Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×
User Journal

Journal charlesnw's Journal: DRM

I am reading an article about RMS views on DRM. (http://trends.newsforge.com/trends/06/08/02/2210213.shtml?tid=147)
In it Stallman states...

GPLv3 explicitly asks software makers to provide whatever digital keys they use such that people who wish to run modified versions of the software can do so by using this key on their modified version. At the 3rd international conference on GPLv3, held in Barcelona in June, RMS said, "They can design the hardware so that it requires the binaries to be signed by a certain signature key in order to run, but they must give you the signature key so that you can sign your modified binaries. They must give you whatever it takes to authorize your version so that it will run."

I am glad he is allowing for this in the GPL v3. Some people of course balk at trusted computing and DRM. However in some sectors (especially defense) you need the ability to have trusted/verified design (this corresponds to A1 certification in the OrangeBook specs). Also I would imagine that consumers/general public would like the ability to verify that there systems haven't been tampered with. However it still allows people who modify there systems to run modified code. While many(most?) people won't want that they will want the ability to verify integrity. This is a huge advantage to DRM/trusted computing. In my opinon trusted computing is simply brining verified design to the masses. Which is a good thing. Due to the fact that it makes the individual systems more secure and therefore the internet more secure.

This discussion has been archived. No new comments can be posted.

DRM

Comments Filter:

Remember, UNIX spelled backwards is XINU. -- Mt.

Working...