[10237] in cryptography@c2.net mail archive
Re: password-cracking by journalists...
daemon@ATHENA.MIT.EDU (reusch)
Wed Jan 23 10:36:57 2002
Message-Id: <3.0.6.32.20020122171656.00938d80@mail.ewndsr1.nj.home.com>
Date: Tue, 22 Jan 2002 17:16:56 -0500
To: cryptography@wasabisystems.com
From: reusch <reusch@home.com>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
At 09:00 PM 1/22/02 -0500, R. Hirschfeld wrote:
>> From: "Trei, Peter" <ptrei@rsasecurity.com>
>> Date: Mon, 21 Jan 2002 09:55:53 -0500
>
>> The inclusion of the word 'effectively' presumes the existance of
>> 'ineffective' technological measures, which it would be no crime
>> to circumvent. Where, then, is the distinction?
>
>17.1201 actually contains a definition:
>
>(B) a technological measure ''effectively controls access to a
> work'' if the measure, in the ordinary course of its operation,
> requires the application of information, or a process or a
> treatment, with the authority of the copyright owner, to gain
> access to the work.
>
>I confess that I can't tell whether this implies that everything is
>effective or that nothing is.
Below are a few attempts to define "ineffectiveness" based on an even number
of negations inserted into the above language. While amusing, it's fruitless.
Any legislation that defines reality is schizophrenic.
Regards,
Michael
a technological measure does not effectively control access to a
work if the measure, in the ordinary course of its operation,
does not require the application of information, or a process or a
treatment, with the authority of the copyright owner, to gain
access to the work.
a technological measure does not effectively control access to a
work if the measure, in an extraordinary course of its operation,
requires the application of information, or a process or a
treatment, with the authority of the copyright owner, to gain
access to the work.
a technological measure does not effectively control access to a
work if the measure, in the ordinary course of its operation,
requires the application of information, or a process or a
treatment, without the authority of the copyright owner, to gain
access to the work. (My favorite!)
a technological measure does not effectively control access to a
work if the measure, in an extraordinary course of its operation,
does not require the application of information, or a process or a
treatment, without the authority of the copyright owner, to gain
access to the work.
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@wasabisystems.com