Digital rights management: Difference between revisions
Expanded the conceptual problem with DRMs, reworded the Netflix HDCP example |
On removal of DRM from videogames post-release |
||
| Line 3: | Line 3: | ||
[[Category:Common terms]] | [[Category:Common terms]] | ||
<!-- In general, this article has an issue with presuming the audience's knowledge. it should not throw around the names of current or past DRM schemes, or technical concepts such as video ripping or capture cards, as if the audience will be automatically familiar with them. If it would overbloat the article to include such explanations, then Wikipedia links should be provided --> | <!-- In general, this article has an issue with presuming the audience's knowledge. it should not throw around the names of current or past DRM schemes, or technical concepts such as video ripping or capture cards, as if the audience will be automatically familiar with them. If it would overbloat the article to include such explanations, then Wikipedia links should be provided --> | ||
[[wikipedia:Digital_rights_management|'''Digital rights management''']] (DRM), alternatively known as '''digital restrictions management'''<ref>{{Cite web |last=Stallman |first=Richard |title=Opposing Digital Rights Mismanagement |url=https://www.gnu.org/philosophy/opposing-drm.en.html |archive-url=http://web.archive.org/web/20251009050044/https://www.gnu.org/philosophy/opposing-drm.en.html |archive-date=9 Oct 2025}}</ref>, broadly refers to any kind of access control technology that is used to deliberately restrict the usage of media content or devices after the sale. It is typically used by a seller to protect their digital rights through prevention of unauthorized distribution or replication of their product. Implementations of DRM can range from very simple (such as a basic disc check) to extremely complex executable binary obfuscation (such as Denuvo) | [[wikipedia:Digital_rights_management|'''Digital rights management''']] (DRM), alternatively known as '''digital restrictions management'''<ref>{{Cite web |last=Stallman |first=Richard |title=Opposing Digital Rights Mismanagement |url=https://www.gnu.org/philosophy/opposing-drm.en.html |archive-url=http://web.archive.org/web/20251009050044/https://www.gnu.org/philosophy/opposing-drm.en.html |archive-date=9 Oct 2025}}</ref>, broadly refers to any kind of access control technology that is used to deliberately restrict the usage of media content or devices after the sale. It is typically used by a seller to protect their digital rights through prevention of unauthorized distribution or replication of their product. Implementations of DRM can range from very simple (such as a basic disc check) to extremely complex executable binary obfuscation (such as Denuvo) | ||
<blockquote><I>DRM creates a damaged good; it prevents you from doing what would be possible without it. – Defective by Design</I><ref>{{Cite web |title=What is DRM? |url=https://www.defectivebydesign.org/what_is_drm |url-status=live |archive-url=https://web.archive.org/web/20260203202020/https://www.defectivebydesign.org/what_is_drm |archive-date=2026-02-03 |access-date=2026-02-06 |website=Defective by Design}}</ref></blockquote> | <blockquote><I>DRM creates a damaged good; it prevents you from doing what would be possible without it. – Defective by Design</I><ref>{{Cite web |title=What is DRM? |url=https://www.defectivebydesign.org/what_is_drm |url-status=live |archive-url=https://web.archive.org/web/20260203202020/https://www.defectivebydesign.org/what_is_drm |archive-date=2026-02-03 |access-date=2026-02-06 |website=Defective by Design}}</ref></blockquote> | ||
| Line 16: | Line 16: | ||
Requirements such as this are not always clearly disclosed. When they are, they are often buried in the Terms of Service or, in Netflix's case, require navigating through multiple FAQ pages. Furthermore, some content may surreptitiously install DRM without the knowledge or consent of the user, such as in the Sony Rootkit scandal.<ref>{{Cite web |date=31 Oct 2005 |title=Sony, Rootkits and Digital Rights Management Gone Too Far |url=https://blogs.technet.com/b/markrussinovich/archive/2005/10/31/sony-rootkits-and-digital-rights-management-gone-too-far.aspx |url-status=dead |archive-url=https://web.archive.org/web/20150317040653/http://blogs.technet.com/b/markrussinovich/archive/2005/10/31/sony-rootkits-and-digital-rights-management-gone-too-far.aspx |archive-date=17 Mar 2015 |access-date=20 Apr 2025 |website=Mark Russinovich's Blog}}</ref> Such software may contain exploits that can compromise the security of the user's PC.<ref>{{Cite web |last=Krebs |first=Brian |date=10 Nov 2005 |title=Virus Writers Exploit Sony Anti-Piracy Software |url=https://blog.washingtonpost.com/securityfix/2005/11/virus_writers_exploit_sony_ant.html |url-status=dead |archive-url=https://web.archive.org/web/20061116191907/http://blog.washingtonpost.com/securityfix/2005/11/virus_writers_exploit_sony_ant.html |archive-date=16 Nov 2006 |access-date=20 Apr 2025 |website=Washington Post}}</ref> | Requirements such as this are not always clearly disclosed. When they are, they are often buried in the Terms of Service or, in Netflix's case, require navigating through multiple FAQ pages. Furthermore, some content may surreptitiously install DRM without the knowledge or consent of the user, such as in the Sony Rootkit scandal.<ref>{{Cite web |date=31 Oct 2005 |title=Sony, Rootkits and Digital Rights Management Gone Too Far |url=https://blogs.technet.com/b/markrussinovich/archive/2005/10/31/sony-rootkits-and-digital-rights-management-gone-too-far.aspx |url-status=dead |archive-url=https://web.archive.org/web/20150317040653/http://blogs.technet.com/b/markrussinovich/archive/2005/10/31/sony-rootkits-and-digital-rights-management-gone-too-far.aspx |archive-date=17 Mar 2015 |access-date=20 Apr 2025 |website=Mark Russinovich's Blog}}</ref> Such software may contain exploits that can compromise the security of the user's PC.<ref>{{Cite web |last=Krebs |first=Brian |date=10 Nov 2005 |title=Virus Writers Exploit Sony Anti-Piracy Software |url=https://blog.washingtonpost.com/securityfix/2005/11/virus_writers_exploit_sony_ant.html |url-status=dead |archive-url=https://web.archive.org/web/20061116191907/http://blog.washingtonpost.com/securityfix/2005/11/virus_writers_exploit_sony_ant.html |archive-date=16 Nov 2006 |access-date=20 Apr 2025 |website=Washington Post}}</ref> | ||
DRM in video games has frequently been implemented in an intrusive manner, hurting load times and performance.<ref>{{Cite web |last=Kessler |first=Ana |date=25 May 2023 |title=Testing Reveals Games with Denuvo Launch Up to Four Times Slower |url=https://80.lv/articles/testing-reveals-games-with-denuvo-launch-up-to-four-times-slower/ |url-status=live |archive-url=https://web.archive.org/web/20250911084255/https://80.lv/articles/testing-reveals-games-with-denuvo-launch-up-to-four-times-slower |archive-date=2025-09-11 |access-date=20 Apr 2025 |website=80.lv}}</ref> This behavior has been more a result of negligent usage of the DRM rather than deliberate malicious intent. | DRM in video games has frequently been implemented in an intrusive manner, hurting load times and performance.<ref>{{Cite web |last=Kessler |first=Ana |date=25 May 2023 |title=Testing Reveals Games with Denuvo Launch Up to Four Times Slower |url=https://80.lv/articles/testing-reveals-games-with-denuvo-launch-up-to-four-times-slower/ |url-status=live |archive-url=https://web.archive.org/web/20250911084255/https://80.lv/articles/testing-reveals-games-with-denuvo-launch-up-to-four-times-slower |archive-date=2025-09-11 |access-date=20 Apr 2025 |website=80.lv}}</ref> This behavior has been more a result of negligent usage of the DRM rather than deliberate malicious intent. The detrimental effect of DRM on games appears to be known to their developers and publishers, seeing that DRM is removed from some games some time after the release,<ref>{{Cite web |date=2009-07-09 |title=DRM removed, UGC in Witcher patch |url=https://www.eurogamer.net/drm-removed-ugc-added-in-witcher-patch |website=Eurogamer}}</ref> often with no announcement.<ref>{{Cite web |date=2016-12-08 |title=Doom Becomes Latest Game To Drop Anti-Piracy Tech Denuvo |url=https://kotaku.com/doom-becomes-latest-game-to-drop-anti-piracy-tech-denuv-1789838010 |website=Kotaku}}</ref> | ||
DRM failures can also come as a surprise. For example, with a YouTube Premium subscription, you can "Download videos to watch offline", but such videos are only available for 48 hours without an internet connection.<ref>{{Cite web |title=Watch videos offline on mobile in select countries & regions |url=https://support.google.com/youtube/answer/6141269 |url-status=live |archive-url=https://web.archive.org/web/20260115091128/https://support.google.com/youtube/answer/6141269 |archive-date=2026-01-15 |access-date=20 Apr 2025 |website=YouTube Help}}</ref> This creates confusion and problems, as users may want to download videos in anticipation of a period without internet access. | DRM failures can also come as a surprise. For example, with a YouTube Premium subscription, you can "Download videos to watch offline", but such videos are only available for 48 hours without an internet connection.<ref>{{Cite web |title=Watch videos offline on mobile in select countries & regions |url=https://support.google.com/youtube/answer/6141269 |url-status=live |archive-url=https://web.archive.org/web/20260115091128/https://support.google.com/youtube/answer/6141269 |archive-date=2026-01-15 |access-date=20 Apr 2025 |website=YouTube Help}}</ref> This creates confusion and problems, as users may want to download videos in anticipation of a period without internet access. | ||