Introduction Origins Implementations Effectiveness Response Summary.

9

Transcript of Introduction Origins Implementations Effectiveness Response Summary.

Page 1: Introduction  Origins  Implementations  Effectiveness  Response  Summary.
Page 2: Introduction  Origins  Implementations  Effectiveness  Response  Summary.

Introduction Origins Implementations Effectiveness Response Summary

Page 3: Introduction  Origins  Implementations  Effectiveness  Response  Summary.

DRM - Digital Rights Management

Intended to prevent uses of the media not desired or intended by the creator

Page 4: Introduction  Origins  Implementations  Effectiveness  Response  Summary.

Early implementations (approx. 1996) were on film DVDs in order to prevent high-quality rips› A simple encryption algorithm

Extended to include audio CDs approximately 2002

Page 5: Introduction  Origins  Implementations  Effectiveness  Response  Summary.

Encryption algorithms – DVD

Software based - iTunes, new Kazaa

Network based - Steam, Ubisoft Uplay

Page 6: Introduction  Origins  Implementations  Effectiveness  Response  Summary.

Software based is generally most effective

Encryption keys tend to be broken quite easily

Network-based has proven to be somewhat effective

Page 7: Introduction  Origins  Implementations  Effectiveness  Response  Summary.

Consumers generally disapproving due to difficulties installing and playing

Free Software Foundation

Several publishers have dropped DRM in the idea that it encourages piracy. However, DRM is still common

Page 8: Introduction  Origins  Implementations  Effectiveness  Response  Summary.

DRM was implemented to help prevent piracy and other potentially malicious uses

Results have been mixed

The outcome of the debate over DRM is still to be decided

Page 9: Introduction  Origins  Implementations  Effectiveness  Response  Summary.