On Wed, 2 Feb 2005, Lars Oppermann wrote: [..]
Is anyone aware of a way those two concepts can co-exist? Because as soon as the content has been decrypted, an application could do anything with it, which renders DRM virtually unusable on the application level. DRM on the hardware level (like trusted computing) however still needs Applications to be authorized.

Can anyone think of a scenario that would work?

No, but it would be interesting to read of one.

I've seen (but lost the links to) articles which claim that DRM is not feasible even in theory. This somehow reminds me of copy protection gimmicks of the late 1970's and 1980's which were eventually dropped from software in the 1980's because it was proven to not work.

Even if you can technically implement uncomplex DRM, handling principles like the doctrine of first sale and fair use are likely too much for any technology even on the horizon. Without those DRM is mostly disadvantageous.

Also, how can it be guaranteed that DRM can't / won't be used to lock out competition or for censorship or espionage?

-Lars
Lars Nooden ([EMAIL PROTECTED])
        The Internet is for Everyone:
                http://www.ietf.org/rfc/rfc3271.txt?number=3271


--------------------------------------------------------------------- To unsubscribe, e-mail: [EMAIL PROTECTED] For additional commands, e-mail: [EMAIL PROTECTED]



Reply via email to