Digital Rights Management
From Just Solve the File Format Problem
(Difference between revisions)
m |
(Added another link) |
||
(2 intermediate revisions by one user not shown) | |||
Line 4: | Line 4: | ||
|thiscat=Digital Rights Management | |thiscat=Digital Rights Management | ||
}} | }} | ||
− | '''Digital Rights Management''' ('''DRM''') refers to a variety of techniques designed to prevent [[Computer|computerized devices]] from obeying the wishes of their owners and users, in favor of the wishes of those who created the hardware, software, content, | + | '''Digital Rights Management''' ('''DRM''') refers to a variety of techniques designed to prevent [[Computer|computerized devices]] from obeying the wishes of their owners and users, in favor of the wishes of those who created the hardware, software, content, or services used by those devices. |
Some forms of DRM are known as '''copy protection'''. | Some forms of DRM are known as '''copy protection'''. | ||
Line 18: | Line 18: | ||
* [[Wikipedia: Digital rights management]] | * [[Wikipedia: Digital rights management]] | ||
* [[Wikipedia: Copy protection]] | * [[Wikipedia: Copy protection]] | ||
− | * [https://archive.org/details/ | + | * [https://github.com/corkami/docs/tree/master/4amthology Write-ups from 4am's best of] - Accounts of cracking copy-protected Apple II software. (From the "TEXT" documents at the [https://archive.org/details/apple_ii_library_4am?sort=-publicdate 4am Collection].) |
+ | * [https://archive.org/details/PC-Mag-1986-01-14/page/n161 "The Copy Protection Wars" (PC Magazine 1986-01-14, pp. 165-182)] - an overview (with human factors) of DRM and DRM-circumvention on the PC platform in the mid-1980s | ||
+ | |||
=== Commentary and criticism === | === Commentary and criticism === | ||
− | |||
− | |||
* [https://www.eff.org/issues/drm Electronic Frontier Foundation: DRM] | * [https://www.eff.org/issues/drm Electronic Frontier Foundation: DRM] | ||
+ | * [https://www.fsf.org/campaigns/drm.html Free Software Foundation: Digital Restrictions Management and Treacherous Computing] | ||
+ | * [https://www.defectivebydesign.org/ Defective by Design] | ||
+ | * [http://drm.info/ DRM.info] | ||
+ | * [https://www.theguardian.com/technology/blog/2014/feb/05/digital-rights-management What happens with Digital Rights Management in the real world?] | ||
[[Category:Information]] | [[Category:Information]] | ||
[[Category:Elements of File Formats]] | [[Category:Elements of File Formats]] | ||
[[Category:Encryption]] | [[Category:Encryption]] |
Latest revision as of 13:43, 11 August 2019
Digital Rights Management (DRM) refers to a variety of techniques designed to prevent computerized devices from obeying the wishes of their owners and users, in favor of the wishes of those who created the hardware, software, content, or services used by those devices.
Some forms of DRM are known as copy protection.
Modern DRM schemes usually involve encryption.
Some critics of DRM call it Digital Restrictions Management.
[edit] See also
[edit] Links
- Wikipedia: Digital rights management
- Wikipedia: Copy protection
- Write-ups from 4am's best of - Accounts of cracking copy-protected Apple II software. (From the "TEXT" documents at the 4am Collection.)
- "The Copy Protection Wars" (PC Magazine 1986-01-14, pp. 165-182) - an overview (with human factors) of DRM and DRM-circumvention on the PC platform in the mid-1980s