Quote:
Originally Posted by pdurrant
With any DRM system, the end user (or the end user's equipment) must be given the decryption key.
|
That's the point. Compromise the mechanism that manages the keys and you render irrelevant the strength of the rest of the system.