←back to thread

658 points transpute | 10 comments | | HN request time: 0.553s | source | bottom
Show context
discerning_ ◴[] No.35844121[source]
If these keys are leaked, they should be adopted by open source projects to disable secure boot.
replies(5): >>35844176 #>>35844425 #>>35844463 #>>35844475 #>>35844941 #
1. fowtowmowcow ◴[] No.35844425[source]
I'm not sure that they can of the key is proprietary to Intel. I think this would open up those projects to litigation.
replies(3): >>35844462 #>>35844871 #>>35844974 #
2. zapdrive ◴[] No.35844462[source]
It's just a string of characters.
replies(2): >>35844483 #>>35844550 #
3. Xorlev ◴[] No.35844483[source]
Software, movies, music is just a string of bits.

Using something leaked always carries some inherent risk.

replies(1): >>35844979 #
4. brookst ◴[] No.35844550[source]
So are bomb threats and false advertising.

I don't think "it's just characters" is a one-simple-trick.

replies(1): >>35845922 #
5. einarfd ◴[] No.35844871[source]
There seems to be a bit of a precedence with the AACS DVD encryption keys that got leaked (https://en.m.wikipedia.org/wiki/AACS_encryption_key_controve...), the suppression of that key. Seems to have failed, it was widely copied, and you can even find a copy of it on my link to Wikipedia.
6. realusername ◴[] No.35844974[source]
> I'm not sure that they can of the key is proprietary to Intel. I think this would open up those projects to litigation

Depends of the legislation.

That's questionable in the US since the keys are 100% machine generated and thus not copyrightable.

In most of the EU, it's clear though, there's interobability exceptions and those keys can be shared freely.

7. realusername ◴[] No.35844979{3}[source]
The difference is that software and music are made by authors unlike keys, that's what makes them copyrightable
8. ok123456 ◴[] No.35845922{3}[source]
you make a mathematical formula that generates the key.
replies(1): >>35846786 #
9. evancox100 ◴[] No.35846786{4}[source]
Good luck with that argument!

"Your honor, I wasn't copying that movie. You see, I applied a mathematical formula to the .zip file, and it just happened to produce the movie as output. Coincidence!"

(That's not to say the key is copyrightable, it's not. I think the relevant law would be the DMCA anti-circumvention provision.)

replies(1): >>35847259 #
10. brookst ◴[] No.35847259{5}[source]
"I didn't distribute the movie, just a file that XOR'd every byte with 255!"

Technical people tend to see the law as a technical thing, where technical arguments will win. Courts are generally unamused, since every judge has years of experience with defendants who think that they've discovered one simple trick.