Enterprise Right Management vs. Traditional Encryption Tools

Ali, Saqib docbook.xml at gmail.com
Wed May 9 20:01:46 EDT 2007


Hi Jon,

> Rights management systems work against polite attackers. They are
> useless against impolite attackers. Look at the way that
> entertainment rights management systems have been attacked.
> The rights management system will be secure so long as no one wants
> to break them. There is tension between the desire to break it and
> the degree to which its users rely on it. At some point, this tension
> will snap and it's going to hurt the people who rely on it. A
> metaphor involving a rubber band and that smarting is likely apt.

What about DRM/ERM that uses TPM? With TPM the content is pretty much
tied to a machine (barring screen captures etc)

Will ERM/DRM be ineffective even with the use of TPM?

Thanks
Saqib Ali

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com



More information about the cryptography mailing list