Quote:
Originally Posted by dgatwood
...I'm sure somebody will try that, and as soon as they do, it will be cracked by someone opening the book and dumping the unencrypted contents as it gets processed. And as soon as a single person makes an unencrypted copy available, the DRM is moot; there's no need for everyone to break it.
In fact, what you're describing is an awful lot like the way that most hardware copy protection dongles work. Those apps are invariably cracked pretty quickly. To do so, someone literally runs the app and uses every feature. As each page of the encrypted binary gets decrypted by the hardware device, the cracker writes the decrypted code to the same offset in a new file. After every page of code has been decrypted, the person removes the code that does the decryption, and now has a decrypted version of that app. It ends up on warez sites shortly thereafter.
|
If you read my comments earlier, you'd see that I'm more interested in the impact on those of us who want to rid their own purchased ebooks of DRM encryption. I don't care about how easy it is for professional pirates. I don't think that most people who own an encrypted book are interested in getting it from the darknets either. We already paid money for it.
Finally, if the decryption is done within the Trusted Execution Environment itself (rather than just the key store being decrypted there), then no part of the decryption takes place in the "normal world" reading app. So, the warez binary you will be left with won't decrypt anything.