• fogrye@lemmy.zip
    link
    fedilink
    English
    arrow-up
    4
    ·
    5 days ago

    I find funny and silly that people managed to develop bulletproof DRM so you can’t steal a 4k Netflix show in any way but building reliable adult check so kids can’t just click “I’m older than 18 y.o.” on porn site is a total mess.

    • General_Effort@lemmy.world
      link
      fedilink
      English
      arrow-up
      5
      ·
      5 days ago

      I find funny and silly that people managed to develop bulletproof DRM so you can’t steal a 4k Netflix show in any way

      Hmm. Did they?

      Anyway, dystopian surveillance is not that hard technologically. It’s just politically and legally difficult and quite expensive.

    • General_Effort@lemmy.world
      link
      fedilink
      English
      arrow-up
      2
      ·
      4 days ago

      BTW, here’s how this “bulletproof” DRM works:

      1. There’s a special chip in your computer that decodes the stream. We all pay extra for electronics, the sole purpose of which is to make your property serve someone else.

      2. The decoded signal is then sent to the display. To prevent it being recorded, the cable signals that the stream must not be recorded. This is where it gets funny. Messing with CPUs and GPUs is not something that can be done. Cables is a different story. IDK if they cracked down on this yet. Some years ago, when you ordered the cheapest cable from Asia, it simply did not transfer the DRM signal. It’s an unnecessary expense. Of course, even using such a cable may be a criminal offense.

    • I Cast Fist@programming.dev
      link
      fedilink
      English
      arrow-up
      2
      ·
      5 days ago

      Tell record labels that if they make a working, near foolproof age verification algo, they’ll get a 30 years of copyright extension for free. They’ll fix it today

    • furry toaster@lemmy.blahaj.zone
      link
      fedilink
      English
      arrow-up
      1
      ·
      5 days ago

      I rather have the latter honestly, if the user can run abritary code and has physical access there should be nothing they can do exert control, any attempt to otherwise is artificial technical limitation, the end user who owns the device should have the absolute right of running arbritary code on their device free of any artificial teachnical limitation imposed by anything or anyone other themselves, with the exception of if the user is not capable of making their own choices responsibily (e.g children, in this case their legal guardian should be the one in their place)