[8039] in cryptography@c2.net mail archive
Re: BSA deploys imaginary pirate software detector vans
daemon@ATHENA.MIT.EDU (Markus Kuhn)
Mon Nov 13 13:16:17 2000
To: cryptography@c2.net, cypherpunks@cyberpass.net
Cc: G.Price@ccsr.cam.ac.uk, njohnson@interl.net,
Fearghas McKay <fm@st-kilda.org>,
"R. A. Hettinga" <rah@shipwright.com>
In-reply-to: Your message of "Fri, 10 Nov 2000 09:39:40 GMT."
<E13uAeq-0003Cx-00@godzilla.ccsr.cam.ac.uk>
Mime-Version: 1.0
Content-Type: text/plain; charset=iso-8859-1
Content-Transfer-Encoding: quoted-printable
Date: Fri, 10 Nov 2000 12:54:48 +0000
From: Markus Kuhn <Markus.Kuhn@cl.cam.ac.uk>
Message-Id: <E13uDhx-0003rq-00@wisbech.cl.cam.ac.uk>
> From: "Neil Johnson" <njohnson@interl.net>
> =
> Wasn't there some articles some time ago about Microsoft doing research=
into
> Tempest/Van Eck (sp) radiation ? It was speculated at the time that th=
ey
> were going include software to "broadcast" their serial numbers so that=
> illegal copies could be detected.
This entire story is complete nonsense (and I am the closest person on
this planet to the source of this rumour).
There was a slightly misleading article in
Scientific American, issue 12/1998,
http://www.sciam.com/1998/1298issue/1298techbus4.html
on this issue that was presented on =
http://slashdot.org/articles/98/11/16/0028250.shtml
in a completely wrong and misleading way. The original idea of using
broadcast serial numbers in electromagnetic emanations appeared in
Markus G. Kuhn, Ross J. Anderson: Soft Tempest: Hidden Data Transmissio=
n
Using Electromagnetic Emanations, in David Aucsmith (Ed.): Information =
Hiding,
Second International Workshop, IH'98, Portland, Oregon, USA, April 15-1=
7, 1998,
Proceedings, LNCS 1525, Springer-Verlag, ISBN 3-540-65386-4, pp. 124-14=
2.
http://www.cl.cam.ac.uk/~mgk25/ih98-tempest.pdf
as well as in patent application GB9722799.5. This was based on (early
ongoing) research done by myself and Ross Anderson and was not funded by
anyone. Microsoft never had anything to do with it.
We showed early results among others to Microsoft Research, and they
decided that they were not interested in pursuing it any further, mostly
because of the "big brother" aspect of the entire idea. As far as I
know, Microsoft has not done or funded any research on compromising
emanations.
If someone is really using today serial numbers embedded in compromising
emanations of PCs to track software pirates, then I would most
definitely like to know about it. Not only out of academic curiosity,
but also to talk about patent license issues ...
Markus
-- =
Markus G. Kuhn, Computer Laboratory, University of Cambridge, UK
Email: mkuhn at acm.org, WWW: <http://www.cl.cam.ac.uk/~mgk25/>