[87350] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: Was a mistake made in the design of AACS?

daemon@ATHENA.MIT.EDU (Ian G)
Wed May 2 18:59:40 2007

Date: Thu, 03 May 2007 00:52:34 +0200
From: Ian G <iang@systemics.com>
To: Hal Finney <hal@finney.org>
Cc: cryptography@metzdowd.com
In-Reply-To: <20070502203156.C44F414F6BC@finney.org>

Hal Finney wrote:
> Perry Metzger writes:
> Once the release window has passed,
> the attacker will use the compromise aggressively and the authority
> will then blacklist the compromised player, which essentially starts
> the game over. The studio collects revenue during the release window,
> and sometimes beyond the release window when the attacker gets unlucky
> and takes a long time to find another compromise."


This seems to assume that when a crack is announced, all 
revenue stops.  This would appear to be false.  When cracks 
are announced in such systems, normally revenues aren't 
strongly effected.  C.f. DVDs.

iang

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post