View Single Post
Old 10-06-2010, 03:37 PM   #78
Shaggy
Wizard
Shaggy ought to be getting tired of karma fortunes by now.Shaggy ought to be getting tired of karma fortunes by now.Shaggy ought to be getting tired of karma fortunes by now.Shaggy ought to be getting tired of karma fortunes by now.Shaggy ought to be getting tired of karma fortunes by now.Shaggy ought to be getting tired of karma fortunes by now.Shaggy ought to be getting tired of karma fortunes by now.Shaggy ought to be getting tired of karma fortunes by now.Shaggy ought to be getting tired of karma fortunes by now.Shaggy ought to be getting tired of karma fortunes by now.Shaggy ought to be getting tired of karma fortunes by now.
 
Shaggy's Avatar
 
Posts: 4,293
Karma: 529619
Join Date: May 2007
Device: iRex iLiad, DR800SG
Quote:
Originally Posted by jbjb View Post
I.e. the reader can circumvent the protection, but you have no way of knowing the key used to do it (short of looking at the memory contents using some very high-tech and expensive scanning equipment - unlikely to be of interest for a single-book key).
Which would probably happen a lot quicker than you might think.

Also, what happens when your customers are demanding to be able to read the content on their PC? Every format I know of also has a PC version of the application/reader (which is where the circumvention usually happens). Hardware protection (whatever that was really worth to begin with) goes out the window in that case.

Quote:
but it's not the case that the decrypting key has to be *given* to the reading device.
However it's implemented (whether you give the key or come up with some other scheme), the end user controlled device needs to be able to access the content. As soon as you allow that, you've lost control of the content. DRM only gives you back the illusion of control.
Shaggy is offline   Reply With Quote