Was a mistake made in the design of AACS?
Ian G
iang at systemics.com
Wed May 2 18:52:34 EDT 2007
Hal Finney wrote:
> Perry Metzger writes:
> Once the release window has passed,
> the attacker will use the compromise aggressively and the authority
> will then blacklist the compromised player, which essentially starts
> the game over. The studio collects revenue during the release window,
> and sometimes beyond the release window when the attacker gets unlucky
> and takes a long time to find another compromise."
This seems to assume that when a crack is announced, all
revenue stops. This would appear to be false. When cracks
are announced in such systems, normally revenues aren't
strongly effected. C.f. DVDs.
iang
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com
More information about the cryptography
mailing list