Tag Archives: Data Assurance

A rudimentary OpenDRM

We all know that Open Source was to free ideas from incarceration, not deprive programmers of income. Here is a rudimentary “OpenDRM” scheme. Step 1 (Python script) Comments Updated Apr 22 Step 2 (Python script) – One possible “salt3” might … Continue reading

Posted in Uncategorized | Tagged , , , , , , , , | Leave a comment

Hypothetical Key Logger defeat

This is a hypothetical key-logger defeat. To test the protocol, consider any keylogger to be an intelligent M(an) I(n) the M(iddle.) Ingredients: Proprietary keyboard that can  track and use as many session keys as active secure applications. execute a Diffie-Hellman key … Continue reading

Posted in Uncategorized | Tagged , , , , | Leave a comment