David_Gerard comments on Against easy superintelligence: the unforeseen friction argument - Less Wrong

25 Post author: Stuart_Armstrong 10 July 2013 01:47PM

You are viewing a comment permalink. View the original post to see all comments and the full post content.

Comments (48)

You are viewing a single comment's thread. Show more comments above.

Comment author: David_Gerard 11 July 2013 06:49:06AM *  7 points [-]

It also stops lots of copying.

(a) Numbers?

(b) What's your evidence that it makes a damn bit of difference? What people want to copy, they do copy.

DRM is sold as security from copying. It has failed utterly, because such security is impossible in theory, and has turned out impossible in practice.

Comment author: ThisSpaceAvailable 16 July 2013 04:16:43AM -1 points [-]

"In theory" is a bit of a slippery term, since all encryption can be cracked in theory. Apart from that, DRM is possible in practice, if you can completely control the hardware. Once you're allowed to hook any TV you want into your DVD player, uncrackable DRM goes out the window, because the player has to supply the TV with unencrypted video. The other way DRM can work is if users aren't viewing all of the content, and there's a way to require external credentials. For instance, people can be forced to buy separate copies of Diablo III if they want to play on BattleNet.

Comment author: Stuart_Armstrong 16 July 2013 10:23:35PM 2 points [-]

all encryption can be cracked in theory

Is it too pedantic to mention one-time pads?

Comment author: [deleted] 16 July 2013 10:24:55PM 1 point [-]

A one-time pad has to be transmitted, too. MITM will crack it.

Comment author: wedrifid 17 July 2013 08:36:11AM 1 point [-]

A one-time pad has to be transmitted, too. MITM will crack it.

A one-time pad that needs to be transmitted can be violated by MITM. But if the relevant private mutual information is already shared or is shared directly without encryption then the encryption they use to communicate is not (in theory required to be) crackable. Since the claim was that "all encryption can be cracked in theory" it is not enough for some cases to be crackable, all must be.

Comment author: Stuart_Armstrong 17 July 2013 07:44:38AM *  0 points [-]

Fair enough - I was out-pedanted!

Comment author: wedrifid 17 July 2013 08:25:12AM *  1 point [-]

Is it too pedantic to mention one-time pads?

No, that's an entirely valid point and I even suggest you were in error when you conceded. If two individuals have enough private mutual information theory allows them encryption that can not be cracked.

Comment author: wedrifid 17 July 2013 08:49:01AM 1 point [-]

"In theory" is a bit of a slippery term, since all encryption can be cracked in theory.

This is what we call The Fallacy of Gray. There is a rather clear difference between the possibility of brute forcing 1024 bit encryption and the utter absurdity of considering a DRMed multimedia file 'secure' when I could violate it using a smartphone with a video camera (and lossless proof-of-concept violations are as simple as realising that vmware exists.)