On Fri, 23 Jan 2004, Soren Harward wrote:

> This question is inspired by the thread on encrypted filesystems, but
> merits its own thread.  Everyone knows about keeping unauthorized users
> out of data they shouldn't have access to.  But what about granting
> authorized users access to data they should be able to access, but not
> permitting them to redistribute it?

In my opinion, it's just a completely impossible pipe dream. Computers are 
built so that, in order to display the information on the screen, it has 
to make a copy of it. If you can display it, you can copy it, somehow.

The only possible way to do this is to have a completely unbroken chain of 
closed, DRM'd technology all the way up to the display. But even then, 
you run the risk of (a) reverse engineering, and (b) I can still take a 
photograph of the screen, if it's that important. (And if it were the sort 
of situation as at Los Alamos, it would be that important.) 

  ~ ross

-- 

This sentence would be seven words long if it were six words shorter.


____________________
BYU Unix Users Group 
http://uug.byu.edu/ 
___________________________________________________________________
List Info: http://uug.byu.edu/cgi-bin/mailman/listinfo/uug-list

Reply via email to