DRM => spyware



Freedom-to-tinker once again has continued analysis of the whole Sony DRM mess. They basically have taken a look at the ways of protecting an audio cd. Active protection (using software to prevent the duplication of music) is currently the main practical solution if you’re pursuing DRM. But what’s interesting is how much in common they have with spyware writers.


I think it’s an interesting analysis and they’ve really hit the nail on the head.

So if you’re designing a CD DRM system based on active protection, you face two main technical problems:

You have to get your software installed, even though the user doesn’t want it.

Once your software is installed, you have to keep it from being uninstalled, even though the user wants it gone.

These are the same two technical problems that spyware designers face.

They further go on to say that those that face the same technical problems usually come up with the same technical solutions.

In other words, once this type of DRM copy protection was decided upon it shouldn’t be a surprise that it wound up as a form of spyware.

Related Posts

Blog Traffic Exchange Related Posts
  • Sony and Amazon to buyback cds It looks as though the recall is being detailed for the Sony cds that use the XCP Digital Rights Management copy protection. Sony has setup a page where customers can request an exchange. Sony will swap cds with DRM for cds without the DRM software. Also, Amazon.com is offering refunds......
  • How to Remove Cyber Security | Cyber Security Removal Guide Cyber Security is a rogue antivirus application. It is in the same family as totalsecurity (total security Removal Guide) and SystemSecurity. This software installs through web popups and trojan horse activity makes false claims about your system being compromised by viruses and other security problems, hijacks we browser activity claiming......
  • How to Remove Personal Security | Personal Security Removal Guide Personal Security is a rogue antivirus application that comes from the same (dreaded) family as the Cyber Security rogue. It usually installs on the users computer without the permission of the computer user. Once installed on the system it will then perform supposed scans finding lots of virus infected files......
Blog Traffic Exchange Related Websites
  • Steps to Installing a Home Steam Shower A home steam shower makes your bathroom a retreat, and if you're a do-it-yourselfer with some experience you can probably handle at least some of the installation yourself. Not only will it make time spent in the bathroom more enjoyable, but any type of bathroom remodeling improves the value of......
  • Antivirus Protection Needn't Cost A Thing - Heres How You Can Protect Your PC For Free Has your computer started misbehaving?If so then slowdowns and other annoyances have many causes. Whilst the problem could be spyware, adware or registry faults, the main cause that computer users face comes in the form of viruses.Some people might say that the best way to avoid viruses is to buy......
  • How to Remove Antivirus 2009, Spyware Guard 2008 and Other Malware My wife, kids, and I spent this past Christmas at my parents' house. It wasn't long after we arrived before I gravitated to their computer to check my email, read the news, check the stock market, etc. Much to my dismay, I found a barrage of malware, spyware, and......
en.pdf24.org    Send article as PDF   

Similar Posts


See what happened this day in history from either BBC Wikipedia
Search:
Keywords:
Amazon Logo

Comments are closed.


Switch to our mobile site