Analysis of information sources in references of the Wikipedia article "Digital rights management" in English language version.
[...] [Good Old Games] focuses on bringing old, time-tested games into the downloadable era with low prices and no DRM.
Digital locks – also known as digital rights management (DRM) technologies or technological protection measures (TPM)
At the end of the day, all DRM systems share a common vulnerability: they provide their attackers with ciphertext, the cipher and the key. At this point, the secret isn't a secret anymore.
Apple has filed a patent application on a technology for tethering rechargeable devices (like iPods) to particular chargers. The idea is that the device will only allow its batteries to be recharged if it is connected to an authorized charger. Whether this is good for consumers depends on how a device comes to be authorized. If "authorized" just means "sold or licensed by Apple" then consumers won't benefit – the only effect will be to give Apple control of the aftermarket for replacement chargers.
Digital locks – also known as digital rights management (DRM) technologies or technological protection measures (TPM)
Apple has filed a patent application on a technology for tethering rechargeable devices (like iPods) to particular chargers. The idea is that the device will only allow its batteries to be recharged if it is connected to an authorized charger. Whether this is good for consumers depends on how a device comes to be authorized. If "authorized" just means "sold or licensed by Apple" then consumers won't benefit – the only effect will be to give Apple control of the aftermarket for replacement chargers.
[...] [Good Old Games] focuses on bringing old, time-tested games into the downloadable era with low prices and no DRM.
At the end of the day, all DRM systems share a common vulnerability: they provide their attackers with ciphertext, the cipher and the key. At this point, the secret isn't a secret anymore.
{{cite web}}
: CS1 maint: unfit URL (link)