[88548] in cryptography@c2.net mail archive
Re: Enterprise Right Management vs. Traditional Encryption Tools
daemon@ATHENA.MIT.EDU (James A. Donald)
Mon May 14 19:55:07 2007
Date: Tue, 15 May 2007 06:58:15 +1000
From: "James A. Donald" <jamesd@echeque.com>
To: Jason Holt <jason@lunkwill.org>
CC: "Ali, Saqib" <docbook.xml@gmail.com>, Jon Callas <jon@callas.org>,
Cryptography <cryptography@metzdowd.com>,
FDE@www.xml-dev.com
In-Reply-To: <Pine.LNX.4.64.0705141519580.6988@pl2.zayda.com>
Jason Holt wrote:
> So I guess the answer to your question is "We'd better
> assume that DRM+TPM will be ineffective until we've
> subjected a specific implementation of it to the same
> level of scrutiny we apply to other cryptosystems, and
> since DRM+TPM proposals tend to be much more
> complicated than other cryptosystems like SSL, that's
> going to take a very long time."
TPM can in principle provide effective DRM - it can also
provide effective super root access to your computer for
FBI and the Motion Picture Association of America - it
can do lots of things. So far it has not done any of
them.
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com