View Single Post
Old 12-09-2007, 06:45 AM   #7
mocelet
Connoisseur
mocelet began at the beginning.
 
Posts: 56
Karma: 11
Join Date: Aug 2007
Device: iLiad / Palm Vx / Nokia E65
Quote:
Originally Posted by Trenien View Post
By the way, the link to the audio file is wrong, it's here
Thanks for spotting that - I fixed the top post.

I hadn't thought about DRM in the way described in the piece. That is, that in a traditional crypto attack you have three people, sender, receiver and attacker. But in the DRM situation, the receiver and attacker are the same person, so the attacker has access to the key and the cleartext (as the receiver). Consequently DRM relies on hiding the key, but leaving it available when needed. Hence laws are required to "prevent" the attacker opening the key storage box.
mocelet is offline   Reply With Quote