![]() |
#46 |
Groupie
![]() ![]() ![]() ![]() ![]() ![]() Posts: 154
Karma: 672
Join Date: Oct 2006
Device: Tapwave Zodiac, eBookwise 1150
|
Actually, your suggestion reminds me of the DRM already being used by eReader (formerly PalmReader). There is no limitation to the actual device, or the number of them. You download an encrypted file, access it on any machine that can run eReader, but rather than a PK, you need to use your credit card number the first time to decrypt the info. Obviously, this creates a disincentive to distributing the file.
Still limits you to the eReader software, but since that is available on a variety of platforms, the limitation is minor, if you use just those platforms. My problem with your suggestion is that it assumes we could get all the vendors to agree on one standard format, with one standard way of locking the file if the vendor insisted. The same idea was essentially behind the OpenReader project, and if you have never heard of OpenReader, that should tell you how well they did. Sadly, for a variety of reasons, the content owners refuse to standardize in any way. Even a series of books, from one author and one publisher, may vary from one book to another as to which formats they make available. ![]() Jack |
![]() |
![]() |
![]() |
#47 |
Addict
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Posts: 370
Karma: 1553
Join Date: Feb 2008
Location: Melbun
Device: Kobo H2O
|
|
![]() |
![]() |
Advert | |
|
![]() |
#48 |
Actively passive.
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Posts: 2,042
Karma: 478376
Join Date: Feb 2008
Location: US
Device: Sony PRS-505/LC
|
I said I was done, but had to respond to that last shot, moz.
FACT: Piracy is an insoluble problem, from a technical standpoint. At some point, a book has to be readable to be a BOOK. Readable books can be copied. Period. Where does that leave us? With 1) Publishers (and authors) who need a reasonable degree of protection, and the ability to treat an e-book sale as they would a paper book sale. 2) Consumers who want to be able to own their e-book (rather that "license" it), and not be limited to a specific device. An encryption system meets those needs. Public Key cryptography is proven, is in use every day, and has an existing infrastructure. If the example of webmail doesn't clarify things for you, nothing further I say will, either. The fact that the idea has merit is its use by some publishers already, as other members have explained. I'm all for intelligent debate, but won't engage in a battle of wits with the unarmed. |
![]() |
![]() |
![]() |
#49 |
Addict
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Posts: 370
Karma: 1553
Join Date: Feb 2008
Location: Melbun
Device: Kobo H2O
|
You haven't suggested how PKI can do this, but several of us have suggested that it can't. You've successfully come up with a complex replacement for HTTPS and that's all.
|
![]() |
![]() |
![]() |
#50 | |
Addict
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Posts: 370
Karma: 1553
Join Date: Feb 2008
Location: Melbun
Device: Kobo H2O
|
Quote:
Or, I send you an encrypted book. You decrypt it. You forward it without re-encrypting it. No more protection. For example, I send you "book.txt" which is PKI encrypted with your public key. You promptly decrypt it using your private key. Now you have a copy of "book.txt", and it was sent to you using PKI. What you do with that file is entirely up to you. Does that make more sense now? The scenario I thought you were addressing is: Honest Bob and Dodgy Dave each buy a copy of "I Need Food" by Some P Sucker. The publisher desires to both send copies to both, and prevent them sending copies of the books to their friends. DRM attempts to do this by locking the book to a device or a piece of software. So Dodgy Dave sends a copy of the book (and the software if necessary) to Crafty Chris, and that's fine, but when set up it does not work. PKI helps a little with "send copies to both", in that Awful Alice can't snoop the transmission and get the book that way, since she won't talk to Dave or Bob. But Crafty Chris asks Dodgy Dave for an unencrypted copy of the book and Dodgy Dave sends it, because the PKI software is designed to make it easy for Dodgy Dave to Decrypt the Data. |
|
![]() |
![]() |
Advert | |
|
![]() |
#51 |
Actively passive.
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Posts: 2,042
Karma: 478376
Join Date: Feb 2008
Location: US
Device: Sony PRS-505/LC
|
Nothing about this discussion is about the security of the transmission. I'm sure your points would be interesting, if that's what we were discussing.
You've also obviously completely failed to grasp the nature of individual private keys. I suggest again "The Code Book", as an entertaining history of cryptography, and a layman's non-technical introduction to public key cryptography. For myself, however, the topic is over. I appreciated Kovid's agreement and understanding, Peter's cogent comment on the mindset of publishers, and the posters who pointed out examples of this system already in practice. But feel free to continue to talk about how it doesn't prevent piracy, and how once "the key" is "cracked" the whole system is broken. Last edited by Taylor514ce; 03-27-2008 at 11:10 PM. |
![]() |
![]() |
![]() |
#52 |
speaking for myself
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Posts: 139
Karma: 2166
Join Date: Feb 2008
Location: San Francisco Bay Area
Device: PRS-505
|
Now, risking to be accused of doublespeak again, but I think that you go in circles because you do not want to talk about "license". To design "DRMish" system, you need to have somewhere a statement of what can be done with the content (e.g. who can open it). Encryption is almost a distraction there. As long as all programs agree to honor the license, the system works. Now, some programs won't honor it and open the content anyway or fake the license or allow you to save decrypted content, but these will exist no matter what. That's a legal, not technical problem. (Encryption just makes that legal problem a bit simpler to solve). Fonts had "embedding" bit for long time and it mostly works, although it can be easily defeated with any binary editor.
|
![]() |
![]() |
![]() |
#53 | |
Addict
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Posts: 370
Karma: 1553
Join Date: Feb 2008
Location: Melbun
Device: Kobo H2O
|
Quote:
Can you explain again how encrypting something so that only I can decrypt it stops me from sharing it once I've decrypted it? That's where I get confused. |
|
![]() |
![]() |
![]() |
#54 | |
Reticulator of Tharn
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Posts: 618
Karma: 400000
Join Date: Jan 2007
Location: EST
Device: Sony PRS-505
|
Quote:
I think the misunderstanding is that you think that the fact that each individual has their own public/private keypair means that no single universal tool like ConvertLIT for MSLIT or mobidedrm for Mobipocket can be written. Is this the issue? |
|
![]() |
![]() |
![]() |
#55 |
Actively passive.
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Posts: 2,042
Karma: 478376
Join Date: Feb 2008
Location: US
Device: Sony PRS-505/LC
|
<sigh> I can't just quit the discussion, it appears.
@Ilasram: in fact, I am a programmer and have been involved in online systems since the pre-Compuserve era. Trust me, I understand cryptography, compression, OCR, etc. and have written systems ranging from online tax appraisal databases for governments to complete online ecommerce sites from the ground up. I've also been involved in print and publishing for decades, engineering RIPs, OCR software, developing fonts, multi-media content distribution, and so on. I emphatically do not think that individual private keys prevent universal reader applications from being written. In fact, one of the appealing features of the PK-based system is that just the opposite is true. @Peter: "Now, some programs won't honor it and open the content anyway or fake the license or allow you to save decrypted content, but these will exist no matter what. That's a legal, not technical problem. (Encryption just makes that legal problem a bit simpler to solve)." Exactly. Thank you. @moz: "Can you explain again how encrypting something so that only I can decrypt it stops me from sharing it once I've decrypted it? That's where I get confused." I would suggest the confusion comes in because 1) I never did explain this, so cannot explain it again and in fact 2) have explicitly stated several times that stopping pirates from sharing their decrypted files isn't possible and isn't what we're talking about. Perhaps you're in the wrong thread? For latecomers to the thread, please at least read post #1, #8, and maybe #22 and #30 before asking me to explain "again" how this prevents piracy, or before you point out the fatal flaw in the system: at some point you'll actually be able to read your book and thus can copy it! ![]() Last edited by Taylor514ce; 03-28-2008 at 09:51 AM. |
![]() |
![]() |
![]() |
#56 | |||
Reticulator of Tharn
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Posts: 618
Karma: 400000
Join Date: Jan 2007
Location: EST
Device: Sony PRS-505
|
Quote:
![]() Oh, and it's actually "llasram" with an "LL." Quote:
Quote:
|
|||
![]() |
![]() |
![]() |
#57 |
Actively passive.
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Posts: 2,042
Karma: 478376
Join Date: Feb 2008
Location: US
Device: Sony PRS-505/LC
|
LLasram. Yes, that was vague. To decrypt my books, I need my key. My key doesn't decrypt your books. That was my point. As for a universal "crack" to break any PK-encrypted file... good luck with that. So what would a pirate do? He'd decrypt his books and upload them. He wouldn't bother writing a stand-alone universal decryption program. Every Reader application would already do that.
Yes, if you could read your own books on your own devices, why "remove" the encryption? Particularly if that would force you onto an unsupported reader application... I think the scheme also satisfies some concerns of the publisher. The biggest flaw in the system is that you can't give away books you're done using. Since they are keyed to you, you can't buy a book for your friend. If you want to poke holes, Moz, there's one the size of my giant robot head. Last edited by Taylor514ce; 03-28-2008 at 11:38 AM. |
![]() |
![]() |
![]() |
#58 | |
Grand Sorcerer
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Posts: 7,452
Karma: 7185064
Join Date: Oct 2007
Location: Linköpng, Sweden
Device: Kindle Voyage, Nexus 5, Kindle PW
|
Quote:
|
|
![]() |
![]() |
![]() |
#59 | ||
Actively passive.
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Posts: 2,042
Karma: 478376
Join Date: Feb 2008
Location: US
Device: Sony PRS-505/LC
|
Quote:
Quote:
|
||
![]() |
![]() |
![]() |
#60 |
Actively passive.
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Posts: 2,042
Karma: 478376
Join Date: Feb 2008
Location: US
Device: Sony PRS-505/LC
|
|
![]() |
![]() |
![]() |
|
![]() |
||||
Thread | Thread Starter | Forum | Replies | Last Post |
Shorty key on my K3 | pen_sq | Amazon Kindle | 1 | 09-04-2010 12:34 PM |
What in the world is a key file? | surrealmind | IMP | 2 | 04-08-2010 12:21 AM |
Unutterably Silly The key to understanding Texans | Nate the great | Lounge | 84 | 08-14-2009 10:51 AM |
access key | RandallFlagg | Calibre | 4 | 03-25-2009 11:50 AM |
Free Cryptography book by MIT Press | Colin Dunstan | Deals and Resources (No Self-Promotion or Affiliate Links) | 3 | 10-06-2004 09:47 AM |