Re: Niches for the Hurd: evaluation method; was: DRM musings, capabilities and stuff

2008-12-29 Thread olafBuddenhagen
Hi, On Tue, Dec 23, 2008 at 12:19:26PM +0100, Michal Suchanek wrote: > 2008/12/22 : > > Well, *we* don't find EROS-like persistence useful for our purpose. > > I never found it useful, as you might remember; and Marcus, who was > > advocating it for a while, finally came to the very same conclus

Re: What shall the filter do to bottommost translators

2008-12-29 Thread olafBuddenhagen
Hi, On Mon, Dec 22, 2008 at 07:19:50PM +0200, Sergiu Ivanov wrote: > On Thu, Dec 18, 2008 at 4:13 PM, wrote: > > On Sun, Dec 14, 2008 at 11:34:57PM +0200, Sergiu Ivanov wrote: > > > I'll put my question differently: are we going to return the > > > control ports (that is, ports to filesystem) in

Bins

2008-12-29 Thread Youngfly Famous
I have a question.how important is it to purchase bins with dumps?because im a newbie.im tryin to learn so i can do very good business.does bins have to do with the format?

Re: Niches for the Hurd: evaluation method; was: DRM musings, capabilities and stuff

2008-12-29 Thread Arne Babenhauserheide
Am Montag 29 Dezember 2008 17:23:45 schrieb Michal Suchanek: > In my view trying to deny users the choice to enter contracts like the > one P requires is not the right way. It is morally dubious and > technically infeasible. Firstoff: Any security against the owner of a system built on free softwa

Re: Niches for the Hurd: evaluation method; was: DRM musings, capabilities and stuff

2008-12-29 Thread Arne Babenhauserheide
Am Montag 29 Dezember 2008 17:23:45 schrieb Michal Suchanek: > > Accessing some service which limits the system in a way which is > > incompatible with the GPLv3 (as soon as central usage gets "interfered > > with" when I change the code, distributing the system in non-source form > > violates the

Re: Niches for the Hurd: evaluation method; was: DRM musings, capabilities and stuff

2008-12-29 Thread Michal Suchanek
On 29/12/2008, Arne Babenhauserheide wrote: > Am Dienstag 23 Dezember 2008 12:19:26 schrieb Michal Suchanek: > > > Normally you can choose how effective the 'drm protection' is - in (d) > > you can defeat it by using the root handle. However, security > > involving hardware encryption and verifi