Alexander Klimov wrote: > On Wed, 11 Feb 2009, Ben Laurie wrote: >> If I have data on my server that I would like to stay on my server >> and not get leaked to some third party, then this is exactly the >> same situation as DRMed content on an end user's machine, is it not? > > The treat model is completely different: for DRM the attacker is the > user who supposedly has complete access to computer, while for server > the attacker is someone who has only (limited) network connection to > your server.
You wish. The threat is an attacker who has root on your machine. -- http://www.apache-ssl.org/ben.html http://www.links.org/ "There is no limit to what a man can do or how far he can go if he doesn't mind who gets the credit." - Robert Woodruff --------------------------------------------------------------------- The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to majord...@metzdowd.com