[Top][All Lists]

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: Niches for the Hurd: evaluation method; was: DRM musings, capabiliti

From: Arne Babenhauserheide
Subject: Re: Niches for the Hurd: evaluation method; was: DRM musings, capabilities and stuff
Date: Tue, 30 Dec 2008 17:52:18 +0100
User-agent: KMail/1.10.3 (Linux/2.6.25-gentoo-r7; KDE/4.1.3; x86_64; ; )

Am Dienstag 30 Dezember 2008 17:23:58 schrieb Michal Suchanek:
> Yes, and then the application does not get the right keys to decrypt
> the data from the device. So the ability to lie (or be root) is
> irrelevant in this case given the protocol to obtain the keys is
> designed properly.

And that kind of setup would violate the GPLv3 since it can be used to lock 
down free software. 

I must be able to access keys to make the modified system work just like the 
original one, so in this case I'd have to have access to the private keys and 
my driver could do the signing and keep my modified system working. 

Best wishes, 
-- My stuff: http://draketo.de - stories, songs, poems, programs and stuff :)
-- Infinite Hands: http://infinite-hands.draketo.de - singing a part of the 
history of free software.
-- Ein W├╝rfel System: http://1w6.org - einfach saubere (Rollenspiel-) Regeln.

-- PGP/GnuPG: http://draketo.de/inhalt/ich/pubkey.txt

Attachment: signature.asc
Description: This is a digitally signed message part.

reply via email to

[Prev in Thread] Current Thread [Next in Thread]