Alexander Klimov wrote:
> On Wed, 11 Feb 2009, Ben Laurie wrote:
>> If I have data on my server that I would like to stay on my server
>> and not get leaked to some third party, then this is exactly the
>> same situation as DRMed content on an end user's machine, is it not?
> 
> The treat model is completely different: for DRM the attacker is the
> user who supposedly has complete access to computer, while for server
> the attacker is someone who has only (limited) network connection to
> your server.

You wish. The threat is an attacker who has root on your machine.

-- 
http://www.apache-ssl.org/ben.html           http://www.links.org/

"There is no limit to what a man can do or how far he can go if he
doesn't mind who gets the credit." - Robert Woodruff

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majord...@metzdowd.com

Reply via email to