Banana (talk | contribs)
Removed 1 duplicate url-status parameter(s) from 1 citation(s) using CRWCitationBot
Bananabot (talk | contribs)
Re-archived 1 citation(s) from archive.today to web.archive.org using CRWCitationBot
Line 3: Line 3:
[[Category:Common terms]]
[[Category:Common terms]]
<!-- In general, this article has an issue with presuming the audience's knowledge. it should not throw around the names of current or past DRM schemes, or technical concepts such as video ripping or capture cards, as if the audience will be automatically familiar with them. If it would overbloat the article to include such explanations, then Wikipedia links should be provided -->
<!-- In general, this article has an issue with presuming the audience's knowledge. it should not throw around the names of current or past DRM schemes, or technical concepts such as video ripping or capture cards, as if the audience will be automatically familiar with them. If it would overbloat the article to include such explanations, then Wikipedia links should be provided -->
[[wikipedia:Digital_rights_management|'''Digital rights management''']] (DRM), alternatively known as '''digital restrictions management'''<ref>{{Cite web |last=Stallman |first=Richard |title=Opposing Digital Rights Mismanagement |url=https://www.gnu.org/philosophy/opposing-drm.en.html |archive-url=https://archive.is/XwqaH |archive-date=2023-05-02}}</ref>, broadly refers to any kind of access control technology that is used to deliberately restrict the usage of media content or devices after the sale. It is typically used by a seller to prevent unauthorized distribution or replication of their product. Implementations of DRM can range from very simple (such as a basic disc check) to extremely complex executable binary obfuscation (such as Denuvo).   
[[wikipedia:Digital_rights_management|'''Digital rights management''']] (DRM), alternatively known as '''digital restrictions management'''<ref>{{Cite web |last=Stallman |first=Richard |title=Opposing Digital Rights Mismanagement |url=https://www.gnu.org/philosophy/opposing-drm.en.html |archive-url=http://web.archive.org/web/20251009050044/https://www.gnu.org/philosophy/opposing-drm.en.html |archive-date=9 Oct 2025}}</ref>, broadly refers to any kind of access control technology that is used to deliberately restrict the usage of media content or devices after the sale. It is typically used by a seller to prevent unauthorized distribution or replication of their product. Implementations of DRM can range from very simple (such as a basic disc check) to extremely complex executable binary obfuscation (such as Denuvo).   


<blockquote><I>DRM creates a damaged good; it prevents you from doing what would be possible without it. – Defective by Design</I><ref>{{Cite web |title=What is DRM? |url=https://www.defectivebydesign.org/what_is_drm |url-status=live |archive-url=https://web.archive.org/web/20260203202020/https://www.defectivebydesign.org/what_is_drm |archive-date=2026-02-03 |access-date=2026-02-06 |website=Defective by Design}}</ref></blockquote>
<blockquote><I>DRM creates a damaged good; it prevents you from doing what would be possible without it. – Defective by Design</I><ref>{{Cite web |title=What is DRM? |url=https://www.defectivebydesign.org/what_is_drm |url-status=live |archive-url=https://web.archive.org/web/20260203202020/https://www.defectivebydesign.org/what_is_drm |archive-date=2026-02-03 |access-date=2026-02-06 |website=Defective by Design}}</ref></blockquote>