Our analysis
and intuition have led us to believe that efficient darknets – in global or
small-worlds form -- will remain a fact of life. In this section we examine rights-management
technologies that are being deployed to limit the introduction rate or decrease
the rate of diffusion of content into the darknet.
Conditional Access Systems
A conditional-access system is a simple form
of rights-management system in which subscribers are given access to objects
based (typically) on a service contract.
Digital rights management systems often perform the same function, but
typically impose restrictions on the use of objects after unlocking.
Conditional access systems such as cable,
satellite TV, and satellite radio offer little or no protection against objects
being introduced into the darknet from subscribing hosts. A conditional-access system customer has no
access to channels or titles to which they are not entitled, and has
essentially free use of channels that he has subscribed or paid for. This means
that an investment of ~$100 (at time of writing) on an analog video-capture
card is sufficient to obtain and share TV programs and movies. Some CA systems provide post-unlock protections
but they are generally cheap and easy to circumvent.
Thus, conditional access systems provide a
widely deployed, high-bandwidth source of video material for the darknet. In practice, the large size and low cost of
CA-provided video content will limit the exploitation of the darknet for
distributing video in the near-term.
The same can not be said of the use of the darknet to
distribute conditional-access system broadcast keys. At some level, each head-end (satellite or cable
TV head-end) uses an encryption key that must be made available to each
customer (it is a broadcast), and in the case of a satellite system this could
be millions of homes. CA-system
providers take measures to limit the usefulness of exploited session keys (for
example, they are changed every few seconds), but if darknet latencies are low,
or if encrypted broadcast data is cached, then the darknet could threaten
CA-system revenues.
We observe that
the exposure of the conditional access provider to losses due to piracy is
proportional to the number of customers that share a session key. In this regard, cable-operators are in a
safer position than satellite operators because a cable operator can narrowcast
more cheaply.
DRM Systems
A classical-DRM system is one in which a
client obtains content in protected (typically encrypted) form, with a license
that specifies the uses to which the content may be put. Examples of licensing terms that are being
explored by the industry are “play on these three hosts,” “play once,” “use
computer program for one hour,” etc.
The license and
the wrapped content are presented to the DRM system whose responsibility is to
ensure that:
a) The client cannot remove the encryption from the file and send it to
a peer,
b) The client cannot “clone” its DRM system to make it run on another
host,
c) The client obeys the rules set out in the DRM license, and,
d) The client cannot separate the rules from the payload.
Advanced DRM systems may go further.
Some such technologies
have been commercially very successful – the content scrambling system used in
DVDs, and (broadly interpreted) the protection schemes used by conditional
access system providers fall into this category, as do newer DRM systems that
use the internet as a distribution channel and computers as rendering
devices. These technologies are
appealing because they promote the establishment of new businesses, and can
reduce distribution costs. If costs and
licensing terms are appealing to producers and consumers, then the vendor
thrives. If the licensing terms are
unappealing or inconvenient, the costs are too high, or competing systems
exist, then the business will fail. The
DivX “DVD” rental model failed on most or all of these metrics, but
CSS-protected DVDs succeeded beyond the wildest expectations of the industry.
On personal
computers, current DRM systems are software-only systems using a variety of
tricks to make them hard to subvert. DRM enabled consumer electronics devices
are also beginning to emerge.
In the absence of the darknet, the goal of
such systems is to have comparable security to competing distribution systems –
notably the CD and DVD – so that programmable computers can play an increasing
role in home entertainment. We will
speculate whether these strategies will be successful in the Sect.
DRM systems
strive to be BOBE (break-once, break everywhere)-resistant. That is, suppliers anticipate (and the
assumptions of the darknet predict) that individual instances (clients) of all
security-systems, whether based on hardware or software, will be
subverted. If a client of a system is
subverted, then all content protected by that DRM client can be
unprotected. If the break can be applied
to any other DRM client of that class
so that all of those users can break their systems, then the DRM-scheme is BOBE-weak. If, on the other hand, knowledge gained
breaking one client cannot be applied elsewhere, then the DRM system is BOBE-strong.
Most commercial
DRM-systems have BOBE-exploits, and we note that the darknet applies to
DRM-hacks as well. The CSS system is an
exemplary BOBE-weak system. The knowledge and code that comprised the De-CSS
exploit spread uncontrolled around the world on web-sites, newsgroups, and even
T-shirts, in spite of the fact that, in principle, the Digital Millennium
Copyright Act makes it a crime to develop these exploits.
A final
characteristic of existing DRM-systems is renewability. Vendors recognize the possibility of
exploits, and build systems that can be field-updated.
It is hard to
quantify the effectiveness of DRM-systems for restricting the introduction of
content into the darknet from experience with existing systems. Existing DRM-systems typically provide
protection for months to years; however, the content available to such systems
has to date been of minimal interest, and the content that is protected is also available in unprotected form. The one system
that was protecting valuable content (DVD video) was broken very soon after
compression technology and increased storage capacities and bandwidth enabled
the darknet to carry video content.
Software
The DRM-systems
described above can be used to provide protection for software, in addition other
objects (e.g. audio and video). Alternatively,
copy protection systems for computer programs may embed the copy protection
code in the software itself.
The most
important copy-protection primitive for computer programs is for the software
to be bound to a host in such a way that the program will not work on an
unlicensed machine. Binding requires a
machine ID: this can be a unique number on a machine (e.g. a network card MAC
address), or can be provided by an external dongle.
For such
schemes to be strong, two things must be true.
First, the machine ID must not be “virtualizable.” For instance, if it is trivial to modify a
NIC driver to return an invalid MAC address, then the software-host binding is
easily broken. Second, the code that
performs the binding checks must not be easy to patch. A variety of technologies that revolve around
software tamper-resistance can help here.
We believe that
binding software to a host is a more tractable problem than protecting passive
content, as the former only requires tamper resistance, while the latter also
requires the ability to hide and manage secrets. However, we observe that all
software copy-protection systems deployed thus far have bee broken. The
definitions of BOBE-strong and BOBE-weak apply similarly to software.
Furthermore, software is as much subject to the dynamics of the darknet as
passive content.
0 komentar:
Posting Komentar