Quote:
Originally Posted by jbjb
I.e. the reader can circumvent the protection, but you have no way of knowing the key used to do it (short of looking at the memory contents using some very high-tech and expensive scanning equipment - unlikely to be of interest for a single-book key).
|
Which would probably happen a lot quicker than you might think.
Also, what happens when your customers are demanding to be able to read the content on their PC? Every format I know of also has a PC version of the application/reader (which is where the circumvention usually happens). Hardware protection (whatever that was really worth to begin with) goes out the window in that case.
Quote:
but it's not the case that the decrypting key has to be *given* to the reading device.
|
However it's implemented (whether you give the key or come up with some other scheme), the end user controlled device needs to be able to access the content. As soon as you allow that, you've lost control of the content. DRM only gives you back the illusion of control.