Digital rights management: Difference between revisions
→Further reading: Start of an organized list of DRM, we should consider a dedicated list article though |
m styl. |
||
| Line 3: | Line 3: | ||
[[Category:Common terms]] | [[Category:Common terms]] | ||
<!-- In general, this article has an issue with presuming the audience's knowledge. it should not throw around the names of current or past DRM schemes, or technical concepts such as video ripping or capture cards, as if the audience will be automatically familiar with them. If it would overbloat the article to include such explanations, then Wikipedia links should be provided --> | <!-- In general, this article has an issue with presuming the audience's knowledge. it should not throw around the names of current or past DRM schemes, or technical concepts such as video ripping or capture cards, as if the audience will be automatically familiar with them. If it would overbloat the article to include such explanations, then Wikipedia links should be provided --> | ||
[[wikipedia:Digital_rights_management|'''Digital rights management''']] (DRM), alternatively known as '''digital restrictions management'''<ref>{{Cite web |last=Stallman |first=Richard |title=Opposing Digital Rights Mismanagement |url=https://www.gnu.org/philosophy/opposing-drm.en.html |archive-url=http://web.archive.org/web/20251009050044/https://www.gnu.org/philosophy/opposing-drm.en.html |archive-date=9 Oct 2025}}</ref>, broadly refers to any kind of access control technology that is used to deliberately restrict the usage of media content or devices after the sale. It is typically used by a seller to protect their digital rights through prevention of unauthorized distribution or replication of their product. Implementations of DRM can range from very simple (such as a basic disc check) to extremely complex executable binary obfuscation (such as Denuvo) | [[wikipedia:Digital_rights_management|'''Digital rights management''']] ('''DRM'''), alternatively known as '''digital restrictions management'''<ref>{{Cite web |last=Stallman |first=Richard |title=Opposing Digital Rights Mismanagement |url=https://www.gnu.org/philosophy/opposing-drm.en.html |archive-url=http://web.archive.org/web/20251009050044/https://www.gnu.org/philosophy/opposing-drm.en.html |archive-date=9 Oct 2025}}</ref>, broadly refers to any kind of access control technology that is used to deliberately restrict the usage of media content or devices after the sale. It is typically used by a seller to protect their digital rights through prevention of unauthorized distribution or replication of their product. Implementations of DRM can range from very simple (such as a basic disc check) to extremely complex executable binary obfuscation (such as Denuvo) | ||
<blockquote><I>DRM creates a damaged good; it prevents you from doing what would be possible without it. – Defective by Design</I><ref>{{Cite web |title=What is DRM? |url=https://www.defectivebydesign.org/what_is_drm |url-status=live |archive-url=https://web.archive.org/web/20260203202020/https://www.defectivebydesign.org/what_is_drm |archive-date=2026-02-03 |access-date=2026-02-06 |website=Defective by Design}}</ref></blockquote> | <blockquote><I>DRM creates a damaged good; it prevents you from doing what would be possible without it. – Defective by Design</I><ref>{{Cite web |title=What is DRM? |url=https://www.defectivebydesign.org/what_is_drm |url-status=live |archive-url=https://web.archive.org/web/20260203202020/https://www.defectivebydesign.org/what_is_drm |archive-date=2026-02-03 |access-date=2026-02-06 |website=Defective by Design}}</ref></blockquote> | ||