
Using Palladium to Secure P2P Networks 286
user555 writes "The RIAA and MPAA have seen Palladium as a way to prevent piracy. But this article argues that ironically Palladium may actually make P2P piracy more widespread (PDF). They argue that the security features of Palladium could be used to create P2P networks that are more resistant to attacks from content owners."
Yeah, right. (Score:5, Interesting)
Re:Yeah, right. (Score:5, Insightful)
Basically it's a counter 'warning' saying "P2P's can work your technology against your own intent".
Certainly I don't see it as an attempt to pacify the anti-Palladium camp.
Re:Yeah, right. (Score:2, Interesting)
Re:Yeah, right. (Score:5, Insightful)
I'm wondering what the hardware manufacturers are going to do - will they continue to offer 'normal' products like they do now ( HDD's, MB's ) without such devices built in - or, will they be forced to only make protected devices?
Personally, I don't see their being sufficient market forces to push HDD and MB makers into dropping the 'insecure' hardware entirely.
Re:Yeah, right. (Score:2, Insightful)
Re:Yeah, right. (Score:2, Interesting)
What are you smoking? (Score:5, Insightful)
This is shameful propaganda. (Score:5, Informative)
These three students must be some of those new "grassroots" Microsoft has been trying to buy on campuses. Harvard, that's almost as costly as Tulane, so these three must have been expensive to confuse or corrupt.
Anyone who uses the term "piracy" for unauthorized file violation is clueless to begin with. Other midless gems from these three include:
The author's research is lacking. They reference 17 works, mostly popular press articles with one or two intersting texts. One reference they omitted is Microsoft's EULAs which require forced upgrading and Microsoft's right to search your files and delete those they considercopyright infringing.
Anyone who considers the control Microsoft now demands of it's user's computers could not think that Microsoft would ever extend "protection" to user content or clients programs. They promise to do it now, despite a lack of tools. Chances are that Microsoft will delete all peer to peer client programs they find.
Shame on Harvard. I've got to give this student paper an A for effort and the fluent ability to state the obvious but an F in research and critical reasoning. The music and film industry blinders these students wear prevent them from exploring the use of P2P for anything but "piracy". The whole idea of "trusted computing" aiding "piracy" is a juvenile conivance of wishful thinking. It lacks all the things Universities are supposed to be full of, honesty and critical thinking.
Re:What are you smoking? (Score:2)
Mmhmm. How many people spend their free time idly browsing through graduate students' websites? Stuart Schechter's site doesn't exactly strike me as a major news distribution point. And just to get the jump on this one, here's a line from the end of the paper:
This research was supported in part by grants from Compaq, HP, IBM, Intel, and Microsoft.
And what does IBM support more than any other hardware company? Linux. Thank you.
Conclusion (Score:5, Interesting)
Re:Conclusion (Score:5, Insightful)
Re:Conclusion (Score:2)
Unfortunately the article was /.ed when I posted my reply so I didn't see
Re:Conclusion (Score:5, Interesting)
Now the RIAA has reason to hack Palladium... (Score:4, Funny)
Perfect!
Not with a warrant (Score:2, Interesting)
The DMCA doesn't necessarily keep investigators from circumventing encryption when monitoring alleged pirate networks. Law enforcement can get a judge's approval to violate 17 USC 1201 [cornell.edu], in a document called a "warrant":
Re:Not with a warrant (Score:5, Insightful)
Re:Not with a warrant (Score:3, Funny)
Re:Now the RIAA has reason to hack Palladium... (Score:2)
It makes no real difference (Score:5, Funny)
Good: 1
Evil:50
Re:It makes no real difference (Score:3, Funny)
Actually, it makes PLENTY of difference. (Score:2, Insightful)
There's a technology out there that, in the US alone, costs people trillions of dollars a year from damage to property, and kills hundreds of thousands of people yearly - against, just in the US. Should such a technology be banned?
If so, then let's head back to the Stone Age, because you just outlawed fire! Sure, it can be used to kill people, but it can also be used for numerous good
Re:Actually, it makes PLENTY of difference. (Score:3, Insightful)
Palladium is not a technology, it is an application. The technology it uses are things like encryption and tamper resistance, which are not evil in an of themselves, the application is keeping people from controlling their own computers, which is.
Re:Actually, it makes PLENTY of difference. (Score:3, Insightful)
MOD THIS UP (Score:2)
Re:It makes no real difference (Score:2)
Sooo...would you say it's a Dark Palladium? ;)
A-ha... (Score:3, Funny)
Good: 1
Evil:50
I'll assume you're placing P2P piracy in the Evil category, and something else in Good... right?
On the other hand... (Score:5, Insightful)
This would be another win for Linux.
Re:On the other hand... (Score:3, Interesting)
Yeah, until the platforms are set up to not even allow you to run Linux on them, and ISP's won't allow you to connect if you're not using a platform that is recognized as secure.
If the mindset that the RIAA and MPAA currently have had been around in the 60's, and they had their way, really, the personal computer never would have existed at all.
Re:On the other hand... (Score:2)
That is why I need my own fab, so I can make any sort of chip I want, and the terrorists can't stop me!
Having the Palladium master keys would help as well.
piracy...? yeah, of XP (Score:5, Insightful)
Yeah, piracy of Windows XP when no one wants to buy Windows Palladium Edition. It astounds me that the population in general is so ignorant and apathetic toward the loss of their rights.
XP is any better? (Score:2)
What's more astonishing that you would claim the general population is so ignorant, yet advocate the thing you fear. Then again, three harvard students bought into this whole bogus notion. This is my review of their article [slashdot.org].
Re:XP is any better? (Score:2)
Re:piracy...? yeah, of XP (Score:5, Insightful)
Re:piracy...? yeah, of XP (Score:5, Insightful)
"Oh, Mommy, look, it's Shiny Video Game. Can we buy it?"
"No, darling, it says it only runs on Palladium, and we still run XP."
"But MOMMY, I WANT SHINY VIDEO GAME!"
Total cost of that trip to Best Buy?
People will buy whatever is being sold to them. They deserve it all, especially since they'll be trampling us on the way.How quickly we forget...so which is it this week? (Score:5, Informative)
Re:How quickly we forget...so which is it this wee (Score:2)
What the hell are you smoking? You realize that the application to email is making messages that your computer won't allow you to quote, copy, filter, or print (spammers will love that - it has nothing to do with secure communication since that doesn't require anything user hostile) and that
back the truck up... (Score:2)
Or is this some tribal territorial coming of age thing, where you just lash out at the nearest shadow and the naked-to-the-waist women react with approval at your prowess? Because if it is, then I'm on your side, and I'll act all put down and stuff so you can get some later in the tent...it's cool...just tell me, 'cause I can rec
Faulty assumptions: (Score:5, Interesting)
That, and the authors give away their toadyism to the "content industries" by referring to P2P networks as "peer to peer pirate networks," as if they have no possible legitimate use save to board ships on the high seas, murder the crew, and plunder the vessels.
Prediction: Reversal Coming (Score:5, Funny)
Re:Prediction: Reversal Coming (Score:2)
The threat from Free software is only going to get more serious for Microsoft, and pirated software is their covert way of fighting it. They can get fat enough off the rich people who don't want to bother pirating and the corp
Palladium secures P2P networks through... (Score:5, Funny)
Uhh.. prolly not (Score:5, Interesting)
2. The APIs for this will probably be under lock and key. The next Jon Johansen wont have access to the API calls to interface with palladium.
3. Why use palladium when you can use waste or something similar.
This submission has two major flaws (Score:5, Insightful)
First of all, it suggests that P2P networks are by nature about piracy. I am a huge fan of BitTorrent and have used it for nothing other than downloading cool movie trailers. While piracy has always been common online, you can't blame the cables for the content.
The second issue I take with this submission is the phrase "more resistant to attacks from content owners." I assume you're talking about the RIAA because security from artists who want to be paid for their work is not something most people ever want. Sure, cut the thieves in the RIAA out of the equation but few people will ever begrudge the artists their $1 or $2 per album. It's the oligarchy that is the RIAA that people are mad at.
Re:This submission has two major flaws (Score:3, Interesting)
I always thought that we already had ways of transmitting data securely between two points. How would the introduction of a company owned passport server help the user?
And I agree that hardly anyone will begrudge the content creators for wanting to earn money, but right now you can't hurt the RIAA withou
Re:This submission has two major flaws (Score:2)
right now you can't hurt the RIAA without also hurting the artists.
Then I suppose I will hurt them both. I will not give my money to support an organization that treats its customers as thieves and expects us to come begging for more. I buy 1-2 albums a year now and only ones where I think the artist categorically deserves my money. Do Bush, Puddle of Mud, Metallica, Madonna, or Ricky Martin genuinely expect me to spend my hard-earned money to keep them in business??? I will listen by radio, thanks v
Nothing is inherantly wrong in trusted computing (Score:5, Insightful)
I'm quite psyched about the control it provides. Sadly most of the public are probably too ignorant to even want that control.
Re:Nothing is inherantly wrong in trusted computin (Score:5, Insightful)
The downside is that you also need to individually sign the patches too, and that can be time consuming.
Re:Nothing is inherantly wrong in trusted computin (Score:2, Insightful)
There is a huge difference between this and what a Palladium based system could potentially do. Software Restriction Policies in XP and Win2003 are not bulletproof. They can protect users from accidentally running a trojan/virus but they cannot guarantee that somebody hasn't modified the OS itself.
This is a fundamental problem with
Re:Nothing is inherantly wrong in trusted computin (Score:2)
However, if a sysadmin wants a moderate confidence that a junior admin hasn't installed software that shouldn't be running, or that a user hasn't installed unauthorized games on a critical system, the Software Restriction Policies are a good additional safety feature that can be used in addition to other security techniques.
Re:Nothing is inherantly wrong in trusted computin (Score:2, Interesting)
The difference is who has control. In the office, the sysadmin deserves to have control over who can run what. At my house on my computers, only I deserve control. I'd better be able to do anything I damn well please on my own equipment. The security policy in Windows XP and Server 2003 lets this happen. Palladium/NGSCB, on the other hand, puts this control in Microsoft's hands. It's their security, not ours. I think "trusted computing" should be me trusting my computer to do what I say, not Microso
thank you for another fine M$ advert. (Score:2)
Repeat after me... (Score:2)
Won't work (Score:5, Insightful)
Re:Won't work (Score:2)
The user has no power (Score:2)
What do you think trusted means? It means the software has been digitally signed by a trusted authority (Microsoft), that the operating system has confirmed the software has not changed since it was signed, and that everything the software depends on (operating system, libraries, hardware) is trusted as well.
Whoever controls the private keys controls w
Re:The user has no power (Score:2)
This sounds like TCPA, not Palladium. I think you are confusing them. Palladium is Microsoft's implementation, and it is quite clear MS and only MS will be able to sign applications who touch Palladium content and hardware drivers (which could take control of the machine).
Re:Won't work (Score:2)
Actually, hopefully no. The best thing would be for a community of people (OSS movement) to come up with another, traditional, computing platform that will be open. But crucially, it will not just be open in the sense of user rights, but in the sense of being able to view and modify the source code as a matter of policy. That way, there shouldn'
The trick is... trust (Score:5, Insightful)
They require that the software that will interact with the DRM features actually be 'trusted'. Unless they want all software written for Palladium to be 'MPAA/RIAA' approved, anyone can write 'untrustful' code. Only one link in the chain has to be broken for it to fail completely.
So, write 'trusted' p2p file sharing.
I am afraid that someone like MS will require you to pay in the future to have the right to write 'trusted' code, or any code won't run at all.
Erroneous Conculstion (Score:5, Insightful)
Since the entertainment industry does not own fiber, switches, PCs, or consumer CD burners they must take Schechter's advice and invert it to suit the networks that they do own.
I'll restate their conclusion as follows:
To thward piracy the entertainment industry must keep distribution costs low> , reducing the total cost for consumers to acquire legitimate content. When it takes less total effort (purchase price + effort) to acquire legitimate media the users will abandon piracy. This approach has been clearly demonstrated with Apple's iTunes product.
Re:Erroneous Conculstion (Score:2)
Re:Erroneous Conculstion (Score:2)
Re:Erroneous Conculstion (Score:2)
The "mp3 download of a song as a loss" is what they say in public. They perceive the low cost and easy distribution of music as creating competition--which is a huge loss for them.
Re:Erroneous Conculstion (Score:2)
You mean the iTunes Music Store. It's statements like these that got me confused between the two in the first place.
iTunes == crappy Apple 'jukebox' software.
iTunes Music Store == cool (cooler than most) online music store
Good Point, but... (Score:4, Interesting)
Now, back to distribution.
Assuming the pirate and the legitimate product have identical distribution and identical production cost, there is still the playback cost to the consumer. I claim that pirate material is MUCH more expensive to playback than legitimate. However, this cost is better measured in hours used than dollars spent.
(1) Pirate CD/VCD media -- often the pirate media simply does not work. If the failure rate is 50%, your $2 pirate metallica disc now costs $4 on average. Now add in the time it took you to bring the disc home, put it in to your cd player, discover it does not work, return to the vendor and buy a new disc. You can save time brining a discman with you, but now you have to carry a discman and spend a minute or two trying to listen to the disc. Suppose 15 minutes of effort here.
(2) Kazaa -- Take five minutes to look for the track you want, take another ten to download. You have spent 15 minutes acquiring a song which may be corrupt. Now burn drop it into winamp or burn it to CDR. Kazaa doesn't have a built in burning tool yet, so add in the cost of Nero -- either in dollars or the time it takes to obtain a pirate copy.
(3) Bittorrent Video -- Take ten minutes to locate a torrent for your video of choice. Note that this video must be a recently released video or otherwise popular in the pirate world. Now take 8 hours to download the video. Spend another half an hour burning it to CD(s) so you can play it.
So in case (1) you pay $4 for the pirate disc plus 15 minutes of your time. In case (2) you still contribute 15 minutes of time, but probably closer to $0.25 for CDR media. In case (3) you spend over eight hours acquiring the media.
Now the class of consumers who have unlimited time or otherwise undervalue their time is limited to those who are either unemployed or employeed beneath some poverty line (in this case, defined for the benefit of this example). While a tiny fraction of thses unemployed consumers are independantly wealthy, we can ignore them. The remaining pirates steal because they cannot afford anything.
Now the digital piracy is not the same as real world piracy. The architypical poor guy who takes a loaf of bread is actually depriving the hard working employed guy of his hard earned meal. In the digital case, the bread is still there, so the hardworking consumer may still benefit despite the theft.
This does not mean that the industry will stop caring about piracy -- after all, the hardworking guy needs a good reason to believe that he should actually pay for his media. But it is clear that it is more efficient for the recording industry to build efficient distribution systems and spend minimal effort complaining about theft.
You're talking about Joe Aoluser, right? (Score:2)
2) KaZaA is the biggest disaster area in the world. More likely scenario: Connect to good DC hub, set a dozen or more albums on download, will all be good and downloaded when you wake up. Or Usenet.
3) Bittorrent, well I sleep while downloading and watch it off HDD. And if it takes you 10 mins to search
Re:You're talking about Joe Aoluser, right? (Score:2)
I'm trying to change the discussion from "can a sufficiently educated person gain access to the information they want" to "is there a way to sell some popular stuff to lazy people with money."
I believe the answ
Re:The economy is in the toilet (Score:2)
I've observed the 50% failure rate based on the media purchased by friends in the Phillipines, Beijing and Hong Kong. The 50% rate appears to hold for software, music, and VCDs purchased between 1997 and 2002. I have no direct data
Repeat after me: MARGINAL (Score:2)
Marginal. Marginal. Marginal cost is defined as the amount that total cost goes up by producing one more unit. So in fact, a large studio would have significantly lower marginal costs than a copyright infringe
irony (Score:3, Interesting)
Why that's like reading [this] Slashdot [article], and finding this ad
http://m2.doubleclick.net/viewad/790463/mrs0300
Re:irony (Score:2)
Win2k5:"I'm sorry, Mike, jokes aren't allowed on the untrusted internet."
Clippy: Do you want help in upgrading to the new MSN Trusted Communications Portal for only $39.95 a month?"
"NOOOOOOooooooooooooo!" =)
knee jerk reaction hurts us all (Score:5, Insightful)
If you need an official MS signature on the code, things like p2p networks probably aren't going to fly.
Unfortunately, the knee-jerk "MS is the devil" reaction hurts everyone. Technology that allows other people to trust information coming out of your machine is useful. This paper describes a good example of an application for that technology.
The problem is going to be in the details -- specifically, as rivest (I think) pointed out, whether or not you need an MS signature to load the code on your machine.
Instead of saying "palladium is evil", we should be pushing for comparatively open implementations. Any system that runs trusted code on my machine ought to be under my control and transparent. I ought to be able to decide what I want to run, and how that code will communicate with the rest of the world.
Unfortunately, that's not going to happen, because everyone is taking a simplistic view of the issue. No one is engaging MS seriously on this, and because of that they're going to deploy a system that's not under user control, and that's not transparent.
DRM is bad, OK? (Score:2)
Yeah?
Instead of saying "palladium is evil", we should be pushing for comparatively open implementations.
No, Palladium is evil. You can't get around the fact that Microsoft's planned hardware domination is evil by wishing it did things it won't. M$ does not deserve to be "engaged" because, as a condition of using their software, they have demanded the right to seach through your files and delete those they f
Thinking bastards can be trusted hurts us all (Score:4, Interesting)
Simplistic view? In the past, M$ has proven they will lie, cheat, and steal to control their users and to try trapping everyone into using their product. It is like working with Hitler. Making a compromise or alliance with such people is suicide. Just ask Stalin.
What good would "open implementations" of DRM do? Allowing others to control what your computer does with their file/data is the entire point of DRM. When that fails, M$ and the MPAA will create a censorship system under the guise they need to delete infringing files. To do so, a M$ controlled DRM system will need to be in place--to trap everyone into only using M$ systems, and/or to hide the fact they are censoring people.
An open implementation would defeat the entire purpose. An open implementation would not even be good for most of the other purposes touted for DRM. Anyone would be able to counterfeit Eca$h, or copy those secret emails. A trusted third party would be required to control your computer. I will never trust M$, only a fool would.
Re:knee jerk reaction hurts us all (Score:2)
Re:knee jerk reaction hurts us all (Score:2)
It will let me know that your computer is willing to vouch for the result (ie., it's affixed the signature), but it requires me to trust your computer.
This is different. When I get a certain kind of signature from a trusted computing enabled machine, I know that a specific chunk of code produced the signature, and that it wasn't modified by you or your machine. That's the point.
That's why it would make spoofing p2p systems h
They're forgetting one thing.... (Score:2, Interesting)
If you were able to peruse the source code for Longhorn, you'd see function calls like:
__riaa_checkvalid_song()
__mpaa_is_movie_pirat
__xxaa_set_torture_flag()
and so on.
One thing academia can't account for is good old politics and strange bed-fellows.
surprised? (Score:5, Insightful)
Surely even Microsoft could have put the 2 together - this would not be news to them, or anyone else really (except journos).
Missed the real threat (Score:5, Insightful)
Unauthorized copying (sometimes called piracy) is not the real threat against the __AA, but it is the easiest to defend. What they really fear is the ability of independents from creating and distributing their own content without their aid. They want to eventually force all technologies to only play content that was blessed by one of their sacred keys. Think about the CSS keys in DVDs...I am unable to produce a DVD containing my own content which is protected by CSS because I don't have access to one of the magic keys. But is my content which I own a copyright on any less deserving of full copyright protection under the law? Well, certainly the DMCA doesn't protect my content because I've been locked out of even using the popular circumvention technologies.
Well, Palladium and the like are the step towards eroding my rights as an independent creator even further. At least with DVDs, I could given enough capitalistic force create my own alternative to CSS with which I could protect my own content. But with an enforced technology, I don't even have that option open to me. Content creators will be forced to publish only through the evil media oligopoly.
BTW, on an unrelated crypto subject. What about an idea of taking advantage of what is traditionally viewed as fair rights. Say it's okay to just extract 3 seconds of media. I can then publish on a P2P network an article which includes an except of seconds 7.2 through 9.8 of a song. If enough different (and independenly-acting) people publish fair-use derived content with different 3-second extracts, one could in theory reproduce the entire original. There are also crypto techniques such as secret splitting, but the simple 3-second method may be more defendable in the interests of expression of fair rights as long as there is no collusion among individuals. Just a thought, not that I condone unauthorized copying.
Re:Missed the real threat (Score:2)
Re:Missed the real threat (Score:2)
There are millions of artists, yet the RIAA represents a very small fraction. Second, technology is making it much easier for an independent artist to record their work and distribute it. Technology is helping independent artists and one day even video creation will be at the point that creative individuals will be able to produce works that could be hard to distinguish from high expense Hollywood films. Why
Trust system (Score:2)
I believe the Content Providers will be able to coerce MS into providing the tools to carry this
What were they thinkin'? (Score:5, Insightful)
Question though... what's to keep MS from trusting a piece of software that I don't? ex. Bonzi Buddy, Xupiter, Save Now...
It just so happens that I don't trust those apps. I don't really care for anyone to tell my computer that I trust these programs. Because I really don't.
But legally, can Microsoft only trust who they want? Wouldn't they have to trust almost everyone? Can they legally say "We're not going to sign your programs as trusted" to anyone? Wouldn't that be anticompetitive, almost?
It isn't okay to run spyware/adware/malware on my system.
Is is okay to run programs that I have written myself.
So why has MS done the exact reverse of this!?
Oh so flawed. They must be kidding. (Score:2, Insightful)
The gist of what they're saying (Score:5, Interesting)
How to attack a P2P network (aka, find 'em, fake 'em, and kill 'em):
1. Find 'em: Break the confidentiality. If you can sniff the network, and gain access to it, then you can find who has stuff being shared and thus sue them out of existence.
2. Fake 'em: Break the data's integrity. Basically, shove in tons of fake data to piss off other users.
3. Kill 'em: Break the availability of the network. Screw with the protocol, drop packets, generate thousands of fake clients, flood off other clients with search requests.
How to defend a P2P with something like Palladium:
Basically, it breaks down to not letting untrusted clients into your network. Since you can now trust that the hardware is secured, and since every client has to be vouched for in order to get in, you can stop all three of the attacks dead in their tracks. A P2P can be trusted in that other clients it tries to connect to will be able to verify that trust mechanism using the very same secure computing methods that this stuff gives you.
Think of it like this. I trust Bob, so I let Bob connect. Bob trusts Cathy, so I can get a network of trust relationships going. Obviously, somewhere, someone could break that trust chain, but the existence of the trust chain is a new thing that hasn't been implemented yet. Combine it with encryption to prevent sniffing the network or at least make it way too difficult, and I can build a trusted network over which anything can be shared, *and* know that nobody is hacking my clients on either the software or hardware level, such that they can see or send things that they shouldn't.
Find 'em breaks down simply by going through enough nodes to make it impossibly difficult to track down where the hell the data actually is. This is already a nearly solved problem anyway, with stuff like FreeNet's method of ensuring that even the clients don't know what they're sharing.
Fake 'em is broken by the trusted architecture. I can trust, to some degree, anyone on my network because of the chain. I can trust the client isn't doing shit it ain't supposed to be doing. I can trust that the hardware hasn't been modified to some degree. I can revoke clients by breaking the trust links to them or creating an "antitrust" kind of link that other clients might use as well. If someone injects fakes onto the network, I put down that I don't trust them, and voila, that propgates to those who trust me and so on. Creates a closed circle.
Kill 'em is broken by the same trust relationship to some extent. If the client can't get into the network, he can't inject things onto the network. Once someone doesn't trust that client, it finds that nobody trusts him anymore. If someone is attacking via flooding, obviously there's not much you can do except block them down the pipe, but the trust chain lets me tell others on the network that this guy is a jackass and thus they don't trust them either.
And so on.
Re:The gist of what they're saying -- Done That (Score:3, Insightful)
MS won't authorize it (Score:2, Insightful)
After all, this is one of the most important parts of the plan. You have to pay to write apps that use it, and this
Re:MS won't authorize it (Score:2)
Haha! (Score:3, Funny)
Gotta remember... (Score:2)
Isn't this already illegal? (Score:5, Insightful)
Excuse me, but isn't it already illegal to attack computers you don't own, even if you are the content owner? Nor, except for a few fake files, is it even happening?
So it will be harder to do something that already is illegal, and already isn't happening.
Boy, I just can't wait to upgrade my processor and OS to get all those benefits.
OH well (Score:4, Informative)
a few days ago I found a new p2p it uses SSL, proxys and tunnels though port 80. lots of other ways to trick the RIAA/ISP's from finding out what we'...ahem YOU are sharing.
Unfortuanatly right now it only works on windows so i was hoping for some slashdot press so we could bug them to death with e-mails
here is the site: http://www.earthstation5.com/homeweb.html
if anyone has more information on this id like to hear it, all I know is what the developers want me to think since word of mouth hasn't spread yet.
author is clueless (Score:2, Interesting)
palladium has no other uses. its not being designed for that. in fact while your computer is not running rights-restricted cod
Uh, am I the only one? WAKE UP (Score:5, Insightful)
Unless they are hacked, and then they won't be allowed to run on a Pull-a-DRM machine.
Ever since DRM first reared its ugly head, I have been (hysterically, at times) hollering about how this is about 'content' control. Monopolizing the *abillity* to publish. (Subscribers can find many posts of mine dealing with that, amongst all the trolling I do ;)
P2P will NOT be 'secure' on a Pull-a-DRM. It will not work! Even if the Pull-a-DRM system is broken by 3 lines of script, those who use the 3 lines will be sued or charged under some **IA brokered law. Sharing will be *restricted* to what the **IAs allow through their 'special' keys.
Sure, copy, share, rip mix burn the newest crap as pushed on Clear Channel, but try and nab a homemade mix of some band you saw last night or a little video from your friend on vacation and it just won't work.
Maybe MS has got it all figured out - somehow Pull-a-DRM just *knows* that Billy's video email is ok, but somehow I doubt it. Remember, YOU DON'T GET TO DECIDE - you are NOT TRUSTED.
Everyone needs to realize that Pull-a-DRM will KILL what the net has done for independent musicians, filmmakers, artists, writers, and coders.
It will be a cancer, slowly spreading. Mom will get the new PC "MSN 10" with the 'Super-Security'(for the kids). Things won't run, she'll bitch, more crap will be made to work ONLY with DRM. Boil the frog. It's what's for dinner!
DRM is NOT YOUR FRIEND
Re:Uh, am I the only one? WAKE UP (Score:2)
How is this going to help piracy?
By allowing p2p developers to lock out rouge apps that would tamper with their network. By tying reputation management to physical "trusted" hardware, so the (limited) damage possible by a user unmodified app can be attributed to that user in the future. Much the same way it will allow game developers to lock out cheaters with modified game software (IMHO, the only "good" thing that will likely result
You can't use the content (Score:3, Interesting)
Who controls which P2P clients get signed? (Score:3, Interesting)
Assumption: Let's assume for the moment that Trusted Computing might turn out not to be evil. That is, I, me, anyone can sign an executable. The person who downloads it can authorize it to run trusted, and thus tamper resistant on their computer.
I provide an implementation of my client. Signed and trusted.
Now my protocol design and client really take off. Popular.
My client and design are open. Others want to implement clients in other languages and for other platforms.
Who signs these other new clients to make them trusted? I would assume that I would have to sign these other clients. Or alternately, all clients would have to recognize a certian set of signed clients as being trusted. If My client, Joe's client, and Jane's client are all trusted, then only me, Joe and Jane can build clients. Any other new clients must be signed by me, Joe or Jane, because all existing clients only recognize our three signatures.
Re:Palladium is the future (Score:3, Funny)
I welcome our future overlords.
God bless Bill Gates.
Re:Hey /. it is not Pd anymore... (Score:4, Interesting)
Re:Interesting Article but.. (Score:2)
Having a P2P network is not illegal. Transferring files is not illegal. Breaking copyright is the illegal part, and they'd have to get into your network to prove you were doing that. The whole trust thing is to prevent them from doing just that.
Re:One short coming with Pallidum (Score:2, Insightful)