bug-hurd
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: Niches for the Hurd: evaluation method; was: DRM musings, capabiliti


From: Michal Suchanek
Subject: Re: Niches for the Hurd: evaluation method; was: DRM musings, capabilities and stuff
Date: Tue, 30 Dec 2008 18:59:18 +0100

On 30/12/2008, Arne Babenhauserheide <arne_bab@web.de> wrote:
> Am Dienstag 30 Dezember 2008 17:23:58 schrieb Michal Suchanek:
>
> > Yes, and then the application does not get the right keys to decrypt
>  > the data from the device. So the ability to lie (or be root) is
>  > irrelevant in this case given the protocol to obtain the keys is
>  > designed properly.
>
>
> And that kind of setup would violate the GPLv3 since it can be used to lock
>  down free software.
>
>  I must be able to access keys to make the modified system work just like the
>  original one, so in this case I'd have to have access to the private keys and
>  my driver could do the signing and keep my modified system working.
>
>  Best wishes,
>

So you would have to deny running anything less restrictive than GPLv3
code on the system for the restriction to be enforceable and we are
back to the GPLv3 only system which I find somewhat limited.

Thanks

Michal




reply via email to

[Prev in Thread] Current Thread [Next in Thread]