We have fortunately yet to see (to my knowledge) rubber-hose cryptanalysis attempted to be applied to a DRM public key. Continued egregious deployment of DRM may see an angry consumer "snap" and attempt such an action. Are key revocation mechanisms sufficient for a master key breach?
No comments :
Post a Comment