> > [viro@parcelfarce.linux.theplanet.co.uk]said:
> Two more problems:
>
> 1) In this case the decryption key is an intergral part of the software
> and as such needs to be supplied as per fair use clauses.
>
> 2) Alan's argument stands. It is possible to fake the server and provide
> the key once the user have pinched a working copy. The wrapper can be
> reverse-engineered for communication key magics if need be.
>
> --
> Tomas Szepe <szepe@pinerecords.com>
-- ______________________________________________ http://www.linuxmail.org/ Now with e-mail forwarding for only US$5.95/yrPowered by Outblaze - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/