[NTLUG:Discuss] FW: motivating shady clients to payup
jeremyb@univista.com
jeremyb at univista.com
Tue Aug 27 00:02:17 CDT 2002
It seems so ironic that we're even discussing use of the DMCA on these
lists, but you're right
if that's what it takes then that's what I'll do. I wish things weren't so
tight, I wouldn't even be considering this gig.
-----Original Message-----
From: Daniel Hauck
To: discuss at ntlug.org
Sent: 8/26/02 11:48 PM
Subject: Re: [NTLUG:Discuss] FW: motivating shady clients to payup
I hate to say it, but you can always trap them with the DMCA. Simply
set up
some simple method of protection and explain that circumvention of the
protection is a criminal violation of the DMCA punishable by fine,
imprisonment or both. If they know what the DMCA means they'll listen.
If
they don't they'll lose a lot more. The DMCA is a very dangerous law
but if
you want to throw some weight around, that's one way to do it. If these
people are outside of the U.S. it doesn't exactly protect them as can be
shown in the Dmitri Skyarlov case or the other guy who authored DeCSS.
But as for methods of securing the hardware, you can encrypt any of the
volumes that are to be mounted at boot time. This would remove some of
the
problem associated with the "...I'd remove the hard drive..." scenario.
Locking down the hardware and setting up a timer for the software isn't
an
inconceivable thing. It happens all the time. It's the law that's
tough to
circumvent and I suppose that's why the DMCA was created in the first
place.
I'm still against the DMCA's existance, but as long as we've got it, you
may
as well use it to your advantage. And let me tell you, there is almost
no
"due process" in the DMCA. You set up some sort of tripwire system to
inform you of tampering and you send them a DMCA threat letter. You
could
own their business before long.
----- Original Message -----
From: "Steve Baker" <sjbaker1 at airmail.net>
To: <discuss at ntlug.org>
Sent: Monday, August 26, 2002 23:34
Subject: Re: [NTLUG:Discuss] FW: motivating shady clients to payup
> Aaron Goldblatt wrote:
> >>If I were an 'unsavory client' - I'd simply unscrew
> >>the hard drive from the PC and place it into another
> >>PC as Drive #2 and voila! All secrets may be revealed
> >>without worrying about passwords, BIOS's, CD-ROMS
> >
> >
> > It has been my experience that a client sufficiently skilled to pull
> > this off (and modify such files as /etc/passwd or /etc/shadow to
> > permit access once the machine is setup again) doesn't need one
> > of us to set up a traffic analysis tool.
>
> I dunno - it doesn't take much to realise that you just need:
>
> cp /etc/passwd /mnt/etc/passwd
> cp /etc/shadow /mnt/etc/shadow
>
> ...I know I could pull that off - I'm not sure I could write a
> traffic analysis tool simply because I'm a graphics guy and know
> very little about networking.
>
> I think that what I'd do would be to buy 'dongles'. You can
> arrange to have those time-out or count the number of usages and
> 'expire' after some set number of runs of the application.
>
> If this is the only project like this then it might not be worth
> the effort - but if you do a lot of this kind of thing then it
> would be worthwhile to learn how to do it.
>
> ----------------------------- Steve Baker
-------------------------------
> Mail : <sjbaker1 at airmail.net> WorkMail: <sjbaker at link.com>
> URLs : http://www.sjbaker.org
> http://plib.sf.net http://tuxaqfh.sf.net http://tuxkart.sf.net
> http://prettypoly.sf.net http://freeglut.sf.net
> http://toobular.sf.net http://lodestone.sf.net
>
>
>
> _______________________________________________
> https://ntlug.org/mailman/listinfo/discuss
>
_______________________________________________
https://ntlug.org/mailman/listinfo/discuss
More information about the Discuss
mailing list