On Fri, 23 Jan 2004, Jason Holt wrote:
> On Fri, 23 Jan 2004, Ross Werner wrote:
> > Try this thought experiment: you come up with any hypothetical DRM system
> > for an open-source system. This system is _always_ going to have to
> 
> It's a stretch, but not impossible.  You have the code, but the binaries are
> signed, and you only get access to the restricted data using the signed
> binaries.

I tweak the source so that it uses the original signed binaries to deliver
the required information to the central server instead of the information
from the actual binary I'm running. (This tactic has been used many times
over, in AIM clients for example. It doesn't even require open source for
it to work, necessarily, although that usually makes it easier.)

  ~ross

-- 

This sentence would be seven words long if it were six words shorter.


____________________
BYU Unix Users Group 
http://uug.byu.edu/ 
___________________________________________________________________
List Info: http://uug.byu.edu/cgi-bin/mailman/listinfo/uug-list

Reply via email to