[87417] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: Was a mistake made in the design of AACS?

daemon@ATHENA.MIT.EDU (Allen)
Fri May 4 09:50:09 2007

Date: Wed, 02 May 2007 17:20:02 -0700
From: Allen <netsecurity@sound-by-design.com>
To:  cryptography@metzdowd.com
In-Reply-To: <46391632.1060204@systemics.com>



Ian G wrote:
> Hal Finney wrote:
>> Perry Metzger writes:
>> Once the release window has passed,
>> the attacker will use the compromise aggressively and the authority
>> will then blacklist the compromised player, which essentially starts
>> the game over. The studio collects revenue during the release window,
>> and sometimes beyond the release window when the attacker gets unlucky
>> and takes a long time to find another compromise."
> 
> 
> This seems to assume that when a crack is announced, all revenue stops.  
> This would appear to be false.  When cracks are announced in such 
> systems, normally revenues aren't strongly effected.  C.f. DVDs.

However, the money spent in trying to enforce control comes 
straight from the bottom line and is therefore limited if they 
want to stay profitable in the long run. True, they do have deep 
pockets, but they could be nibbled to death by ducks as they are 
very big targets and the ducks are small and have wings.

Best,

Allen

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post