[87350] in cryptography@c2.net mail archive
Re: Was a mistake made in the design of AACS?
daemon@ATHENA.MIT.EDU (Ian G)
Wed May 2 18:59:40 2007
Date: Thu, 03 May 2007 00:52:34 +0200
From: Ian G <iang@systemics.com>
To: Hal Finney <hal@finney.org>
Cc: cryptography@metzdowd.com
In-Reply-To: <20070502203156.C44F414F6BC@finney.org>
Hal Finney wrote:
> Perry Metzger writes:
> Once the release window has passed,
> the attacker will use the compromise aggressively and the authority
> will then blacklist the compromised player, which essentially starts
> the game over. The studio collects revenue during the release window,
> and sometimes beyond the release window when the attacker gets unlucky
> and takes a long time to find another compromise."
This seems to assume that when a crack is announced, all
revenue stops. This would appear to be false. When cracks
are announced in such systems, normally revenues aren't
strongly effected. C.f. DVDs.
iang
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com