Virtuallizing Palladium

Ben Laurie ben at algroup.co.uk
Mon Jul 15 02:34:40 PDT 2002


Albion Zeglin wrote:
> 
> Similar to DeCSS, only one Palladium chip needs to be reverse engineered and
> it's key(s) broken to virtualize the machine.

If you break one machine's key:

a) You won't need to virtualise it

b) It won't be getting any new software licensed to it

> Simulate a Pentium VI in Java and
> all extant code could be accessed.

If you live long enough for it to run, yeah.

>  Similarly, is Microsoft's signing keys were
> cracked  then any code could be signed.

Duh.

> If the software needs a real-time connection to the internet though, then
> protection could be built into it.

Oh yeah? How?

> Laptop applications would be vulnerable
> until we have pervasive wireless connection.
> 
> How many bits do you think MS will use for the keys?

Enough.

Cheers,

Ben.

-- 
http://www.apache-ssl.org/ben.html       http://www.thebunker.net/

"There is no limit to what a man can do or how far he can go if he
doesn't mind who gets the credit." - Robert Woodruff





More information about the cypherpunks-legacy mailing list