Lars Oppermann wrote: > Is anyone aware of a way those two concepts can co-exist? Because as > soon as the content has been decrypted, an application could do anything > with it, which renders DRM virtually unusable on the application level. > DRM on the hardware level (like trusted computing) however still needs > Applications to be authorized. > > Can anyone think of a scenario that would work?
Nothing would provide full "protection". Nothing at all. Even propietary, hardware-encoded systems would not provide full protection. People could just grab a home camera, point it at the computer monitor and mail tapes by physical mail. But full protection should not be the goal. Let me explain: Do bicyle theft laws prevent the theft of all bicycles? Does any law fully prevent any crime? No. The objective of laws is not the complete removal of an illegal activity, because the only way to truly attain that is by creating a police state governed by a brutal tyrany. Rather, the objective of laws is to discourage crime, but to balance the desire for low crime against the desire for personal freedom. So too should it be with DRM. Therefore, this is the stance I propose: The goal of DRM is not to make copying absolutely impossible. Just make it difficult and inconvenient in a way that properly balances against users' freedoms. If anyone has a good reason why they need near absolute access control, they should not be using DRM, they should use password based encryption. Now, if I think of a way to attain that other goal, I'll let you know. :-) Cheers, -- Daniel Carrera | Rigorous reasoning from inapplicable Join OOoAuthors today! | assumptions yields the world's most http://oooauthors.org | durable nonsense. --------------------------------------------------------------------- To unsubscribe, e-mail: [EMAIL PROTECTED] For additional commands, e-mail: [EMAIL PROTECTED]
