Enterprise Right Management vs. Traditional Encryption Tools
    James A. Donald 
    jamesd at echeque.com
       
    Mon May 14 16:58:15 EDT 2007
    
    
  
Jason Holt wrote:
 > So I guess the answer to your question is "We'd better
 > assume that DRM+TPM will be ineffective until we've
 > subjected a specific implementation of it to the same
 > level of scrutiny we apply to other cryptosystems, and
 > since DRM+TPM proposals tend to be much more
 > complicated than other cryptosystems like SSL, that's
 > going to take a very long time."
TPM can in principle provide effective DRM - it can also
provide effective super root access to your computer for
FBI and the Motion Picture Association of America - it
can do lots of things.  So far it has not done any of
them.
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com
    
    
More information about the cryptography
mailing list