SlideShare ist ein Scribd-Unternehmen logo
1 von 27
Downloaden Sie, um offline zu lesen
The L d
Th Landscape of Content P t ti
                 f C t t Protection
            Technology:
 Implications for Digital Publishing

                June 5, 2012
                  Bill Rosenblatt
     GiantSteps Media Technology Strategies
             www.giantstepsmts.com
     billr@giantstepsmts.com 212 956 1045
                         1
Ways to Fight Copyright Infringement

Legal
Economic
Behavioral
Technical



(Courtesy Larry Lessig, Code and Other Laws of Cyberspace)


                                            2
Ways to Fight Copyright Infringement

Legal: Strengthen copyright law
Economic: Make content cheaper & easier to access
Behavioral: Educate public about copyright
Technical: Use technology to enforce copyright
                        gy              py g



(Courtesy Larry Lessig, Code and Other Laws of Cyberspace)


                                            3
Technical Methods

           Proactive                            Reactive
 Limit what consumer can do          Don’t limit what consumer can
  with content                         do with content
 Encrypt content, require special    Search for infringing copies of
  s/w or h/w to decrypt                content
 Ti access to user or device
  Tie         t         d i           Id tif their source by context
                                       Identify th i        b      t t
  identity                             or examination
 Expiry date & time                  Create evidence for legal
 Limits on print, copy to             infringement complaint
  clipboard, etc.

                                     4
Technical Methods

              DRM                        Content Identification
 Limit what consumer can do          Don’t limit what consumer can
  with content                         do with content
 Encrypt content, require special    Search for infringing copies of
  s/w or h/w to decrypt                content
 Ti access to user or device
  Tie         t         d i           Id tif their source by context
                                       Identify th i        b      t t
  identity                             or examination
 Expiry date & time                  Create evidence for legal
 Limits on print, copy to             infringement complaint
  clipboard, etc.

                                     5
Pros and Cons of DRM
Constituency       Attribute           DRM
Publishers         Piracy              Maybe
Retailers          Lock-in             Yes
Libraries          E-lending           Some
Distributors, E-   Cost to implement   Yes
reader vendors
Users              Portability         Restricted
Users              Sharing             Restricted
Users              Borrowing           Some
eReading Market    Growth              Fragmentation
                                 6
Fragmentation:
       Current DRM f eBooks
       C      t DRMs for B k
DRM                      Platforms
AZW DRM                  Amazon Kindle devices/apps
Adobe Content Server 4   B&N Nook Sony Reader
                              Nook,      Reader,
(ACS4)                   Kobo Reader, various others
Apple FairPlay           iOS (iPhone, iPad)
“Screen shot DRM”        Google Books
Fictionwise DRM          B&N Nook
Microsoft PlayReady      Blio Reader
Kobo Vox DRM             Kobo Vox tablet

                          7
DRM in Music

Paid downloads DRM free
                   DRM-free
iTunes post-DRM functionality restrictions
Streams (Spotify, Pandora) encrypted
“Offline listening mode” in mobile subscription
                  g                        p
 services (Spotify, Rhapsody, MOG) use DRM




                        8
DRM in Movies & TV

Protection getting stronger not weaker
                    stronger,
“Software hardening” to deter hacking
Impact of hacks limited
Forensic antipiracy services to catch hacks
               p y
UltraViolet standard for downloads: family accounts,
 rights locker, 5 DRMs, stream encryption
        locker DRMs
Watermarking + encryption for early window high def

                           9
DRM for Corporate Documents

Protect confidential information
Adjunct to corporate content management systems
Complements firewalls, DLP, SSO, etc.
Strong protection
      gp
Integrated into Word, Excel, Acrobat, etc.
Integrated with identity management


                        10
Content Identification in Publishing
       Watermarking                           Fingerprinting
       (Safari,
       (Safari Booxtream)                     (Attributor,
                                              (Attributor Irdeto)
   Adding user identity into to         Examining files to determine
    downloaded eBook                      their identity
                                                       y
   User ID, real name, cc# in           Fancy form of pattern matching
    obfuscated or plaintext form         Requires web crawling to find
   Once, in every chapter, or on
    O     i         h t                   unauthorized copies online
                                               th i d      i     li
    every page                           Cannot identify user who
   Legal one-click hacks possible
          one click                       copied content
   Web crawling optional                Hacks not relevant


                                     11
Content Identification in Publishing

         Watermarking                           Fingerprinting
 Safari Books Online                     At least 4 of Big 6 trade
  PDF downloads:                          Majority of major K-12 and
                                                              K 12
  user’s name on every page                higher ed
 Harry Potter EPUB downloads:            Many major STM and
  obfuscated user ID on copyright          university presses
                                              i    it
  page




                                    12
Publishers Going DRM-Free?

Genres: SF/fantasy, IT
         SF/fantasy
Demographics: young/techie
…otherwise most publishers do and will use DRM
…and publishers either use it for e-lending or don’t
        p                                  g
 allow e-lending at all
Particularly hard to imagine higher ed & profesional
 going DRM-free

                          13
Non-Optimal Choices
Status quo               Go DRM-free




Standardize strong DRM   Standardize w’marking




                         14
Non-Optimal Choices
Status quo                     Go DRM-free
   • M k tf
     Market fragmentation
                    t ti
     and slower e-readership
     g
     growth
   • Or monopoly

Standardize t
St d di strong DRM             Standardize ’ ki
                               St d di w’marking




                               15
Non-Optimal Choices
Status quo                     Go DRM-free
   • M k tf
     Market fragmentation
                    t ti            • I
                                      Irreversible d i i
                                              ibl decision
     and slower e-readership        • Not practical for some
     g
     growth                           models
   • Or monopoly                    • Might increase piracy

Standardize t
St d di strong DRM             Standardize ’ ki
                               St d di w’marking




                               16
Non-Optimal Choices
Status quo                       Go DRM-free
   • M k tf
     Market fragmentation
                    t ti              • I
                                        Irreversible d i i
                                                ibl decision
     and slower e-readership          • Not practical for some
     g
     growth                             models
   • Or monopoly                      • Might increase piracy

Standardize t
St d di strong DRM               Standardize ’ ki
                                 St d di w’marking
   • Expensive and complex
   • Resistance from retailers
     and device makers
   • Privacy issues

                                 17
Non-Optimal Choices
Status quo                       Go DRM-free
   • M k tf
     Market fragmentation
                    t ti              • I
                                        Irreversible d i i
                                                ibl decision
     and slower e-readership          • Not practical for some
     g
     growth                             models
   • Or monopoly                      • Might increase piracy

Standardize t
St d di strong DRM               Standardize ’ ki
                                 St d di w’marking
   • Expensive and complex            • Privacy vs. efficacy
   • Resistance from retailers          tradeoff
     and device makers                • Hacks are legal
   • Privacy issues

                                 18
IDPF Is Exploring a New Choice:
           EPUB LCP
 Lightweight Content Protection for EPUB 3
 Open pro-competitive standard
 Use personal information (e.g. name email cc#)
                            (e g name, email,
  as password, stored in obfuscated form
 Complementary to watermarking
 Library lending (expiry period) support




                        19
EPUB LCP is “Lightweight”

Give away password to others, they can read content
                       others
  – “Social DRM” concept
  – Who do you trust with your personal information?
No “phoning home”
  – Heavyweight DRM depends on it
  – Can be used offline (or if retailer goes out of business)
Designed to be extended for certain markets
  – More security
  – More business models
                               20
Heavyweight vs. Lightweight

                      Heavyweight         Lightweight
File sharing          Restricted          “Social”
Net cnxn required
            q         Yes                 No
One-click hacks       No                  Yes
Recovery from hacks Possible              Not possible
Legality of hacks     Illegal             Illegal
Cost/complexity       Expensive/complex   Cheaper/simpler
Bus model flexibility More                Less



                               21
Security Strength of DRMs and
   Anticircumvention Law
   A ti i         ti L
                      Illegal under Anticircumvention Law



No DRM          Light DRM                          Heavy DRM



      One-Click Hacks Available

 Watermark      EPUB LCP ACS4, AZW             Pay TV CAS/DRM




                                  22
Models Not Possible with EPUB LCP

    Separate license delivery
      – One file, multiple sets of rights
    Domain authentication
      – “Family accounts”: multiple users and/or devices
    License chaining
      – Subscription services
    Master-slave
      –S
       Secure t
              transfer f
                   f from PC t portable d i
                             to t bl device
    Forward-and-delete
      – Support for “Digital First Sale”
                     Digital       Sale
                                23
Window of Opportunity

Fragmentation increasing
  – E.g. Kobo replacing ACS4 with proprietary DRM
Amazon at ~60% market share
            60%
  – Tipping point between monopoly and fragmentation
E-reading i
E di going global
             l b l
  – Moving into higher-piracy markets
EUPB 2 – EPUB 3 transition
                 t    iti
  – Opportunity to rectify IDPF’s historical inaction on DRM

                             24
What IDPF Is Doing

Engaged GiantSteps to help with EPUB LCP design
Draft requirements
Soliciting comments from knowledgeable
 constituents… like you!




                        25
More Information



    www.giantstepsmts.com




www.copyrightandtechnology.com

               26
Bill Rosenblatt
GiantSteps Media Technology Strategies
billr@giantstepsmts.com
212 956 1045
www.giantstepsmts.com
copyrightandtechnology.com
   py g             gy

                   27

Weitere ähnliche Inhalte

Ähnlich wie The landscape of content protection technology

Keynote fx try harder 2 be yourself
Keynote fx   try harder 2 be yourselfKeynote fx   try harder 2 be yourself
Keynote fx try harder 2 be yourself
DefconRussia
 
Qo E E2 E4 Net Neutrality Leo Van Audenhove
Qo E E2 E4   Net Neutrality   Leo Van AudenhoveQo E E2 E4   Net Neutrality   Leo Van Audenhove
Qo E E2 E4 Net Neutrality Leo Van Audenhove
imec.archive
 
Competitive Compliance with Blockchain
Competitive Compliance with BlockchainCompetitive Compliance with Blockchain
Competitive Compliance with Blockchain
Sven Wohlgemuth
 

Ähnlich wie The landscape of content protection technology (20)

Presentazione
PresentazionePresentazione
Presentazione
 
What is DRM?
What is DRM? What is DRM?
What is DRM?
 
Rights, DRM, and Piracy
Rights, DRM, and PiracyRights, DRM, and Piracy
Rights, DRM, and Piracy
 
DRM: A Skeptics View
DRM: A Skeptics ViewDRM: A Skeptics View
DRM: A Skeptics View
 
To DRM or not to DRM?
To DRM or not to DRM?To DRM or not to DRM?
To DRM or not to DRM?
 
Darknet
DarknetDarknet
Darknet
 
Keynote fx try harder 2 be yourself
Keynote fx   try harder 2 be yourselfKeynote fx   try harder 2 be yourself
Keynote fx try harder 2 be yourself
 
Digital Piracy
Digital PiracyDigital Piracy
Digital Piracy
 
idOnDemand | Article | Looking For An ID Solution? Get It From idOnDemand!
idOnDemand | Article | Looking For An ID Solution? Get It From idOnDemand!idOnDemand | Article | Looking For An ID Solution? Get It From idOnDemand!
idOnDemand | Article | Looking For An ID Solution? Get It From idOnDemand!
 
Who is the digital you
Who is the digital youWho is the digital you
Who is the digital you
 
Ipr in cyberspace
Ipr in  cyberspaceIpr in  cyberspace
Ipr in cyberspace
 
Blockchains for trusted data and unstoppable code
Blockchains for trusted data and unstoppable codeBlockchains for trusted data and unstoppable code
Blockchains for trusted data and unstoppable code
 
Soft piracy
Soft piracySoft piracy
Soft piracy
 
The Carrot or the Stick: Opportunities and Challenges in Rights Technologies
The Carrot or the Stick: Opportunities and Challenges in Rights TechnologiesThe Carrot or the Stick: Opportunities and Challenges in Rights Technologies
The Carrot or the Stick: Opportunities and Challenges in Rights Technologies
 
Qo E E2 E4 Net Neutrality Leo Van Audenhove
Qo E E2 E4   Net Neutrality   Leo Van AudenhoveQo E E2 E4   Net Neutrality   Leo Van Audenhove
Qo E E2 E4 Net Neutrality Leo Van Audenhove
 
Legal Issues in Developing in a Hybrid Envionment with Open Source Software
Legal Issues in Developing in a Hybrid Envionment with Open Source SoftwareLegal Issues in Developing in a Hybrid Envionment with Open Source Software
Legal Issues in Developing in a Hybrid Envionment with Open Source Software
 
OWF13 - O-Reilly
OWF13 - O-ReillyOWF13 - O-Reilly
OWF13 - O-Reilly
 
Competitive Compliance with Blockchain
Competitive Compliance with BlockchainCompetitive Compliance with Blockchain
Competitive Compliance with Blockchain
 
Authorship Drm Seminar
Authorship Drm SeminarAuthorship Drm Seminar
Authorship Drm Seminar
 
Digital rights management (drm) and you
Digital rights management (drm) and youDigital rights management (drm) and you
Digital rights management (drm) and you
 

Mehr von GiantSteps Media Technology Strategies

Copyright and Technology London 2012: Multiplatform Video Security - Susanne ...
Copyright and Technology London 2012: Multiplatform Video Security - Susanne ...Copyright and Technology London 2012: Multiplatform Video Security - Susanne ...
Copyright and Technology London 2012: Multiplatform Video Security - Susanne ...
GiantSteps Media Technology Strategies
 
International Perspectives on Digital Copyright Arthur Hoyle, Univ of Canberra
International Perspectives on Digital Copyright   Arthur Hoyle, Univ of CanberraInternational Perspectives on Digital Copyright   Arthur Hoyle, Univ of Canberra
International Perspectives on Digital Copyright Arthur Hoyle, Univ of Canberra
GiantSteps Media Technology Strategies
 
Copyright and Technology London 2012: Opening Remarks - Bill Rosenblatt, Gian...
Copyright and Technology London 2012: Opening Remarks - Bill Rosenblatt, Gian...Copyright and Technology London 2012: Opening Remarks - Bill Rosenblatt, Gian...
Copyright and Technology London 2012: Opening Remarks - Bill Rosenblatt, Gian...
GiantSteps Media Technology Strategies
 
Copyright and Technology London 2012: Content Identification - Werner Strydom...
Copyright and Technology London 2012: Content Identification - Werner Strydom...Copyright and Technology London 2012: Content Identification - Werner Strydom...
Copyright and Technology London 2012: Content Identification - Werner Strydom...
GiantSteps Media Technology Strategies
 
Copyright and Technology London 2012: Content Identification - Alex Terpstra,...
Copyright and Technology London 2012: Content Identification - Alex Terpstra,...Copyright and Technology London 2012: Content Identification - Alex Terpstra,...
Copyright and Technology London 2012: Content Identification - Alex Terpstra,...
GiantSteps Media Technology Strategies
 
Copyright and Technology London 2012: Rights Registries - Nicholas Bentley, C...
Copyright and Technology London 2012: Rights Registries - Nicholas Bentley, C...Copyright and Technology London 2012: Rights Registries - Nicholas Bentley, C...
Copyright and Technology London 2012: Rights Registries - Nicholas Bentley, C...
GiantSteps Media Technology Strategies
 
Copyright and Technology London 2012: Multiplatform Video Security - Jude Ume...
Copyright and Technology London 2012: Multiplatform Video Security - Jude Ume...Copyright and Technology London 2012: Multiplatform Video Security - Jude Ume...
Copyright and Technology London 2012: Multiplatform Video Security - Jude Ume...
GiantSteps Media Technology Strategies
 
Copyright and Technology London 2012: Rights Registries - Paul Jessop, County...
Copyright and Technology London 2012: Rights Registries - Paul Jessop, County...Copyright and Technology London 2012: Rights Registries - Paul Jessop, County...
Copyright and Technology London 2012: Rights Registries - Paul Jessop, County...
GiantSteps Media Technology Strategies
 

Mehr von GiantSteps Media Technology Strategies (20)

Enabling Efficient and Fair Markets for Digital Content
Enabling Efficient and Fair Markets for Digital ContentEnabling Efficient and Fair Markets for Digital Content
Enabling Efficient and Fair Markets for Digital Content
 
Digital Disruption of the Book Publishing Industry
Digital Disruption of the Book Publishing IndustryDigital Disruption of the Book Publishing Industry
Digital Disruption of the Book Publishing Industry
 
Is the CJEU likely to extend the UsedSoft ruling to works other than software?
Is the CJEU likely to extend the UsedSoft ruling to works other than software?Is the CJEU likely to extend the UsedSoft ruling to works other than software?
Is the CJEU likely to extend the UsedSoft ruling to works other than software?
 
Copyright and Technology Conference Observation protocol & impact analysis
Copyright and Technology Conference Observation protocol & impact analysisCopyright and Technology Conference Observation protocol & impact analysis
Copyright and Technology Conference Observation protocol & impact analysis
 
You bought it, but do you own it?
You bought it, but do you own it?You bought it, but do you own it?
You bought it, but do you own it?
 
Standards success factors
Standards success factorsStandards success factors
Standards success factors
 
Copyright and Technology London 2012: Multiplatform Video Security - Susanne ...
Copyright and Technology London 2012: Multiplatform Video Security - Susanne ...Copyright and Technology London 2012: Multiplatform Video Security - Susanne ...
Copyright and Technology London 2012: Multiplatform Video Security - Susanne ...
 
International Perspectives on Digital Copyright Arthur Hoyle, Univ of Canberra
International Perspectives on Digital Copyright   Arthur Hoyle, Univ of CanberraInternational Perspectives on Digital Copyright   Arthur Hoyle, Univ of Canberra
International Perspectives on Digital Copyright Arthur Hoyle, Univ of Canberra
 
Copyright and Technology London 2012: Opening Remarks - Bill Rosenblatt, Gian...
Copyright and Technology London 2012: Opening Remarks - Bill Rosenblatt, Gian...Copyright and Technology London 2012: Opening Remarks - Bill Rosenblatt, Gian...
Copyright and Technology London 2012: Opening Remarks - Bill Rosenblatt, Gian...
 
Copyright and Technology London 2012: Eric Walter, Hadopi
Copyright and Technology London 2012: Eric Walter, HadopiCopyright and Technology London 2012: Eric Walter, Hadopi
Copyright and Technology London 2012: Eric Walter, Hadopi
 
Copyright and Technology London 2012: Content Identification - Werner Strydom...
Copyright and Technology London 2012: Content Identification - Werner Strydom...Copyright and Technology London 2012: Content Identification - Werner Strydom...
Copyright and Technology London 2012: Content Identification - Werner Strydom...
 
Copyright and Technology London 2012: Content Identification - Alex Terpstra,...
Copyright and Technology London 2012: Content Identification - Alex Terpstra,...Copyright and Technology London 2012: Content Identification - Alex Terpstra,...
Copyright and Technology London 2012: Content Identification - Alex Terpstra,...
 
Copyright and Technology London 2012: Rights Registries - Nicholas Bentley, C...
Copyright and Technology London 2012: Rights Registries - Nicholas Bentley, C...Copyright and Technology London 2012: Rights Registries - Nicholas Bentley, C...
Copyright and Technology London 2012: Rights Registries - Nicholas Bentley, C...
 
Copyright and Technology London 2012: Multiplatform Video Security - Jude Ume...
Copyright and Technology London 2012: Multiplatform Video Security - Jude Ume...Copyright and Technology London 2012: Multiplatform Video Security - Jude Ume...
Copyright and Technology London 2012: Multiplatform Video Security - Jude Ume...
 
Copyright and Technology London 2012: Rights Registries - Paul Jessop, County...
Copyright and Technology London 2012: Rights Registries - Paul Jessop, County...Copyright and Technology London 2012: Rights Registries - Paul Jessop, County...
Copyright and Technology London 2012: Rights Registries - Paul Jessop, County...
 
Copyright and Technology 2011: Ron Wheeler Presentation
Copyright and Technology 2011: Ron Wheeler PresentationCopyright and Technology 2011: Ron Wheeler Presentation
Copyright and Technology 2011: Ron Wheeler Presentation
 
Copyright and Technology 2011: Ron Wheeler Presentation
Copyright and Technology 2011: Ron Wheeler PresentationCopyright and Technology 2011: Ron Wheeler Presentation
Copyright and Technology 2011: Ron Wheeler Presentation
 
Copyright and Technology 2011: Hillel Parness Presentation
Copyright and Technology 2011: Hillel Parness PresentationCopyright and Technology 2011: Hillel Parness Presentation
Copyright and Technology 2011: Hillel Parness Presentation
 
Copyright and Technology 2011: Opening Remarks - Bill Rosenblatt
Copyright and Technology 2011: Opening Remarks - Bill RosenblattCopyright and Technology 2011: Opening Remarks - Bill Rosenblatt
Copyright and Technology 2011: Opening Remarks - Bill Rosenblatt
 
Standards success factors
Standards success factorsStandards success factors
Standards success factors
 

The landscape of content protection technology

  • 1. The L d Th Landscape of Content P t ti f C t t Protection Technology: Implications for Digital Publishing June 5, 2012 Bill Rosenblatt GiantSteps Media Technology Strategies www.giantstepsmts.com billr@giantstepsmts.com 212 956 1045 1
  • 2. Ways to Fight Copyright Infringement Legal Economic Behavioral Technical (Courtesy Larry Lessig, Code and Other Laws of Cyberspace) 2
  • 3. Ways to Fight Copyright Infringement Legal: Strengthen copyright law Economic: Make content cheaper & easier to access Behavioral: Educate public about copyright Technical: Use technology to enforce copyright gy py g (Courtesy Larry Lessig, Code and Other Laws of Cyberspace) 3
  • 4. Technical Methods Proactive Reactive  Limit what consumer can do  Don’t limit what consumer can with content do with content  Encrypt content, require special  Search for infringing copies of s/w or h/w to decrypt content  Ti access to user or device Tie t d i  Id tif their source by context Identify th i b t t identity or examination  Expiry date & time  Create evidence for legal  Limits on print, copy to infringement complaint clipboard, etc. 4
  • 5. Technical Methods DRM Content Identification  Limit what consumer can do  Don’t limit what consumer can with content do with content  Encrypt content, require special  Search for infringing copies of s/w or h/w to decrypt content  Ti access to user or device Tie t d i  Id tif their source by context Identify th i b t t identity or examination  Expiry date & time  Create evidence for legal  Limits on print, copy to infringement complaint clipboard, etc. 5
  • 6. Pros and Cons of DRM Constituency Attribute DRM Publishers Piracy Maybe Retailers Lock-in Yes Libraries E-lending Some Distributors, E- Cost to implement Yes reader vendors Users Portability Restricted Users Sharing Restricted Users Borrowing Some eReading Market Growth Fragmentation 6
  • 7. Fragmentation: Current DRM f eBooks C t DRMs for B k DRM Platforms AZW DRM Amazon Kindle devices/apps Adobe Content Server 4 B&N Nook Sony Reader Nook, Reader, (ACS4) Kobo Reader, various others Apple FairPlay iOS (iPhone, iPad) “Screen shot DRM” Google Books Fictionwise DRM B&N Nook Microsoft PlayReady Blio Reader Kobo Vox DRM Kobo Vox tablet 7
  • 8. DRM in Music Paid downloads DRM free DRM-free iTunes post-DRM functionality restrictions Streams (Spotify, Pandora) encrypted “Offline listening mode” in mobile subscription g p services (Spotify, Rhapsody, MOG) use DRM 8
  • 9. DRM in Movies & TV Protection getting stronger not weaker stronger, “Software hardening” to deter hacking Impact of hacks limited Forensic antipiracy services to catch hacks p y UltraViolet standard for downloads: family accounts, rights locker, 5 DRMs, stream encryption locker DRMs Watermarking + encryption for early window high def 9
  • 10. DRM for Corporate Documents Protect confidential information Adjunct to corporate content management systems Complements firewalls, DLP, SSO, etc. Strong protection gp Integrated into Word, Excel, Acrobat, etc. Integrated with identity management 10
  • 11. Content Identification in Publishing Watermarking Fingerprinting (Safari, (Safari Booxtream) (Attributor, (Attributor Irdeto)  Adding user identity into to  Examining files to determine downloaded eBook their identity y  User ID, real name, cc# in  Fancy form of pattern matching obfuscated or plaintext form  Requires web crawling to find  Once, in every chapter, or on O i h t unauthorized copies online th i d i li every page  Cannot identify user who  Legal one-click hacks possible one click copied content  Web crawling optional  Hacks not relevant 11
  • 12. Content Identification in Publishing Watermarking Fingerprinting  Safari Books Online  At least 4 of Big 6 trade PDF downloads:  Majority of major K-12 and K 12 user’s name on every page higher ed  Harry Potter EPUB downloads:  Many major STM and obfuscated user ID on copyright university presses i it page 12
  • 13. Publishers Going DRM-Free? Genres: SF/fantasy, IT SF/fantasy Demographics: young/techie …otherwise most publishers do and will use DRM …and publishers either use it for e-lending or don’t p g allow e-lending at all Particularly hard to imagine higher ed & profesional going DRM-free 13
  • 14. Non-Optimal Choices Status quo Go DRM-free Standardize strong DRM Standardize w’marking 14
  • 15. Non-Optimal Choices Status quo Go DRM-free • M k tf Market fragmentation t ti and slower e-readership g growth • Or monopoly Standardize t St d di strong DRM Standardize ’ ki St d di w’marking 15
  • 16. Non-Optimal Choices Status quo Go DRM-free • M k tf Market fragmentation t ti • I Irreversible d i i ibl decision and slower e-readership • Not practical for some g growth models • Or monopoly • Might increase piracy Standardize t St d di strong DRM Standardize ’ ki St d di w’marking 16
  • 17. Non-Optimal Choices Status quo Go DRM-free • M k tf Market fragmentation t ti • I Irreversible d i i ibl decision and slower e-readership • Not practical for some g growth models • Or monopoly • Might increase piracy Standardize t St d di strong DRM Standardize ’ ki St d di w’marking • Expensive and complex • Resistance from retailers and device makers • Privacy issues 17
  • 18. Non-Optimal Choices Status quo Go DRM-free • M k tf Market fragmentation t ti • I Irreversible d i i ibl decision and slower e-readership • Not practical for some g growth models • Or monopoly • Might increase piracy Standardize t St d di strong DRM Standardize ’ ki St d di w’marking • Expensive and complex • Privacy vs. efficacy • Resistance from retailers tradeoff and device makers • Hacks are legal • Privacy issues 18
  • 19. IDPF Is Exploring a New Choice: EPUB LCP  Lightweight Content Protection for EPUB 3  Open pro-competitive standard  Use personal information (e.g. name email cc#) (e g name, email, as password, stored in obfuscated form  Complementary to watermarking  Library lending (expiry period) support 19
  • 20. EPUB LCP is “Lightweight” Give away password to others, they can read content others – “Social DRM” concept – Who do you trust with your personal information? No “phoning home” – Heavyweight DRM depends on it – Can be used offline (or if retailer goes out of business) Designed to be extended for certain markets – More security – More business models 20
  • 21. Heavyweight vs. Lightweight Heavyweight Lightweight File sharing Restricted “Social” Net cnxn required q Yes No One-click hacks No Yes Recovery from hacks Possible Not possible Legality of hacks Illegal Illegal Cost/complexity Expensive/complex Cheaper/simpler Bus model flexibility More Less 21
  • 22. Security Strength of DRMs and Anticircumvention Law A ti i ti L Illegal under Anticircumvention Law No DRM Light DRM Heavy DRM One-Click Hacks Available Watermark EPUB LCP ACS4, AZW Pay TV CAS/DRM 22
  • 23. Models Not Possible with EPUB LCP  Separate license delivery – One file, multiple sets of rights  Domain authentication – “Family accounts”: multiple users and/or devices  License chaining – Subscription services  Master-slave –S Secure t transfer f f from PC t portable d i to t bl device  Forward-and-delete – Support for “Digital First Sale” Digital Sale 23
  • 24. Window of Opportunity Fragmentation increasing – E.g. Kobo replacing ACS4 with proprietary DRM Amazon at ~60% market share 60% – Tipping point between monopoly and fragmentation E-reading i E di going global l b l – Moving into higher-piracy markets EUPB 2 – EPUB 3 transition t iti – Opportunity to rectify IDPF’s historical inaction on DRM 24
  • 25. What IDPF Is Doing Engaged GiantSteps to help with EPUB LCP design Draft requirements Soliciting comments from knowledgeable constituents… like you! 25
  • 26. More Information www.giantstepsmts.com www.copyrightandtechnology.com 26
  • 27. Bill Rosenblatt GiantSteps Media Technology Strategies billr@giantstepsmts.com 212 956 1045 www.giantstepsmts.com copyrightandtechnology.com py g gy 27