[107913] in Cypherpunks
Re: My comments on Intel's Processor ID Number
daemon@ATHENA.MIT.EDU (Mok-Kong Shen)
Thu Jan 28 05:22:09 1999
Date: Thu, 28 Jan 1999 10:21:58 +0100
From: Mok-Kong Shen <mok-kong.shen@stud.uni-muenchen.de>
To: cypherpunks@toad.com
Reply-To: Mok-Kong Shen <mok-kong.shen@stud.uni-muenchen.de>
Renegade wrote:
>
> I do not think the ID has anything to do with the claimed intention(s), as
> it is weak just like Bruce pointed out. I think it has more to do with
> where they want to go with copy protection, than anything else.
As has been pointed out by others, the copy protection could be
circumvented. However, that is likely to be done only by some private
persons. Commercial firms and official institutions certainly
don't do that. So copy protection is indeed effective.
Another value of the providing the new feature is in marketing
advertisement, I suppose.
M. K. Shen
------------------------------------------------------
M. K. Shen, Postfach 340238, D-80099 Muenchen, Germany (permanent)
http://www.stud.uni-muenchen.de/~mok-kong.shen/
(Origin site of WEAK2-EX, WEAK3-EX and WEAK4-EX, three Wassenaar-conform
algorithms based on the new paradigm Security through Inefficiency.
Containing 2 mathematical problems with rewards totalling US$500.)