Is there an open-source DRM solution? -


Have some open-ended, well-documented and used DRM framework / libraries?

I want to write some structures to buy and sell digital goods, where I want to apply the vendor in any way to the possibility of locking files from the DRM, in any way where Only authorized computers will be able to open it (some fair play like iTunes)

This, and perhaps, involves contacting your server with some login credentials.

On the other hand, I want the client to open source and maybe even the server .. Is this possible? Security does not work through ambiguity, but the DRM is not really "security" ...

All I was able to find, but with "DRM IS Bad" and Sun's DRAM project Finished, but I

If you think that open source DRM is not possible, then tell me.

This claim is an open source implementation of OMA DRM2. I suppose that includes the necessary software components to create servers and clients, so that hardware can be left as an exercise for the reader:

License MPL, which is a non-GPL-compatible FOSS license

I have no experience with this implementation, but OMA is a bit of DRM, and it seems that a DRM plan is quite active, as any DRM scheme is practical OMA DRM standard is well Is documented, and (or at least) used widely by the mobile phone industry.

The fundamental problem with open source DRM is that although all algorithms and source code can be published without harm, client devices must be "trustworthy" by the rights issuer to respect officials. That is, nothing is prohibited. It is incompatible with FOSS, which states that the user of the device should have full control over it.

Security does not work through ambiguity, but the DRM is not exactly "security"

ambiguity of algorithms Secure through is generally weak. Security through the secrecy of information is the only way to crypto, sign, etc. The DRM does not require the ambiguity of the algorithm (which is why Oma DRM is a published standard, and how the source comes for implementation can be published and it can be used independently), but it is necessary That player device has access to information (some type of key) that the user does not access, and which is not part of the algorithm / source.

Generally, security protects the owner / user of a device from the threat model of external attackers in the DRM threat model, the device's owner / user is the attacker, and the right The owner is being protected. If the user has complete control of the device, then clearly this game has ended in theory. This can not be very immediate in practice, but in case of open source people allow people to write their own DRM customers, who prevent them from copying protected data from their rights, they are incredibly honest.

Users can sometimes be persuaded to comply with the law, in which case the DRM can remind them that if they are jumping through hammers then they will work for the sanctions. If they are, then they are law.


Comments

Popular posts from this blog

python - Overriding the save method in Django ModelForm -

html - CSS autoheight, but fit content to height of div -

qt - How to prevent QAudioInput from automatically boosting the master volume to 100%? -