[Cryptography] The Laws (was the principles) of secure information systems design

Ray Dillinger bear at sonic.net
Wed Jul 13 20:25:20 EDT 2016



On 07/13/2016 05:14 PM, Henry Baker wrote:
>> "DRM" -- A technology which gives the key to the attacker.
> 
> Digital Rootkit Management
> 

Oooh, I particularly like that one.  With Sony's invention as
a prime example even.  I think I will update my handouts now.

				Bear


-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 819 bytes
Desc: OpenPGP digital signature
URL: <http://www.metzdowd.com/pipermail/cryptography/attachments/20160713/9a299280/attachment.sig>


More information about the cryptography mailing list