[6646] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: Copy protection proposed for digital displays

daemon@ATHENA.MIT.EDU (David Honig)
Wed Feb 23 11:06:54 2000

Message-Id: <3.0.6.32.20000223070920.007a9430@pop.sprynet.com>
Date: Wed, 23 Feb 2000 07:09:20 -0800
To: Ian Farquhar <Ian.Farquhar@Aus.Sun.COM>, Ian.Farquhar@Aus.Sun.COM,
        cryptography@c2.net, eugene.leitl@lrz.uni-muenchen.de,
        kelsey.j@ix.netcom.com
From: David Honig <honig@sprynet.com>
Cc: Ian.Farquhar@Aus.Sun.COM
In-Reply-To: <200002230647.RAA20946@tolstoy.Aus.Sun.COM>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"

At 05:46 PM 2/23/00 +1100, Ian Farquhar wrote:
>Of course, there are also ways manufacturers could try to counter 
>this.  Constructing tamper-resistant cases for monitors is one
>way.  Indeed, I'll suggest to everyone here that tamper
>resistant enclosures (everything from "mousetraps" to FIPS-140
>style boxes) are going to become much more common in consumer
>electronics.

When the decryption unit is in the same package as
the video DACs, the game will be much much harder.
Its not been done yet, but it will.


>Ultimately, this will come down to being a tradeoff between
>investment and return.  Who's Intel targeting?  I'd suggest

Well, directly they're targeting folks like 
http://www.opencable.com/public_docs.html
who are the actual purchasers of chips in mass
quantities.

>they're targeting casual copiers and underfunded bootleg
>operators.  Against them, this may be viable.  Against even a
>moderately well funded piracy operation, forget it.

"They have logic analyzers in hong kong"








  






home help back first fref pref prev next nref lref last post