Alexander Klimov wrote:
> On Wed, 11 Feb 2009, Ben Laurie wrote:
>> If I have data on my server that I would like to stay on my server
>> and not get leaked to some third party, then this is exactly the
>> same situation as DRMed content on an end user's machine, is it not?
> The treat model is completely different: for DRM the attacker is the
> user who supposedly has complete access to computer, while for server
> the attacker is someone who has only (limited) network connection to
> your server.

You wish. The threat is an attacker who has root on your machine.


"There is no limit to what a man can do or how far he can go if he
doesn't mind who gets the credit." - Robert Woodruff

The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to

Reply via email to