-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 On 9/5/2014 12:49 PM, valdis.kletni...@vt.edu wrote:
> On Fri, 05 Sep 2014 12:38:13 -0700, Paul Ferguson said: >> The principle questions still stand unanswered: >> >> What is the motivation for this? What do you gain? Does it create >> some large architectural and performance in efficiency? > > How often do the copyright owners on content give a flying fig in > a rolling donut about efficiency if it interferes with being able > to control who accesses the content, and how? > > Look at the legislative history of attempts to fix the > anti-circumvention clause of the DMCA so it's not illegal to do > technical tricks to access content you have a legal right to > access. That should tell you all you need to know about the > motivation for this.... > Thanks for validating for me that this is pretty much what John Schiel said earlier: >> Almost sounds like the perfect protocol to allow the combination >> Internet/content provider to keep all content coming from where >> they want the content to come from instead of the freedom to >> choose where the >> content comes from. - - ferg - -- Paul Ferguson VP Threat Intelligence, IID PGP Public Key ID: 0x54DC85B2 Key fingerprint: 19EC 2945 FEE8 D6C8 58A1 CE53 2896 AC75 54DC 85B2 -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.22 (MingW32) iF4EAREIAAYFAlQKFuIACgkQKJasdVTchbK5FQD/Sk4TXIMBxJo6TMlPwhjXYYRJ nUuWCfhlJ20MCVMJbRoBANqwQOE0+wLyTqhvfwc3hbQLCt0ok91YXsfAEcQY9rA1 =o0UB -----END PGP SIGNATURE-----