[Top][All Lists]

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: Niches for the Hurd: evaluation method; was: DRM musings, capabiliti

From: Arne Babenhauserheide
Subject: Re: Niches for the Hurd: evaluation method; was: DRM musings, capabilities and stuff
Date: Tue, 30 Dec 2008 17:04:19 +0100
User-agent: KMail/1.10.3 (Linux/2.6.25-gentoo-r7; KDE/4.1.3; x86_64; ; )

Am Dienstag 30 Dezember 2008 16:48:53 schrieb Michal Suchanek:
> > Yes they have, because with a treacherous design, they can use my free
> > tools to create parts I can't access.
> Yes, and the tools required are memory protection and a hardware
> cryptography device both of which are present in most current systems.
> So we are back to all systems being treacherous by design.

No, because I can make my system lie to them because I am root - and that's 
If they expect some driver for accessing the cryptographic device, I just 
install a fake driver which tells them what they want to hear. 

With Coyotos that would be far harder because protection against root is built 
into its core design. 

We already discussed this, no need to go at it again. 

Best wishes, 
-- My stuff: http://draketo.de - stories, songs, poems, programs and stuff :)
-- Infinite Hands: http://infinite-hands.draketo.de - singing a part of the 
history of free software.
-- Ein W├╝rfel System: http://1w6.org - einfach saubere (Rollenspiel-) Regeln.

-- PGP/GnuPG: http://draketo.de/inhalt/ich/pubkey.txt

Attachment: signature.asc
Description: This is a digitally signed message part.

reply via email to

[Prev in Thread] Current Thread [Next in Thread]