POV-Ray : Newsgroups : povray.off-topic : Preparedness : Re: Analysis Server Time
29 Jul 2024 06:27:58 EDT (-0400)
  Re: Analysis  
From: Orchid Win7 v1
Date: 11 Sep 2012 04:29:14
Message: <504ef65a$1@news.povray.org>
On 11/09/2012 08:38 AM, scott wrote:
>> Well, that's true. I mean, it's not as if there are already thousands of
>> proprietary and open-source libraries that implement both basic
>> cryptographic primitives and entire protocols... Oh, wait.
>
> I wonder how many people were involved with defining the standard for eg
> the BluRay format? Seems like quite a lot of work heavily based around
> preventing people breaking the encryption, and recovering from the
> situation if someone does break it. I highly doubt they will just
> copy&paste that solution to the next generation format, so surely there
> are people actively working on this.

I'm sure the actual cryptographic primitives are well-known 
off-the-shelf models. The protocol by which they are combined into a 
complete system? Yeah, that's probably band new.

> Or maybe you could work for Sony writing rootkits for their audio CDs
> :-)

You realise that Sony BMG didn't actually /write/ that, right? They just 
/bought/ it from some crappy 3rd party company [who presumably has 
really good sales staff]. Probably sold it to some marketiod suit who 
doesn't understand the first thing about computers, claiming it was a 
magic bullet to completely solve all their problems for just $$$/month.

> It seems like a pretty endless list to me of companies that would
> require programmers with a very good understanding of how to select and
> implement cryptographic techniques. Hey, even we have two software guys
> here implementing these things into RFID tags, and we make printers!

Well, maybe. Also seems like they wouldn't need very many of these guys, 
and not very often.


Post a reply to this message

Copyright 2003-2023 Persistence of Vision Raytracer Pty. Ltd.