Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 internet speed test! ×
It's funny.  Laugh.

Submission + - Gotta Share (improveverywhere.com)

TexasDex writes: Improv Everywhere has done it again, and this time their prank is social media-themed. After their previous spontaneous public musicals such as the food court musical that left onlookers entertained and bewildered, their latest hit, 'Gotta Share', delivered at the GEL Conference in New York, poked fun at people who can't go ten minutes without tweeting what they're doing.

Comment Re:Virtual Machines (Score 1) 831

In theory one could emulate TPM inside a virtual machine, but from what I understand there is a key in the TPM that is machine specific. This is how the remote attestation feature works, by checking to make sure the device is "safe" and the software (e.g. music player that only lets you play it for 30 days) running on it has not been modified. This is actually pretty secure, and no logical trickery will get around it, but it's not perfect. The fundamental flaw of all DRM/TPM systems is that you have the keys. They might make them hard to get by putting them on a separate chip instead of the RAM but a sufficiently skilled attacker with, say, an electron microscope, might be able to extract them. At that point everything is completely broken. In the traditional "Alice, Bob, and Eve" story, Alice is sending a message to Bob and doesn't want Eve to be able to decrypt it, but Bob and Eve are effectively the same person. This is why no DRM scheme can be perfect, just a major nuisance to law-abiding folk.

Slashdot Top Deals

"Why should we subsidize intellectual curiosity?" -Ronald Reagan

Working...