Was a mistake made in the design of AACS?

Ian G iang at systemics.com
Wed May 2 18:52:34 EDT 2007


Hal Finney wrote:
> Perry Metzger writes:
> Once the release window has passed,
> the attacker will use the compromise aggressively and the authority
> will then blacklist the compromised player, which essentially starts
> the game over. The studio collects revenue during the release window,
> and sometimes beyond the release window when the attacker gets unlucky
> and takes a long time to find another compromise."


This seems to assume that when a crack is announced, all 
revenue stops.  This would appear to be false.  When cracks 
are announced in such systems, normally revenues aren't 
strongly effected.  C.f. DVDs.

iang

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com



More information about the cryptography mailing list