[HN Gopher] Intel PIII: Is Big Brother Inside? (1999) ___________________________________________________________________ Intel PIII: Is Big Brother Inside? (1999) Author : erjiang Score : 83 points Date : 2021-03-13 18:34 UTC (4 hours ago) (HTM) web link (www.zdnet.com) (TXT) w3m dump (www.zdnet.com) | monocasa wrote: | > Q: I've never heard of software "expiring." How is that | possible? | | What a beautiful world that was | Emendo wrote: | > A software product could even "seek permission" from the | vendor -- via the Internet or your modem -- each time it ran, | so that the vendor would know whenever you started the program. | | Now it is the norm. | ReactiveJelly wrote: | And better yet, whenever you complain about how invasive it | is, someone will appear to take up page space to call you | names for wanting things to be better. | gambiting wrote: | I mean, in 1999 one of the dominant software distribution | models was shareware where frequently applications would stop | working after some amount of time and demand payment. | stingraycharles wrote: | The article is referring to automatic expiry of license keys | though. Still seems like a rather naive question, I agree. | sn_master wrote: | With subscription, even continuing to pay increasing amounts | isn't a guarantee than the product will remain available once | the vendor decides to cancel it. And, piracy isn't an option | for developing countries where the software price is over a | year's average wage. | ttt0 wrote: | It's never guaranteed, no matter what payment model. There | is plenty of discontinued closed-source software from way | before a subscription model became a thing that everyone | does, and some of it managed to stay alive only thanks to | piracy. With subscriptions it's way worse, because it has | to rely on a central server, sometimes for no good reason | at all, and you can't even do that. It's just bound to | happen that the company will pull the plug once it's no | longer profitable. | tehjoker wrote: | Back in the day, the license keys weren't checked at a | central server, there was some kind of check sum or | database inside the software instead. This was wonderful | for both pirates and legitimate users for when the | company disappeared. | | I still remember a working Starcraft CD key (though it | later turned out that something on the order of | 01234566789 worked). | forgotmypw17 wrote: | my Word 97 still works great (and blows away today's | software, both foss and not) | dehrmann wrote: | _serial number_ | | Seems so quaint to think of that as a privacy concern. | bcrl wrote: | I look back over the last 22 years, and we had very different | attitudes towards privacy back then. It's sad to think that | almost 2 generations are now growing up without knowing what | privacy was, or how much actual freedom there was in being a | free range kid with the only obligation being home for | supper. | | We overestimate the change over the course of a year, but | seriously underestimate it over a couple of decades. | salawat wrote: | Someone hasn't heard of the German Tank Problem... | | https://en.m.wikipedia.org/wiki/German_tank_problem | | Further, over time, many authorities have to be repeatedly | reminded that User-Agents with UUID's != the user themselves, | and every attempt by technologists to cram more UUID on more | and more closely held technology with more and more | ubiquitous and trending toward always on data streams just | makes this threat harder and harder to play down. | | You don't need to serialize and track everything. We need to | stop doing it. This is also why the systemd machine-id was a | step in the wrong direction. | azalemeth wrote: | In many ways, all of the predictions made at the time in | replies to articles like this have come true. Everyone _is_ | spying on us constantly; legitimate end-users _are_ absolutely | peeved off / made to suffer SaaS and activation crap, and the | pirates _do_ just continue exactly as before (albeit with a | nice, NSA-provided open-source RE environment to play in...) | tyingq wrote: | Pretty sure I remember Sun compilers, Veritas Volume Manager, | and several other pieces of software having license keys that | expired in the 1990's. Several of them used something called | FlexLM. | tails4e wrote: | Flexlm is alive and kicking. All of thr EDA software I use | daily is protected by it. Its so archaic I can only assume | its been broken seven ways from Sunday, but its still there. | Id be interested to know if anyone here knows why it's the de | facto standard for on premises software licencing. | [deleted] | beervirus wrote: | Oh man, I remember this. What a simpler time. | dehrmann wrote: | > But didn't you say it'd help to prevent counterfeiting of | chips? | | The stolen part I get, but did it used to be easier to | counterfeit chips? There's a lot that goes into making something | that looks like a PIII, and even then, I assume Intel had state- | of-the-art fabs, so I'm surprised this was a concern. | | The hardware scams I've heard of stamping better specs on | something, for hard drives, a firmware hack that makes it appear | to be higher capacity, and unauthorized hardware made in off- | hours on the same production line. | [deleted] | bombcar wrote: | Those are the direct scams - but there are also lesser scams | where a supplier replaces a part with a working part made by | another manufacturer and pockets the difference. The parts may | work correctly (in some cases it was only discovered because | the parts worked FASTER than expected) - but it is fraud. | moonbug wrote: | a common problem back then was chips getting remarked as higher | clock bin parts. | whoopdedo wrote: | I felt at the time that when Intel said "counterfeit" they | really meant "clones". | illys wrote: | "Big Brother Inside" for just a unique id? What should we say now | about Intel Management Engine? | PurpleFoxy wrote: | We already know the management engine is a backdoor/botnet. No | intel powered computer is secure or private. | wmf wrote: | This was a self-own by Intel where they claimed that the | processor serial number would be used for online authentication | which was then exaggerated to "the processor serial number will | be a super-cookie sent in every HTTP request" which does sound | pretty big-brotherish. | | The ME, on the other hand, is obviously good since it "allows" | you to watch 4K Netflix on your PC. | sneak wrote: | Every single iPhone and iPad transmits its hardware serial | number to Apple when you launch the App Store app, or on first | boot after restore for "activation". | trollied wrote: | I don't know why you've gone on a tangent and randomly | mentioned Apple? | | Anyway, speaking of unique identifiers in mobile devices, | mobile phones have had IMEIs for ages - pre-dates Apple by a | long time. | JohannMac wrote: | Common to have unique SN in a processor. Let the SW vendors do | copy protection too. E.g. at Sonos we used them to associate with | the software signed certificate such that you couldn't run a | given Players software on another Player without the same SN. | When making products via contract manufactures, especially in | China, it was a wise procedure. ___________________________________________________________________ (page generated 2021-03-13 23:00 UTC)