand that TCPA is not a
black and white issue. It is neither the overwhelming threat that some
activists are describing, nor the panacea that the vendors are selling.
It is a technology with strengths and weaknesses.
As an exercise, try thinking of