Re: How do you.....

new topic     » goto parent     » topic index » view thread      » older message » newer message

On 3 Jun 2003, at 11:04, Christian.CUVIER at agriculture.gouv.fr wrote:

> 
> 
> > Date: Mon, 2 Jun 2003 16:26:20 -0400 From: jbrown105 at speedymail.org
> > Subject:
> > Re: How do you..... On Mon, Jun 02, 2003 at 07:30:36AM -0400, irvm at
> > ellijay.com
> > wrote:
> > 
> >> 
> >> On Monday 02 June 2003 01:46 am, you wrote:
> > 
> >> >
> >> > On Mon, 02 Jun 2003 00:35:04 -0300, <rforno at tutopia.com> wrote:
> > 
> >> > > Karl:
> >> > > What is DRM?
> > 
> >> >
> >> > Digital Rights Management
> > 
> >> 
> >> Which, in a nutshell, means that if someone else (Microsoft, or the RIAA,
> >> for
> >> example) created it, you can't use it as you wish, even if you have paid
> >> fot
> >> it.  
> >> 
> >> But if _you_ want to create something, you will have to pay Microsoft for
> >> the
> >> privilege, or what you have created won't run on DRM protected computers
> >> [play on DRM cd's]  ...etc. *
> >> 
> >> And they complain about the mafia.....
> >> 
> >> Irv
> >> 
> > 
> > I wonder how they'll handle the running of non-DRM legacy Windows apps.
> > 
> > If DRM can't be turned off, then those old apps won't run, which will be a
> > huge incentive against DRM.
> > 
> > jbrown
> 
>  What if this was just a propaganda ploy to panic a lot of people into 
> buying non-DRM software before the iron curtain falls? It is just too 
> unlikely that M$ and others move to such a gaping break of 
> compatibility, given their record of maintaining ascendant compat with 
> obsolete techniques and products at a high cost.
>  That's why I don't fret too much about the issue. Just use third party 
> add-ons to protect your privacy. This is gettong harder since 911, but 
> remains possible.

You haveto realise the usa gov is supporting these restrictions. By tagging 
all communications' sources and destinations, they will be able to log all 
internet communications more easily. The main holdup to IPv6 is the logging 
ability and packet formating. All phone lines used for speech can be 
wiretapped (it supposedly takes a court order, but those would be easy to 
get now), and the digital lines will be tapped as a matter of course, without 
court orders. Having a "3rd party" OS or socks driver simply means your 
packets will be refused from internet routers with a error msg along the lines 
of "if we can't read it, you can't use our internet". If an app passes DRM, 
poeple will be more likely to use it, meaning signed snoopware will be used 
without a 2nd thought. (All versions of Microsoft Office keep a number that 
identifies your computer in each file you create that includes Visual Basic 
macros. Office 97 keeps an identifying number even if there are no macros.) Look
how many people use javascript, java, activex, even tho i downloaded 5 public 
examples of how to install malicious code remotely on someone's computer without
their knowledge, using any of them. If Adobe can get the us gov to use .pdf as a
default text editor, despite what other countries say about M$ and .pdf, you
know
M$, with it's money, will win. Howard Schmidt, vice chairman of the White
House's
National Critical Infrastructure Protection Board, was previously Microsoft's
chief
security officer. Scott Charney, Microsoft's current security officer, is a
former
federal official.


Kat

new topic     » goto parent     » topic index » view thread      » older message » newer message

Search



Quick Links

User menu

Not signed in.

Misc Menu