Digital rights management: Difference between revisions
mNo edit summary |
m Fixed some phrasing. Notify me on the discord if there's any other tone that needs fixing, really want that tag gone... Tags: Mobile edit Mobile web edit Visual edit |
||
Line 28: | Line 28: | ||
Such requirements are not always clearly disclosed. If they are disclosed, they are often buried in a ToS, or in the case of Netflix, require you to follow several links around the FAQ pages. Furthermore, some content may surreptitiously install DRM without the knowledge or consent of the user, such as in the Sony Rootkit scandal.<ref>https://web.archive.org/web/20150317040653/http://blogs.technet.com/b/markrussinovich/archive/2005/10/31/sony-rootkits-and-digital-rights-management-gone-too-far.aspx</ref> Such software may contain exploits that can compromise the security of the user's PC.<ref>https://web.archive.org/web/20061116191907/http://blog.washingtonpost.com/securityfix/2005/11/virus_writers_exploit_sony_ant.html</ref> | Such requirements are not always clearly disclosed. If they are disclosed, they are often buried in a ToS, or in the case of Netflix, require you to follow several links around the FAQ pages. Furthermore, some content may surreptitiously install DRM without the knowledge or consent of the user, such as in the Sony Rootkit scandal.<ref>https://web.archive.org/web/20150317040653/http://blogs.technet.com/b/markrussinovich/archive/2005/10/31/sony-rootkits-and-digital-rights-management-gone-too-far.aspx</ref> Such software may contain exploits that can compromise the security of the user's PC.<ref>https://web.archive.org/web/20061116191907/http://blog.washingtonpost.com/securityfix/2005/11/virus_writers_exploit_sony_ant.html</ref> | ||
DRM in video games | DRM in video games has frequently been implemented in an intrusive manner where the performance of the game and load times are noticably poorer.<ref>https://80.lv/articles/testing-reveals-games-with-denuvo-launch-up-to-four-times-slower/</ref> This behavior has been more due to negligent usage of the DRM rather than anything that can be directly attributed to malicious behavior. | ||
DRM failures can also come as a surprise. For example, with a YouTube Premium subscription, you can "Download videos to watch offline," but such videos are only available for 48 hours if you do not have an internet connection.<ref>https://support.google.com/youtube/answer/6141269</ref> This is confusing and problematic, as a user might want to download videos if they will know that they will not have an internet connection for a while. They may even take the extra step of turning off their internet connection to ensure that the videos still play offline. Once the 48 hours have expired, however, the user is surprised to find that the videos that they thought they had downloaded for offline consumption actually require an internet connection to work. | DRM failures can also come as a surprise. For example, with a YouTube Premium subscription, you can "Download videos to watch offline," but such videos are only available for 48 hours if you do not have an internet connection.<ref>https://support.google.com/youtube/answer/6141269</ref> This is confusing and problematic, as a user might want to download videos if they will know that they will not have an internet connection for a while. They may even take the extra step of turning off their internet connection to ensure that the videos still play offline. Once the 48 hours have expired, however, the user is surprised to find that the videos that they thought they had downloaded for offline consumption actually require an internet connection to work. |