Although schemes to control duplication of software have been around since the 1970s, over the past decade companies have been increasing their use of DRM to protect digital content from duplication. An early example of DRM is the Content Scrambling System used on DVD movies which was introduced around 1996. Since then music and movie studios have enthusiastically embraced DRM, using it to protect all kinds of media across numerous platforms (CDs, DVDs, HD-DVD, Blu-ray, web downloads, pay-per-view movies, and TiVo recordings are just a few of the many examples of how DRM is used).
Many believe that DRM exists solely to prevent pirates from making perfect copies of digital media and selling this off for a profit. To be honest, while this might have been the goal of DRM in the beginning, Im pretty sure that the scheme has experienced significant feature creep since its inception. Despite nearly a decade of DRM, you can still find and download pretty much anything you want. Movies, music, audiobooks, you name it. In fact, if the goal of DRM was to prevent piracy, its failed - and failed dismally.
Vista Mail vs. Outlook Express
Vista Expert: Why I Don't Like Vista
Windows Vista's Phishing Filter: A User's Guide
Fifty Fantastic Tech Freebies|
When I look at the way that the music industry and the movie studios are using DRM, I dont see a secure digital lock designed to keep the pirates at bay. Instead I see it as likened to a chastity belt. Rather than being truly secure, DRM is more of a symbolic security system thats designed to prevent casual wrongdoing, but which is useless against any kind of serious attack. If an individual isnt motivated to defeat the lock, then the system works. If an individual is determined, then the security of the lock depends on how motivated the individual is to get the better of it.
There are other potential upsides to having a system of DRM, even if it is weak and imperfect. This is because it acts as a stumbling block that gets in the way of average users casually distributing copyrighted content. Stop a good kid turning bad and all that. How effective is DRM at doing this? Who knows, but you can be sure that the effect is small given that ripping CDs and now DVDs is becoming commonplace.
To show just how determined hackers can be to bypass RM, take for example the AACS (Advanced Access Content System) access restriction scheme used to secure high-definition movies. This is a very tough, high-tech scheme that took many years and millions of dollars to develop, but hackers armed with little more than memory dumps and a lot of patience found weaknesses in the system within days, and came out with working hacks within weeks.