Thread: Social DRM
View Single Post
Old 04-25-2014, 02:10 PM   #12
skreutzer
Software Developer
skreutzer considers 'yay' to be a thoroughly cromulent word.skreutzer considers 'yay' to be a thoroughly cromulent word.skreutzer considers 'yay' to be a thoroughly cromulent word.skreutzer considers 'yay' to be a thoroughly cromulent word.skreutzer considers 'yay' to be a thoroughly cromulent word.skreutzer considers 'yay' to be a thoroughly cromulent word.skreutzer considers 'yay' to be a thoroughly cromulent word.skreutzer considers 'yay' to be a thoroughly cromulent word.skreutzer considers 'yay' to be a thoroughly cromulent word.skreutzer considers 'yay' to be a thoroughly cromulent word.skreutzer considers 'yay' to be a thoroughly cromulent word.
 
skreutzer's Avatar
 
Posts: 190
Karma: 89000
Join Date: Jan 2014
Location: Germany
Device: PocketBook Touch Lux 3
It's unfair to point out this disadvantage of the method I suggested, because every other method has the very same disadvantage! Every “soft-DRM” attempt might be easily removed by editing or conversion, and even if removal doesn't happen (by accident or with intention), one might still replace an identifier with an invalid one or with a valid one of another individual, so you can't savely assume that the “identifier” identifies an “legitimate” user, which in the worst case will be blamed for stuff he didn't actually do. But having “soft-DRM” in place obviously implicates that it is intended to cause consequences for somebody, while it won't work for a version where the soft-DRM was removed, so only ordinary users get into trouble who indeed already have paid the author and without doubt can't carry out mass distribution by themselves or would be able to prevent/influence it at all.
skreutzer is offline   Reply With Quote