On 30/12/2008, Arne Babenhauserheide <arne_...@web.de> wrote:
> Am Dienstag 30 Dezember 2008 17:23:58 schrieb Michal Suchanek:
>
> > Yes, and then the application does not get the right keys to decrypt
>  > the data from the device. So the ability to lie (or be root) is
>  > irrelevant in this case given the protocol to obtain the keys is
>  > designed properly.
>
>
> And that kind of setup would violate the GPLv3 since it can be used to lock
>  down free software.
>
>  I must be able to access keys to make the modified system work just like the
>  original one, so in this case I'd have to have access to the private keys and
>  my driver could do the signing and keep my modified system working.
>
>  Best wishes,
>

So you would have to deny running anything less restrictive than GPLv3
code on the system for the restriction to be enforceable and we are
back to the GPLv3 only system which I find somewhat limited.

Thanks

Michal


Reply via email to