Quote:
Originally Posted by ratinox
Yup. The weakest point in well-designed cryptosystems usually is key management. If you can compromise the key management mechanism then it doesn't matter how good the rest of the system might be.
|
With any DRM system, the end user (or the end user's equipment) must be given the decryption key.