[107913] in Cypherpunks

home help back first fref pref prev next nref lref last post

Re: My comments on Intel's Processor ID Number

daemon@ATHENA.MIT.EDU (Mok-Kong Shen)
Thu Jan 28 05:22:09 1999

Date: Thu, 28 Jan 1999 10:21:58 +0100
From: Mok-Kong Shen <mok-kong.shen@stud.uni-muenchen.de>
To: cypherpunks@toad.com
Reply-To: Mok-Kong Shen <mok-kong.shen@stud.uni-muenchen.de>

Renegade wrote:
> 
> I do not think the ID has anything to do with the claimed intention(s), as
> it is weak just like Bruce pointed out. I think it has more to do with
> where they want to go with copy protection, than anything else.

As has been pointed out by others, the copy protection could be
circumvented. However, that is likely to be done only by some private
persons. Commercial firms and official institutions certainly 
don't do that. So copy protection is indeed effective.

Another value of the providing the new feature is in marketing
advertisement, I suppose.

M. K. Shen


------------------------------------------------------
M. K. Shen, Postfach 340238, D-80099 Muenchen, Germany   (permanent) 
http://www.stud.uni-muenchen.de/~mok-kong.shen/     
(Origin site of WEAK2-EX, WEAK3-EX and WEAK4-EX, three Wassenaar-conform
 algorithms based on the new paradigm Security through Inefficiency.
 Containing 2 mathematical problems with rewards totalling US$500.)


home help back first fref pref prev next nref lref last post