Re: How do you.....
- Posted by gertie at visionsix.com Jun 03, 2003
- 468 views
On 3 Jun 2003, at 11:04, Christian.CUVIER at agriculture.gouv.fr wrote: > > > > Date: Mon, 2 Jun 2003 16:26:20 -0400 From: jbrown105 at speedymail.org > > Subject: > > Re: How do you..... On Mon, Jun 02, 2003 at 07:30:36AM -0400, irvm at > > ellijay.com > > wrote: > > > >> > >> On Monday 02 June 2003 01:46 am, you wrote: > > > >> > > >> > On Mon, 02 Jun 2003 00:35:04 -0300, <rforno at tutopia.com> wrote: > > > >> > > Karl: > >> > > What is DRM? > > > >> > > >> > Digital Rights Management > > > >> > >> Which, in a nutshell, means that if someone else (Microsoft, or the RIAA, > >> for > >> example) created it, you can't use it as you wish, even if you have paid > >> fot > >> it. > >> > >> But if _you_ want to create something, you will have to pay Microsoft for > >> the > >> privilege, or what you have created won't run on DRM protected computers > >> [play on DRM cd's] ...etc. * > >> > >> And they complain about the mafia..... > >> > >> Irv > >> > > > > I wonder how they'll handle the running of non-DRM legacy Windows apps. > > > > If DRM can't be turned off, then those old apps won't run, which will be a > > huge incentive against DRM. > > > > jbrown > > What if this was just a propaganda ploy to panic a lot of people into > buying non-DRM software before the iron curtain falls? It is just too > unlikely that M$ and others move to such a gaping break of > compatibility, given their record of maintaining ascendant compat with > obsolete techniques and products at a high cost. > That's why I don't fret too much about the issue. Just use third party > add-ons to protect your privacy. This is gettong harder since 911, but > remains possible. You haveto realise the usa gov is supporting these restrictions. By tagging all communications' sources and destinations, they will be able to log all internet communications more easily. The main holdup to IPv6 is the logging ability and packet formating. All phone lines used for speech can be wiretapped (it supposedly takes a court order, but those would be easy to get now), and the digital lines will be tapped as a matter of course, without court orders. Having a "3rd party" OS or socks driver simply means your packets will be refused from internet routers with a error msg along the lines of "if we can't read it, you can't use our internet". If an app passes DRM, poeple will be more likely to use it, meaning signed snoopware will be used without a 2nd thought. (All versions of Microsoft Office keep a number that identifies your computer in each file you create that includes Visual Basic macros. Office 97 keeps an identifying number even if there are no macros.) Look how many people use javascript, java, activex, even tho i downloaded 5 public examples of how to install malicious code remotely on someone's computer without their knowledge, using any of them. If Adobe can get the us gov to use .pdf as a default text editor, despite what other countries say about M$ and .pdf, you know M$, with it's money, will win. Howard Schmidt, vice chairman of the White House's National Critical Infrastructure Protection Board, was previously Microsoft's chief security officer. Scott Charney, Microsoft's current security officer, is a former federal official. Kat