[88271] in cryptography@c2.net mail archive
Re: Enterprise Right Management vs. Traditional Encryption Tools
daemon@ATHENA.MIT.EDU (Ali, Saqib)
Sat May 12 09:07:08 2007
Date: Wed, 9 May 2007 17:01:46 -0700
From: "Ali, Saqib" <docbook.xml@gmail.com>
To: "Jon Callas" <jon@callas.org>
Cc: Cryptography <cryptography@metzdowd.com>, FDE@www.xml-dev.com
In-Reply-To: <9D668B7E-93DD-4EE1-87E6-7E5FAD09E8BF@callas.org>
Hi Jon,
> Rights management systems work against polite attackers. They are
> useless against impolite attackers. Look at the way that
> entertainment rights management systems have been attacked.
> The rights management system will be secure so long as no one wants
> to break them. There is tension between the desire to break it and
> the degree to which its users rely on it. At some point, this tension
> will snap and it's going to hurt the people who rely on it. A
> metaphor involving a rubber band and that smarting is likely apt.
What about DRM/ERM that uses TPM? With TPM the content is pretty much
tied to a machine (barring screen captures etc)
Will ERM/DRM be ineffective even with the use of TPM?
Thanks
Saqib Ali
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com