Download presentation
Presentation is loading. Please wait.
Published byFerdinand Horton Modified over 8 years ago
1
Digital Rights Management (DRM) Kamil Kaminski
2
Personal Example, Playing a Blu-ray Disc Blu-ray and BD+/AACS encryption: AACS (Advanced Access Content System), on the disc HDCP (High-bandwidth Digital Content Protection), on the monitors end The requirements: HDCP certified monitor HDMI/DVI connection Software capable of decoding Blu-ray discs, such as CyberLink PowerDVD What Does That Mean?
3
Personal Example Contd. If you don't have a monitor with HDMI/DVI connection or your monitor does not support HDCP decryption, you're out of luck If you don’t have the necessary software (proprietary), you won’t be able to view the disc How can we get around that? Decrypt the movie on the fly, by using software such as Slysoft AnyDVD (or dump it to HDD), bypassing the protections Epic Win AACS has been cracked and recracked multiple of times HDCP has been completely cracked 2 months ago, Intel, company itself behind the HDCP, confirms that the extracted Master Key is valid DRM by Richard Stallman (man behind GNU and FSF): http://www.youtube.com/watch?v=8p9IU4zp7mU
4
Sony’s Nasty Rootkit Discs carried a software that would install itself onto the system silently without user’s permission It does that by braking the system’s security in the same way a virus would do What does a rootkit do? Changes the system so reading the disc would be restricted Hides its own presence It’s almost impossible to delete it All of this is a felony, Sony even had part of the code under GPL license and violated the terms of use of it Sony was never prosecuted. People sued them but they only focused on the side issues while the other nasty things that they did went unnoticed In the future, we will get a computer with rootkit already preinstalled and it will be impossible to remove
5
Why Digital Restriction Management is Unethical DRM - “functionality of refusing to function” Doesn’t respect user’s freedom, refuses you to do things Malicious on the user, may spy on you Restricts you: A file may or may not be used on multiple computers A file may require you to input special password or I.D. Limited amount of time a file could be burned onto media A file may require constant internet connection A file may be tied to specific hardware or software You really do not own the file you buy. DRM is just a call for piracy.
6
What can we do about DRM Don’t accept DRM unless you posses means to break the handcuffs Join groups such as defectivebydesign.org, and show megacorporations that if they design a product that attacks user’s freedom they will be hated If possible, use open source (free software) Richard Stallman: http://www.youtube.com/watch?v=c0FP7pWNu40 http://www.youtube.com/watch?v=uJi2rkHiNqg
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.