On Fri, 23 Jan 2004, Soren Harward wrote: > This question is inspired by the thread on encrypted filesystems, but > merits its own thread. Everyone knows about keeping unauthorized users > out of data they shouldn't have access to. But what about granting > authorized users access to data they should be able to access, but not > permitting them to redistribute it?
In my opinion, it's just a completely impossible pipe dream. Computers are built so that, in order to display the information on the screen, it has to make a copy of it. If you can display it, you can copy it, somehow. The only possible way to do this is to have a completely unbroken chain of closed, DRM'd technology all the way up to the display. But even then, you run the risk of (a) reverse engineering, and (b) I can still take a photograph of the screen, if it's that important. (And if it were the sort of situation as at Los Alamos, it would be that important.) ~ ross -- This sentence would be seven words long if it were six words shorter. ____________________ BYU Unix Users Group http://uug.byu.edu/ ___________________________________________________________________ List Info: http://uug.byu.edu/cgi-bin/mailman/listinfo/uug-list
