Re: Is EME usable regardless of the software/hardware I use ?

Mark Watson [2013-06-11T00:25]:
> The point is that there are countless examples in
> which security measures are used to hinder a minority of people,
> including customers in many contexts, who want to attack a system or
> business in some way.

Examples? (to understand the articulation of social behavior and business models)

> The desire of businesses to protect themselves
> and use technical or other measures to do so is in no other context
> branded as an assumption that a majority of customers are criminals.

Hmm, it seems like we are conflating issues here:

Protection mechanisms:

* before buying: a RFID tag for avoiding stealing *the object* (ownership model such as a DVD)
* after buying:  Content encryption for avoiding distributing copies of the content (ownership model such as a DVD)
* during watching: Content encryption for avoiding to keep a local personal copy of the content (performance model such as online streaming)
* others possible to suggest

These are not the same thing, not the same social consequences either. 
As long you do not frame the arguments with the precise social and business consequences of each model, we will have conflicts in that discussions, or be running after windmills. :) There are plenty of examples of many things. 


-- 
Karl Dubost
http://www.la-grange.net/karl/

Received on Monday, 10 June 2013 15:43:32 UTC