Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id ; Tue, 13 Mar 2001 16:37:57 -0500 Received: (majordomo@vger.kernel.org) by vger.kernel.org id ; Tue, 13 Mar 2001 16:35:59 -0500 Received: from zeus.kernel.org ([209.10.41.242]:7373 "EHLO zeus.kernel.org") by vger.kernel.org with ESMTP id ; Tue, 13 Mar 2001 16:34:25 -0500 Message-ID: <3AAE778B.8418D1E9@cypress.com> Date: Tue, 13 Mar 2001 13:39:55 -0600 From: Thomas Dodd Organization: Cypress Semiconductor Southeast Design Center X-Mailer: Mozilla 4.76 [en] (X11; U; SunOS 5.8 sun4u) X-Accept-Language: en-US, en-GB, en, de-DE, de-AT, de-CH, de, zh-TW, zh-CN, zh MIME-Version: 1.0 To: linux-kernel@vger.kernel.org CC: Andre Hedrick Subject: Re: new generic content schemes popping up everywhere... In-Reply-To: Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org X-Mailing-List: linux-kernel@vger.kernel.org Andre Hedrick wrote: > >From siliconvalley.com's GMSV column today: > self-destruct if it's tampered with. The utility is enabled > with 11 layers of security defenses, all of which must be > successfully navigated to disable the system. These layers > range from a series of forced reboots designed to thwart > automated hacking tools to something called "the white screen > of death" which destroys the software and all files stored > inside it. Infraworks CEO George Friedman says the > application's system-level control is possible largely because > it is firmly anchored into users' C drives during > installation. "We're fairly deep in the operating system," Not much help if you put the disk in another box without their system installed (or mount in linux/BSD/MacOS) to break the encryption/controls. Once that's done, A floppy based OS and tool could break open the files on a disk, when their apps aren't running. If it can be decrypted "legally" it can be done "illegally" too. -Thomas - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/