Enterprise Right Management vs. Traditional Encryption Tools
Ali, Saqib
docbook.xml at gmail.com
Wed May 9 20:01:46 EDT 2007
Hi Jon,
> Rights management systems work against polite attackers. They are
> useless against impolite attackers. Look at the way that
> entertainment rights management systems have been attacked.
> The rights management system will be secure so long as no one wants
> to break them. There is tension between the desire to break it and
> the degree to which its users rely on it. At some point, this tension
> will snap and it's going to hurt the people who rely on it. A
> metaphor involving a rubber band and that smarting is likely apt.
What about DRM/ERM that uses TPM? With TPM the content is pretty much
tied to a machine (barring screen captures etc)
Will ERM/DRM be ineffective even with the use of TPM?
Thanks
Saqib Ali
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com
More information about the cryptography
mailing list