04-23-2014, 03:48 PM | #1 |
Addict
Posts: 398
Karma: 96448
Join Date: Dec 2013
Device: iPad
|
Social DRM
Hello,
Does anyone know of a free open source Social DRM for ePubs? Please spare me the lectures about why I should or shouldn't use it, thanks. |
04-23-2014, 04:21 PM | #2 |
Grand Sorcerer
Posts: 12,168
Karma: 73448616
Join Date: Nov 2007
Location: Toronto
Device: Nexus 7, Clara, Touch, Tolino EPOS
|
|
Advert | |
|
04-23-2014, 04:25 PM | #3 |
temp. out of service
Posts: 2,792
Karma: 24285242
Join Date: May 2010
Location: Duisburg (DE)
Device: PB 623
|
possible solution
Not something I heard of before but, you could script one like this:
1) Take your "social_identifier_string" of choice 2) make a QR code sized 1 pixel per dot of it. 3) convert the QR image to SVG 4) insert the SVG downsized to 1 pixel into your cover or chapter separator / header / deco... SVG As long as it isn't known where exactly it is people wouldn't even find it by stringsearch being converted to small dots in svg-lese inside another svg. Eyeball-search of every SVG in the epub under extremely high magnification because every dot of the image could be the QR code sized down. Having never heard about such attempt of implementing social DRM I assume in good faith that there is no preceding case of it and hereby declare this idea open source |
04-23-2014, 04:59 PM | #4 |
Grand Sorcerer
Posts: 27,552
Karma: 193191846
Join Date: Jan 2010
Device: Nexus 7, Kindle Fire HD
|
I only know of one, but it's not lecture-free.
|
04-24-2014, 01:18 AM | #5 |
Wizard
Posts: 4,520
Karma: 121692313
Join Date: Oct 2009
Location: Heemskerk, NL
Device: PRS-T1, Kobo Touch, Kobo Aura
|
|
Advert | |
|
04-24-2014, 02:27 AM | #6 |
Addict
Posts: 398
Karma: 96448
Join Date: Dec 2013
Device: iPad
|
YES! Those two ideas were exactly what I was looking for!
@Freeshadow: that is a great idea and I will implement it. @DD Thanks a lot! |
04-25-2014, 07:03 AM | #7 |
Software Developer
Posts: 189
Karma: 89000
Join Date: Jan 2014
Location: Germany
Device: PocketBook Touch Lux 3
|
Are you serious, implementing any kind of DRM? Here's a way to circumwent “soft-DRM”, “watermarks” in e-books: two independent people obtain the file from its source and then diff them against each other. If there is no difference, obviously the Social DRM isn't able to trace a file found later in the wild back to the original purchaser, and if they are different, just remove the differences and create a plain file without the useless extra garbage which shouldn't have been there in the first place, and wouldn't need to with an ethical, good approach or business model.
|
04-25-2014, 07:09 AM | #8 |
Grand Sorcerer
Posts: 27,552
Karma: 193191846
Join Date: Jan 2010
Device: Nexus 7, Kindle Fire HD
|
You clearly did not read the instructions.
|
04-25-2014, 09:12 AM | #9 |
Software Developer
Posts: 189
Karma: 89000
Join Date: Jan 2014
Location: Germany
Device: PocketBook Touch Lux 3
|
Oh, sorry, I just missed that this was solely a fun question without real-world relevance, and that suggestions are supposed to provide a scenario for a programming exercise, because the correct answer, if the question would be serious, would be that there is no solution that actually can work. Maybe that's why it is called “soft-DRM” – not because it doesn't get as much into the way as “hard-DRM” does but because it is easy to remove. Additionally, probably the identifier of another person could be faked, which then would be blamed for unauthorized distribution.
In this case, I would suggest to investigate if time stamps of the files in an bundled e-book file package can be used, because nobody would check differences in minutes and seconds, which also could be legitimate information as result of the e-book creation process. |
04-25-2014, 09:23 AM | #10 | |
The Grand Mouse 高貴的老鼠
Posts: 71,510
Karma: 306214458
Join Date: Jul 2007
Location: Norfolk, England
Device: Kindle Voyage
|
Quote:
|
|
04-25-2014, 09:51 AM | #11 |
temp. out of service
Posts: 2,792
Karma: 24285242
Join Date: May 2010
Location: Duisburg (DE)
Device: PB 623
|
Wiped by every touch (yes pun intended)
|
04-25-2014, 02:10 PM | #12 |
Software Developer
Posts: 189
Karma: 89000
Join Date: Jan 2014
Location: Germany
Device: PocketBook Touch Lux 3
|
It's unfair to point out this disadvantage of the method I suggested, because every other method has the very same disadvantage! Every “soft-DRM” attempt might be easily removed by editing or conversion, and even if removal doesn't happen (by accident or with intention), one might still replace an identifier with an invalid one or with a valid one of another individual, so you can't savely assume that the “identifier” identifies an “legitimate” user, which in the worst case will be blamed for stuff he didn't actually do. But having “soft-DRM” in place obviously implicates that it is intended to cause consequences for somebody, while it won't work for a version where the soft-DRM was removed, so only ordinary users get into trouble who indeed already have paid the author and without doubt can't carry out mass distribution by themselves or would be able to prevent/influence it at all.
|
04-25-2014, 06:36 PM | #13 |
Addict
Posts: 398
Karma: 96448
Join Date: Dec 2013
Device: iPad
|
How do you feel about the notion that when you cannot have security, at least try to detter the thief as much as possible?
|
04-25-2014, 09:28 PM | #14 |
temp. out of service
Posts: 2,792
Karma: 24285242
Join Date: May 2010
Location: Duisburg (DE)
Device: PB 623
|
@ skreuzer The keyword here is "social".
If it's non intrusive a fair user has no interest in removal. An unfair one needs nothing but two copies from varying users, diff in a shell and some braincells. Might even have own interest in keeping unique markers on own stuff. Think: name on clothes/personal logos/wallpapers on devices etc. A QR encoded but not first-sight in plain view embedded identifier is subtle, machine readable and thanks to the rising spread of smartphones yet easily accessible to humans. embedding it as svg code inside existing SVGs makes it at least partly resistant to non intended damage, math games with timestamps are the direct counterexample of resistance. A wee typo correction or inclusion of a custom meta data field is highly likely to screw the identifier up. |
04-26-2014, 04:20 AM | #15 |
The Grand Mouse 高貴的老鼠
Posts: 71,510
Karma: 306214458
Join Date: Jul 2007
Location: Norfolk, England
Device: Kindle Voyage
|
Personally, I'd like it if books I bought had a nice graphical title page with my name, date and place of purchase, purchase price, and a facsimile of the author's signature.
That's the kind of social DRM it would be nice to have. |
|
Similar Threads | ||||
Thread | Thread Starter | Forum | Replies | Last Post |
Social reading? | Matthew Bostock | General Discussions | 145 | 06-27-2012 08:21 AM |
Social Media | jbcohen | Lounge | 2 | 02-08-2011 03:02 AM |
Gimmicks as a form of social DRM | Barcey | News | 4 | 01-18-2009 01:06 PM |
Social DRM Take 2 | pilotbob | News | 157 | 09-19-2008 01:29 PM |