The Amazing ZamZiBam
Posts: 6
Joined: 7/23/2002 From: USA Status: offline
|
I would like to apoligize for the illiterate post. Let me make up for it with some justification. I have not posted in a forum for a long time, so I skipped some basic rules. I started this thread under the assumption that most people look at this topic with varried perspective. So I do not make any 100% definition to anything other than opinion. For example, one of the responses on how lasers work and etc. First of all, I do not need anyone to explain that, but do argue. Even the slightest transference of light has an effect on a material, provided that the material is sensitive enough to react. In other words, it is obvious that a standard CD-Rom will not be affected by the laser, but material that is different can be effected, and if the CD-Rom is called BLANK Corporation CD-Rom it does not mean that is what it is or that is who makes it. What I went on to explaining is a possible use of this concept and the SafeDisc2 copy protection scheme, seems to be the perfect system to use for what I was explaining. Unfortunately, as I said, I skipped some rules, so I went from defining a technology to arguing how it would be used in a legal form and etc. I still stand by what I wrote and further posts should clear up the illiterate post. As for the technology, let me be more specific. If we have an area on the disc, that if it is read by a laser such as a CD-Rom after it is copied; it does not play, because it was not properly copied because of that protection, than it is a protection scheme. Now after a while, people will crack this protection and it will be common for most software packages to follow a working crack scheme. In other words, a system of cracking the protection will be made. As this scheme becomes obsolete and the pattern is matched the problem will have been solved. However, what will have happened is an internal signature pattern will have been retained. In other words, the crack covers up the pattern, but does not properly duplicate it. As this is so, very distinct and sensitive properties of materials, will remain on the original discs, but will not be duplicated on the copies. So the copies will work just the same on your system, however if you play them online, the signatures will not be properly duplicated. So on a server, the administrators will be able to check your CD for a proper signature and knock you off of the server for example, or a snoop will be able to e-mail you asking you why the signature does not validate and etc., also please read the pattern explanation one more time and if confused ask, it is actually simple. I did explain everything, though I admit I just dumped the data. As for the responses, I welcome them, except now that I have a better bearing on the thread, please ask about anything else that is not obvious or understandable. In other words, all arguments you may have, I have a good response for as long as it pertains to my first post!. Sorry for the confusion!. NOTE! If it is being tested, the legality is questionable!. END NOTE! Alright, I suppose there are a few more notes to be added. First, I am proposing the concept, but I am not proposing a question. In other word's I am not asking anyone if this works, I am telling you how it works. It is obvious and important to note that an individual has the right to protect intellectual property and etc. At the same time, it is just as if not more important to note the damage this can do to the intellectual properties of others. One person can think up an idea that can damage many persons position, but one argument to that idea can protect the many persons position as well as that individuals. Let me go into the legal part of the concept. If there are any technical questions ask, but here is the concept once it is understood how it works and that it does work. If you have a dataspace that is on your system that is proven to be impossible to duplicate, at the same time that it is varied in signature, than you have unknown dataspace. In other words, the signature is designed so that if you purchase the original and you decide to give it away or sell it, the signature will evolve with the original sor of like a polymorphic signature based on a single key. For example if the cd-rom is protected by a hologram, than the varied key can reflect off of the hologram making it impossible to duplicate. At the same time it carries and matches any signatures in any drive it goes into. No 2 drives can match a random burn pattern. All this is great and an awesome idea, but you also have an un-identified dataspace. In other words, you have writeable space on the cd-rom that can not be duplicated, but the random signature can theoretically and conceptually take random data. Here is an argument. OVERBURNING. If you overburn a CD-Rom, it can have varied lenght!? Correct?! So is that not the same thing!? No! Because the adminstrator who would have to contemplate this, could base security on a finalized segment with no possibility to read beyond a specific point on the disc. With a varied signature, you have random dataspace that is different and is part of the data segment that has to be read and can not be patched. What I am saying is, you can not detect this in SafeDisc2 at the time, but just as it is a "POSSIBLE" BETA test of a new security system being designed by an un-named security company, you have the possibility that someone else knows this and can use the BETA test for a simple backdoor, such as nothing more than getting for example a single registry key off of your system. Does THAT make more sense!? In other words, it's just as illegal and I would say out of 100%, less than a quarter of 1% would know how to check for this type of material on the CD-ROM! It's theoretically that sensitive!
|