Digital rights management (DRM) is a class of access control technologies that are used by hardware
manufacturers, publishers, copyright holders and individuals with the intent
to limit the use of digital content and devices after sale. DRM is any technology that inhibits uses
of digital content that are not desired or intended by the content provider. Copy protection which can be circumvented without
modifying the file or device, such as serial numbers or keyfiles are not generally considered to be DRM.
DRM also includes specific instances of digital works or devices. Companies
such as Amazon,
AT&T AOL, Apple Inc., the BBC, Microsoft, Electronic Arts and Sony use digital rights management. In 1998
the Digital Millennium Copyright Act (DMCA) was passed in the United States
to impose criminal penalties on those who make available technologies whose
primary purpose and function is to circumvent content protection technologies.]
The use of digital rights management is
controversial. Content providers claim that DRM is necessary to fight copyright
infringement online and that it can help the copyright holder maintain artistic
control or ensure
continued revenue streams. Those opposed to DRM contend there is
no evidence that DRM helps prevent copyright infringement, arguing instead that
it serves only to inconvenience legitimate customers, and that DRM helps big
business stifle innovation and competition. Further, works can become permanently
inaccessible if the DRM scheme changes or if the service is discontinued. Proponents argue that digital locks
should be considered necessary to prevent "intellectual property"
from being copied freely, just as physical locks are needed to prevent personal
property from being stolen.
SHORTCOMINGS OF DIGITAL RIGHTS MANAGEMENT
Methods to bypass DRM
There are many methods to bypass DRM control
on audio and video content.
One simple method to bypass DRM on audio
files is to burn the content to an audio CD and then rip it into DRM-free files.
Many software programs have been developed
that intercept the data stream as it is decrypted out of the DRM-restricted
file, and then use this data to construct a DRM-free file. These programs
require a decryption key.
Another method is to use software to record
the signals being sent through the audio or video cards, or to plug analog
recording devices into the analog outputs of the media player. These techniques
utilize the so-called "analog hole" (see below).
Analog hole
All forms of DRM for audio and visual
material (excluding interactive materials, e.g. videogames) are subject to the analog hole, namely that in
order for a viewer to play the material, the digital signal must be turned into
an analog signal containing light and/or sound for the viewer, and so available
to be copied as no DRM is capable of controlling content in this form.
All DRM to date can therefore be bypassed by
recording this signal and digitally storing and distributing it in a non DRM
limited form, by anyone who has the technical means of recording the analog
stream..
DRM on general computing platforms
Many of the DRM systems in use are designed
to work on general purpose computing hardware, such as desktop PCs apparently
because this equipment is felt to be a major contributor to revenue loss from
disallowed copying.
Such schemes, especially software based ones,
can never be wholly secure since the software must include all the information
necessary to decrypt the content, such as the decryption keys. An attacker will be able to
extract this information, directly decrypt and copy the content, which bypasses
the restrictions imposed by a DRM system.
DRM on purpose-built hardware
Many DRM schemes use encrypted media which
requires purpose-built hardware to hear or see the content. It tries to protect
a secret decryption key from the users of the system.
While this in principle can work, it is
extremely difficult to build the hardware to protect the secret key against a
sufficiently determined adversary.. In addition user verification provisions
are frequently subject to attack, pirate
decryption being among the most frequented ones.
Watermarks
Watermarks can very typically be removed,
although degradation of video or audio can occur.
Mass piracy failure
Mass piracy of hard copies does not
necessarily need DRM to be decrypted or removed, as it can be achieved by
bit-perfect copying of a legally obtained medium without accessing the
decrypted content.
Obsolescence
When standards and formats change, it may be
difficult to transfer DRM-restricted content to new media. Additionally, any
system that requires contact with an authentication server is vulnerable to
that server becoming unavailable, as happened in
2007 when videos purchased from Major League Baseball (mlb.com) prior to 2006 became
unplayable due to a change to the servers that validate the licenses.
Amazon PDF and LIT eBooks - In August 2006,
Amazon stopped selling DRMed PDF and .LIT format eBooks. Customers were unable
to download purchased eBooks 30 days after that date, losing access to their
purchased content on new devices.
Music Team notified its customers via email
they will be shutting down their DRM servers October 9, 2008 and any
DRM-encumbered music acquired from them will no longer be accessible unless
ripped to a non-DRM format before that date.
After bad press and negative reaction from
customers, on October 9, 2008, Walmart decided not to take its DRM servers
offline.
Ads for Adobe PDF - Also in January
2009, Adobe
Systems announced that as of
March 2009 they would no longer operate the servers that served ads to their PDF reader. Depending on the restriction
settings used when PDF documents were created, they may no longer be readable.
Adobe Content Server 3 for Adobe PDF - In April 2009, Adobe
Systems announced that as of
March 30, 2009 the Adobe Content 3 server would no longer activate new
installations of Adobe
Reader or Adobe
Acrobat. In addition, the ability to migrate content from Adobe Content
Server 3 to Adobe Content Server 4 would cease from mid-December 2009. Anyone who
failed to migrate their DRMed PDF files during this nine month window lost
access to their content the next time they had to re-install their copy of
Adobe Reader or Adobe Acrobat.
Moral and legitimacy implications
1. One of the principles
of the Rule of Law is that "The law can be readily determined and is
stable enough to allow individuals to plan their affairs."
2. A problem with DRM
that EFF points to is: ".. in an effort to attract customers, these music
services try to obscure the restrictions they impose on you with clever
marketing."
3. DRM laws are widely
flouted: according to Australia Official Music Chart Survey, copyright
infringements from all causes are practised by millions of people.