Hi Jon, > Rights management systems work against polite attackers. They are > useless against impolite attackers. Look at the way that > entertainment rights management systems have been attacked. > The rights management system will be secure so long as no one wants > to break them. There is tension between the desire to break it and > the degree to which its users rely on it. At some point, this tension > will snap and it's going to hurt the people who rely on it. A > metaphor involving a rubber band and that smarting is likely apt.
What about DRM/ERM that uses TPM? With TPM the content is pretty much tied to a machine (barring screen captures etc) Will ERM/DRM be ineffective even with the use of TPM? Thanks Saqib Ali _______________________________________________ FDE mailing list [email protected] http://www.xml-dev.com/mailman/listinfo/fde
