| TIP: Click on subject to list as thread! | ANSI |
| echo: | |
|---|---|
| to: | |
| from: | |
| date: | |
| subject: | Re: VPNs |
From: "Rich"
This is a multi-part message in MIME format.
------=_NextPart_000_0395_01C5CC14.9B225D60
Content-Type: text/plain;
charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
My objection to your use of the term DRM is that it doesn't apply and =
diverts the discussion away to off topic, often silly, emotionally =
charged claims. A claim that something could be used for DRM could = apply
to anything as there is no limit to what someone might use. = Passwords
can be used for DRM. They are today. TLS/SSL can be used for = DRM. It
is today. Smartcards, tokens, or anything to identify the = entity to which
rights were granted can be used.
None of this helps for secure boot whose purpose is to validate the =
software environment and has no need to identify the user or the = machine.
Rich
"John Beckett"
wrote in message =
news:7roek156s13jun0lt9u808ahvmc20pbmrj{at}4ax.com...
"Rich" wrote in message news::
> Your reply falls apart immediately after "as you well know".
> In fact you have it exactly backwards.
Maybe you're answering in automatic mode??
Just because I mentioned the terms "Geo" and "DRM" in
the same message
does not mean I am supporting all or any of Geo's assertions re DRM.
In fact, I was pointing out that trusted computing is capable of good
things, and I predict that with the rising sophistication of malware,
companies really will need trusted computing systems for their laptops =
if
the laptops are allowed to connect to the normal company network.
I claim that the same features of trusted computing that provide the
benefit of secure remote access are also capable of providing DRM. I =
am
not commenting on whether that is good or bad.
I would appreciate a clear correction if I have made a mistake in the
above (i.e. which words are wrong, and briefly why).
> What you approve is up to you and if you use it can provide you with
> a degree of trust not available without secure boot.
I understand that.
=20
> Many of george's opinions on DRM are ...
That's an issue for another thread, IMHO.
John
------=_NextPart_000_0395_01C5CC14.9B225D60
Content-Type: text/html;
charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
My
objection to your use =
of the term=20
DRM is that it doesn't apply and diverts the discussion away to off = topic, often=20
silly, emotionally charged claims. A claim that something could
be = used=20
for DRM could apply to anything as there is no limit to what someone = might=20
use. Passwords can be used for DRM. They are
today. = TLS/SSL=20
can be used for DRM. It is today. Smartcards, tokens, or anything = to=20
identify the entity to which rights were granted can be =
used.
None of
this helps for =
secure boot=20
whose purpose is to validate the software environment and
has = no need=20
to identify the user or the machine.
Rich
* Origin: Barktopia BBS Site http://HarborWebs.com:8081 (1:379/45)SEEN-BY: 633/267 270 5030/786 @PATH: 379/45 1 106/2000 633/267 |
|
| SOURCE: echomail via fidonet.ozzmosis.com | |
Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.