[88548] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: Enterprise Right Management vs. Traditional Encryption Tools

daemon@ATHENA.MIT.EDU (James A. Donald)
Mon May 14 19:55:07 2007

Date: Tue, 15 May 2007 06:58:15 +1000
From: "James A. Donald" <jamesd@echeque.com>
To: Jason Holt <jason@lunkwill.org>
CC: "Ali, Saqib" <docbook.xml@gmail.com>, Jon Callas <jon@callas.org>, 
 Cryptography <cryptography@metzdowd.com>,
  FDE@www.xml-dev.com
In-Reply-To: <Pine.LNX.4.64.0705141519580.6988@pl2.zayda.com>

Jason Holt wrote:
 > So I guess the answer to your question is "We'd better
 > assume that DRM+TPM will be ineffective until we've
 > subjected a specific implementation of it to the same
 > level of scrutiny we apply to other cryptosystems, and
 > since DRM+TPM proposals tend to be much more
 > complicated than other cryptosystems like SSL, that's
 > going to take a very long time."

TPM can in principle provide effective DRM - it can also
provide effective super root access to your computer for
FBI and the Motion Picture Association of America - it
can do lots of things.  So far it has not done any of
them.

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post