what to fake,
>> ...
>> if the parameters used cannot be faked, someone
>> able to hack th JAVA VM could do the job.
>>
>> This risks may be important to analyse for
>> financial transaction security, privacy protection,
>> or secrecy, but not just for
>> software licensing.
ked, someone
> able to hack th JAVA VM could do the job.
>
> This risks may be important to analyse for
> financial transaction security, privacy protection,
> or secrecy, but not just for
> software licensing.
>
>
>
>
>>-Message d'origine-----
&g
tware licensing.
> -Message d'origine-
> De: Dain Sundstrom [mailto:[EMAIL PROTECTED]]
> Date: jeudi 21 février 2002 16:29
> À: Coetmeur, Alain
> Cc: '[EMAIL PROTECTED]'; [EMAIL PROTECTED]
> Objet: Re: [JBoss-user] Copy protection
>
>
> You really
You really don't understand the basic theory of cryptography, which
assumes you have a trusted source and a trusted sink. The source and
sink are people not machines. For example the movie industry believed
that DVD copy protection was unbreakable, because they controlled the
sink software.
one way is to use
a public key protocol to check for right to execute
maybe a privatekey can also be enough.
an example could be:
a key component of your EAR looks
at the server name, and check
if it is coherent with a certificate
it has in it's keystore.
you can create a certificate for each
You can't. You will have to learn to trust with your users.
-dain
Leigh Wanstead wrote:
> Hello everyone,
>
> I am not sure if this is a correct place to ask. Anyway, here is the
> question.
>
> How to protect your ear files? I mean if you deploy ear into application
> server, how you preve