13.07.2015 Views

What Every Citizen Should Know About DRM, aka - Public Knowledge

What Every Citizen Should Know About DRM, aka - Public Knowledge

What Every Citizen Should Know About DRM, aka - Public Knowledge

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

IV. The “Threat Model” of Universal Infringement,and the Potential Threats Posed By <strong>DRM</strong>With the personal computer driving the Internet’sexplosive growth in the mid to late 1990s,clients and servers began to differentiate. Today,many and perhaps most personal computers functiononly as clients; they rely on services providedby relatively few dedicated “server” hosts. ManyInternet service providers (ISPs) provide servertypeservices to their customers so that they maypublish web pages and other information. Oneconsequence of this design is good news for contentowners: Specifically, when a user publishesinfringing material on his ISP’s server, it is relativelyeasy to identify andMany observers regard contact the ISP staff torequest removal of thethe broadcast-flag infringing materials.But this aspect of Internetuse is changing, and ininitiative as a first stepa way that harkens back totoward comprehensive the original structure ofthe Internet. With thedesign control over availability of high speed,“always-on” Internetcomputers and other access by cable modemand DSL, of advancedproducts. operating systems such asGNU/Linux and BSD andlater versions of Windows, and of continuingprice/performance improvements in computerprocessors, memory and disk storage, individualscan now run their own servers, accessible to anyoneon the Internet. Users no longer necessarilyrely on ISP-provided servers; they need only basicInternet connectivity. Individual users become, ineffect, “hosts.” This is why, while some perceiveuser-run peer-to-peer servers as a novel development,they are actually nothing more than a returnto the Internet’s original model as a network ofcomputers as equal peers, each acting as both clientand server.The implication of this development is bothclear and disturbing for those who wish to outlawpeer-to-peer services as such — one probably cannotbuild effective <strong>DRM</strong> at the router level 38 , andbuilding it in at the host level probably requiresbuilding <strong>DRM</strong> into every personal computer thatcan connect to the Internet.This is a tall order, but at least some representativesof content companies hope to approach thisgoal. One way to do so is on a step-by-step basis.For example, content companies could seek regulationsand other measures that affect the design ofcomputers that receive television content (as anincreasing number of personal computers are ableto do), or that affect the design of devices that canbe connected to TV receivers (this would cover abroad range of digital and consumer-electronicsdevices). Indeed, many observers regard the contentcompanies’ push for a broadcast-flag regulationto be evidence of such a step-by-step strategy.The step-by-step approach can be used in morethan one arena. For example, content companiescan seek <strong>DRM</strong>-based design changes through privatecontracts (e.g., by refusing to license contentto cable or satellite-TV companies that don’tincorporate certain <strong>DRM</strong> measures into theirequipment, including the equipment they licenseconsumers to use). At they same time they can seekto advance the ubiquity of <strong>DRM</strong> by public regulationsuch as the broadcast-flag proposal submittedto the Federal Communications Commission,which the FCC has adopted, albeit in significantlyaltered form.The content companies’ efforts to make <strong>DRM</strong>more pervasive in the digital world are complementedby efforts in the computer industry, somemembers of which hope to establish through“trusted computing” and similar initiatives a kindof <strong>DRM</strong>-based secure space inside your next computer— secure in ways that benefit you, perhaps,but also secure in ways that prevent you from havingfull control over your computer, especiallywhen it is being used as a channel for delivery ofcommercial content.28

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!