[prev in list] [next in list] [prev in thread] [next in thread] 

List:       gnuradio-discuss
Subject:    [Discuss-gnuradio] [Phil Karn: It's war, folks --- SSSCA formally introduced]
From:       Eric Blossom <eb () comsec ! com>
Date:       2002-03-25 22:52:00
Message-ID: 20020325145200.A29402 () comsec ! com
[Download RAW message or body]

Apologies to those who have already seen this stuff, but it is
directly applicable to open source software defined radio.

Eric


>From eb  Sat Mar 23 13:20:43 2002
Return-Path: <owner-cryptography+cryptography-list=comsec.com@wasabisystems.com>
Delivered-To: cryptography-list@comsec.com
Received: from mononoke.wasabisystems.com (lion.ninthwonder.com [151.199.66.147])
	by relay.comsec.com (Postfix) with ESMTP id 35CE01119D
	for <cryptography-list@comsec.com>; Sat, 23 Mar 2002 13:20:43 -0800 (PST)
Received: by mononoke.wasabisystems.com (Postfix, from userid 96)
	id BDB753071D; Sat, 23 Mar 2002 16:18:59 -0500 (EST)
Delivered-To: cryptography@wasabisystems.com
Received: from snark.piermont.com (snark.piermont.com [166.84.151.72])
	by mononoke.wasabisystems.com (Postfix) with ESMTP id 5CFEB3070A
	for <cryptography@wasabisystems.com>; Sat, 23 Mar 2002 16:18:58 -0500 (EST)
Received: by snark.piermont.com (Postfix, from userid 1000)
	id 0CA33D97CB; Sat, 23 Mar 2002 16:18:58 -0500 (EST)
Received: from mail.freeride.com (mail.freeride.com [12.146.1.84])
	by mononoke.wasabisystems.com (Postfix) with ESMTP id 9277A30710
	for <cryptography@wasabisystems.com>; Fri, 22 Mar 2002 12:56:30 -0500 (EST)
Received: from [192.168.10.155] ([12.14.36.230])
	by mail.freeride.com (8.10.1/8.10.1) with ESMTP id g2MHtZj05227;
	Fri, 22 Mar 2002 12:55:45 -0500 (EST)
Mime-Version: 1.0
X-Sender: rahettinga@pop.earthlink.net
Message-Id: <p05101507b8c0dd4f48fc@[10.0.1.3]>
Date: Fri, 22 Mar 2002 08:10:13 -0500
To: Digital Bearer Settlement List <dbs@philodox.com>,
	dcsb@ai.mit.edu, cryptography@wasabisystems.com
From: "R. A. Hettinga" <rah@shipwright.com>
Subject: Phil Karn: It's war, folks --- SSSCA formally introduced
Content-Type: text/plain; charset="us-ascii"
Sender: owner-cryptography@wasabisystems.com
Precedence: bulk


--- begin forwarded text


Status:  U
From: ietf@ka9q.net
To: ietf@ietf.org
Subject: It's war, folks --- SSSCA formally introduced
Reply-to: karn@ka9q.net
Date: Thu, 21 Mar 2002 17:33:36 -0800
Sender: owner-ietf@ietf.org

The story just hit Slashdot -- Senators Hollings, Stevens, Inouye,
Breaux, Nelson, and Feinstein have introduced the so-called "Consumer
Broadband and Digital Television Act of 2002", formerly known to most
of us as the SSSCA. The text of Hollings' comments are available here:

http://www.politechbot.com/docs/cbdtpa/hollings.cbdtpa.release.032102.html

The Slashdot article (with links to other coverage) is here:

http://slashdot.org/article.pl?sid=02/03/21/2344228&mode=thread&tid=103

I cannot overstress the awful implications of this bill if it becomes
law. The personal computer, as we know it, will be destroyed. The
Internet, as we know it, will be destroyed.

Hollings doesn't say that, of course. But all through his statement he
claims that there exist technological solutions to the piracy
problem. These apparently consist entirely of "do not copy" bits added
to copyrighted materials.

The fact that any "do-not-copy-bit" can be trivially cleared on any
personal computer that can be programmed by its user does not seem to
have registered yet with the authors of this bill. And when it does,
the logical next step will then become obvious to them: the licensing
of programmers and/or the prohibition of open source software as too
easily modified by end users. And when *that* fails, a total ban on
any personal computer that can be programmed by its user.

It's time for the IETF, its members and the IAB to react, and react
quickly and forcefully.  We need to say clearly that there is simply
no such thing as an "Internet copy prevention technology" that can
actually work in a world with programmable personal computers.

We need to steer policy makers in a different direction, toward
watermarking technologies that do not block copies from being made but
allows them to be traced after the fact.  Yes, effective watermarking
is technically difficult, and several have already been broken. But at
least it's *possible* to build an effective watermarking scheme
without utterly destroying both the personal computer and the Internet.

Phil

--- end forwarded text


-- 
-----------------
R. A. Hettinga <mailto: rah@ibuc.com>
The Internet Bearer Underwriting Corporation <http://www.ibuc.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@wasabisystems.com


[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic