My Photo

Your email address:


Powered by FeedBlitz

April 2018

Sun Mon Tue Wed Thu Fri Sat
1 2 3 4 5 6 7
8 9 10 11 12 13 14
15 16 17 18 19 20 21
22 23 24 25 26 27 28
29 30          
Blog powered by Typepad

Become a Fan

« Intelligent Organizations – Assembling Context and The Proof is in the Chimp! | Main | It’s All About the Librarian! New Paradigms in Enterprise Discovery and Awareness »

July 13, 2006

Comments

Feed You can follow this conversation by subscribing to the comment feed for this post.

Brian

> Equally important, we cover information rights
> management – technology that enables the owner of
> data to control what a recipient can do with the
> data, much in the same way a PDF can be created
> without enabling the recipient to print it.

This sounds remarkably like snake oil, and reading page 75 of the report doesn't shed any more light on a safe way to do this. IRM technology tends to fail as soon as someone takes an interest in attacking it... and once someone has figured out how to break it once, they can share the information far and wide.

Why propose a privacy "solution" that doesn't stand a chance against someone willing to attack it?

The report sounds interesting. I'm going to read it.

The comments to this entry are closed.