[8039] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: BSA deploys imaginary pirate software detector vans

daemon@ATHENA.MIT.EDU (Markus Kuhn)
Mon Nov 13 13:16:17 2000

To: cryptography@c2.net, cypherpunks@cyberpass.net
Cc: G.Price@ccsr.cam.ac.uk, njohnson@interl.net,
        Fearghas McKay <fm@st-kilda.org>,
        "R. A. Hettinga" <rah@shipwright.com>
In-reply-to: Your message of "Fri, 10 Nov 2000 09:39:40 GMT."
             <E13uAeq-0003Cx-00@godzilla.ccsr.cam.ac.uk> 
Mime-Version: 1.0
Content-Type: text/plain; charset=iso-8859-1
Content-Transfer-Encoding: quoted-printable
Date: Fri, 10 Nov 2000 12:54:48 +0000
From: Markus Kuhn <Markus.Kuhn@cl.cam.ac.uk>
Message-Id: <E13uDhx-0003rq-00@wisbech.cl.cam.ac.uk>

> From: "Neil Johnson" <njohnson@interl.net>
> =

> Wasn't there some articles some time ago about Microsoft doing research=
 into
> Tempest/Van Eck (sp) radiation ? It was speculated  at the time that th=
ey
> were going include software to "broadcast" their serial numbers so that=

> illegal copies could be detected.

This entire story is complete nonsense (and I am the closest person on
this planet to the source of this rumour).

There was a slightly misleading article in

  Scientific American, issue 12/1998,
  http://www.sciam.com/1998/1298issue/1298techbus4.html

on this issue that was presented on =


  http://slashdot.org/articles/98/11/16/0028250.shtml

in a completely wrong and misleading way. The original idea of using
broadcast serial numbers in electromagnetic emanations appeared in

  Markus G. Kuhn, Ross J. Anderson: Soft Tempest: Hidden Data Transmissio=
n
  Using Electromagnetic Emanations, in David Aucsmith (Ed.): Information =
Hiding,
  Second International Workshop, IH'98, Portland, Oregon, USA, April 15-1=
7, 1998,
  Proceedings, LNCS 1525, Springer-Verlag, ISBN 3-540-65386-4, pp. 124-14=
2.

  http://www.cl.cam.ac.uk/~mgk25/ih98-tempest.pdf

as well as in patent application GB9722799.5. This was based on (early
ongoing) research done by myself and Ross Anderson and was not funded by
anyone. Microsoft never had anything to do with it.

We showed early results among others to Microsoft Research, and they
decided that they were not interested in pursuing it any further, mostly
because of the "big brother" aspect of the entire idea. As far as I
know, Microsoft has not done or funded any research on compromising
emanations.

If someone is really using today serial numbers embedded in compromising
emanations of PCs to track software pirates, then I would most
definitely like to know about it. Not only out of academic curiosity,
but also to talk about patent license issues ...

Markus

-- =

Markus G. Kuhn, Computer Laboratory, University of Cambridge, UK
Email: mkuhn at acm.org,  WWW: <http://www.cl.cam.ac.uk/~mgk25/>



home help back first fref pref prev next nref lref last post