SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Technology Stocks : Novell (NOVL) dirt cheap, good buy? -- Ignore unavailable to you. Want to Upgrade?


To: jwright who wrote (34715)11/7/2000 9:43:34 AM
From: Paul Fiondella  Respond to of 42771
 
Eliminating trust from the equation

"once the MP3 file is stored to my virtual drive my job is to keep the file from being decrypt and copied to another drive managed by another FSD which I have no control over"

okay

"but at the same time I have to decrypt it when the user wants to play the MP3 file."

aha the user enters stage left

"At this point I was going to give more details but I don't want to give away the farm."

don't, always resist that temptation

"Personal Directory or any other form of security will not solve this problem because the trust is still with the individual. To solve this problem you have to eliminate trust from the equation."

okay let's do that. In the original conception of a digital identity vault we talked about having a card with an ID on it and having that card transmit the id to activate your identity vault system when you put your finger over a section of the card. Let's call that part one of the authentication process.

In part two you have activated the card your "logged in" id has been transmitted to your identity vault and you password into the system.

Now your want to conduct a transaction to have access to the music file and the keeper of the file wants to be sure you have that right.

Well it all comes down to "you are who you say you are" . That was to be one of the features of an identity vault --- something in the vault which uniquely identifies you.

No more trust --- I've got your id. You are who you say you are. No one other than you can authorize the transaction. Something sits in your vault that uniquely identifies you to me.

"Trust but verify" --- Ronald Raygun

======================

You protect yourself from yourself by transmitting an identifier which you cannot modify or get access to.



To: jwright who wrote (34715)11/7/2000 10:15:45 AM
From: ToySoldier  Read Replies (3) | Respond to of 42771
 
The problem with this whole recorded music piracy protection topic is (as Scott has been saying) that no matter what technology is used to ensure that the music makes it to its intended source, the music eventually has to be HEARD. This means the sound waves leave all protection schemes behind and travel through the air.

Once the music has been turned into sound waves to be placed there at the discretion of so-called trusted individual, the music is basically being laundered from ALL protection schemes previously placed on it since even the most basic audio tape recorder can capture these laundered audio waves.

This captured music (pirated) is then available to be used in whatever discretion the recorder of the music sees fit.

So, when Scott says that the music would have to be plugged into one's head to stop music piracy, that is exactly right since what cannot be heard - cannot be recorded. Of course, if we figure a way of plugging us right into a music system, I think we can be assured that the pirates will figure a way of recording these signals somehow.

The Internet is not the evil source of piracy - that has existed well before the Internet. The Internet has only made the distribution of piracy much easier.

I personally do not see an answer to stopping out-of-control piracy. Maybe the answer is to rethink how the authors and artists get rewarded for their work!

Cheers!

Toy