DRM => spyware



Freedom-to-tinker once again has continued analysis of the whole Sony DRM mess. They basically have taken a look at the ways of protecting an audio cd. Active protection (using software to prevent the duplication of music) is currently the main practical solution if you’re pursuing DRM. But what’s interesting is how much in common they have with spyware writers.


I think it’s an interesting analysis and they’ve really hit the nail on the head.

So if you’re designing a CD DRM system based on active protection, you face two main technical problems:

You have to get your software installed, even though the user doesn’t want it.

Once your software is installed, you have to keep it from being uninstalled, even though the user wants it gone.

These are the same two technical problems that spyware designers face.

They further go on to say that those that face the same technical problems usually come up with the same technical solutions.

In other words, once this type of DRM copy protection was decided upon it shouldn’t be a surprise that it wound up as a form of spyware.

Related Posts

Blog Traffic Exchange Related Posts
  • Microsoft to bundle anti-spyware with vista Well it shouldn't come as a big surprise, but Microsoft is expected to bundle their anti-spyware product (which will be renamed windows defender) with Vista when the next version of the OS ships. It's probably not a big surprise given the headaches that people have with spyware and the potential......
  • Artists revolting against DRM This is under the security tab because DRM software protection has proven to be a computer security issue... Spyware Confidential is reporting on artists revolting against the Sony DRM. According to the story... My Morning Jacket, the artists who recorded the copy protected CD "Z" I mentioned here, are doing......
  • How to Remove Personal Security | Personal Security Removal Guide Personal Security is a rogue antivirus application that comes from the same (dreaded) family as the Cyber Security rogue. It usually installs on the users computer without the permission of the computer user. Once installed on the system it will then perform supposed scans finding lots of virus infected files......
Blog Traffic Exchange Related Websites
  • How to wreck your business credibility and how to avoid it When running a small business your credibility is vital. You spend a lot of time and money building your credibility, reputation and integrity within your chosen market. So if I told you all that hard work could be completely destroyed, just by you failing to do something simple, would......
  • Snowboarding 101 - Snowboarding Basics Becoming acclimated to your snowboard is going to be one of the most important basic essentials when it comes to learning how to snowboard. It is vitally important that you become comfortable in movement on the slope at the time while your feet are strapped into the boots. The following......
  • FREE AntiVirus Software FREE AVG Anti-virus Software Review Magnanimously protecting your PC... While many of my readers have heard of AVG Free Edition, many still have not so, I thought I would go over the Anti-virus software that protects many of my personal PC's from the wild west internet. As far as AV......
en.pdf24.org    Send article as PDF   

Similar Posts


See what happened this day in history from either BBC Wikipedia
Search:
Keywords:
Amazon Logo

Comments are closed.


Switch to our mobile site