![](/i/fill.gif) |
![](/i/fill.gif) |
|
![](/i/fill.gif) |
|
![](/i/fill.gif) |
| ![](/i/fill.gif) |
| ![](/i/fill.gif) |
|
![](/i/fill.gif) |
|
![](/i/fill.gif) |
| ![](/i/fill.gif) |
| ![](/i/fill.gif) |
|
![](/i/fill.gif) |
Warp wrote:
>
> It might be possible in Windows to create a program that shows an
> image which can't be taken a snapshot of: Using DirectDraw to draw the image
> directly on screen.
The image must still be written to video memory, so if you can read video memory
you can read the image, no? It is quite possible to take screenshots from - say
- DirectDraw games, so in what way would the video display be diffrent?
--
Margus Ramst
Personal e-mail: mar### [at] peak edu ee
TAG (Team Assistance Group) e-mail: mar### [at] tag povray org
Post a reply to this message
|
![](/i/fill.gif) |
| ![](/i/fill.gif) |
| ![](/i/fill.gif) |
|
![](/i/fill.gif) |
|
![](/i/fill.gif) |
| ![](/i/fill.gif) |
| ![](/i/fill.gif) |
|
![](/i/fill.gif) |
The problem that I am facing is that some of my source data will be
extracted directly from proprietary .dxf files that are currently being
commercially sold.
The only really critical area that would need concealing would be the
<x,y,z> co-ordinates.
Of course I have to convert the data to a .pov script for usage but the data
owner insists that the data must be secured so that the .pov script cannot
be used to reverse engineer the original file.
Post a reply to this message
|
![](/i/fill.gif) |
| ![](/i/fill.gif) |
| ![](/i/fill.gif) |
|
![](/i/fill.gif) |
|
![](/i/fill.gif) |
| ![](/i/fill.gif) |
| ![](/i/fill.gif) |
|
![](/i/fill.gif) |
On Sat, 27 May 2000 10:15:56 -0700, "David Vincent-Jones"
<geo### [at] galaxynet com> wrote:
>Is there ant way in which the source .POV file could be encrypted so that
>the user would not have access to this source.
Hmm... how about PGP? It's GPL'ed, isn't it? It's just an idea.
Peter Popov ICQ : 15002700
Personal e-mail : pet### [at] usa net
TAG e-mail : pet### [at] tag povray org
Post a reply to this message
|
![](/i/fill.gif) |
| ![](/i/fill.gif) |
| ![](/i/fill.gif) |
|
![](/i/fill.gif) |
|
![](/i/fill.gif) |
| ![](/i/fill.gif) |
| ![](/i/fill.gif) |
|
![](/i/fill.gif) |
On Wed, 31 May 2000 08:49:09 +0300, Peter Popov wrote:
>On Sat, 27 May 2000 10:15:56 -0700, "David Vincent-Jones"
><geo### [at] galaxynet com> wrote:
>
>>Is there ant way in which the source .POV file could be encrypted so that
>>the user would not have access to this source.
>
>Hmm... how about PGP? It's GPL'ed, isn't it? It's just an idea.
Actually, PGP isn't GPL'ed. It's a good example of another famous program
that has available source, but limits the use of that source to versions of
PGP. At least, that's what I've read. I've never looked at the PGP source
license personally.
Also, PGP doesn't solve the problem: the private key the hypothetical
PGP-POV would use to decode the scene would be encoded somewhere in the
PGP-POV executable. There are methods to extract crypto keys from binary
data like executables semi-automatically (crypto keys tend to have a
higher entropy than other binary data) and if that fails one could always
use a debugger to extract the private key. With the private key known,
the attacker could easily decode the scene file.
Besides, you'd have to distribute the source to PGP-POV anyway, so all
that reverse-engineering would be unnecessary.
--
Ron Parker http://www2.fwi.com/~parkerr/traces.html
My opinions. Mine. Not anyone else's.
Post a reply to this message
|
![](/i/fill.gif) |
| ![](/i/fill.gif) |
| ![](/i/fill.gif) |
|
![](/i/fill.gif) |
|
![](/i/fill.gif) |
| ![](/i/fill.gif) |
| ![](/i/fill.gif) |
|
![](/i/fill.gif) |
"David Vincent-Jones" <geo### [at] galaxynet com> wrote in message
news:393002de@news.povray.org...
> I am interested in publishing a program that would in turn call upon POV
Ray
> to render an output image.
> The image, actually a series of images, would be something like a building
> 'walk-through'.
An extremely slow 'walk-through' ! POV-Ray will not render fast enough
for a real-time walk-through.
Why not just pre-render the scenes and then 'play' them back in series
to produce the walk-through ?
--
Scott Hill. (sco### [at] innocent com)
Software Engineer.
Author of Pandora's Box (coming to a web page soon(ish)).
Post a reply to this message
|
![](/i/fill.gif) |
| ![](/i/fill.gif) |
| ![](/i/fill.gif) |
|
![](/i/fill.gif) |
|
![](/i/fill.gif) |
| ![](/i/fill.gif) |
| ![](/i/fill.gif) |
|
![](/i/fill.gif) |
On 29 May 2000 10:31:12 -0400, Warp <war### [at] tag povray org> wrote:
> Btw, just for curiosity:
> It might be possible in Windows to create a program that shows an
>image which can't be taken a snapshot of: Using DirectDraw to draw the image
>directly on screen.
I get a kick out of such thoughts. :)
Being a photographer, I have read of many people trying to protect
their photos when displayed on their website. Sooner or later, someone
finds a way to defeat the computer screen-capture feature and they
assume their image is now secure.
Then someone simply photographs the monitor with a real camera to
capture the image, if they want it badly enough. :)
Later,
Glen Berry
( Remove the "7" from 7no### [at] ezwv com to email me. )
Post a reply to this message
|
![](/i/fill.gif) |
| ![](/i/fill.gif) |
| ![](/i/fill.gif) |
|
![](/i/fill.gif) |
|
![](/i/fill.gif) |
| ![](/i/fill.gif) |
| ![](/i/fill.gif) |
|
![](/i/fill.gif) |
On Mon, 29 May 2000 11:10:49 -0700, "David Vincent-Jones"
<geo### [at] galaxynet com> wrote:
>The problem that I am facing is that some of my source data will be
>extracted directly from proprietary .dxf files that are currently being
>commercially sold.
Do you have written permission to extract and use this data for your
own purpose? The company that owns Poser stopped a few people who
tried to distribute meshes of humans they had created with Poser.
Later,
Glen Berry
( Remove the "7" from 7no### [at] ezwv com to email me. )
Post a reply to this message
|
![](/i/fill.gif) |
| ![](/i/fill.gif) |
| ![](/i/fill.gif) |
|
![](/i/fill.gif) |
|
![](/i/fill.gif) |
| ![](/i/fill.gif) |
| ![](/i/fill.gif) |
|
![](/i/fill.gif) |
Glen Berry wrote:
> On 29 May 2000 10:31:12 -0400, Warp <war### [at] tag povray org> wrote:
>
> > Btw, just for curiosity:
> > It might be possible in Windows to create a program that shows an
> >image which can't be taken a snapshot of: Using DirectDraw to draw the image
> >directly on screen.
>
> I get a kick out of such thoughts. :)
>
> Being a photographer, I have read of many people trying to protect
> their photos when displayed on their website. Sooner or later, someone
> finds a way to defeat the computer screen-capture feature and they
> assume their image is now secure.
>
> Then someone simply photographs the monitor with a real camera to
> capture the image, if they want it badly enough. :)
>
> Later,
> Glen Berry
>
> ( Remove the "7" from 7no### [at] ezwv com to email me. )
Though it would not take care of the 'photo of screen' problem you could write a
small program to take an image interlace it say 4 times ( each of the 4 'frames'
would have 1/4 of the lines and flip through them quickly to appear solid, though
a screen capture would only show one of the 4 frames.
My .02
Post a reply to this message
|
![](/i/fill.gif) |
| ![](/i/fill.gif) |
| ![](/i/fill.gif) |
|
![](/i/fill.gif) |
|
![](/i/fill.gif) |
| ![](/i/fill.gif) |
| ![](/i/fill.gif) |
|
![](/i/fill.gif) |
Glen Berry wrote:
>
> Sooner or later, someone
> finds a way to defeat the computer screen-capture feature and they
> assume their image is now secure.
>
I wonder how? As far as I see, you can't really defeat screen-capture,
especially from a web page.
--
Margus Ramst
Personal e-mail: mar### [at] peak edu ee
TAG (Team Assistance Group) e-mail: mar### [at] tag povray org
Post a reply to this message
|
![](/i/fill.gif) |
| ![](/i/fill.gif) |
| ![](/i/fill.gif) |
|
![](/i/fill.gif) |
|
![](/i/fill.gif) |
| ![](/i/fill.gif) |
| ![](/i/fill.gif) |
|
![](/i/fill.gif) |
> The image, actually a series of images, would be something like a
building
> 'walk-through'.
Is the main thing to provide the user with the images or with the ability
to render these images themselves and make their own inputs into the source
file, i.e.
"you fill in the blanks, and the program will spit out a realistic
rendering according to your specification?"
If all the end user needs is images without their own input, then of course
you could render the images and post them to the web and let them sift
their way through them.
I can't see a way to get user input without them being able to see the
source file unless someone programs a patch. Maybe something that would
work like this -
"include http://something.something.something.com/file.inc"
and then povray uses and processes the file from a website and immediately
destroys it afterwards. Even then there'd probably be a way around it if
someone were determined.
Post a reply to this message
|
![](/i/fill.gif) |
| ![](/i/fill.gif) |
| ![](/i/fill.gif) |
|
![](/i/fill.gif) |
|
![](/i/fill.gif) |
| ![](/i/fill.gif) |