On Wed, 11 Feb 2009, Ben Laurie wrote: > If I have data on my server that I would like to stay on my server > and not get leaked to some third party, then this is exactly the > same situation as DRMed content on an end user's machine, is it not?
The treat model is completely different: for DRM the attacker is the user who supposedly has complete access to computer, while for server the attacker is someone who has only (limited) network connection to your server. -- Regards, ASK --------------------------------------------------------------------- The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to majord...@metzdowd.com