vitanuova.loyalty.org: July 3, 2002
Think about this: if you move the file (and, if you like, the entire software operating environment!) to another PC, the application can no longer decrypt the file. If you modify the operating system (which you are able to do), the application can longer decrypt the file. If you run a different operating system (which you are able to do), the application can no longer decrypt the file. If you modify the application (which you are able to do), the application can no longer decrypt the file. This is a technically impressive capability! After the meeting, I kept realizing more and more interesting features of this design.
Technically, this is quite interesting stuff, but I don’t know that I’m all that crazy about being locked out of my system because of some hardware being changed or the security mechanism being convinced that it’s no longer in a “trusted” environment.
When computers you can use any way you want are outlawed, only outlaws will have them, I guess.
There’s more on this here.