freebird
Debian Rocks!
AMD introduces On-Chip DRM Protection
*www.infoworld.com/article/07/03/28/14OPcurve_1.html
Source:I’m increasingly aghast at the erosion of the traditional freedom we’ve enjoyed to do whatever we please with our personal
computers -- but intrigued by the science behind it.
My latest
revelation came during a recent visit to AMD for a day of briefings,
mostly about the Barcelona quad-core Opteron and the Torrenza
direct-connect coprocessor interface. During that visit, I got the
briefest of updates on ATI’s new GPU (graphics processing unit)
technology. It will ship with software that plays movies on Blu-ray
discs. The AMD rep spelled it out in words that would have been
undiplomatic coming from me: He said that the new chips will “block
unauthorized access to the frame buffer.” In short, that means an
unauthorized party can’t save the contents of the display to a file on
disk unless the content owner approves it.
There
is a short list of parties who will be unauthorized to access your
frame buffer: You. There is a long list of parties who are authorized
to access your frame buffer, and that list includes Microsoft, Apple,
AMD, Intel, ATI, NVidia, Sony Pictures, Paramount, HBO, CBS,
Macrovision, and all other content owners and enablers that want your
machine to themselves whenever you’re watching, listening to, reading,
or shooting monsters with their products.
Video,
audio, and software will all drive a similar road, that being a single,
unmodifiable path from the original encoded, licensed source to
rendering, and on to delivery (display, headphones, portable device,
printer, or memory for execution of software). This bit of progress
seems to have little relevance to IT until you expand the meaning of
the word “content” to encompass that which you create that is consumed
by human eyes and ears.
As
people working the IT side of business, academia, and government, we
know all too well that personal and customer information, trade
secrets, and other varieties of confidential data can be intercepted
using tricks similar to those that are used to swipe movies and music.
IT content needs that direct path from source media to delivery, too,
so that possession of encoded media -- say, a Blu-ray disc -- is
critical to viewing, listening, or executing.
For
example, right now there is no unbreakable way to arrange that a PDF or
other sort of viewable document can’t be copied or at least stored as a
snapshot of the display. The audio portion of a classified presentation
can be recorded as easily as hooking an analog or digital recorder into
the headphone output. HTML would be a much more viable means of
rendering rich content if it could be protected. Rich document and
multimedia rendering engines would know if they were talking to
delivery devices that were specifically matched with physically secure
equipment. If a renderer couldn’t verify that a display or headset that
it trusts was the sole source of delivery, nothing would appear or be
heard.
It’s
easy to write off entertainment content owners and distributors as a
money-grubbing cartel; for the most part, they are. But the technical
work they do to protect what they own matters, even that work which we
find distasteful given needless extremes of use such as
pay-per-single-view. They’ve got the money to drive the science of data
and content protection. If they perfect that unbreakable link between
the media and the delivery end point, if there’s never another DVD
image splattered all over the Internet, then IT will be able to make a
promise that, to date, it couldn’t: Nobody can view or copy your data
without authorization.
*www.infoworld.com/article/07/03/28/14OPcurve_1.html