[11276] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

RE: Challenge to David Wagner on TCPA

daemon@ATHENA.MIT.EDU (James A. Donald)
Thu Aug 1 22:30:20 2002

From: "James A. Donald" <jamesd@echeque.com>
To: <ptrei@rsasecurity.com>, cypherpunks <cypherpunks@lne.com>,
	<cryptography@wasabisystems.com>
Date: Thu, 1 Aug 2002 19:17:41 -0700
In-reply-to: <Pine.SOL.4.30.0208020306300.21349-100000@kruuna.Helsinki.FI>

    --
On 2 Aug 2002 at 3:31, Sampo Syreeni wrote:
> More generally, as long as we have computers which allow data to
> be addressed as code and vice versa, the ability to control use
> of data will necessarily entail ability to control use of code.
> So, either we will get systems where circumventing copyright
> controls is trivial or ones where you cannot compile your own
> code. All the rest is just meaningless syntax.

The announced purpose of TCPA/Palladium is to introduce some
intermediate cases.  For example you could compile your own code,
and then encrypt it so that it can only run on a specific target
computer.

As somone who sells code, I would think this would be a great
idea, were it not for the excesses we have been seeing from the IP
lobbyists. 

    --digsig
         James A. Donald
     6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
     iB5WVaGfx+zq5Dani1KQGdZIU5Kl21LDrc7w4e1m
     2PoKhj2EuUKqjKlZ/RN3VXdP0TFKxmpO/rR69KupZ


---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@wasabisystems.com

home help back first fref pref prev next nref lref last post