-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Julian Oliver wrote:
> ok. the method of signing clearly does breach the GPLv3, in the sense
> that client functionality with a specific server is "interfered with".
> 
> this was not a problem with the GPLv2.
> 
> i'll need to read more about this to understand the full scope of that
> change.
> 
> i wonder how this implicates upon Linus and IBM's favoured TPM module?
> 
>   http://en.wikipedia.org/wiki/Trusted_Platform_Module


This doesn't implicate the module at all. The module could be perfectly
legally used by GPL code - e.g. to generate or store cryptographic keys
for file system encryption (this is what it is used for by Linux, AFAIK).

What you cannot do is to use the module to prevent running GPL code that
was not signed by some secret keys that weren't distributed with the source.

> well, in the quote two-above they do specifically mention a hardware
> trigger.

They do not - the part about the signing keys is from the FAQ explaining
one specific case, not the actual license text. The other part from the
actual license speaks about "installation information" - whether the key
check is done in hardware, software or by a hired goon is completely
irrelevant.

> at the end-of-the-day, the problem of cheating is created by the
> game-designer, i think, not the players: when game-play is built around
> surviving in a world where resources are scarce, competition between
> people increases. factor in subscription costs and an opportunity for
> people to exert social and/or physical power over others and 'cheating' will
> seem like an increasingly desireable solution for many.

Well, that is a poor point of view - most games are built around the
notion of competition or a goal to achieve. If you remove that, the game
play will be lost.

Where cheating becomes possible is when you are putting trust in
inappropriate places - such as piece of software not under your control.
This is basic information security and many game designers seem to think
about this only as an afterthought, after solving all the cool explosion
effects and fancy physical simulations. Also a lot of people seem to
think that just bolting on some crypto will solve their problems,
resulting in a solution where you have a bulletproof front door and wide
open windows. If you want to get the security right, you need to design
for it from start and make a lot of tradeoff-s between security,
performance and practicality of the solution.

Jan
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.7 (GNU/Linux)
Comment: Using GnuPG with Mandriva - http://enigmail.mozdev.org

iD8DBQFHeA4Yn11XseNj94gRAlSyAKCgnWqlw+xIw5OYdiB76Qs8nAOfswCffnYF
SocIs0zvdldnsmWh6Nr+TpA=
=UChl
-----END PGP SIGNATURE-----

_______________________________________________
Soya-user mailing list
Soya-user@gna.org
https://mail.gna.org/listinfo/soya-user

Reply via email to