TIP: Click on subject to list as thread! ANSI
echo: nthelp
to: John Beckett
from: Rich
date: 2005-10-08 14:28:52
subject: Re: VPNs

From: "Rich" 

This is a multi-part message in MIME format.

------=_NextPart_000_0395_01C5CC14.9B225D60
Content-Type: text/plain;
        charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

   My objection to your use of the term DRM is that it doesn't apply and =
diverts the discussion away to off topic, often silly, emotionally =
charged claims.  A claim that something could be used for DRM could = apply
to anything as there is no limit to what someone might use.  = Passwords
can be used for DRM.  They are today.  TLS/SSL can be used for = DRM.  It
is today. Smartcards, tokens, or anything to identify the = entity to which
rights were granted can be used.

   None of this helps for secure boot whose purpose is to validate the =
software environment and has no need to identify the user or the = machine.

Rich

  "John Beckett" 
wrote in message =
news:7roek156s13jun0lt9u808ahvmc20pbmrj{at}4ax.com...
  "Rich"  wrote in message news::
  >    Your reply falls apart immediately after "as you well know".
  >  In fact you have it exactly backwards.

  Maybe you're answering in automatic mode??

  Just because I mentioned the terms "Geo" and "DRM" in
the same message
  does not mean I am supporting all or any of Geo's assertions re DRM.

  In fact, I was pointing out that trusted computing is capable of good
  things, and I predict that with the rising sophistication of malware,
  companies really will need trusted computing systems for their laptops =
if
  the laptops are allowed to connect to the normal company network.

  I claim that the same features of trusted computing that provide the
  benefit of secure remote access are also capable of providing DRM. I =
am
  not commenting on whether that is good or bad.

  I would appreciate a clear correction if I have made a mistake in the
  above (i.e. which words are wrong, and briefly why).

  > What you approve is up to you and if you use it can provide you with
  > a degree of trust not available without secure boot.

  I understand that.
  =20
  > Many of george's opinions on DRM are ...

  That's an issue for another thread, IMHO.

  John

------=_NextPart_000_0395_01C5CC14.9B225D60
Content-Type: text/html;
        charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable








   My
objection to your use =
of the term=20
DRM is that it doesn't apply and diverts the discussion away to off = topic, often=20
silly, emotionally charged claims.  A claim that something could
be = used=20
for DRM could apply to anything as there is no limit to what someone = might=20
use.  Passwords can be used for DRM.  They are
today.  = TLS/SSL=20
can be used for DRM.  It is today. Smartcards, tokens, or anything = to=20
identify the entity to which rights were granted can be =
used.
 
   None of
this helps for =
secure boot=20
whose purpose is to validate the software environment and
has = no need=20
to identify the user or the machine.
 
Rich
 

  "John Beckett" <FirstnameSurname{at}com=">mailto:FirstnameSurname{at}compuserve.com.omit">FirstnameSurname{at}com=
puserve.com.omit>=20
  wrote in message news:7roek156s13=
jun0lt9u808ahvmc20pbmrj{at}4ax.com..."Rich"=20
  <{at}> wrote in message >   =20
  Your reply falls apart immediately after "as you well =
know".>  In=20
  fact you have it exactly backwards.Maybe you're answering in =
automatic=20
  mode??Just because I mentioned the terms
"Geo" and "DRM" in =
the same=20
  messagedoes not mean I am supporting all or any of Geo's =
assertions re=20
  DRM.In fact, I was pointing out that trusted computing is =
capable of=20
  goodthings, and I predict that with the rising sophistication of=20
  malware,companies really will need trusted computing systems for =
their=20
  laptops ifthe laptops are allowed to connect to the normal company =

  network.I claim that the same features of trusted computing =
that=20
  provide thebenefit of secure remote access are also capable of =
providing=20
  DRM. I amnot commenting on whether that is good or
bad.I =
would=20
  appreciate a clear correction if I have made a mistake in theabove =
(i.e.=20
  which words are wrong, and briefly why).> What
you approve =
is up to=20
  you and if you use it can provide you with> a degree of trust =
not=20
  available without secure boot.I understand =
that. >=20
  Many of george's opinions on DRM are ...That's an issue for =
another=20
  thread,
IMHO.John

------=_NextPart_000_0395_01C5CC14.9B225D60--

--- BBBS/NT v4.01 Flag-5
* Origin: Barktopia BBS Site http://HarborWebs.com:8081 (1:379/45)
SEEN-BY: 633/267 270 5030/786
@PATH: 379/45 1 106/2000 633/267

SOURCE: echomail via fidonet.ozzmosis.com

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.