Questions tagged [drm]

DRM (digital rights management) is the enforcement of restrictions on access control to data through technical means, such as copy protection.

Digital rights management (DRM) refers to technical means to control operations that may be performed on data. For example, a DRM policy might be that a file must not be copiable, or must only be read by a particular person, or that all copies must be deleted after a period of time. When the policy is solely about who has access to the data and not about what can be done with the data, see .

DRM usually specifically refers to restrictions that apply to content covered by copyright, such as music, videos, etc. DRM also applies to application code; see also .

126 questions
60
votes
4 answers

Are there DRM techniques to effectively prevent pirating?

A question on Skeptics.SE asks whether current DRM techniques effectively prevent pirating: Is DRM effective? The question for IT Security is: Can DRM be made effective, and are there any examples? One approach that has been discussed here leverages…
MrHen
  • 703
  • 1
  • 5
  • 5
43
votes
28 answers

Discouraging users from copying images off a website?

Let me begin by stating that I'm aware it's extremely tedious or virtually impossible to prevent individuals from pirating content. I'm working on a website for a client who is a relatively well known cartoonist. We're working on methods to prevent…
Satej S
  • 573
  • 1
  • 4
  • 8
39
votes
6 answers

Schemes/ Mechanisms that could provide one time decryption?

I am quite familiar with most of the common undergrad/grad security foundations; but I couldn't find anything related to this scenario: A scheme/system where a piece of data can only be 'decrypted' AND read only once (potentially in a computer…
DaveIdito
  • 511
  • 4
  • 3
34
votes
5 answers

Is it possible to embed information that is both nearly invisible to the naked eye and decodable from an external camera?

I am interested in watermarking a video for copyright purposes. The requirements are as follows: The watermark must be barely noticeable to the naked eye. The watermark must be able to be extracted from a device such as a smartphone camera.…
Zac R.
  • 451
  • 4
  • 5
33
votes
11 answers

Prevent my site from being copied

Is it possible to protect my site from HTTrack Website Copier or any similar program? Without setting a max number of HTTP request from users.
h4ck3r
  • 464
  • 1
  • 4
  • 9
25
votes
5 answers

ZX Spectrum tape loader: how was copy prevention implemented?

I am curious how copy prevention was implemented for games or other programs loaded from cassette on the micro computers of the early 1980s, such as the ZX Spectrum 48k. If I recall correctly, some games even managed to defeat direct tape-to-tape…
D.H.
  • 628
  • 7
  • 14
23
votes
3 answers

How does DRM stop copying?

I've been doing some research into some DRM solutions, specifically "self-protecting containers". One example of this is DigiBox. Normally, the protected data is encrypted in some kind of container. However, once the data is in use, it is decrypted…
mrQWERTY
  • 443
  • 3
  • 7
20
votes
5 answers

How to use FDE without needing to share the encryption password

We have an AI model which needs to be deployed on premise. The hardware will be provided by us, so we can do what ever we want on the device. The device is a mini PC running Ubuntu 18.04. The UI is launched in kiosk mode so only our program will be…
Hari
  • 311
  • 2
  • 6
19
votes
3 answers

How does Widevine, FairPlay, and other DRM's work under the hood?

I am trying to understand how DRM works under the hood. There doesn't seem to be much information about it on the web so I figured I would ask here. After some attempted research, I found it extremely difficult to find any information regarding how…
JBis
  • 640
  • 5
  • 17
18
votes
6 answers

How do I prevent copying of my PDF files?

One time while I was printing my documents at a copy center, I saw they dragged-and-dropped my PDFs from my flash drive to their desktop. How do I protect my files without using password? Is there a way to make a file open once and after that…
18
votes
1 answer

How difficult is it to intercept the POST response body when SSL is used?

For an Android application that is performing POST requests (JSON) over SSL and receiving a JSON object as a response, how difficult is it to get the JSON response? Is the easiest way to decompile the application to get the request and send it and…
user181807
  • 189
  • 1
  • 3
13
votes
1 answer

How do HTML5 DRM addons protect their output?

HTML5 has a DRM framework Encrypted Media Extensions (EME), that allows DRM companies to create content decryption modules (CDM) to decrypt DRM protected content. Browsers should use a sandbox to run the CDM, so that security holes that allow access…
allo
  • 3,173
  • 11
  • 24
13
votes
4 answers

How do software keygens work?

I have seen them plenty of times, with many different types of software, but the one thing I have always wondered, is how software keygens know what key to generate. I know the basic principle of it: the keygen looks somewhere in the software…
Ephraim
  • 235
  • 1
  • 2
  • 8
12
votes
1 answer

How does HDMI splitter bypass HDCP?

I just read this article. It's about HDCP and how some old HDMI monitors would not work with your newer devices (such as game consoles, etc) because newer devices protect video stream content in a way that blocks old monitors from displaying it. I'm…
Andrew Savinykh
  • 1,630
  • 3
  • 14
  • 22
10
votes
1 answer

What role does cryptography play in anti-piracy?

As a follow-up to Cipher for Product Registration, are there secure yet usable cryptographic standards/protocols for protecting software and data used by software? I'm interested in hardware and software techniques for: Software…
mikeazo
  • 2,827
  • 12
  • 29
1
2 3
8 9