snip.. > Is anyone aware of a way those two concepts can co-exist? Because > as soon as the content has been decrypted, an application could > do anything with it, which renders DRM virtually unusable on the > application level. DRM on the hardware level (like trusted > computing) however still needs Applications to be authorized. > > Can anyone think of a scenario that would work?
I met someone at a creative commons party recently here in SF who is working on an open source solution. I am a simple end user, so I can only repeat what the true geeks tell me. I have loaned this person's card to a friend, who is not in his office next door at the moment. When he gets back, I will get it from him. --------------------------------------------------------------------- To unsubscribe, e-mail: [EMAIL PROTECTED] For additional commands, e-mail: [EMAIL PROTECTED]