On Fri, 11 May 2007, Jon Callas wrote:
What about DRM/ERM that uses TPM? With TPM the content is
pretty much tied to a machine (barring screen captures etc)
Will ERM/DRM be ineffective even with the use of TPM?
There are two different features of TPM: it can work as an embedded
smartcard (to
Earlier someone asked about comparisons between full-width CFB and CBC.
They are very similar in certain ways. For example, the sequence of
operations for both are the same: xor the next block of plaintext; encrypt
the result; xor the next block of plaintext; encrypt the result; and so
on. The