Was a mistake made in the design of AACS?
    Allen 
    netsecurity at sound-by-design.com
       
    Wed May  2 20:20:02 EDT 2007
    
    
  
Ian G wrote:
> Hal Finney wrote:
>> Perry Metzger writes:
>> Once the release window has passed,
>> the attacker will use the compromise aggressively and the authority
>> will then blacklist the compromised player, which essentially starts
>> the game over. The studio collects revenue during the release window,
>> and sometimes beyond the release window when the attacker gets unlucky
>> and takes a long time to find another compromise."
> 
> 
> This seems to assume that when a crack is announced, all revenue stops.  
> This would appear to be false.  When cracks are announced in such 
> systems, normally revenues aren't strongly effected.  C.f. DVDs.
However, the money spent in trying to enforce control comes 
straight from the bottom line and is therefore limited if they 
want to stay profitable in the long run. True, they do have deep 
pockets, but they could be nibbled to death by ducks as they are 
very big targets and the ducks are small and have wings.
Best,
Allen
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com
    
    
More information about the cryptography
mailing list