If one experienced cryptologist shares his work, the DRM system is failing from then on and needs to be renewed. Whether or not the DRM has failed in its mission depends on the cost of implementing the DRM in the first place, and an accurate estimation of loss prevention for the duration (which includes deterrent factors). I do not desire to give my opinion on the usefulness of DRM, since it's a topic that triggers passions (to my disgust).
What I hoped to convey with my post, fjtorres, is that even if a real "hardened" DRM shows its nose, it could be easily defeated with a program that just simulates navigation (click on the keyboard or whatever), takes screenshots and OCR the stuff.
A program that doesn't even touch the DRM part, and let the copyright owner's approved program deal with it.
@Barry
Your test is very interesting, but as you said it's harder to tamper books (there is nothing "undetectable" in the first place: it's a sequence of visible letters).
Additionally, I believe one weak spot of your test is that even though the tamper is resilient against typical audio conversion (it would work too with video), it might be less resilient against a difference test. In other words, if you got in touch with other testers and compared your audio files, you might have been able to isolate and remove the tampers.
Furthermore, if the tampers are located in humanly undetectable audio nuances (or videos nuances), countering it would consist of doing precisely the research Audible did, and randomly alter all humanly undetectables nuances. I dislike this, as I like the idea of data purity, but if copyright owners do it I guess pirates will follow.
|