[16633] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: Cryptography Research wants piracy speed bump on HD DVDs

daemon@ATHENA.MIT.EDU (Ian G)
Wed Jan 5 11:44:55 2005

X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
Date: Wed, 05 Jan 2005 15:53:22 +0000
From: Ian G <iang@systemics.com>
To: Adam Back <adam@cypherspace.org>
Cc: Taral <taral@taral.net>, Matt Crawford <crawdad@fnal.gov>,
	cryptography@metzdowd.com
In-Reply-To: <20041222214755.GA2018@bitchcake.off.net>

Adam Back wrote:

>>From what I recall from reading the CR paper a while back they can
>tolerate up to some threshold of colluding players.  However if you go
>over that threshold (and it's not too large) you can remove the mark.
>
>I would think the simplest canonical counter-attack would be to make a
>p2p app that compares diffs in the binary output (efficiently rsync
>style) accumulates enough bits to strip the disk watermark, p2p rips
>and publishes.  QED.
>  
>
If the p2p apps could collude, they could create
a pre-threshold image and share it amongst
themselves only, gradually combining it until
no more differences were detected.  When a
post threshold watermark was reached, the
final image could be released.  You would need
some way to know that the watermark had
been reached, according to the testing against
a sufficient sized pool or somesuch metric.

Add some reputation nyms to sign and that
should avoid the poisoning attacks as well.

-- 
News and views on what matters in finance+crypto:
        http://financialcryptography.com/


---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post