Was a mistake made in the design of AACS?
Allen
netsecurity at sound-by-design.com
Wed May 2 20:20:02 EDT 2007
Ian G wrote:
> Hal Finney wrote:
>> Perry Metzger writes:
>> Once the release window has passed,
>> the attacker will use the compromise aggressively and the authority
>> will then blacklist the compromised player, which essentially starts
>> the game over. The studio collects revenue during the release window,
>> and sometimes beyond the release window when the attacker gets unlucky
>> and takes a long time to find another compromise."
>
>
> This seems to assume that when a crack is announced, all revenue stops.
> This would appear to be false. When cracks are announced in such
> systems, normally revenues aren't strongly effected. C.f. DVDs.
However, the money spent in trying to enforce control comes
straight from the bottom line and is therefore limited if they
want to stay profitable in the long run. True, they do have deep
pockets, but they could be nibbled to death by ducks as they are
very big targets and the ducks are small and have wings.
Best,
Allen
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com
More information about the cryptography
mailing list