Superdistribution development/release

Brian W. Buchanan brian at smarter.than.nu
Wed Dec 3 19:13:16 PST 1997



On Wed, 3 Dec 1997, Declan McCullagh wrote:

> 
> Here an incentive: if anyone breaks this, I'll write an article about it
> and another profiling the person who does.
> 
> When you have this kind of "encryption" scheme running on untrusted
> hardware to which the user has access, it's doomed to fail. Even if it's
> custom hardware, it'll probably be broken, but it'll just take longer.

Should be relatively trivial to break the encryption, since it can't be
over 40-bit (or 56-bit if the company joined the kiss-ass alliance).
Probably just as easy or easier to disassemble the software or do some
creative tweaking of Windows DLLs to intercept data.  Custom hardware is
probably out due to cost and distribution problems, and even with it, it's
still possible to intercept data between the hardware and the software, or
the software and the OS.

-- 
Brian Buchanan                                      brian at smarter.than.nu

No security through obscurity!  Demand full source code!
4.4BSD for the masses - http://www.freebsd.org







More information about the cypherpunks-legacy mailing list