"First, get it built into all CPU chips...only _then_ make it mandatory."
My fellow Cypherpunks, Tim May writes:
Then, perhaps after some major war or terror incident or other trigger, major OSes will require the TCPA/DRM features to be running at all times. Sure, maybe some little Perl or Java program Joe Sixpack writes won't need it, but anything not on the margins will require it.
This then brings up the question of Open Source operating systems like the (GNU) Linux distributions and the BSD operating systems. Is the TCPA/DRM feature code to be published or censored out? For the source code, will the censored code be a binary file? This could be a mess. I believe that there was a discussion of US mandated Malice code in Open Source operating systems on the Cypherpunks list recently, but I couldn't find it with a Google search. Anybody got a Cypherpunk Hyperarchive link? If the above happens, it would keep the coding anarchists busy for years :-) Recompiling your operating system with an outlaw file included would be an anarchic and patriotic act. It could also knock down Microsoft market share. I suspect the the US solution would be hardware. All new hardware would be maliced and old hardware would become obsolete. Yours Truly, Gary Jeffers Beat State!!!
-- On 7 Jul 2002 at 0:42, Gary Jeffers wrote:
I suspect the the US solution would be hardware. All new hardware would be maliced and old hardware would become obsolete.
The plan, as envisaged by our enemies, is that first almost everyone will voluntarily run a "trusted" operating system in order to view copyrighted entertainment. The major capability of the new hardware will be to advertise to servers that trusted software is in control. Then new hardware that is willing to run an "untrusted" operating system will be banned. After all, only pirates, drug trafficers, money launderers, and child pornographers are running untrusted software. Then only properly degreed people will be authorized to work on untrusted operating systems and hardware campable of running them. The qualifications for being properly degreed, like the qualifications for medicine, will become increasing related to control and less related to competence. Unauthorized possession of untrusted hardware will become subject to increasingly severe sanctions, and net access will only be possible through a gateway and proxies running trusted sofware. Of course the flaw in this is step one -- almost everyone runs a "trusted" operating system. When step one does not seem to be happening, it will be announced to be largely complete, and then step two will be launched prematurely, and so will encounter considerable hostility.. --digsig James A. Donald 6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG c6oGyTOTR4sjs5j10gZI6c8osgJ1nsUjWBiuVfcv 2tuCE2J8F56JYFA6IB8E7zAWovOi9DOy+tkuBnRCm
participants (2)
-
Gary Jeffers
-
jamesd@echeque.com