Upload
chikulenka
View
226
Download
0
Embed Size (px)
Citation preview
8/14/2019 DMCA, DRM, Computer Security & You
1/22
8/14/2019 DMCA, DRM, Computer Security & You
2/22
Searching for Halvar..
8/14/2019 DMCA, DRM, Computer Security & You
3/22
Sklyarov Case
Russian programmer Wrote program that
decrypts AdobeeBooks
Program permits ReadAloud function
Also copyrightinfringement
8/14/2019 DMCA, DRM, Computer Security & You
4/22
DMCA 1201 1 of 2
(a)(1)(A) No person shall circumvent a technologicalmeasure that effectively controls access to a work protected under this title.
(a)(2) No person shall manufacture, import, offer to thepublic, provide, or otherwise traffic in any technology,product, service, device, component, or part thereof, that--
(A) is primarily designed or produced for the purpose of circumventing a technological measure that effectivelycontrols access to a work protected under this title;
8/14/2019 DMCA, DRM, Computer Security & You
5/22
DMCA 1201 2 of 2
(a)(2) No person shall manufacture, import, offer to the public,provide, or otherwise traffic in any technology, product, service,device, component, or part thereof, that--
(B) has only limited commercially significant purpose or use otherthan to circumvent a technological measure that effectively controlsaccess to a work protected under this title; or
(C) is marketed by that person or another acting in concert with thatperson with that person's knowledge for use in circumventing atechnological measure that effectively controls access to a work protected under this title.
8/14/2019 DMCA, DRM, Computer Security & You
6/22
2600 VAN
8/14/2019 DMCA, DRM, Computer Security & You
7/22
Professor Ed Felten
8/14/2019 DMCA, DRM, Computer Security & You
8/22
My Speech
Power of the Content Industries Development of Copyright Law
Dwindling Rights of Citizens Copyright Maximalism Legal and Technological Controls of Content DMCA Anti-circumvention Provisions
Whether You Will Do Something About It
8/14/2019 DMCA, DRM, Computer Security & You
9/22
8/14/2019 DMCA, DRM, Computer Security & You
10/22
The Congress shall
have Power To promote the Progressof Science and usefulArts, by securing for limited Times toAuthors and Inventorsthe exclusive Right to
their respectiveWritings andDiscoveries
8/14/2019 DMCA, DRM, Computer Security & You
11/22
Corporate Behemoths
8/14/2019 DMCA, DRM, Computer Security & You
12/22
Sonny Bono Copyright Term Extension Act
8/14/2019 DMCA, DRM, Computer Security & You
13/22
8/14/2019 DMCA, DRM, Computer Security & You
14/22
8/14/2019 DMCA, DRM, Computer Security & You
15/22
8/14/2019 DMCA, DRM, Computer Security & You
16/22
Fair Use
(1) the purpose and character of use (2) the nature of the copyrighted work (3) the amount and substantiality of
copying, and (4) the market effect.
8/14/2019 DMCA, DRM, Computer Security & You
17/22
DMCA 1201(b)(2)(C)(1)
Other Rights, Etc., Not Affected. Nothing in this section shall affect rights,
remedies, limitations, or defenses tocopyright infringement, including fair use,under this title.
8/14/2019 DMCA, DRM, Computer Security & You
18/22
Security Testing Exception
information derived used solely to promotethe security of the owner or operator of the
tested computer system, or information obtained shared directly with
the developer of the system
information obtained distributed in a waythat might enable copyright infringementor other legal violations
8/14/2019 DMCA, DRM, Computer Security & You
19/22
Encryption Research
Professional Cryptographers Seek Advance Permission Necessary to Advance the State of the Art Publishing Results Does Not Promote
Infringement
8/14/2019 DMCA, DRM, Computer Security & You
20/22
Reverse Engineering
Purpose to Achieve Program-to-programInteroperability
Reverse Engineering Is Necessary Information Divulged for the Sole
Purposes of Enabling Program-to-ProgramInteroperability
h // / d h
http://cryptome.org/ms-drm-os.htmhttp://cryptome.org/ms-drm-os.htm8/14/2019 DMCA, DRM, Computer Security & You
21/22
http://cryptome.org/ms-drm-os.htm
12 December 2001. Thanks to I.Source: US Patent Office: http://www.uspto.gov
------------------------------------------------------------------------
United States Patent 6,330,670England , et al. December 11, 2001
------------------------------------------------------------------------Digital rights management operating system
Abstract
A digital rights management operating system protects rights-managed data, such as downloaded content,from access by untrusted programs while the data is loaded into memory or on a page file as a result of theexecution of a trusted application that accesses the memory. To protect the rights-managed data resident inmemory, the digital rights management operating system refuses to load an untrusted program into memorywhile the trusted application is executing or removes the data from memory before loading the untrusted
program. If the untrusted program executes at the operating system level, such as a debugger, the digital rightsmanagement operating system renounces a trusted identity created for it by the computer processor when thecomputer was booted. To protect the rights-managed data on the page file, the digital rights managementoperating system prohibits raw access to the page file, or erases the data from the page file before allowingsuch access. Alternatively, the digital rights management operating system can encrypt the rights-manageddata prior to writing it to the page file. The digital rights management operating system also limits thefunctions the user can perform on the rights-managed data and the trusted application, and can provide atrusted clock used in place of the standard computer clock.
http://cryptome.org/ms-drm-os.htmhttp://cryptome.org/ms-drm-os.htm8/14/2019 DMCA, DRM, Computer Security & You
22/22