![]() |
#31 | |
Reticulator of Tharn
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Posts: 618
Karma: 400000
Join Date: Jan 2007
Location: EST
Device: Sony PRS-505
|
Quote:
|
|
![]() |
![]() |
![]() |
#32 |
Actively passive.
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Posts: 2,042
Karma: 478376
Join Date: Feb 2008
Location: US
Device: Sony PRS-505/LC
|
There is no DRM, in the sense of locking a book to a device. The file containing the book is encrypted, that's all. Only you can decrypt it, via your private key. Copy the file wherever you want, as many times as you want, and still only you can read it. Use any book reading program or device you want (they would all have to support public key encryption, and provide a way for you to enter your key - imagine this as a step in the software installation or device registration). Doesn't matter. The books are keyed to you.
If you're a skilled programmer with the ability to write an encryption/decryption program yourself, so that you can decrypt your books outside of a reader application, and then spread the plain text around, nothing in this system can stop you. Similarly, if you want to photocopy your Cybook screen as you turn each page... nothing will stop you. Nothing will stop dedicated pirates from pirating books. Writing a public key encryption/decryption program isn't exactly trivial - so nothing in this system makes it "easy" to remove the DRM. This system would even be stronger that today's typical DRM systems, because there would be no single universal "code cracker". A program to decrypt my books wouldn't work on your books. Last edited by Taylor514ce; 03-26-2008 at 11:52 PM. |
![]() |
![]() |
![]() |
#33 | |
Addict
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Posts: 370
Karma: 1553
Join Date: Feb 2008
Location: Melbun
Device: Kobo H2O
|
That's fine, you get it now, thanks to everyone else for explaining while I was away. And thanks for the apology (unnecessary, but appreciated).
Quote:
Why would someone like me contribute to developing an "open DRM" system that stops me reading the books I've bought? Wouldn't I be more likely to sign up and build a tool that lets me do whatever I want with the DRMbooks I buy? Then, of course, I'd release those tools so everyone else could do the same with their DRMbooks. |
|
![]() |
![]() |
![]() |
#34 |
Actively passive.
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Posts: 2,042
Karma: 478376
Join Date: Feb 2008
Location: US
Device: Sony PRS-505/LC
|
Re-read the post right above yours. A universal "crack" to public key crypto just isn't feasible. Maybe for the NSA. They read everything anyway.
Nothing in a pk system stops you reading the books you've bought. In fact, in enables ONLY you to read the the books you've bought, and doesn't limit you to a single device. Note that I'm not discussing an unproven system. It's already in use in secure email systems and secure web sites, and no one is complaining that they can only browse secure sites with particular programs or particular specific machines, nor has web commerce died because of a "universal crack" of HTTPS. It's probably the most attacked and proven system out there. |
![]() |
![]() |
![]() |
#35 | |
Reticulator of Tharn
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Posts: 618
Karma: 400000
Join Date: Jan 2007
Location: EST
Device: Sony PRS-505
|
Quote:
![]() If you look at the Mobipocket DRM tool it's actually pretty funny. The device PID is the key. Using that to produce decrypted content from DRMed files isn't a matter of finding a cryptographic weakness in the algorithms used, but simply a matter of figuring the algorithm. Then key + algorithm + DRMed content = decrypted content. This is what moz was getting at about "open DRM." Cory Doctrow has some articles about this, but all DRM -- or "DRM-like"? "DRM-ish"? systems -- depend on giving customers both the encrypted content and the keys to decrypt it with. To prevent "unauthorized" decryption you then have to hide either the algorithm or the keys or both. Which isn't possible -- that information can only be obfuscated. |
|
![]() |
![]() |
![]() |
#36 |
Addict
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Posts: 370
Karma: 1553
Join Date: Feb 2008
Location: Melbun
Device: Kobo H2O
|
Yes, but the whole point there is that anyone can see them. With DRM, you're trying to stop everyone except the one special user from seeing it, and you're also trying to prevent that user from saving the data unencrypted. Try this experiment: open an encrypted email and forward it unencrypted. If you can, you just "cracked" the open DRM system you're proposing.
|
![]() |
![]() |
![]() |
#37 |
Connoisseur
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Posts: 66
Karma: 918
Join Date: Dec 2007
Device: iRex Iliad
|
I don't think this would work. The reason is that there's no incentive for the sharer to keep his private key secret (as there is in his WiFi and other instances). The book will just end up on the Darknet along with the required key.
|
![]() |
![]() |
![]() |
#38 |
Actively passive.
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Posts: 2,042
Karma: 478376
Join Date: Feb 2008
Location: US
Device: Sony PRS-505/LC
|
The last three posts seem to be intentionally missing the point. I'll respond once more then drop the subject, as I think I've clearly explained PK cryptography and anyone interested in learning how it works can research it on their own.
@Ilasram: Publishers never give you the key. You never give them the key. There is a public encryption key and a private decryption key. That's the very heart of the system. You've misunderstood the system at it's fundamental level. @moz: anyone can see what? No one can log into my webmail and read my emails except me, unless I give away my password. I'm not sure what would induce me to do that, but yes... if I choose to give away my password, people could read my email. But, here's the point, they couldn't read YOUR email with my password. The system isn't broken. If you say "once you have your email you can copy it and forward it", yes, that's a "given" and I've already conceded that point at least half a dozen times already. Please re-read the thread. @sanders: since all my books are encrypted with my key, publishers could easily track me down if I decided to post all my books in a torrent with the message "and here's my key". That would take a pretty dimwitted pirate. The path to piracy would be to first decrypt all your books and then to post the decrypted versions. And to repeat, again, I know it's not piracy-proof, no system can be. Please re-read the thread. |
![]() |
![]() |
![]() |
#39 |
Grand Sorcerer
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Posts: 11,470
Karma: 13095790
Join Date: Aug 2007
Location: Grass Valley, CA
Device: EB 1150, EZ Reader, Literati, iPad 2 & Air 2, iPhone 7
|
I am sorry but this all looks like DRM to me. Currently there is DRM on eReader files that have no need for locking to a device. The lock is to a credit card number and the purchasers name is in the file I believe but not used for unlocking (decryption). Also there are systems based on passport that have multiple device support from Adobe and Microsoft. Other systems have multiple device support as well and as such the number of devices could be changed it needed.
How is this different? I know technically how decryption is different. I am asking how it impacts less and offers and improved user experience over say eReader. Dale |
![]() |
![]() |
![]() |
#40 |
Actively passive.
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Posts: 2,042
Karma: 478376
Join Date: Feb 2008
Location: US
Device: Sony PRS-505/LC
|
@DaleDe: it may not be different, as I haven't explored eReader, etc. Any system which keys the book to the user rather than to a device, and provides a unique transaction between buyer/seller (meaning, the book they sell me is demonstrably different from the "same" book they sell you), and that doesn't limit personal use of my book, would work.
I think the systems you describe are different, if they key to "multiple devices"... a fundamental difference is the system I propose publishers adopt doesn't key to a device, anymore than you are chained to a particular computer to login to your webmail. |
![]() |
![]() |
![]() |
#41 | |
Reticulator of Tharn
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Posts: 618
Karma: 400000
Join Date: Jan 2007
Location: EST
Device: Sony PRS-505
|
Quote:
I do agree(?) that a less restrictive system would provide less incentive for piracy, but a system based on asymmetric cryptography would make it no more difficult to produce a systemic break for the sufficiently motivated. |
|
![]() |
![]() |
![]() |
#42 |
Actively passive.
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Posts: 2,042
Karma: 478376
Join Date: Feb 2008
Location: US
Device: Sony PRS-505/LC
|
You were ok up to this point:
Substitute "private" for "public" and you've got it. And of course, no pirate is going to have my private key, unless I am the pirate, and that brings us round full circle to the fact that nothing will stop a determined pirate, and that at some point any system has to produce plaintext, or else we couldn't read books. Last edited by Taylor514ce; 03-27-2008 at 01:42 PM. Reason: reversed "public" and "private" - now even I'm confused. |
![]() |
![]() |
![]() |
#43 | |
Reticulator of Tharn
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Posts: 618
Karma: 400000
Join Date: Jan 2007
Location: EST
Device: Sony PRS-505
|
Quote:
|
|
![]() |
![]() |
![]() |
#44 | |
Addict
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Posts: 370
Karma: 1553
Join Date: Feb 2008
Location: Melbun
Device: Kobo H2O
|
Quote:
OK, in that case PKI will do everything you want. |
|
![]() |
![]() |
![]() |
#45 | |
Grand Sorcerer
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Posts: 7,452
Karma: 7185064
Join Date: Oct 2007
Location: Linköpng, Sweden
Device: Kindle Voyage, Nexus 5, Kindle PW
|
Quote:
|
|
![]() |
![]() |
![]() |
|
![]() |
||||
Thread | Thread Starter | Forum | Replies | Last Post |
Shorty key on my K3 | pen_sq | Amazon Kindle | 1 | 09-04-2010 12:34 PM |
What in the world is a key file? | surrealmind | IMP | 2 | 04-08-2010 12:21 AM |
Unutterably Silly The key to understanding Texans | Nate the great | Lounge | 84 | 08-14-2009 10:51 AM |
access key | RandallFlagg | Calibre | 4 | 03-25-2009 11:50 AM |
Free Cryptography book by MIT Press | Colin Dunstan | Deals and Resources (No Self-Promotion or Affiliate Links) | 3 | 10-06-2004 09:47 AM |