Enterprise Right Management vs. Traditional Encryption Tools
James A. Donald
jamesd at echeque.com
Mon May 14 16:58:15 EDT 2007
Jason Holt wrote:
> So I guess the answer to your question is "We'd better
> assume that DRM+TPM will be ineffective until we've
> subjected a specific implementation of it to the same
> level of scrutiny we apply to other cryptosystems, and
> since DRM+TPM proposals tend to be much more
> complicated than other cryptosystems like SSL, that's
> going to take a very long time."
TPM can in principle provide effective DRM - it can also
provide effective super root access to your computer for
FBI and the Motion Picture Association of America - it
can do lots of things. So far it has not done any of
them.
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com
More information about the cryptography
mailing list