IWETHEY v. 0.3.0 | TODO
1,095 registered users | 1 active user | 0 LpH | Statistics
Login | Create New User
IWETHEY Banner

Welcome to IWETHEY!

New Andre Hedrick warns of coming battle with DRM.
I know this is a few weeks old, but one of the Linux Kernel names [link|http://kt.zork.net/kernel-traffic/kt20011231_148.html#1|went up in flames] about where DRM is heading.

He is of the opinion that big selfish companies (like Microsoft) are trying all different things to get control back of digital information on all consumer hardware.

Wade.

"All around me are nothing but fakes
Come with me on the biggest fake of all!"

New While the aim of M$ is hardly new info,
and even while - many thousands (millions by now?) are at least vaguely aware of the threat of hardware encryption possibilities - nay likelihood:

I see no change in the uneven adversarial position. Just M$ (alone) possesses CA$H of ~$35 Billions - and growing, through interest accumulations, daily.

The US Admistration is evidently of- by- and for- continued Corporate hegemony; not merely within the US, but worldwide: via all recent undebated panic legislation on all fronts. How can we not note the effects already of, the 'Terror' rubric extended to cover many aspects of 'software' - much as bandied about in the above link?

Uneven adversarial position? Tell me again.. what funds are earmarked for creation of, maintenance of: any org. whatsoever which might call upon even 1% of the Beast CA$H available - to buy congress and state legislators to counter the propaganda of the Beast?

This even AFTER Sklyarov, DMCA, the only temporarily-stalled SSSCA [plus whatever is being prepared as we speak]. And unless you dispute the assertion that legislators' perpetual need for reelection funds means: they ARE ever 'buyable' [??]

Then - tell me again please: besides endless (if sometimes incisive) bitching and moaning in cult web-pages unread by the unwashed - how is it possible that every next Beast plan shall *not* become LAW within the next 2-3 years ?? (2-7 years.. if Bushie Jr. doesn't shoot self in foot like Daddy did, after war euphoria wears off - and his real talents emerge or are seen to have been imaginary)

With no organized, funded, competent and unrelenting opposition: how could it turn out any other way?





Oh No!! that might sound like a Union! and go against the InDuhVidualist Grain... Let's just continue to bitch & moan and all. hang. separately. Then the post-lockdown forums can be filled with YEARS of recriminations about.. shoulda woulda coulda and mainly.....

How Could We Have Been So Dumb\ufffd

(If there are such forums permitted, that is)



Ashton
There must be a brilliant, highly effective underground campaign afoot - which I'm just too dull to notice.. Yes, that must be it.
Score 1/2002:

McDisneySoft 100 (and growing at.. ~6%/annum? on interest *alone*)

Visitors 1.1 (flat-line? What's 6%/annum on Zippo?)
New Andre's been plugging this for a while
He let fly a long rant on CPRM as well. This is the scary shit, thanks for the heads-up. DMCA and SSSCA don't help us in this regard either.

I've heard numerous sources say that software-based systems crypto won't work, and it's possible that even hardware-based solutions may be exploitable (references vary). My sense is that end-to-end crypto would be generally difficult to back out.
--
Karsten M. Self [link|mailto:kmself@ix.netcom.com|kmself@ix.netcom.com]
[link|http://kmself.ix.netcom.com/|[link|http://kmself.ix.netcom.com/|http://kmself.ix.netcom.com/]]
What part of "gestalt" don't you understand?
New The problem with pervasive crypto...
...is recovering the data in the event of disaster.

Your server goes tits up, or $EVIL_EX_EMPLOYEE has changed the passwords on the server before going off to be a transgendered freedom fighter in Colombia.

You have backups of an encrypted RAID array, and not much else.

You restore the data. What's the passphrase/key? Well, Bill and George know it. Whoops, they were hit by the same flying elephant that knocked out your server, or have followed $EVIL_EX_EMPLOYEE to fight for justice in the jungle.

Hey, there's a copy on Joe's laptop. Whoops, got stolen. Been a bad week. And all our corporate accounts data is encrypted and it'll take longer than the age of the universe to brute force it.

There is, of course, an alternative - used by Microsoft in Windows 2000. You designate a Recovery Agent (typically the Domain Admins group) and they can decrypt anything encrypted IF THE RECOVERY AGENT WAS PUT IN PLACE BEFOREHAND. The process is tedious and convoluted, involving shuffling certificates around.

Joe Accounts Worker can't expect to encrypt his hard disk and then magically have the IT department decrypt it when he can't remember his password.

What makes Windows Encryption worse is that it's done against the security principal (the user) - they choose a directory or file and in the properties, choose to encrypt it.

The bad part of this is that the only thing you need to crack is the user's regular domain password. And we all know how well users choose their passwords.


Peter
Shill For Hire
[link|http://www.kuro5hin.org|There is no K5 Cabal]
New Backups & encryption
That's one of the topics covered in someone's [link|http://kmself.home.netcom.com/Linux/FAQs/backups.html|Linux Backups Mini-FAQ], under "Other Issues".

My thinking is that backups should be treated as data access violations waiting to happen, and that physical security over backups are essential.

The problems of encrypted data storage by default, and the inconvenience it mandates, has been covered broadly...though naturally I can't find any references to the issue immediately....
--
Karsten M. Self [link|mailto:kmself@ix.netcom.com|kmself@ix.netcom.com]
[link|http://kmself.ix.netcom.com/|[link|http://kmself.ix.netcom.com/|http://kmself.ix.netcom.com/]]
What part of "gestalt" don't you understand?
New Encrypted local data storage is a minefield.
Trust me, I've been there. Well, on the fringes, at least.

The only way it works for end-users (e.g. reasonably un-teched senior executives) is if it is part of a secure PC package - which brings up issues of key management. And then they don't see the point in picking individual files to encrypt. The downside is not that encrypting the whole disk needs to be pretty fast but you need a personnel structure for managing supervisor passwords in case they forget their own or have hardware problems.

In other words, it has to be managed by the same people who already manage encrypting services in IT. Or the end-users will quickly find it Too Hard To Do.

Wade.

"All around me are nothing but fakes
Come with me on the biggest fake of all!"

     Andre Hedrick warns of coming battle with DRM. - (static) - (5)
         While the aim of M$ is hardly new info, - (Ashton)
         Andre's been plugging this for a while - (kmself) - (3)
             The problem with pervasive crypto... - (pwhysall) - (2)
                 Backups & encryption - (kmself) - (1)
                     Encrypted local data storage is a minefield. - (static)

TI BASIC READY
81 ms