DRM
History Began since the 70’s Originally started on Floppys Ruined Value of Software Software touted being not copy protected.
Off-Disk Protection Codewords Code Wheels Manual Reference Difficult to copy sheets. Dongles
Back to On Disk Advance of CDs Burners were expensive, as were CDs False TOCs False Files
To Off Disk Again CD Keys Couldn’t use updating or online software features Unique to the program. Gave with the software. Later had limited usage
Software Solutions Pt 1 Safedisc Securom Basic check for CD Easily broken Securom More Aggressive software May not work with virtual drives Took longer to crack.
Software Solutions Pt. 2 Starforce Most aggressive of Software solutions Claimed to cause damage to computers. Difficult to remove from computer Claimed to have rootkits Massive backlash by users.
Modern DRM Pt. 1 DEGRADE / Altering Alters the program during runtime Subtle and hidden Seems like a bug Eventually becomes unusable. Primarily in video games
Modern DRM Pt. 2 Limited Activation Disallows the keys from being authorized X times. Difficult to Revoke Can sometimes be overly aggressive. Changes in hardware can cause a new authorization
Modern DRM Pt. 3 Online Only Usage Requires internet connectivity to function Program authorizes at all times. Can cause lag in personal usage elements Loss of internet can cause loss of program usage.
Modern DRM Pt. 4 Online Distribution Requires the Internet to receive Program Usually requires the internet to start program Some have offline mode Distributer holds onto software license. Sometimes has secondary DRM
Pros and Cons Pro Con Protects Software Prevents Illegal Copying Overly Aggressive DRM can hurt consumer Can prevent actual usage of program.
Future of DRM Cloud Based DRM Subscription Fees. What if the server goes down? What is the user purchasing?