Dark mode switch icon Light mode switch icon

Drm Threat Analysis Shows Futility In Drm Mechanisms

1 min read

This analysis shows how DRM solutions are ineffective because they [attempt to] address the wrong threat model.

“Many DRM advocates make the classic mistake of refusing to choose a threat model. When they complain about the problem, they seem to be using the Napsterization model – they talk about one infringing copy propagating across the world. But when they propose solutions they seem to be solving the casual-copying problem, asking only that the technology keep the majority of customers from ripping content. So naturally the systems they are building don�t solve the problem they complain about.”

Freedom To Tinker: DRM, and the First Rule of Security Analysis

Originally published on by Jason Axley