Quote:
Originally Posted by Trenien
By the way, the link to the audio file is wrong, it's here
|
Thanks for spotting that - I fixed the top post.
I hadn't thought about DRM in the way described in the piece. That is, that in a traditional crypto attack you have three people, sender, receiver and attacker. But in the DRM situation, the receiver and attacker are the same person, so the attacker has access to the key and the cleartext (as the receiver). Consequently DRM relies on hiding the key, but leaving it available when needed. Hence laws are required to "prevent" the attacker opening the key storage box.