Talk:Traitor tracing

From Wikipedia, the free encyclopedia
Jump to: navigation, search

while a valid discussion, this article has nothing to do with the notion of traitor tracing as used in the computer science community. That notion of content protection is applicable in a broadcast setting, where a valid key is being reused. Citations for that notion are easily found on Since I don't know who put up this article, and why, I'm reluctant to correct this. Hugo. (talk) 19:17, 15 May 2011 (UTC)

Activation Controls[edit]

In section "Activation Controls", the sentence "In this model, software ships with a sticker or label printed on the outside of the software, but inside the package." makes no grammatical sense, and as such I don't know how to fix it. Please fix it. (talk) 02:30, 9 February 2014 (UTC)

I changed that sentence to "In this model, each box of software ships with a unique activation number on a sticker or label that can only be read after the package is opened, separate from the CD-ROM or a DVD-ROM.". Does it make more sense now? --DavidCary (talk) 02:34, 15 October 2016 (UTC)

This article is mislabeled[edit]

This article has nothing to do with tracing and everything to do with methods of software registration. The name should be changed --— Preceding unsigned comment added by (talkcontribs) 02:30, 2014 February 9‎

What new name would you prefer? --DavidCary (talk) 02:34, 15 October 2016 (UTC)

Primary vs other[edit]

What is the criteria for being a primary method? There seems to be no criteria at all here.--Henke37 (talk) 13:51, 2 April 2015 (UTC)