dmca, drm, computer security & you

Upload: chikulenka

Post on 30-May-2018

226 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/14/2019 DMCA, DRM, Computer Security & You

    1/22

  • 8/14/2019 DMCA, DRM, Computer Security & You

    2/22

    Searching for Halvar..

  • 8/14/2019 DMCA, DRM, Computer Security & You

    3/22

    Sklyarov Case

    Russian programmer Wrote program that

    decrypts AdobeeBooks

    Program permits ReadAloud function

    Also copyrightinfringement

  • 8/14/2019 DMCA, DRM, Computer Security & You

    4/22

    DMCA 1201 1 of 2

    (a)(1)(A) No person shall circumvent a technologicalmeasure that effectively controls access to a work protected under this title.

    (a)(2) No person shall manufacture, import, offer to thepublic, provide, or otherwise traffic in any technology,product, service, device, component, or part thereof, that--

    (A) is primarily designed or produced for the purpose of circumventing a technological measure that effectivelycontrols access to a work protected under this title;

  • 8/14/2019 DMCA, DRM, Computer Security & You

    5/22

    DMCA 1201 2 of 2

    (a)(2) No person shall manufacture, import, offer to the public,provide, or otherwise traffic in any technology, product, service,device, component, or part thereof, that--

    (B) has only limited commercially significant purpose or use otherthan to circumvent a technological measure that effectively controlsaccess to a work protected under this title; or

    (C) is marketed by that person or another acting in concert with thatperson with that person's knowledge for use in circumventing atechnological measure that effectively controls access to a work protected under this title.

  • 8/14/2019 DMCA, DRM, Computer Security & You

    6/22

    2600 VAN

  • 8/14/2019 DMCA, DRM, Computer Security & You

    7/22

    Professor Ed Felten

  • 8/14/2019 DMCA, DRM, Computer Security & You

    8/22

    My Speech

    Power of the Content Industries Development of Copyright Law

    Dwindling Rights of Citizens Copyright Maximalism Legal and Technological Controls of Content DMCA Anti-circumvention Provisions

    Whether You Will Do Something About It

  • 8/14/2019 DMCA, DRM, Computer Security & You

    9/22

  • 8/14/2019 DMCA, DRM, Computer Security & You

    10/22

    The Congress shall

    have Power To promote the Progressof Science and usefulArts, by securing for limited Times toAuthors and Inventorsthe exclusive Right to

    their respectiveWritings andDiscoveries

  • 8/14/2019 DMCA, DRM, Computer Security & You

    11/22

    Corporate Behemoths

  • 8/14/2019 DMCA, DRM, Computer Security & You

    12/22

    Sonny Bono Copyright Term Extension Act

  • 8/14/2019 DMCA, DRM, Computer Security & You

    13/22

  • 8/14/2019 DMCA, DRM, Computer Security & You

    14/22

  • 8/14/2019 DMCA, DRM, Computer Security & You

    15/22

  • 8/14/2019 DMCA, DRM, Computer Security & You

    16/22

    Fair Use

    (1) the purpose and character of use (2) the nature of the copyrighted work (3) the amount and substantiality of

    copying, and (4) the market effect.

  • 8/14/2019 DMCA, DRM, Computer Security & You

    17/22

    DMCA 1201(b)(2)(C)(1)

    Other Rights, Etc., Not Affected. Nothing in this section shall affect rights,

    remedies, limitations, or defenses tocopyright infringement, including fair use,under this title.

  • 8/14/2019 DMCA, DRM, Computer Security & You

    18/22

    Security Testing Exception

    information derived used solely to promotethe security of the owner or operator of the

    tested computer system, or information obtained shared directly with

    the developer of the system

    information obtained distributed in a waythat might enable copyright infringementor other legal violations

  • 8/14/2019 DMCA, DRM, Computer Security & You

    19/22

    Encryption Research

    Professional Cryptographers Seek Advance Permission Necessary to Advance the State of the Art Publishing Results Does Not Promote

    Infringement

  • 8/14/2019 DMCA, DRM, Computer Security & You

    20/22

    Reverse Engineering

    Purpose to Achieve Program-to-programInteroperability

    Reverse Engineering Is Necessary Information Divulged for the Sole

    Purposes of Enabling Program-to-ProgramInteroperability

    h // / d h

    http://cryptome.org/ms-drm-os.htmhttp://cryptome.org/ms-drm-os.htm
  • 8/14/2019 DMCA, DRM, Computer Security & You

    21/22

    http://cryptome.org/ms-drm-os.htm

    12 December 2001. Thanks to I.Source: US Patent Office: http://www.uspto.gov

    ------------------------------------------------------------------------

    United States Patent 6,330,670England , et al. December 11, 2001

    ------------------------------------------------------------------------Digital rights management operating system

    Abstract

    A digital rights management operating system protects rights-managed data, such as downloaded content,from access by untrusted programs while the data is loaded into memory or on a page file as a result of theexecution of a trusted application that accesses the memory. To protect the rights-managed data resident inmemory, the digital rights management operating system refuses to load an untrusted program into memorywhile the trusted application is executing or removes the data from memory before loading the untrusted

    program. If the untrusted program executes at the operating system level, such as a debugger, the digital rightsmanagement operating system renounces a trusted identity created for it by the computer processor when thecomputer was booted. To protect the rights-managed data on the page file, the digital rights managementoperating system prohibits raw access to the page file, or erases the data from the page file before allowingsuch access. Alternatively, the digital rights management operating system can encrypt the rights-manageddata prior to writing it to the page file. The digital rights management operating system also limits thefunctions the user can perform on the rights-managed data and the trusted application, and can provide atrusted clock used in place of the standard computer clock.

    http://cryptome.org/ms-drm-os.htmhttp://cryptome.org/ms-drm-os.htm
  • 8/14/2019 DMCA, DRM, Computer Security & You

    22/22