Thread: Social DRM
View Single Post
Old 04-25-2014, 09:12 AM   #9
skreutzer
Software Developer
skreutzer considers 'yay' to be a thoroughly cromulent word.skreutzer considers 'yay' to be a thoroughly cromulent word.skreutzer considers 'yay' to be a thoroughly cromulent word.skreutzer considers 'yay' to be a thoroughly cromulent word.skreutzer considers 'yay' to be a thoroughly cromulent word.skreutzer considers 'yay' to be a thoroughly cromulent word.skreutzer considers 'yay' to be a thoroughly cromulent word.skreutzer considers 'yay' to be a thoroughly cromulent word.skreutzer considers 'yay' to be a thoroughly cromulent word.skreutzer considers 'yay' to be a thoroughly cromulent word.skreutzer considers 'yay' to be a thoroughly cromulent word.
 
skreutzer's Avatar
 
Posts: 190
Karma: 89000
Join Date: Jan 2014
Location: Germany
Device: PocketBook Touch Lux 3
Oh, sorry, I just missed that this was solely a fun question without real-world relevance, and that suggestions are supposed to provide a scenario for a programming exercise, because the correct answer, if the question would be serious, would be that there is no solution that actually can work. Maybe that's why it is called “soft-DRM” – not because it doesn't get as much into the way as “hard-DRM” does but because it is easy to remove. Additionally, probably the identifier of another person could be faked, which then would be blamed for unauthorized distribution.

In this case, I would suggest to investigate if time stamps of the files in an bundled e-book file package can be used, because nobody would check differences in minutes and seconds, which also could be legitimate information as result of the e-book creation process.
skreutzer is offline   Reply With Quote