Page 5 of 5

Re: MachFive 3 at NAMM

Posted: Wed Apr 20, 2011 8:57 am
by FMiguelez
James Steele wrote:
b-righteous wrote:I hope it won't require iLok 2's new buggy more intrusive protection.
FUD.
+1

:roll:

I need some food now...

Re: MachFive 3 at NAMM

Posted: Wed Apr 20, 2011 11:24 am
by b-righteous
carrythebanner wrote:Care to elaborate on that? I've heard that the iLok 2 is newer and supposedly more secure technology, but I haven't yet heard any reports that it's "more intrusive" than the original iLok.
More secure = more intrusive. To be clear, it now has different tiers of protection. It is the higher level of security that is more complex and intrusive and is currently causing bugs in the software that is using it. The software that does not use the newer protection scheme does not suffer from the issues. This is verified by a dev. currently using the new protection. Only other issue is the new 64 bit drivers were flakey but I guess that is expected and may already be solved.

Don't get me qrong, I am not one who is against dongles and copy protection. However, I don't like the extra layer of potential issues they can cause. It is hard enough already to make all this stuff work together.

Re: MachFive 3 at NAMM

Posted: Thu Apr 21, 2011 7:12 am
by carrythebanner
b-righteous wrote:
carrythebanner wrote:Care to elaborate on that? I've heard that the iLok 2 is newer and supposedly more secure technology, but I haven't yet heard any reports that it's "more intrusive" than the original iLok.
More secure = more intrusive. To be clear, it now has different tiers of protection. It is the higher level of security that is more complex and intrusive and is currently causing bugs in the software that is using it. The software that does not use the newer protection scheme does not suffer from the issues. This is verified by a dev. currently using the new protection. Only other issue is the new 64 bit drivers were flakey but I guess that is expected and may already be solved.
That's more words on the topic, but not much of an elaboration. Intrusive how — does software using it collect personal info or behave rootkit-like in some way? Which software are you talking about? Who are your sources? I'm not saying you're wrong, I'm just saying that from where I sit the information is vague and unverifiable.
b-righteous wrote:Don't get me qrong, I am not one who is against dongles and copy protection. However, I don't like the extra layer of potential issues they can cause. It is hard enough already to make all this stuff work together.
Right, I'm not suggesting you have anything against copy protection. Just trying to suss out where your statement is coming from.

MachFive 3 at NAMM

Posted: Thu Apr 21, 2011 10:50 am
by James Steele
carrythebanner wrote:I'm not saying you're wrong, I'm just saying that from where I sit the information is vague and unverifiable.
+1