home *** CD-ROM | disk | FTP | other *** search
- Newsgroups: sci.crypt
- Path: sparky!uunet!elroy.jpl.nasa.gov!sdd.hp.com!network.ucsd.edu!qualcom.qualcomm.com!qualcom.qualcomm.com!karn
- From: karn@qualcom.qualcomm.com (Phil Karn)
- Subject: Re: PGP *2.0* available
- Message-ID: <1992Oct7.224601.8915@qualcomm.com>
- Sender: news@qualcomm.com
- Nntp-Posting-Host: qualcom.qualcomm.com
- Reply-To: karn@chicago.qualcomm.com
- Organization: Qualcomm, Inc
- References: <1992Sep7.142336.5733@ghost.dsi.unimi.it> <27740.Sep2003.57.2992@virtualnews.nyu.edu> <1992Sep20.195136.8642@cactus.org> <17939.Sep2300.39.3792@virtualnews.nyu.edu>
- Date: Wed, 7 Oct 1992 22:46:01 GMT
- Lines: 20
-
- In article <17939.Sep2300.39.3792@virtualnews.nyu.edu>, brnstnd@nyu.edu (D. J. Bernstein) writes:
- |> In article <1992Sep20.195136.8642@cactus.org> ritter@cactus.org (Terry Ritter) writes:
- |> > As far as I can tell, the whole point of cryptography is to be
- |> > able to restrict information to only those who are intended to
- |> > have it.
- |>
- |> That description is far too broad. You cannot singlehandedly restrict
- |> information to a chosen recipient, because he can in turn give the
- |> information to someone else. You pose an impossible problem; is it a
- |> surprise that there are no solutions?
-
- Indeed. I've been making this point regarding anti-piracy devices for
- some time. Even if Videocipher, for example, had not been broken there
- would have been no way to prevent someone from taping the output of a
- legitimate decoder and selling it or giving it away. The same is
- undoubtedly true for software packages, at least those running on
- standard general purpose machines. If you can't trust the authorized
- user, then all bets are off.
-
- Phil
-