PGP software pirated
Robert J. Hansen
rjh at sixdemonbag.org
Mon Jun 11 19:08:31 CEST 2007
-----BEGIN PGP SIGNED MESSAGE-----
> However, does this mean that someone was able to find the private key
> for the key PGP uses to sign licenses?
All license enforcement mechanisms are fundamentally DRM
technologies. DRM uses encryption algorithms, but DRM is not an
Pretty much all computer security authorities agree that DRM is a
shell game. Not only doesn't it work, but it can't work. There are
some very strong arguments supporting this proposition.
Don't worry about encrypted messages. There's very little chance
that someone has figured out how to break the crypto going into an
OpenPGP-encrypted message. All that's happened is a DRM system has
been circumvented... again.
> I want to know how the hackers were able to give me a
> signed message?
Due to the provisions of the Digital Millennium Copyright Act, this
is a very dangerous question for any U.S. citizen to answer. An
overzealous federal prosecutor could easily claim that an in-depth
technical explanation amounts to trafficking in circumvention devices.
If other people want to answer you, they certainly can. However, I'm
Robert J. Hansen <rjh at sixdemonbag.org>
"Most people are never thought about after they're gone. 'I wonder
where Rob got the plutonium?' is better than most get." -- Phil Munson
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.7 (Darwin)
-----END PGP SIGNATURE-----
More information about the Gnupg-users