Enterprise Right Management vs. Traditional Encryption Tools

James A. Donald jamesd at echeque.com
Mon May 14 16:58:15 EDT 2007


Jason Holt wrote:
 > So I guess the answer to your question is "We'd better
 > assume that DRM+TPM will be ineffective until we've
 > subjected a specific implementation of it to the same
 > level of scrutiny we apply to other cryptosystems, and
 > since DRM+TPM proposals tend to be much more
 > complicated than other cryptosystems like SSL, that's
 > going to take a very long time."

TPM can in principle provide effective DRM - it can also
provide effective super root access to your computer for
FBI and the Motion Picture Association of America - it
can do lots of things.  So far it has not done any of
them.

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com



More information about the cryptography mailing list