1. All media is encrypted executable code. For example, there are not true videos published, but actual instructions for drawing an image on the screen. Programs are likewise encrypted. Those instructions are encrypted with a streaming cipher public-private key encryption scheme and are decrypted in hardware. 2. The chips in charge of decoding images use the mechanisms of Xerox's self-destructing chips. Any would-be reverse engineer will just end up having his shit blown up. 3. Each chip is etched with a unique number that it's keys are derived from. The media publisher operates a service that the client hardware contacts with it's request, telemetry data, and it's encryption key. The service stores the media in an intermediate form that allows for efficient watermarking and encryption.
>>2 Oh, no no no, that is not supported. The data path from the processor and GPU is encrypted directly to the monitor, which has the same mechanisms.
Besides that, that would not help at all for nefarious probably-Russian ``individuals'' who try to steal video games and programs.
Furthermore, all the video is watermarked in every frame, unique each time the key is fetched from the DRM servers with metadata on the unique identifiers of the machine that requested it. If a matching watermark is detected on an illegal criminal website, then all rights are revoked for that machine in perpetuity. Since this covers all software and multimedia, it is now as useless as my niece's iPad when she lost the icloud info after doing a factory reset. That mean's it's a fucking expensive brick that people are going to cry about it and beg me to fix it, but they'll be shit out of luck.
Name:
Anonymous2015-10-01 3:04
1. Don't watch movies
Boom, DRM circumvented.
Name:
Anonymous2015-10-01 3:48
>>5 Not limited to movies. Think about if your computer were an iPhone, and how that would act. This is a way to stop jailbreaks and prevent escapes from the walled garden, as well as any unauthorized code from ever being executed.
It would also stop all criminal malware.
Name:
Anonymous2015-10-01 5:28
>>6 We'd just make our own hardware. There's a reason we don't use Apple devices.
Outlaw custom hardware!
Our own hardware wouldn't be able to be used against us. That would mean that it would be undetectable and would also give us the power to defend ourselves against tyrants who want to force their malicious technology on us.
Name:
Anonymous2015-10-01 6:14
>>4 You just compress the video (which you'd need to do anyways) to scramble the watermark.
Name:
Anonymous2015-10-01 9:19
just make people watch it on an ipad or something, then you can't do shit expect what they let you
Name:
Cudder !cXCudderUE2015-10-01 13:55
Point camera at screen. Record onto VHS.
Name:
Anonymous2015-10-01 14:19
>>10 Useless basement dwellers don't have the money to pay for the media in the first place, they don't form a market and nobody cares if they watch bootlegged VHS copies of glorious 1080p content.
For neurotypical folk on the other hand the existence of the analog loophole becomes less and less relevant as technology progresses, becoming entirely irrelevant by the time we are watching our movies in interactive 3D.
Name:
Anonymous2015-10-01 14:19
1. Make a movie 2. If someone pirates your movie, stop making movies forever 3. No more movies to pirate Bam!
Name:
Anonymous2015-10-01 14:31
but actual instructions for drawing an image on the screen
It would take a real fuckload of space to store that.
Name:
Anonymous2015-10-01 15:17
>>13 It could be compressed as a sequence of bytes to write. The sequence itself could be further compressed.
Move everything to the cloud and charge rental subscription fees for the client hardware, which is basically a thin client.
Media and software companies like it because they aren't selling anything, and the product can be revoked at their leisure. Customers Consumers like it because they're dumbasses and the devices are very shiny. Also very cheap, at only $100 up front and $50/month for the next two years, it's way more cost effective than buying a bunch of $500 laptops that can't even stream the latest hilarious Hollywood comedies because they lack the trusted computing hardware. Additionally, as the cloud gets more powerful, the upgrades are passed along to the consumer for free. You never have to worry about whether the latest Call of Duty, Grand Theft Auto, or Disgaea will run on your system, because the publishers will work with the cloud provider that there is enough cloud hardware to run each instance and stream the image and sound to your screen. And over time, it will get better and better at doing so.
There's really no upside to having your own general purpose computing hardware unless you're really into child porn or something.
Name:
Anonymous2015-10-02 1:23
>>18 Great. Let's go back to the 70's and do time sharing. It's so good I wonder why people stopped doing it
Name:
Anonymous2015-10-02 5:07
>>19 The greed of Intel and Microsoft wanting to put a computer in every home. The only way to do that was by sending users vastly overpowered machines that they could barely use. Now that we have always-on high speed internet superhighway connections, we can reverse that harmful trend take advantage of the economies of scales once again.
Also, the executives at Intel and Microsoft were really into child porn and wanted to hide their disgusting habits, and to help others of their ilk to stay hidden so that they could keep killing precious little children. Thankfully, companies like Google are fully committed to removing such degeneracies from the internet. I mean, Bing doesn't even blacklist lolicon for fucks sake! It's almost as badjust as bad even worse than going back in time and giving Hitler a super-Enigma machine. If you aren't using the cloud, then fuck you.
going back in time and giving Hitler a super-Enigma machine.
Wouldn't have helped him much:
Though Enigma had some cryptographic weaknesses, in practice it was German procedural flaws, operator mistakes, failure to systematically introduce changes in encipherment procedures, and Allied capture of key tables and hardware that, during the war, enabled Allied cryptologists to succeed.1.
Why would you even want to create something that will fuck up everything. Are you some corporate shitbag?
Name:
Anonymous2015-12-31 3:54
>>26 If you rely on the generosity of corporations to not create intrusive DRM, you are a mindless consumer who wants to be and deserves to be exploited.