Re: new generic content schemes popping up everywhere...

Thomas Dodd (ted@cypress.com)
Tue, 13 Mar 2001 13:39:55 -0600


Andre Hedrick wrote:
> >From siliconvalley.com's GMSV column today:
> self-destruct if it's tampered with. The utility is enabled
> with 11 layers of security defenses, all of which must be
> successfully navigated to disable the system. These layers
> range from a series of forced reboots designed to thwart
> automated hacking tools to something called "the white screen
> of death" which destroys the software and all files stored
> inside it. Infraworks CEO George Friedman says the
> application's system-level control is possible largely because
> it is firmly anchored into users' C drives during
> installation. "We're fairly deep in the operating system,"

Not much help if you put the disk in another box without their
system installed (or mount in linux/BSD/MacOS) to break the
encryption/controls. Once that's done, A floppy based OS
and tool could break open the files on a disk, when their
apps aren't running.

If it can be decrypted "legally" it can
be done "illegally" too.

-Thomas
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/