[11276] in cryptography@c2.net mail archive
RE: Challenge to David Wagner on TCPA
daemon@ATHENA.MIT.EDU (James A. Donald)
Thu Aug 1 22:30:20 2002
From: "James A. Donald" <jamesd@echeque.com>
To: <ptrei@rsasecurity.com>, cypherpunks <cypherpunks@lne.com>,
<cryptography@wasabisystems.com>
Date: Thu, 1 Aug 2002 19:17:41 -0700
In-reply-to: <Pine.SOL.4.30.0208020306300.21349-100000@kruuna.Helsinki.FI>
--
On 2 Aug 2002 at 3:31, Sampo Syreeni wrote:
> More generally, as long as we have computers which allow data to
> be addressed as code and vice versa, the ability to control use
> of data will necessarily entail ability to control use of code.
> So, either we will get systems where circumventing copyright
> controls is trivial or ones where you cannot compile your own
> code. All the rest is just meaningless syntax.
The announced purpose of TCPA/Palladium is to introduce some
intermediate cases. For example you could compile your own code,
and then encrypt it so that it can only run on a specific target
computer.
As somone who sells code, I would think this would be a great
idea, were it not for the excesses we have been seeing from the IP
lobbyists.
--digsig
James A. Donald
6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
iB5WVaGfx+zq5Dani1KQGdZIU5Kl21LDrc7w4e1m
2PoKhj2EuUKqjKlZ/RN3VXdP0TFKxmpO/rR69KupZ
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@wasabisystems.com