> It can be done, > It can be bullet proof
I am with Greg on this one. Watermarking or other DRM schema are fundamentally flawed. They all provide the user (or "attacker" depending on your point of view) with ciphertext, the cipher and the key. Obscured, perhaps, but it is all there and the "secret" falls apart. Cory Doctorow put it very well in a talk on the subject when he said, "Here's the social reason that DRM fails: keeping an honest user honest is like keeping a tall user tall." DRM stops Joe down the hall from making a clean copy, but to the sophisticated user the Watermark is easy to remove. The entire talk is a must read if you really care about any of this stuff: http://www.dashes.com/anil/stuff/doctorow-drm-ms.html - Brian -- Brian W. Brown Director, Electronic Student Services Room 269, John Thomas Hall Appalachian State University Boone, NC 28608 Office: 828-262-7124 http://ess.appstate.edu/ http://phpwebsite.appstate.edu/
