Was a mistake made in the design of AACS?

Allen netsecurity at sound-by-design.com
Wed May 2 20:20:02 EDT 2007



Ian G wrote:
> Hal Finney wrote:
>> Perry Metzger writes:
>> Once the release window has passed,
>> the attacker will use the compromise aggressively and the authority
>> will then blacklist the compromised player, which essentially starts
>> the game over. The studio collects revenue during the release window,
>> and sometimes beyond the release window when the attacker gets unlucky
>> and takes a long time to find another compromise."
> 
> 
> This seems to assume that when a crack is announced, all revenue stops.  
> This would appear to be false.  When cracks are announced in such 
> systems, normally revenues aren't strongly effected.  C.f. DVDs.

However, the money spent in trying to enforce control comes 
straight from the bottom line and is therefore limited if they 
want to stay profitable in the long run. True, they do have deep 
pockets, but they could be nibbled to death by ducks as they are 
very big targets and the ducks are small and have wings.

Best,

Allen

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com



More information about the cryptography mailing list