Was a mistake made in the design of AACS?
    Ian G 
    iang at systemics.com
       
    Wed May  2 18:52:34 EDT 2007
    
    
  
Hal Finney wrote:
> Perry Metzger writes:
> Once the release window has passed,
> the attacker will use the compromise aggressively and the authority
> will then blacklist the compromised player, which essentially starts
> the game over. The studio collects revenue during the release window,
> and sometimes beyond the release window when the attacker gets unlucky
> and takes a long time to find another compromise."
This seems to assume that when a crack is announced, all 
revenue stops.  This would appear to be false.  When cracks 
are announced in such systems, normally revenues aren't 
strongly effected.  C.f. DVDs.
iang
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com
    
    
More information about the cryptography
mailing list