Virtuallizing Palladium
Similar to DeCSS, only one Palladium chip needs to be reverse engineered and it's key(s) broken to virtualize the machine. Simulate a Pentium VI in Java and all extant code could be accessed. Similarly, is Microsoft's signing keys were cracked then any code could be signed. If the software needs a real-time connection to the internet though, then protection could be built into it. Laptop applications would be vulnerable until we have pervasive wireless connection. How many bits do you think MS will use for the keys? Albion.
Albion Zeglin wrote:
Similar to DeCSS, only one Palladium chip needs to be reverse engineered and it's key(s) broken to virtualize the machine.
If you break one machine's key: a) You won't need to virtualise it b) It won't be getting any new software licensed to it
Simulate a Pentium VI in Java and all extant code could be accessed.
If you live long enough for it to run, yeah.
Similarly, is Microsoft's signing keys were cracked then any code could be signed.
Duh.
If the software needs a real-time connection to the internet though, then protection could be built into it.
Oh yeah? How?
Laptop applications would be vulnerable until we have pervasive wireless connection.
How many bits do you think MS will use for the keys?
Enough. Cheers, Ben. -- http://www.apache-ssl.org/ben.html http://www.thebunker.net/ "There is no limit to what a man can do or how far he can go if he doesn't mind who gets the credit." - Robert Woodruff
Ben Laurie <ben@algroup.co.uk> was seen to declaim:
Albion Zeglin wrote:
Similar to DeCSS, only one Palladium chip needs to be reverse engineered and it's key(s) broken to virtualize the machine. If you break one machine's key: a) You won't need to virtualise it b) It won't be getting any new software licensed to it I would think it would be more likely to match the "mod" chips that address this very issue in the Gaming world - a replacement chip that tells the OS "yeah, everythings ok" even when it isn't :)
Probably not worth emulating a Pentium4 in Java, however, there is bochs to start from. I don't think it does P4 emulation yet, but open source, yadda, yadda, cypherpunks write code, yadda, yadda. :) ----------------------Kaos-Keraunos-Kybernetos--------------------------- + ^ + :NSAs budget is about|Passwords are like underwear. You don't /|\ \|/ :$20 Billion USD/year|share them, you don't hang them on your/\|/\ <--*-->:and they didn't stop|monitor, or under your keyboard, you \/|\/ /|\ :9-11 from happening.|don't email them, or put them on a web \|/ + v + :I want a refund! |site, and you must change them very often. --------_sunder_@_sunder_._net_------- http://www.sunder.net ------------ On Thu, 11 Jul 2002, Albion Zeglin wrote:
Similar to DeCSS, only one Palladium chip needs to be reverse engineered and it's key(s) broken to virtualize the machine. Simulate a Pentium VI in Java and all extant code could be accessed. Similarly, is Microsoft's signing keys were cracked then any code could be signed.
If the software needs a real-time connection to the internet though, then protection could be built into it. Laptop applications would be vulnerable until we have pervasive wireless connection.
How many bits do you think MS will use for the keys?
Albion.
participants (4)
-
Albion Zeglin
-
Ben Laurie
-
David Howe
-
Sunder