> It can be done,

> It can be bullet proof

I am with Greg on this one.  Watermarking or other DRM schema are
fundamentally flawed.  They all provide the user (or "attacker" depending
on your point of view) with ciphertext, the cipher and the key.  Obscured,
perhaps, but it is all there and the "secret" falls apart.

Cory Doctorow put it very well in a talk on the subject when he said,
"Here's the social reason that DRM fails: keeping an honest user honest is
like keeping a tall user tall."  DRM stops Joe down the hall from making a
clean copy, but to the sophisticated user the Watermark is easy to remove.

The entire talk is a must read if you really care about any of this stuff:
http://www.dashes.com/anil/stuff/doctorow-drm-ms.html

- Brian

-- 
Brian W. Brown
Director, Electronic Student Services
Room 269, John Thomas Hall
Appalachian State University
Boone, NC 28608

Office: 828-262-7124

http://ess.appstate.edu/
http://phpwebsite.appstate.edu/

Reply via email to