Antiadguy (talk | contribs)
m I clarified what the AACS key was.
Bythmusters (talk | contribs)
m http -> https
Line 10: Line 10:
DRM, by definition, is designed to make content less compatible with devices. This means there is a higher likelihood of software or hardware refusing to play content due to buggy or overly restrictive DRM. For example, with the aforementioned Netflix HDCP requirement, it is not enough for the display you intend to watch the content on to support HDCP—all monitors connected to the system must support it.<ref>{{Cite web |title=Netflix requires all monitors to be HDCP 2.2. How can I get around this? |url=https://old.reddit.com/r/pcmasterrace/comments/1avkwtb/netflix_requires_all_monitors_to_be_hdcp_22_how/ |url-status=live |access-date=20 Apr 2025 |website=Old Reddit}}</ref><ref>{{Cite web |title=How do I get Netflix working at 4k on my second monitor? |url=https://old.reddit.com/r/netflix/comments/mam2l9/how_do_i_get_netflix_working_at_4k_on_my_second/ |url-status=live |access-date=20 Apr 2025 |website=Old Reddit}}</ref><ref>{{Cite web |title=How to use Netflix on your Windows computer or tablet |url=https://help.netflix.com/en/node/23931 |url-status=live |access-date=20 Apr 2025 |website=Netflix Help Center}}</ref> This means that on PCs with multi-monitor setup PC, older but fully functional monitors cannot be used as secondary screens without violating Netflix’s DRM restrictions.
DRM, by definition, is designed to make content less compatible with devices. This means there is a higher likelihood of software or hardware refusing to play content due to buggy or overly restrictive DRM. For example, with the aforementioned Netflix HDCP requirement, it is not enough for the display you intend to watch the content on to support HDCP—all monitors connected to the system must support it.<ref>{{Cite web |title=Netflix requires all monitors to be HDCP 2.2. How can I get around this? |url=https://old.reddit.com/r/pcmasterrace/comments/1avkwtb/netflix_requires_all_monitors_to_be_hdcp_22_how/ |url-status=live |access-date=20 Apr 2025 |website=Old Reddit}}</ref><ref>{{Cite web |title=How do I get Netflix working at 4k on my second monitor? |url=https://old.reddit.com/r/netflix/comments/mam2l9/how_do_i_get_netflix_working_at_4k_on_my_second/ |url-status=live |access-date=20 Apr 2025 |website=Old Reddit}}</ref><ref>{{Cite web |title=How to use Netflix on your Windows computer or tablet |url=https://help.netflix.com/en/node/23931 |url-status=live |access-date=20 Apr 2025 |website=Netflix Help Center}}</ref> This means that on PCs with multi-monitor setup PC, older but fully functional monitors cannot be used as secondary screens without violating Netflix’s DRM restrictions.


Such requirements are not always clearly disclosed. When they are, they are often buried in the Terms of Service or, in Netflix's case, require navigating through multiple FAQ pages. Furthermore, some content may surreptitiously install DRM without the knowledge or consent of the user, such as in the Sony Rootkit scandal.<ref>{{Cite web |date=31 Oct 2005 |title=Sony, Rootkits and Digital Rights Management Gone Too Far |url=http://blogs.technet.com/b/markrussinovich/archive/2005/10/31/sony-rootkits-and-digital-rights-management-gone-too-far.aspx |url-status=dead |archive-url=https://web.archive.org/web/20150317040653/http://blogs.technet.com/b/markrussinovich/archive/2005/10/31/sony-rootkits-and-digital-rights-management-gone-too-far.aspx |archive-date=17 Mar 2015 |access-date=20 Apr 2025 |website=Mark Russinovich's Blog}}</ref> Such software may contain exploits that can compromise the security of the user's PC.<ref>{{Cite web |last=Krebs |first=Brian |date=10 Nov 2005 |title=Virus Writers Exploit Sony Anti-Piracy Software |url=http://blog.washingtonpost.com/securityfix/2005/11/virus_writers_exploit_sony_ant.html |url-status=dead |archive-url=https://web.archive.org/web/20061116191907/http://blog.washingtonpost.com/securityfix/2005/11/virus_writers_exploit_sony_ant.html |archive-date=16 Nov 2006 |access-date=20 Apr 2025 |website=Washington Post}}</ref>
Such requirements are not always clearly disclosed. When they are, they are often buried in the Terms of Service or, in Netflix's case, require navigating through multiple FAQ pages. Furthermore, some content may surreptitiously install DRM without the knowledge or consent of the user, such as in the Sony Rootkit scandal.<ref>{{Cite web |date=31 Oct 2005 |title=Sony, Rootkits and Digital Rights Management Gone Too Far |url=https://blogs.technet.com/b/markrussinovich/archive/2005/10/31/sony-rootkits-and-digital-rights-management-gone-too-far.aspx |url-status=dead |archive-url=https://web.archive.org/web/20150317040653/http://blogs.technet.com/b/markrussinovich/archive/2005/10/31/sony-rootkits-and-digital-rights-management-gone-too-far.aspx |archive-date=17 Mar 2015 |access-date=20 Apr 2025 |website=Mark Russinovich's Blog}}</ref> Such software may contain exploits that can compromise the security of the user's PC.<ref>{{Cite web |last=Krebs |first=Brian |date=10 Nov 2005 |title=Virus Writers Exploit Sony Anti-Piracy Software |url=https://blog.washingtonpost.com/securityfix/2005/11/virus_writers_exploit_sony_ant.html |url-status=dead |archive-url=https://web.archive.org/web/20061116191907/http://blog.washingtonpost.com/securityfix/2005/11/virus_writers_exploit_sony_ant.html |archive-date=16 Nov 2006 |access-date=20 Apr 2025 |website=Washington Post}}</ref>


DRM in video games has frequently been implemented in an intrusive manner, hurting load times and performance.<ref>{{Cite web |last=Kessler |first=Ana |date=25 May 2023 |title=Testing Reveals Games with Denuvo Launch Up to Four Times Slower |url=https://80.lv/articles/testing-reveals-games-with-denuvo-launch-up-to-four-times-slower/ |url-status=live |access-date=20 Apr 2025 |website=80.lv}}</ref> This behavior has been more a result of negligent usage of the DRM rather than deliberate malicious intent.
DRM in video games has frequently been implemented in an intrusive manner, hurting load times and performance.<ref>{{Cite web |last=Kessler |first=Ana |date=25 May 2023 |title=Testing Reveals Games with Denuvo Launch Up to Four Times Slower |url=https://80.lv/articles/testing-reveals-games-with-denuvo-launch-up-to-four-times-slower/ |url-status=live |access-date=20 Apr 2025 |website=80.lv}}</ref> This behavior has been more a result of negligent usage of the DRM rather than deliberate malicious intent.
Line 26: Line 26:


===DRM degradation===
===DRM degradation===
The development of some forms of DRM, such as [[wikipedia:Games_for_Windows_–_Live|Games For Windows Live]], are reliant on special processes within some operating systems that end up becoming unsupported or deprecated as time goes on. Legacy [[SecuROM]]-protected titles (released roughly between 1998 and 2005) are notoriously known for not running on operating systems newer than Windows XP<ref>https://www.lucadamico.dev/papers/drms/securom/ArabianNights.pdf</ref><ref>{{Cite web |last=@haggar |date=15 Oct 2006 |title=Unpacking SecuROM 4.xx |url=http://www.reversing.be/article.php?story=20061015153108847 |url-status=live |archive-url=https://web.archive.org/web/20220226230919/http://www.reversing.be/article.php?story=20061015153108847 |archive-date=26 Feb 2022 |access-date=20 Apr 2025 |website=www.reversing.be}}</ref>. Customers must spend an extensive amount of time circumventing the DRM (or using more illicit methods) just to play content they legitimately purchased.<ref>{{Cite web |last=Baggs |first=Nathan |date=16 Jan 2025 |title=Hacking This Terrible DRM |url=https://www.youtube.com/watch?v=vjkqI7dBDVg |url-status=live |access-date=20 Apr 2025 |website=[[YouTube]]}}</ref>
The development of some forms of DRM, such as [[wikipedia:Games_for_Windows_–_Live|Games For Windows Live]], are reliant on special processes within some operating systems that end up becoming unsupported or deprecated as time goes on. Legacy [[SecuROM]]-protected titles (released roughly between 1998 and 2005) are notoriously known for not running on operating systems newer than Windows XP<ref>https://www.lucadamico.dev/papers/drms/securom/ArabianNights.pdf</ref><ref>{{Cite web |last=@haggar |date=15 Oct 2006 |title=Unpacking SecuROM 4.xx |url=https://www.reversing.be/article.php?story=20061015153108847 |url-status=live |archive-url=https://web.archive.org/web/20220226230919/http://www.reversing.be/article.php?story=20061015153108847 |archive-date=26 Feb 2022 |access-date=20 Apr 2025 |website=www.reversing.be}}</ref>. Customers must spend an extensive amount of time circumventing the DRM (or using more illicit methods) just to play content they legitimately purchased.<ref>{{Cite web |last=Baggs |first=Nathan |date=16 Jan 2025 |title=Hacking This Terrible DRM |url=https://www.youtube.com/watch?v=vjkqI7dBDVg |url-status=live |access-date=20 Apr 2025 |website=[[YouTube]]}}</ref>


This DRM degradation has the worst effects on physical licenses of products, as unlike a digital installation, if a physical copy of a game's DRM stops being supported by modern hardware, developers cannot simply distribute a patch to directly modify the code on a disc, and online patches cannot last forever.
This DRM degradation has the worst effects on physical licenses of products, as unlike a digital installation, if a physical copy of a game's DRM stops being supported by modern hardware, developers cannot simply distribute a patch to directly modify the code on a disc, and online patches cannot last forever.
Line 34: Line 34:
Attempting to prevent the copying of video content is one of the most common and long-standing uses of DRM. The idea of using copy obstruction on video content predates the term "DRM", one early example being the "Automatic Gain Control" requirement in VCRs used to enforce the "Macrovision" copy-protection scheme.<ref>[https://www.law.cornell.edu/uscode/text/17/1201#k_1_A 17 U.S. Code § 1201 - Circumvention of copyright protection systems, K.1.A.i]</ref><ref>[https://cs.stanford.edu/people/eroberts/courses/cs181/projects/1999-00/dmca-2k/macrovision.html Macrovision Demystified], Stanford CS181. </ref> This requirement resulted in VCRs and compliant analog to DV capture cards not being able to record commercial VHS tapes{{citation needed}}.
Attempting to prevent the copying of video content is one of the most common and long-standing uses of DRM. The idea of using copy obstruction on video content predates the term "DRM", one early example being the "Automatic Gain Control" requirement in VCRs used to enforce the "Macrovision" copy-protection scheme.<ref>[https://www.law.cornell.edu/uscode/text/17/1201#k_1_A 17 U.S. Code § 1201 - Circumvention of copyright protection systems, K.1.A.i]</ref><ref>[https://cs.stanford.edu/people/eroberts/courses/cs181/projects/1999-00/dmca-2k/macrovision.html Macrovision Demystified], Stanford CS181. </ref> This requirement resulted in VCRs and compliant analog to DV capture cards not being able to record commercial VHS tapes{{citation needed}}.


From 1996, DVDs began to feature the "Content Scramble System" (CSS), an encryption based DRM. CSS was successfully circumvented as early as 1999, less than five years after its introduction, partly due to the limited length of the 40-bit encryption key, which was used to comply with US government export regulations of the time.<ref>http://www.cs.cmu.edu/~dst/DeCSS/FrankStevenson/mail1.txt</ref><ref>[https://web.archive.org/web/20000302000206/http://www.dvd-copy.com/news/cryptanalysis_of_contents_scrambling_system.htm "Cryptanalysis of Contents Scrambling System", Frank A. Stevenson, archived from dvd-copy.com]</ref> Following this, DVDs as well as HD-DVDs and Blu-Rays would implement other types of DRM, one of them being the "Advanced Access Content System".<ref>{{Cite web |title=Advanced Access Content System (AACS) |url=http://www.aacsla.com/specifications/specs091/AACS_Spec_Common_0.91.pdf |url-status=dead |archive-url=https://web.archive.org/web/20070302130221/http://www.aacsla.com/specifications/specs091/AACS_Spec_Common_0.91.pdf |archive-date=2 Mar 2007 |access-date=20 Apr 2025}}
From 1996, DVDs began to feature the "Content Scramble System" (CSS), an encryption based DRM. CSS was successfully circumvented as early as 1999, less than five years after its introduction, partly due to the limited length of the 40-bit encryption key, which was used to comply with US government export regulations of the time.<ref>https://www.cs.cmu.edu/~dst/DeCSS/FrankStevenson/mail1.txt</ref><ref>[https://web.archive.org/web/20000302000206/http://www.dvd-copy.com/news/cryptanalysis_of_contents_scrambling_system.htm "Cryptanalysis of Contents Scrambling System", Frank A. Stevenson, archived from dvd-copy.com]</ref> Following this, DVDs as well as HD-DVDs and Blu-Rays would implement other types of DRM, one of them being the "Advanced Access Content System".<ref>{{Cite web |title=Advanced Access Content System (AACS) |url=https://www.aacsla.com/specifications/specs091/AACS_Spec_Common_0.91.pdf |url-status=dead |archive-url=https://web.archive.org/web/20070302130221/http://www.aacsla.com/specifications/specs091/AACS_Spec_Common_0.91.pdf |archive-date=2 Mar 2007 |access-date=20 Apr 2025}}
</ref> When the first AACS processing key was similarly extracted, the AACS Licensing Administrator began issuing cease-and-desist letters to websites where the key was posted.<ref>{{Cite web |date=17 Apr 2007 |title=AACS licensor complains of posted key |url=https://lumendatabase.org/notices/21725 |url-status=live |access-date=20 Apr 2025 |website=Lumen}}</ref> Another form of Blu-Ray DRM, [[Cinavia]], uses a form of audio watermarking that makes certain releases unplayable in devices that are not equipped to recognize it, a notable example being Sony's Playstation 3.<ref>{{Cite web |last=Ganesh |first=T. S. |date=21 Mar 2012 |title=Cinavia DRM: How I Learned to Stop Worrying and Love Blu-ray’s Self-Destruction |url=https://www.anandtech.com/show/5693/cinavia-drm-how-i-learned-to-stop-worrying-and-love-blurays-selfdestruction/2 |url-status=live |access-date=20 Apr 2025 |website=AnandTech}}</ref>  
</ref> When the first AACS processing key was similarly extracted, the AACS Licensing Administrator began issuing cease-and-desist letters to websites where the key was posted.<ref>{{Cite web |date=17 Apr 2007 |title=AACS licensor complains of posted key |url=https://lumendatabase.org/notices/21725 |url-status=live |access-date=20 Apr 2025 |website=Lumen}}</ref> Another form of Blu-Ray DRM, [[Cinavia]], uses a form of audio watermarking that makes certain releases unplayable in devices that are not equipped to recognize it, a notable example being Sony's Playstation 3.<ref>{{Cite web |last=Ganesh |first=T. S. |date=21 Mar 2012 |title=Cinavia DRM: How I Learned to Stop Worrying and Love Blu-ray’s Self-Destruction |url=https://www.anandtech.com/show/5693/cinavia-drm-how-i-learned-to-stop-worrying-and-love-blurays-selfdestruction/2 |url-status=live |access-date=20 Apr 2025 |website=AnandTech}}</ref>  


Line 48: Line 48:


===Always-online DRM===
===Always-online DRM===
Some DRM requires a constant internet connection. While this may make sense in something that inherently requires an internet connection such as a streaming service or multiplayer-only video game, this has also been employed in games with single-player content, rendering customers unable to use their purchase if they do not have an active internet connection.<ref>{{Cite web |last=Kain |first=Erik |date=17 May 2012 |title='Diablo III' Fans Should Stay Angry About Always-Online DRM |url=https://www.forbes.com/sites/erikkain/2012/05/17/diablo-iii-fans-should-stay-angry-about-always-online-drm/ |url-status=live |access-date=20 Apr 2025 |website=Forbes}}</ref> Conversely, if operations for these services are shut down, user, even those with legitimate copies of software and internet access, cannot run their games without resorting to hacking them first.<ref>{{Cite web |last=Vitor |first=João |date=12 Jul 2024 |title=Rewriting completely the GameSpy support from 2000 to 2004 using Reverse Engineering on EA and Bungie Games |url=https://keowu.re/posts/Rewriting-completely-the-GameSpy-support-from-2000-to-2004-using-Reverse-Engineering-on-EA-and-Bungie-Games/ |url-status=live |access-date=20 Apr 2025 |website=Keowu Blog's}}</ref><ref>{{Cite web |last=Burns |first=Chris |date=4 Apr 2014 |title=GameSpy Shuts Down May 31: Will Your Game Be Affected? |url=https://www.slashgear.com/gamespy-shuts-down-may-31-will-your-game-be-affected-04323788/ |url-status=live |access-date=20 Apr 2025 |website=SlashGear}}</ref> [[Ubisoft]] has historically been known for server shutdowns and transfers cutting off access to games for many players.<ref>http://pc.gamespy.com/articles/121/1218211p1.html
Some DRM requires a constant internet connection. While this may make sense in something that inherently requires an internet connection such as a streaming service or multiplayer-only video game, this has also been employed in games with single-player content, rendering customers unable to use their purchase if they do not have an active internet connection.<ref>{{Cite web |last=Kain |first=Erik |date=17 May 2012 |title='Diablo III' Fans Should Stay Angry About Always-Online DRM |url=https://www.forbes.com/sites/erikkain/2012/05/17/diablo-iii-fans-should-stay-angry-about-always-online-drm/ |url-status=live |access-date=20 Apr 2025 |website=Forbes}}</ref> Conversely, if operations for these services are shut down, user, even those with legitimate copies of software and internet access, cannot run their games without resorting to hacking them first.<ref>{{Cite web |last=Vitor |first=João |date=12 Jul 2024 |title=Rewriting completely the GameSpy support from 2000 to 2004 using Reverse Engineering on EA and Bungie Games |url=https://keowu.re/posts/Rewriting-completely-the-GameSpy-support-from-2000-to-2004-using-Reverse-Engineering-on-EA-and-Bungie-Games/ |url-status=live |access-date=20 Apr 2025 |website=Keowu Blog's}}</ref><ref>{{Cite web |last=Burns |first=Chris |date=4 Apr 2014 |title=GameSpy Shuts Down May 31: Will Your Game Be Affected? |url=https://www.slashgear.com/gamespy-shuts-down-may-31-will-your-game-be-affected-04323788/ |url-status=live |access-date=20 Apr 2025 |website=SlashGear}}</ref> [[Ubisoft]] has historically been known for server shutdowns and transfers cutting off access to games for many players.<ref>https://pc.gamespy.com/articles/121/1218211p1.html


[https://web.archive.org/web/20250000000000*/http://pc.gamespy.com/articles/121/1218211p1.html Archive]</ref><ref>{{Cite web |last=Sharkey |first=Mike |date=8 Feb 2012 |title=Ubisoft DRM Locks Out Paying Customers |url=http://pc.gamespy.com/articles/121/1218211p1.html |url-status=live |access-date=20 Apr 2025 |website=GameSpy}}</ref> Encrypted [[ATSC 3.0]] channels cannot be tuned to without a persistent internet connection.<ref>{{Cite web |last=Seidman |first=Lon |date=3 Sep 2023 |title=The ADTH Nextgen TV Box Shows Us Just How Bad ATSC 3.0 Encryption Will Be.. |url=https://blog.lon.tv/2023/09/03/the-adth-nextgen-tv-box-shows-us-just-how-bad-atsc-3-0-encrpytion-will-be/ |url-status=live |access-date=20 Apr 2025 |website=Lon.tv}}</ref>
[https://web.archive.org/web/20250000000000*/http://pc.gamespy.com/articles/121/1218211p1.html Archive]</ref><ref>{{Cite web |last=Sharkey |first=Mike |date=8 Feb 2012 |title=Ubisoft DRM Locks Out Paying Customers |url=https://pc.gamespy.com/articles/121/1218211p1.html |url-status=live |access-date=20 Apr 2025 |website=GameSpy}}</ref> Encrypted [[ATSC 3.0]] channels cannot be tuned to without a persistent internet connection.<ref>{{Cite web |last=Seidman |first=Lon |date=3 Sep 2023 |title=The ADTH Nextgen TV Box Shows Us Just How Bad ATSC 3.0 Encryption Will Be.. |url=https://blog.lon.tv/2023/09/03/the-adth-nextgen-tv-box-shows-us-just-how-bad-atsc-3-0-encrpytion-will-be/ |url-status=live |access-date=20 Apr 2025 |website=Lon.tv}}</ref>