tag:blogger.com,1999:blog-8060605.post112109739209371286..comments2024-03-26T15:57:13.443+00:00Comments on On An Overgrown Path: Now Naxos downloads from library web sitesUnknownnoreply@blogger.comBlogger1125tag:blogger.com,1999:blog-8060605.post-1121101492026392122005-07-11T18:04:00.000+01:002005-07-11T18:04:00.000+01:00Hmm, I foresee great hacking opportunities here, p...Hmm, I foresee great hacking opportunities here, presuming Naxos' idea works on the idea of an embedded key that tabulates the length of time the piece is "legal". Then there can be those annoyances if someone has an internal computer clock that has gone haywire, presuming the 'key' is interdependent on that--libraries do not always have the money to buy the latest technology so are apt to have PCs with busted clocks.<BR/><BR/>Seen this before when attempts were made to secure CD-ROM databases with a similar methodology. Never worked in practice like it did in theory.Anonymousnoreply@blogger.com