Saturday, June 1, 2019
Digital Rights Mischief :: Ethics
digital Rights  impairmentImagine a world where media is kept privately.  A world in which the books you read and the music you  mind to is as protected as your social  credentials number  maybe even more so.  What if someone asked to borrow your laptop, the very place you kept your media?  This  rear Dan in a dilemma. He had to help her   besides if he lent her his computer, she might read his books. Aside from the fact that you could go to prison for many  geezerhood for letting someone else read your books, the very  sentiment shocked him at first. Like everyone, he had been taught since elementary school that sharing books was nasty and wrong  something that  simply pirates would do. Thus begins a short story by Richard Stallman, who paints a very bleak future of the technologies we have today.  Yet the gradual way this society became so controlled begins with a single step. That step is digital rights management.  Digital rights management, DRM, and Trusted Computing, TC, infrin   ge upon consumers rights and should be met with public boycott.DRM and TC limit rights by controlling digital media.  In order to control content, DRM and TC use a computer identification system to verify a users right to use media.  The electronic Privacy Information Center defines DRM as systems that  measure up the use of digital files in order to protect the interests of copyright holders.  DRM systems can control many aspects of the usability of a particular file.  They can limit portability, the ability to  distribute or print a file.  They can control  chafe, the ability to read, write, or save a file.  DRM systems  usually use one of two methods to achieve control.   encoding protects files from outside sources, giving only authorized software access to a file.  This authorized software  pull up stakes then follow the policies set forth by the DRM system.  The other method, marking, is a way of telling software to treat the file as protected.  This works  scoop up in proprie   tary systems where only a  a few(prenominal) applications can read a particular file.  Both methods then enforce rules that the DRM system applies to the file.  Generally these  allow in determining the identity of the computer trying to access the file, often using a unique numbering scheme.Digital Rights Mischief    EthicsDigital Rights MischiefImagine a world where media is kept privately.  A world in which the books you read and the music you listen to is as protected as your social security number  maybe even more so.  What if someone asked to borrow your laptop, the very place you kept your media?  This put Dan in a dilemma. He had to help her  but if he lent her his computer, she might read his books. Aside from the fact that you could go to prison for many years for letting someone else read your books, the very idea shocked him at first. Like everyone, he had been taught since elementary school that sharing books was nasty and wrong  something that only pirates would do. Th   us begins a short story by Richard Stallman, who paints a very bleak future of the technologies we have today.  Yet the gradual way this society became so controlled begins with a single step. That step is digital rights management.  Digital rights management, DRM, and Trusted Computing, TC, infringe upon consumers rights and should be met with public boycott.DRM and TC limit rights by controlling digital media.  In order to control content, DRM and TC use a computer identification system to verify a users right to use media.  The Electronic Privacy Information Center defines DRM as systems that restrict the use of digital files in order to protect the interests of copyright holders.  DRM systems can control many aspects of the usability of a particular file.  They can limit portability, the ability to share or print a file.  They can control access, the ability to read, write, or save a file.  DRM systems commonly use one of two methods to achieve control.  Encryption protects file   s from outside sources, giving only authorized software access to a file.  This authorized software will then follow the policies set forth by the DRM system.  The other method, marking, is a way of telling software to treat the file as protected.  This works best in proprietary systems where only a few applications can read a particular file.  Both methods then enforce rules that the DRM system applies to the file.  Generally these include determining the identity of the computer trying to access the file, often using a unique numbering scheme.  
Subscribe to:
Post Comments (Atom)
 
 
No comments:
Post a Comment