- From: Leif Halvard Silli <xn--mlform-iua@xn--mlform-iua.no>
- Date: Tue, 17 Dec 2013 20:46:43 +0100
- To: Casey Callaghan <caseyc37@gmail.com>
- Cc: David Singer <singer@apple.com>, Fred Andrews <fredandw@live.com>, "public-html-admin@w3.org" <public-html-admin@w3.org>, "timbl@w3.org" <timbl@w3.org>
Casey Callaghan, Tue, 17 Dec 2013 06:43:29 +0200: > DRM […] > There are two ways, as far as I can see, in which this can be > implemented. The first is control; the DRM technology can attempt to > take control of the computer … example [ …] the Sony rootkit. That is: (Rather) Unintelligent “traps” that “jumps to conclusions” (e.g. after having counted the number of viewings etc) by technically blocking something for the users whenever the trap detects some behavior(s), but without "phoning home" about it. > The second possible approach is, yes, surveillance; the seller ensures > that they know about any uses of the media, and can identify illegal > ones or duplicate registrations and take relevant steps. Any system > that involves registration of the media on some server, or media that > can only be consumed by visiting some website, falls under this > approach. It strikes me that for on-demand services (which thus requires log-in etc), the provider would get this information anyhow. Or why would ”phoning home DRM”, in this case, still be an issue? -- leif halvard silli
Received on Tuesday, 17 December 2013 19:47:16 UTC