snip..

> Is anyone aware of a way those two concepts can co-exist? Because
> as soon as the content has been decrypted, an application could
> do anything with it, which renders DRM virtually unusable on the
> application level. DRM on the hardware level (like trusted
> computing) however still needs Applications to be authorized.
>
> Can anyone think of a scenario that would work?

I met someone at a creative commons party recently here in SF who is 
working on an open source solution.  I am a simple end user, so I 
can only repeat what the true geeks tell me.  I have loaned this 
person's card to a friend, who is not in his office next door at 
the moment.  When he gets back, I will get it from him. 

---------------------------------------------------------------------
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Reply via email to