Seth Schoen, staff technologist for the Electronic Frontier Foundation and one of the world's top DRM technical researchers, has written up an analysis of the DRM that Adobe has built into the latest version of Flash for videos, which prevents video viewers from making mashups and re-edits of the video they see on the net.
Amazingly, Adobe seems to have entirely missed the fact that the reason that the Flash video format has taken off is that it's so fluid, versatile and remixable -- not because they sucked up to some Hollysaurs and crippled their technology.
Now Adobe, which controls Flash and Flash Video, is trying to change that with the introduction of DRM restrictions in version 9 of its Flash Player and version 3 of its Flash Media Server software. Instead of an ordinary web download, these programs can use a proprietary, secret Adobe protocol to talk to each other, encrypting the communication and locking out non-Adobe software players and video tools. We imagine that Adobe has no illusions that this will stop copyright infringement -- any more than dozens of other DRM systems have done so -- but the introduction of encryption does give Adobe and its customers a powerful new legal weapon against competitors and ordinary users through the Digital Millennium Copyright Act (DMCA).
Recall that the DMCA sets out a blanket ban on tools that help "circumvent" any DRM system (as well as the act of circumvention itself). When Flash Video files are simply hosted on a web site with no encryption, it's unlikely that tools to download, edit, or remix them are illegal. But when encryption enters the picture, entertainment companies argue that fair use is no excuse; Adobe, or customers using Flash Media Server 3, can try to shut down users who break the encryption without having to prove that the users are doing anything copyright-infringing. Even if users aren't targeted directly, technology developers may be threatened and the technologies the users need driven underground.
For most of a decade, government negotiators from around the Pacific Rim have met in utmost secrecy to negotiate a “trade deal” that was kept secret from legislatures, though executives from the world’s biggest corporations were allowed in the room and even got to draft parts of the treaty.
In a new episode of the BBC’s Panorama, Edward Snowden describes the secret mobile phone malware developed by GCHQ and the NSA, which has the power to listen in through your phone’s mic and follow you around, even when your phone is switched off.
In 1948, the Institute of Applied Science commissioned an unknown illustrator to depict a fistful of squirming, terrified criminals caught in an authoritative fist, under the headline “CAUGHT BY THEIR FINGERTIPS” — they were advertising a home Criminal Investigation and Identification course.
SitePoint Premium is the ultimate e-learning library for web developers, designers, and digital professionals. Famous for their web development books written by industry leaders, they’ve expanded their content library to include in-depth video courses and short, handy screencasts partnering with A Book Apart and UX Mastery. Whatever you want to achieve in your web career, […]
Skip the technical jargon and get right to taking amazing, professional-quality photos with this complete training. The Hollywood Art Institute Photography Course includes 22 modules filled with tutorials on how to profit off of your photography, or simply capture your memories in the manner they deserve.Accredited by the Photography Education Accreditation CouncilDive into this 22 […]
Power up your gadgets in the most unexpected places with the extremely compact SolarJuice battery pack. SolarJuice charges up at home like your average battery pack, but also lets you add extra juice on-the-go using its built-in solar panel—so you’ll never be left unplugged from the digital world.4.5 Stars on Amazon!Simultaneously charges 2 devices at […]