[11582] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: Palladium and malware

daemon@ATHENA.MIT.EDU (bear)
Thu Aug 29 16:24:17 2002

Date: Thu, 29 Aug 2002 10:00:16 -0700 (PDT)
From: bear <bear@sonic.net>
To: Paul Crowley <paul@ciphergoth.org>
Cc: cryptography@wasabisystems.com
In-Reply-To: <87ofbm8p49.fsf@saltationism.subnet.hedonism.cluefactory.org.uk>



On 29 Aug 2002, Paul Crowley wrote:

>I'm informed that malware authors often go to some lengths to prevent
>their software from being disassembled.  Could they use Palladium for
>this end?  Are there any ways in which the facilities that Palladium
>and TCPA provide could be useful to a malware author who wants to
>frustrate legitimate attempts to understand and defeat their software?

If it provides the protections that copy-protection groups want
(ie, it can be used to prevent keys in their software from being
read by other software) then yes, it can be used to prevent any
code from being read by any software.

				Bear



---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@wasabisystems.com

home help back first fref pref prev next nref lref last post