Revision of DRM from Sun, 01/25/2015 - 16:48
The revisions let you track differences between multiple versions of a post.
What is DRM?
Citiation of the Defective by Design project:"Digital Restrictions Management is the practice of imposing technological restrictions that control what users can do with digital media. When a program is designed to prevent you from copying or sharing a song, reading an ebook on another device, or playing a single-player game without an Internet connection, you are being restricted by DRM. In other words, DRM creates a damaged good; it prevents you from doing what would be possible without it. This concentrates control over production and distribution of media, giving DRM peddlers the power to carry out massive digital book burnings and conduct large scale surveillance over people's media viewing habits."
Since DRM requires proprietary software to work properly, we are not able to distribute a modified version of the program without the violating code. It may not work due to the schema of DRM. Free Software and Trisquel resist this type of control, but they are not immune to it.
Free Software can be restricted through Tivoization, named for the device it was first seen on. Tivoization is the process to create a system which incorporates Free Software with Copyleft and by using restrictions of proprietary hardware, to prevent users from running a modified version of the software. Any "free" software that is used that way is not Free Software. This is one of many reasons why Open Source misses the point of Free Software.
You can find DRM with proprietary software:
- If you have a video on your laptop you cannot see on a bigger screen (“not authorized”)
- If you buy an ebook on your smartphone and you are not able to read it on your computer.
- If you cannot install a modified version of an operating system on the same hardware due to certain restrictions although the software itself is Free Software.
Additional effects of DRM
Remotely erasedAccording to a story of the New York Times about Amazon and "1984":
- "It illustrates how few rights you have when you buy an e-book from Amazon," said Bruce Schneier, chief security technology officer for British Telecom and an expert on computer security and commerce. "As a Kindle owner, I’m frustrated. I can’t lend people books and I can’t sell books that I’ve already read, and now it turns out that I can’t even count on still having my books tomorrow."
Surveillance
DRM incorporates service-as-a-substitute-for-software (SaaSS). SaaSS raises the question about surveillance regularly.
For example if the software remembers what books you read and which page you were. Or when it stores informations on the server of the vendor instead of your own device.
Depending on the manufacturer
DRM forces the user to remain in a dependent situation to a single entity for products and services. To change the manufacturer is incredibly difficult without massive costs.