Virtuallizing Palladium
Ben Laurie
ben at algroup.co.uk
Mon Jul 15 02:34:40 PDT 2002
Albion Zeglin wrote:
>
> Similar to DeCSS, only one Palladium chip needs to be reverse engineered and
> it's key(s) broken to virtualize the machine.
If you break one machine's key:
a) You won't need to virtualise it
b) It won't be getting any new software licensed to it
> Simulate a Pentium VI in Java and
> all extant code could be accessed.
If you live long enough for it to run, yeah.
> Similarly, is Microsoft's signing keys were
> cracked then any code could be signed.
Duh.
> If the software needs a real-time connection to the internet though, then
> protection could be built into it.
Oh yeah? How?
> Laptop applications would be vulnerable
> until we have pervasive wireless connection.
>
> How many bits do you think MS will use for the keys?
Enough.
Cheers,
Ben.
--
http://www.apache-ssl.org/ben.html http://www.thebunker.net/
"There is no limit to what a man can do or how far he can go if he
doesn't mind who gets the credit." - Robert Woodruff
More information about the cypherpunks-legacy
mailing list