Re: Five industry giants propose encryption plan to protect Hollywood
Date: Thu, 19 Feb 1998 11:13:50 -0800 (PST) From: William Knowles <erehwon@dis.org>
BURBANK, Calif. (February 19, 1998 09:06 a.m. EST http://www.nando.net) -- Five computer and electronics industry giants have agreed on a strategy to prevent people from illegally copying digital movies and music, the Los Angeles Times reported Thursday.
According to the proposal, high-definition TV sets, personal computers, digital video disc players, digital video cassette recorders and set-top boxes would be equipped with technology that requires a code before a copyrighted piece of work can be transferred from one device to another.
It would ensure that someone who watches or listens to digital movies or music over satellite services, cable networks and the Internet won't be able to make copies without permission.
The encryption technique scrambles the copyrighted material in one device so it cannot be unscrambled by another device without the correct software key.
It's unscrambled when it is listened to...what are they thinking? ---guy Escpecially regarding computers, this won't work.
-----BEGIN PGP SIGNED MESSAGE----- In <199802200635.BAA20101@panix2.panix.com>, on 02/20/98 at 01:35 AM, Information Security <guy@panix.com> said:
Date: Thu, 19 Feb 1998 11:13:50 -0800 (PST) From: William Knowles <erehwon@dis.org>
BURBANK, Calif. (February 19, 1998 09:06 a.m. EST http://www.nando.net) -- Five computer and electronics industry giants have agreed on a strategy to prevent people from illegally copying digital movies and music, the Los Angeles Times reported Thursday.
According to the proposal, high-definition TV sets, personal computers, digital video disc players, digital video cassette recorders and set-top boxes would be equipped with technology that requires a code before a copyrighted piece of work can be transferred from one device to another.
It would ensure that someone who watches or listens to digital movies or music over satellite services, cable networks and the Internet won't be able to make copies without permission.
The encryption technique scrambles the copyrighted material in one device so it cannot be unscrambled by another device without the correct software key.
It's unscrambled when it is listened to...what are they thinking? ---guy
what they are talking about is *every* VCR, TapeRecorded, ...ect will not record data that has this security feature without a proper record code. (keep hold of the old VCR's and Tape Players). Even though the data is decrypted to be viewed you will still have a stego data channel that will tell these recording devices to to record. Will this prevent the professional bootleger from making copies? No. The finanical incentives for working around these security measures are there (bootleging is a multi-billion dollor business). What this will do is prevent you from recording songs off a CD to play on a tape in your car or prevent you from recording that movie you just watched on PPV.
Escpecially regarding computers, this won't work.
Well I have gone over this in previous posts that right's management woun't work against the bootlegers as at some time you have to display the raw data to the user. what it will to is make things that much harder for the average user. - -- - --------------------------------------------------------------- William H. Geiger III http://users.invweb.net/~whgiii Geiger Consulting Cooking With Warp 4.0 Author of E-Secure - PGP Front End for MR/2 Ice PGP & MR/2 the only way for secure e-mail. OS/2 PGP 2.6.3a at: http://users.invweb.net/~whgiii/pgpmr2.html - --------------------------------------------------------------- Tag-O-Matic: Windows: The Gates of hell. -----BEGIN PGP SIGNATURE----- Version: 2.6.3a-sha1 Charset: cp850 Comment: Registered_User_E-Secure_v1.1b1_ES000000 iQCVAwUBNO4RHI9Co1n+aLhhAQFG2QP/UB+mC12eokmLdoZcW80HhDzffc6AhDvm JvVnMra07WTfv9+0axDUHlf7K940yTAeB9gIygPyprNcecB0LndEt0dUB3202oeS 1H2Hztl6Ub/cZVkxnIILeGUDKd/g5jIAnM+/J7e1SHdqPqh0+Bx7WVv2wMLaxl1o riku/bZu5FY= =yOdL -----END PGP SIGNATURE-----
Oh please. You could always (for computers anyway) write your own drivers for video cards and sound cards that not only display stuff, but also save it to a hard drive as it's being recieved. Whoop!
Date: Thu, 19 Feb 1998 11:13:50 -0800 (PST)
From: William Knowles <erehwon@dis.org>
BURBANK, Calif. (February 19, 1998 09:06 a.m. EST http://www.nando.net) -- Five computer and electronics industry giants have agreed on a strategy to prevent people from illegally copying digital movies and music, the Los Angeles Times reported Thursday.
According to the proposal, high-definition TV sets, personal
Well I have gone over this in previous posts that right's management woun't work against the bootlegers as at some time you have to display the raw data to the user. what it will to is make things that much harder for the average user.
Exactly, it will probably require the average user to get involved in weird type in the 5th word of the 6th paragraph on page 60 in volume 6 of your book and your ssn and your 3rd daughter's birth hour to display. But once displayed... it's yours. Shit, things like Lotus ScreenCam can grab anything displayed on screen. -- =====================================Kaos=Keraunos=Kybernetos============== .+.^.+.| Ray Arachelian |Prying open my 3rd eye. So good to see |./|\. ..\|/..|sunder@sundernet.com|you once again. I thought you were |/\|/\ <--*-->| ------------------ |hiding, and you thought that I had run |\/|\/ ../|\..| "A toast to Odin, |away chasing the tail of dogma. I opened|.\|/. .+.v.+.|God of screwdrivers"|my eye and there we were.... |..... ======================= http://www.sundernet.com ==========================
In <34F21246.7B6B00A8@brainlink.com>, on 02/23/98 at 07:20 PM, sunder <sunder@brainlink.com> said:
Oh please. You could always (for computers anyway) write your own drivers for video cards and sound cards that not only display stuff, but also save it to a hard drive as it's being recieved. Whoop!
Well sitting down and writting a device driver is above and beyond the ability of the average WinBlows user. More than likely it is above and beyond the average "programmer" (ASM what's that??). M$ is already playing around with using crypto and only allowing signed programs to run under their OS (Crypto API, Active-X) it is not hard to imagine that they could have the new version of their OS only allow device drivers that have been approved and signed by microsoft (when you control +90% of the market you can get away with silly shit like this).
Date: Thu, 19 Feb 1998 11:13:50 -0800 (PST)
From: William Knowles <erehwon@dis.org>
BURBANK, Calif. (February 19, 1998 09:06 a.m. EST http://www.nando.net) -- Five computer and electronics industry giants have agreed on a strategy to prevent people from illegally copying digital movies and music, the Los Angeles Times reported Thursday.
According to the proposal, high-definition TV sets, personal
Well I have gone over this in previous posts that right's management woun't work against the bootlegers as at some time you have to display the raw data to the user. what it will to is make things that much harder for the average user.
Exactly, it will probably require the average user to get involved in weird type in the 5th word of the 6th paragraph on page 60 in volume 6 of your book and your ssn and your 3rd daughter's birth hour to display. But once displayed... it's yours. Shit, things like Lotus ScreenCam can grab anything displayed on screen.
Yes but I wouldn't want to use ScreenCam to copy a 100 page document. My point was it would not make it impossible to copy the data just that it would raise the "threshold of pain" above what the average user is willing to endure. -- --------------------------------------------------------------- William H. Geiger III http://users.invweb.net/~whgiii Geiger Consulting Cooking With Warp 4.0 Author of E-Secure - PGP Front End for MR/2 Ice PGP & MR/2 the only way for secure e-mail. OS/2 PGP 2.6.3a at: http://users.invweb.net/~whgiii/pgpmr2.html --------------------------------------------------------------- Tag-O-Matic: OS/2, Windows/0
participants (3)
-
Information Security
-
sunder
-
William H. Geiger III