Quote:
Originally Posted by geekmaster
They must be relying on the DMCA to protect them, rather than using "REAL" security practices. It is still a lot faster to crack the DRM using information obtained from an authorized reading device.
|
The length of the key, or the complexity from key to decryption, really makes little practical difference.
To be able to read the book, the user must have both the key and the decryption algorithm. It's just a question of how hard it is to do the reverse engineering.