[11582] in cryptography@c2.net mail archive
Re: Palladium and malware
daemon@ATHENA.MIT.EDU (bear)
Thu Aug 29 16:24:17 2002
Date: Thu, 29 Aug 2002 10:00:16 -0700 (PDT)
From: bear <bear@sonic.net>
To: Paul Crowley <paul@ciphergoth.org>
Cc: cryptography@wasabisystems.com
In-Reply-To: <87ofbm8p49.fsf@saltationism.subnet.hedonism.cluefactory.org.uk>
On 29 Aug 2002, Paul Crowley wrote:
>I'm informed that malware authors often go to some lengths to prevent
>their software from being disassembled. Could they use Palladium for
>this end? Are there any ways in which the facilities that Palladium
>and TCPA provide could be useful to a malware author who wants to
>frustrate legitimate attempts to understand and defeat their software?
If it provides the protections that copy-protection groups want
(ie, it can be used to prevent keys in their software from being
read by other software) then yes, it can be used to prevent any
code from being read by any software.
Bear
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@wasabisystems.com