On Wed, 3 Dec 1997, William H. Geiger III wrote:
For practical reason data must be in the clear in memory at some point in time. Also the data must be transferred into some type of peripheral so the user can do somthing with the data (read text off a monitor, print a document, listen to music, ...ect).
This is the biggest failings in these systems. Once the user has the ability to decrypt the data the game is lost. One does not need to break the crypto system as they give you the keys with the product!!
Ut oh. Now the government is going to protect us from the new Horseman, copyright violators, by mandating diskless network computers that run only government-approved software. We can't let those awful hackers unlawfully disassemble software for the purpose of stealing other data, now can we? After all, it's for the children... and this solves that pesky strong crypto problem too. -- Brian Buchanan brian@smarter.than.nu No security through obscurity! Demand full source code! 4.4BSD for the masses - http://www.freebsd.org