Hi Jon,

> Rights management systems work against polite attackers. They are
> useless against impolite attackers. Look at the way that
> entertainment rights management systems have been attacked.
> The rights management system will be secure so long as no one wants
> to break them. There is tension between the desire to break it and
> the degree to which its users rely on it. At some point, this tension
> will snap and it's going to hurt the people who rely on it. A
> metaphor involving a rubber band and that smarting is likely apt.

What about DRM/ERM that uses TPM? With TPM the content is pretty much
tied to a machine (barring screen captures etc)

Will ERM/DRM be ineffective even with the use of TPM?

Thanks
Saqib Ali
_______________________________________________
FDE mailing list
[email protected]
http://www.xml-dev.com/mailman/listinfo/fde

Reply via email to