Psystar Announces Program for Third-Party PC Manufacturers to Enable Snow Leopard Installation

AidenShaw you are stupid that you don't even know that Psystar bluntly copied EFI-X that have been doing this since early last year.


yep the great irony. He (i refuse to believe it is really more than one guy in his mother's basement) copied someone else's work without giving credit, then decides to sell it in violation of the open source license (that crappy GUI is NOT significant additional material) and uses it to violate the DMCA and another company's copyright.
 
1. Yes I quoted news articles, without fully pasting it with source etc.
Big deal. Never claimed it was my own, and a quick google search of topics will obviously reveal original article :p

2. Apple are being sued for using someone elses technology, apparently. Thought it might be slightly relevant. :eek:

3. The intel move for Apple has made it so much easier to hack OSX to run at native speeds on non-Apple hardware. Yes, a simple observation, which I thought pertinent.

4. Correction re. Europe law. In Europe the Apple EULA ain't valid.

Anyway regardless, the floodgates well and truly open
 
4. Correction re. Europe law. In Europe the Apple EULA ain't valid.

According to what law? Many countries in Europe have strong consumer protection laws that limit the enforceability of of an agreement made after the sale. But Psystar is not a consumer.
 
1. Yes I quoted news articles, without fully pasting it with source etc.
Big deal. Never claimed it was my own, and a quick google search of topics will obviously reveal original article :p

It's still plagerism. Its your job to cite sources if you want us to take you seriously. It is not our job to do work that you should have done. We are not responsible for re-googling.

2. Apple are being sued for using someone elses technology, apparently. Thought it might be slightly relevant. :eek:
Which right now is irrelevant since there is no conclusions that we can draw from this case. No discovery no facts. There are tons of lawsuits where one company claims they had a copyright that they in fact did not - Universal v Nintendo - facts which came out in discovery. Pointing out "Apple has been sued for patent infringement" is an irrelevant distraction.

3. The intel move for Apple has made it so much easier to hack OSX to run at native speeds on non-Apple hardware. Yes, a simple observation, which I thought pertinent.
Irrelevant. Just because something is easy, is not a justification for the action. You cannot use ease as a justification defense. If I in court claim that the laws regarding robbing people shouldn't apply to me because I only target helpless elderly people who are easy to target, I will get laughed at and get the book thrown at me.

4. Correction re. Europe law. In Europe the Apple EULA ain't valid.
As BaldiMac might put it, Cite please. With a link.. Remember to consider that Psytar is a business.
 
This is about First Sale Doctrine. And the judge, even while ruling in favor of Vernor, paved the way for an appeal on the grounds that 3 rulings in the Ninth circuit court, a higher court, supported the opposite, that software is indeed licensed.

In other words, Vernor is based on a 1977 precedent about movies (the Wise case), but there exist higher court rulings specifically about software licenses.

This thus proves nothing. Autodesk could've probably appealed. And if Psystar wants to argue First Sale Doctrine for their sale of OS X, they first have to produce financial evidence of even acquiring it in the first place, which they failed to do in discovery. And even if they were to find proof of purchase of OS X, win the First Sale Doctrine point, they then need to fight off the EULA which they broke by installing OS X on non apple hardware.

Guess why they are stalling and dreading the trial in January ? Because it's obvious to them they are losing. Re-filing their dismissed counter-suit in Florida instead of California proves they are desperate.

Re: Autodesk v Vernor
As I too thought the Autodesk v Vernor set important precedence, casting this case off as unimportant requires some discussion. Since I am not a lawyer, my opinions upon reading the case have no legal importance.

Judge Jones in his 26 page decision discusses precedent, especially with regard to software, policy, piracy, ownership, and legislation. He notes the prior cases of the Ninth Circuit and their contradictory findings. He discusses the distinction between a 'mere license' versus ownership. He cited in a Softman v Adobe court that
Autodesk v Vernor said:
"Merely labeling a transaction as a lease or license does not control. If a transaction involves a single payment giving the buyer an unlimited period in which it has the right to possession, the transaction is a sale. In this situation, the buyer owns the copy regardless of the label the parties use for the contract. . . . The pertinent issue is whether, as in a lease, the user may be required to return the copy to the vendor after the expiration of a particular period. If not, the transaction conveyed not only possession, but also transferred ownership of the copy."

Although that is not the concluding remark of Judge Jones in this case, I argue this conveys in plain language the result. If KnightWRX wishes to explain how Judge Jones has erred, how Wise is poor policy, or that another case establishes a better precedent, we would like to learn of it. Whether Autodesk were to appeal or not is immaterial to this discussion. Autodesk must overcome the finding of policy quoted in the Softman case above. Judge Jones discusses extensively how he came that his conclusion. A mere suggestion that Autodesk could appeal should not imply that the Ninth Circuit court will overrule Judge Jones.

Parenthetically, this case has been written about by bloggers and they present additional commentary germane to this case, its implications, and possible motivations in predicting future actions by Autodesk.

Re: proof of purchase
I confess to being sufficiently cynical to believe that Psystar could and did produce receipts of one or more copies of OS X. However, I suspect this notation is likely a legal subterfuge. It is similar to responses of defense attorneys when subpoenaed for relevant documents. Don't just give the relevant documents, ship a truck of documents and force the opposition to find the relevant material. Readers conclude from the lack of receipts that Psystar has made counterfeit copies of OS X that Psystar delivered to customers. Even I would recognize that Apple could and would press criminal charges and would receive an injunction barring any sales of counterfeit copies of OS X by Psystar. None of that has happened. Apple's lawyers can bury Psystar in a sea of paper, so…?

Re: stalling and dreading
Psystar has not revealed their anxiety or legal tactics to me.

Re: counter-suit in Florida
I have not researched this one, but by my recollection, this is a suit initiated by Psystar against Apple Computer regarding Snow Leopard. Apple Computer chose to separate the unreleased Snow Leopard from findings in their California suit against Psystar. While I will certainly agree this shows a degree of belligerence on the part of Psystar, it should not be surprising that if they think they can win in their counter-suit against Apple for copyright misuse in California, they should pursue a suit with Snow Leopard. I don't understand jurisdiction in this case, but if Apple files in California, should I be surprised that Psystar files in Florida?
 
But if I buy a copy of Apple OSX for my Hackintosh, it's not stealing. Surely I can modify files on my OS that I bought....

Fair Use. Just as it is legal to photocopy copyright images and paste them on your wall, but not legal to resell them.
 
Many EULAs have been declared invalid in the courts.

Many assume that the last thing that Apple would want to do is to have the courts rule on the validity of their restrictive EULAs. If the courts ruled that the Apple EULAs are invalid, then the Apple computer business collapses.

I don't think Apple's computer business collapses, but it makes things mighty inconvenient. The logical fix for Apple would be to sell software update subscriptions to registered Mac purchasers. Then they would either drop retail sales of OS updates entirely or raise the price of retail copies by a huge amount.

If I were a Hackintosh type, I would be very mad at Psystar for rocking the boat.
 
I don't think Apple's computer business collapses, but it makes things mighty inconvenient.

AidenShaw's argument is silly (as usual) - the general populace hardly has any interest in running OS X on non-Apple hardware with all the configuration gymnastics that would require. Striking down Apple's EULA would not mean you could just pop an OS X disc into your HP laptop and have everything work correctly, obviously. HP wouldn't bother with making OS X work well with their machines as that would upset their fat and ugly (but rich) bedmate (Microsoft). And Joe Q. Public isn't interested in a Psystar machine.

And people don't just buy Macs for OS X. What the AidenShaws of the world can't bring themselves to admit is that a lot of people are willing to pay some extra $$$ for a great looking computer that has tight integration between hardware and software. We're not all interested in $400 Dells, much to AidenShaw's dismay.

Apple is playing this exactly right: leave the Hackintosh hobbyists to their own devices and go after the odd duck (Psystar) that is trying to make a ill-gained profit.
 
[Yawn] Ok, I'm bored now with the all the fanboys, and to be honest who cares. There's loads of OSX hacks on PC hardware out there and the hacks and work arounds will keep getting better and better. Dell or someone might even make more of their pcs secretly osx compatible, a bit like the mini 9 discovery, but better.I do really think all this is great fun, isn't it? Adios amoebas.:apple::eek::D

I'm off to order my new computer: https://www.pearc.de/?___store=english&___from_store=english
 
4. Correction re. Europe law. In Europe the Apple EULA ain't valid.

In Germany, Psystar would not be protected by the very strong consumer protection laws, since they are not consumers. Instead, they would be judged on the principle that as a company, when they enter into a contract, they are bound by that contract. And by buying a box with MacOS X and a license, they have entered into a contract that requires them to obey that license, and that's it.
 
Fair Use.

sorry but no. hacking the OS access control is NOT fair use. Fair use in this case would be something like taking screen shots to use for teaching a computer class, writing an instruction manual etc.

At this point the DMCA has not been overturned via case law and it clearly states that the use or dissemination of any knowledge or technology designed to bypass access controls created by the owner of a technology (be it hardware or software) is illegal. even without copyright violations.
 
At this point the DMCA has not been overturned via case law and it clearly states that the use or dissemination of any knowledge or technology designed to bypass access controls created by the owner of a technology (be it hardware or software) is illegal. even without copyright violations.
I've read over the DMCA regulations several times. I know the intent of the regulation, to prevent copying of movies and music that are copy protected by an encryption scheme. As far as I know, the OS X disks are not encrypted. So it would not seem as though copying OS X would constitute a violation of the DMCA act, does it?

Let us imagine that SONY placed something on the SONY disks so that the encrypted DVDs could only be played in SONY DVD players. If Toshiba developed a player that maintained the encryption scheme, but circumvented the SONY to SONY restriction, would the court rule in favor of SONY?

Let me ask the question in a different way. Congress passed the DMCA act to protect the rights of the music and movie industry. In doing so, Congress makes a bargain with the industries designed to benefit the public and the industries. If Congress believed that the public was not being served, they needn't protect the creators. Would the court rule that a SONY to SONY restriction matched the intent of Congress in passing the DMCA?
 
I've read over the DMCA regulations several times. I know the intent of the regulation, to prevent copying of movies and music that are copy protected by an encryption scheme. As far as I know, the OS X disks are not encrypted. So it would not seem as though copying OS X would constitute a violation of the DMCA act, does it?
The disc may not be encrypted, but copying does you no good since copyright prevents you from distributing or modifying it anyway. There are portions of OSX that are copywritten - both sides allege that - and thats the portion that is covered by DMCA. As long as there is some sort of protection involved thats all that matters.

Let us imagine that SONY placed something on the SONY disks so that the encrypted DVDs could only be played in SONY DVD players. If Toshiba developed a player that maintained the encryption scheme, but circumvented the SONY to SONY restriction, would the court rule in favor of SONY?
Yes. There is nothing that stops Sony from developing a proprietary format. They cannot do that to that DVD’s since they do not possess the copyrights relevant to the DVD format. If Sony owned and controlled the DVD platform than it would be legal. DVD playback is a licensed system - you have to possess the CSS decryption keys to playback encoded DVD’s

Let me ask the question in a different way. Congress passed the DMCA act to protect the rights of the music and movie industry. In doing so, Congress makes a bargain with the industries designed to benefit the public and the industries. If Congress believed that the public was not being served, they needn't protect the creators. Would the court rule that a SONY to SONY restriction matched the intent of Congress in passing the DMCA?

That would depend on the nature of the protection that Sony implemented and if it was legal or not. Since we don’t know that in this case, I cannot answer. Your question is really vague here since we don’t know anything of the agreement that you propose (since it doesn’t exist) nor can we assume that congress has to ignore the industry simply because the industry was not serving the public. I am going to need more details to understand what you are referring to here. I really don’t think that’s all that relevant to the DMCA since it’s a consumer restricting act by its nature. You can’t argue that the DMCA is invalid since it is not balanced between consumers and businesses because laws are not required to be balanced.

You are arguing a big hypothetical here because we don’t know what the restriction entails and therefore cannot rule if it is reasonable or not. That is really crucial. Right now that means jack for this case (Apple V Psystar) since the restriction that Apple imposes is designed to protect a legal business strategy. It’s “fair” (as subjective as it can be) because there is adequate competition in the market so that consumers can enter into such a restriction on their own free will. Apple lays its terms down and offers a clause to get out. It possess no market power to force consumers to do anything illegal (as far as we can tell), and the terms have already been seen as reasonable. The only way Apple’s DMCA claims apply is the protection systems that they apply to enforce their terms. We don’t know how said protection systems really operate (they are sealed), but all we know is that they are a lock and key system designed to support their copyrights so that Apple can claim (legally) that their product is designed for this application and nothing else.

I need more information if I am going to draw a conclusion and my conclusion has no legal weight because it is not a court case.
 
no, but there is access control via a hardware check. the bootloader software that is used to make a hackintosh bypasses that check allowing an installation on any hardware.

The question would be: Is EFI emulation (to allow the check to suceed) by itself, especially if it can be shown to be used legally for install of a different operating system, illegal?

Psystar is operating in a very dark shade of grey, and certainly in somes areas the legal results could affect some innocent bystanders.
 
The question would be: Is EFI emulation (to allow the check to suceed) by itself, especially if it can be shown to be used legally for install of a different operating system, illegal?

Psystar is operating in a very dark shade of grey, and certainly in somes areas the legal results could affect some innocent bystanders.

EFI emulation is not the problem. EFI is not an Apple-specific technology. Apple embeds an encryption key in the System Management Controller. Emulation of the SMC and this encryption key would be the basis of any DMCA claim.
 
EFI emulation is not the problem. EFI is not an Apple-specific technology. Apple embeds an encryption key in the System Management Controller. Emulation of the SMC and this encryption key would be the basis of any DMCA claim.
Exactly. Apple does not own EFI - they just use it as a boot environment (since most PC's use BIOS). They couldnd never get away with that as a DNCA violation. AN SMC encryption scheme has a lot more legal weight.

It matters not the system boot type (probably because Apple figures that they aren't the only guys going to be using it) unless Apple invents their own that they control 100%. Encrypting the SMC is sufficient as a lock and key system.

Remember, burglars can't legitimately claim their ability to pick locks is evidence that the defenses of the house they rob is not protected. Its the intention of the lock that matters.
 
The disc may not be encrypted, but copying does you no good since copyright prevents you from distributing or modifying it anyway. There are portions of OSX that are copywritten - both sides allege that - and thats the portion that is covered by DMCA. As long as there is some sort of protection involved thats all that matters.
I agree except I believe simple copyright rules apply and not DMCA. It is my belief that the DMCA was enacted to prevent owners of DVDs from duplicating content they owned as it enabled piracy. If the DVDs were not encrypted, duplicating copyrighted material would still be illegal.

Yes. There is nothing that stops Sony from developing a proprietary format. …
…Your question is really vague here since we don’t know anything of the agreement that you propose (since it doesn’t exist) nor …
I concede from your discussion that my example was poorly crafted. I was trying to raise an example in which companies create products compatible with another company. I had presumed the DVD market had done this, though I could not describe it adequately.
… that means jack for this case (Apple V Psystar) since the restriction that Apple imposes is designed to protect a legal business strategy. It’s “fair” (as subjective as it can be) because there is adequate competition in the market so that consumers can enter into such a restriction on their own free will. Apple lays its terms down and offers a clause to get out. It possess no market power to force consumers to do anything illegal (as far as we can tell), and the terms have already been seen as reasonable. The only way Apple’s DMCA claims apply is the protection systems that they apply to enforce their terms. We don’t know how said protection systems really operate (they are sealed), but all we know is that they are a lock and key system designed to support their copyrights so that Apple can claim (legally) that their product is designed for this application and nothing else.
charlituna said:
no, but there is access control via a hardware check. the bootloader software that is used to make a hackintosh bypasses that check allowing an installation on any hardware.
I will concede this point as well. I have reviewed the DMCA provisions and find them too complex to argue rationally. It simply seemed perverse to the act that the per se argument that a bootloader hardware check should constitute DMCA protection while a cell phone exemption to the DMCA act should prevent a purchaser from being held hostage to a cell phone provider. The encrypted disks seemed quite different from rom code. The DMCA protects encrypted disks. Reverse engineering of rom codes are not unusual. However, with my lack of knowledge, to those asserting that the court will punish Psystar for reverse engineering the Apple ROM code, I concede.
 
I agree except I believe simple copyright rules apply and not DMCA. It is my belief that the DMCA was enacted to prevent owners of DVDs from duplicating content they owned as it enabled piracy. If the DVDs were not encrypted, duplicating copyrighted material would still be illegal.

The copy protections that OSX employs would be covered by both copyright and DMCA - that was the portion that is really relevant to my answer. Copyright coveres the creation of the code, DMCA protects the cracking of said code which is per Apple's argument. Apple splits the two up into separate complaints.

As far as your belief about the DMCA, it was partially about DVD duplication, but it is really just an extension of copyright falling under Section 17 (US copyright). There are lots of components and only one of them concerns anti-circumvention (the second component). This related codification of the DMCA (section 1201) says that it is illegal to:

  • (1) "circumvent a technological measure that effectively controls access to a work" except as allowed after rulemaking procedures administered by the Register of Copyrights every three years.
  • (2) "manufacture, import, offer to the public, provide, or otherwise traffic in" a device, service or component which is primarily intended to circumvent "a technological measure that effectively controls access to a work", and which either has limited commercially significant other uses or is marketed for the anti-circumvention purpose.

I's not specific to video devices or video playback. That is covered elsewhere. It looks as though the DMCA just strengthens the copyright codes though it contains other provisions. From what I gather, their enforcement is seperate, but they are part for the same legal statutes.
 
It simply seemed perverse to the act that the per se argument that a bootloader hardware check should constitute DMCA protection while a cell phone exemption to the DMCA act should prevent a purchaser from being held hostage to a cell phone provider.

Like all copyrights, there are exceptions to it to provide for fair use. The courts have determined that Boot loaders are not exceptions probably since the user does not interact with them. As far as cell phones are concerned, the locking is only to cover a limited contract between you the user and a service provider - not the manufacturer of the phone. Its not rally analogous.

Not to mention that the boot loader code is a proprietary trade secret that impacts the operation of a device from functioning - a cell phone lock does not do this. Locking codes are a shared technology between the handset manufacturer and a third party
 
EFI emulation is not the problem. EFI is not an Apple-specific technology. Apple embeds an encryption key in the System Management Controller. Emulation of the SMC and this encryption key would be the basis of any DMCA claim.

I don't think it's clear that SMC "emulation" supports claims of DMCA violation. It might, I just don't think it's clear yet. The reason being that, so far as I understand the process of "key" creation and the transmission of those "keys", they simply are not encrypted in the normal sense of the word "encrypted." To make matters worse, the information that we're referring to by using the word "key" is information that's openly and easily accessible whether it was encrypted or not. There are some interesting articles about this that I posted in the other big thread about Psystar (or was it this one?). I'll try to dig them up.

Imagine that I write a computer program that will simply not start unless it detects the identifying information of, say, a EVGA Geforce 8600GT–whatever the identifying information of that part happens to be in machine language or what have you. There's no encrypting or decrypting involved here. Now, suppose I say that my program's check as to the identifying information of an EVGA Geforce 8600GT is a DRM measure. Since there's no encryption or decryption involved in this process is the fact of my writing or uttering that this process is a DRM measure enough to make it so? I don't really have a ready answer about this. I'm just throwing it out there.
 
To make matters worse, the information that we're referring to by using the word "key" is information that's openly and easily accessible whether it was encrypted or not. There are some interesting articles about this that I posted in the other big thread about Psystar (or was it this one?). I'll try to dig them up.
It matters not. The fact that some people may have guessed something intended to be a secret (not public) doesn't suddenly make it public knowledge as far as the law is concerned. Groklaw points out in the filings:

Psystar's remaining argument that Apple's technological protection measures are not "'effective" because of the alleged availability on the Internet of information related to decoding the mechanism, fails as a matter of law. Courts have rejected this very argument as "spurious," since any technological protection measure necessarily must have been defeated before a DMCA claim can be asserted. See Corley, 273 F.3d at 441-42; Reimerdes, 111 F. Supp. 2d at 318 (noting that it would "gut the statute" if the "use of the word 'effectively' means that the statute protects only successful or efficacious technological means of controlling access"). A security measure is "effective" if "its function is to control access" and "in the ordinary course of its operation," the protection mechanism prevents access to a copyrighted work. 17 U.S.C. § 1201(a)(3)(B); Reimerdes, 111 F. Supp. 2d at 318.A33 To determine effectiveness, courts look to the technology's operation "at the level of the ordinary consumer." RealNetworks, 2009 WL 2475338, at *17. Even widespread publication on the Internet of keys to decode the protections does not deprive the copyright owner of the DMCA's legal protections.A34 Apple employs a highly secure type of protection technology, [redacted] (Kelly Decl. ¶ 11.) But what matters more than the details of Apple's particular encryption scheme is the dispositive fact that in the ordinary course of operation, Apple's technological protection measures prevent the ordinary consumer from installing or running Mac OS X on non-Apple hardware. RealNetworks, Inc., 2009 WL 2475338, at *17 (test for effectiveness is whether the measure is effective against the "ordinary consumer" or "average consumer"); Reimerdes, 111 F. Supp. 2d at 318 (finding a 40-bit encryption key embedded within authorized hardware effective); Pearl Inv., LLC v. Standard I/O, Inc., 257 F. Supp. 2d 326, 350 (D. Me. 2003); 321 Studios, 307 F. Supp. 2d at 1095. Apple's witnesses testified without contradiction that Apple's technological protection mechanisms function to protect access to Mac OS X and prohibit installation on non-Apple hardware. Indeed, Psystar's own pleadings concede this.35 (Am. Countercl. ¶¶ 33,37-38; Psystar Br. at 16-17).

My Take: The DMCA claims are valid since Psystar has to break something. It doesn't matter how widley available the data is - it was something that they have to crack and it had an intended purpose for the average consumer. That justifies the DMCA claims

Your scenario assumes no decrypting of information - however since we have no information of how Apple's SMC really works (its been redacted and Apple will not comment on it) so we do not know if there is any encryption going on.

Furthermore the courts (at least according to this disposition) do not make such a distinction I re-quote:

A security measure is "effective" if "its function is to control access" and "in the ordinary course of its operation," the protection mechanism prevents access to a copyrighted work. 17 U.S.C. § 1201(a)(3)(B); Reimerdes, 111 F. Supp. 2d at 318

The appropriate footnote:
The legislative history specifically states that "measures that can be deemed to 'effectively control access to a work' would be those based on encryption, scrambling, authentication, or some other measure which requires the use of a 'key' provided by a copyright owner to gain access to a work." H.R. Rep. No. 105-551, pt. 2, at 39 (1998). This is exactly what Apple does: Mac OS X requires a key and Apple provides this key to those who are authorized to use it.

Looks to me like all ther needs to be is a key provided by a copyright holder to gain access to the work. It doesn't specify any more than that. I am not going to look further than that to figure out the exact wording of the house bill, but I double checked this site and it seems to agree. Section 17 falls under the already discussed copyright.
 
Very interesting. Thanks for providing that.

Your scenario assumes no decrypting of information - however since we have no information of how Apple's SMC really works (its been redacted and Apple will not comment on it) so we do not know if there is any encryption going on.

I'm desperately trying to find the article I read a few weeks ago the outlined exactly the process of SMC emulation, what information the "keys" contain, how they're generated, and how they're used. SMC stands for System Management Controller. The primary function of the SMC is to manage power through the system and control fans. In the process of the SMC's primary function, data necessary for the operation of that function is generated and transmitted. It's that data, which has the primary function of managing power, that is co-opted by Apple as their top-secret redacted encryption scheme (i.e. the "key"). There just is no encryption or decryption going on.

When I say of the key that it's easily accessible I don't mean that it's easily accessible over the internet. I mean that the data is completely unhidden ordinary run-o-the-mill system power management data. That's it's primary purpose; that's the reason the data exists. Apple's OS simply makes sure that data exists in order to allow an install. That data can exist with or without an actual SMC. The question is whether generating that data is a violation of DMCA.

A security measure is "effective" if "its function is to control access" and "in the ordinary course of its operation," the protection mechanism prevents access to a copyrighted work. 17 U.S.C. § 1201(a)(3)(B); Reimerdes, 111 F. Supp. 2d at 318

Imagine the following scenario. Apple designs it's OS so that it only installs when the computer's microphone detects a certain sequence of hand clapping sounds. Apple employees know this hand clapping sequence and Apple's policy is that only Apple employees are authorized to install copies of the OS. When the Apple employees engage in the clapping procedure they don't take care to ensure that non-Apple employees can't hear or see it. Now, in this case, the clapping sequence's primary function is to control access. Additionally, in the ordinary course of the clapping sequences operation (being clapped by an Apple employee), the protection mechanism prevents access to a copyrighted work. If somebody observes the clapping, and since Apple doesn't take much if any care of hiding it many people do observe the clapping, is it the case that if those people clap the sequence and install the OS they violate the DMCA?

The case of the SMC is worse than the clapping scenario since the SMC wasn't even designed as a preventative measure. It's primary function, per Apple's own documentation, is to manage power. The information it passes around the system isn't hidden or encrypted and apparently accessing the information is quite a simple procedure; akin to being in the room when somebody yells a "secret" password to their friend.

The footnote about key-ness is interesting. Essentially, just having a key is a sufficient condition to a mechanisms being a security measure. The question is whether the output of an unencrypted bit of information from circuitry that was not built for the purpose of providing security measures counts as a key. I mean, theoretically, an SMU from a PC could be designed such that it happens to output the same bits with respect to the hardware it manages that the SMC outputs for the hardware it manages, even though the hardware is different. If that were to happen, presumably OSX would install on that PC. Would that count as a DMCA violation?
 
Register on MacRumors! This sidebar will go away, and you'll see fewer ads.
Back
Top