Analysis of information sources in references of the Wikipedia article "数字版权管理" in Chinese language version.
At the end of the day, all DRM systems share a common vulnerability: they provide their attackers with ciphertext, the cipher and the key. At this point,the secret isn't a secret anymore.
|url=
值 (帮助)存档于2007-09-30).|url=
值 (帮助)存档于2007-09-30).At the end of the day, all DRM systems share a common vulnerability: they provide their attackers with ciphertext, the cipher and the key. At this point,the secret isn't a secret anymore.