- From: Jeff Jaffe <jeff@w3.org>
- Date: Thu, 11 Jul 2013 15:45:59 -0400
- To: "piranna@gmail.com" <piranna@gmail.com>
- CC: Andreas Kuckartz <A.Kuckartz@ping.de>, "public-restrictedmedia@w3.org" <public-restrictedmedia@w3.org>
On 7/11/2013 3:27 PM, piranna@gmail.com wrote: >> I don't understand why a closed implementation of an API for encrypted media >> helps the NSA get metadata about users emails and phone calls. >> > Are you kidding us? A closed implementation of WHATEVER can host > anything inside it, Sure I understand that part, but that appears to be related to the fact that certain companies ship closed code and has nothing to do with the specifics of EME. > from user activity loggers to keylogers, > backdoors, trojans... Several years ago it was detected that a printer > firmware (an external device whose purpose is NOT to store executable > code!) had a virus and did a really impresive propagation... > > By definition, any box that's closed and you can't inspect can store > the cancer's cure or an activated nuclear bomb ready to explote and > you didn't notice about any of them. > > > -- > "Si quieres viajar alrededor del mundo y ser invitado a hablar en un > monton de sitios diferentes, simplemente escribe un sistema operativo > Unix." > – Linus Tordvals, creador del sistema operativo Linux
Received on Thursday, 11 July 2013 19:46:07 UTC