-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 On 9/5/2014 12:49 PM, Valdis.Kletnieks@vt.edu wrote:
On Fri, 05 Sep 2014 12:38:13 -0700, Paul Ferguson said:
The principle questions still stand unanswered:
What is the motivation for this? What do you gain? Does it create some large architectural and performance in efficiency?
How often do the copyright owners on content give a flying fig in a rolling donut about efficiency if it interferes with being able to control who accesses the content, and how?
Look at the legislative history of attempts to fix the anti-circumvention clause of the DMCA so it's not illegal to do technical tricks to access content you have a legal right to access. That should tell you all you need to know about the motivation for this....
Thanks for validating for me that this is pretty much what John Schiel said earlier:
Almost sounds like the perfect protocol to allow the combination Internet/content provider to keep all content coming from where they want the content to come from instead of the freedom to choose where the content comes from.
- - ferg - -- Paul Ferguson VP Threat Intelligence, IID PGP Public Key ID: 0x54DC85B2 Key fingerprint: 19EC 2945 FEE8 D6C8 58A1 CE53 2896 AC75 54DC 85B2 -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.22 (MingW32) iF4EAREIAAYFAlQKFuIACgkQKJasdVTchbK5FQD/Sk4TXIMBxJo6TMlPwhjXYYRJ nUuWCfhlJ20MCVMJbRoBANqwQOE0+wLyTqhvfwc3hbQLCt0ok91YXsfAEcQY9rA1 =o0UB -----END PGP SIGNATURE-----