Trusted Computing, Peer-To-Peer Distribution, and the Economics of Pirated Entertainment SUBMISSION — DO NOT DISTRIBUTE OR QUOTE
نویسندگان
چکیده
To better protect digital media from piracy, the Trusted Computing Platform Alliance (TCPA) is introducing technologies to secure personal computers and the entertainment content with which they are trusted, from pirate software. We argue that these new technologies, designed to make extracting content from protected media and media players more difficult, may also be used to protect those who distribute pirated content. 1 Piracy and evolving technology The viability of pirated entertainment hinges on the costs of the three required steps: extracting content from its original media, producing copies, and distributing those copies. The legal liability incurred by participating in these processes may also be factored into the costs. The entertainment industry has collaborated with the computer and electronics industry to bring forward new technologies to protect digital content. We argue that these new technologies, aimed at making content extraction more difficult, may have the side effect of reducing the costs of, and potential liability for, distributing pirated content. The net result could be an increase, rather than a decrease, in the distribution of pirated entertainment such as music and movies. 1.1 The evolution of pirated entertainment Before the days of consumer audio and videotape all three of the steps required to pirate media were expensive. Both the recording equipment and the media itself were expensive, and even if pirated television content had been available, there was no equipment with which to view it. Audiotape and videotape made copying possible at reasonable cost, but quality degraded as copies of copies were made. In the video market, anti-piracy
منابع مشابه
Trusted Computing, Peer-to-Peer Distribution, and The Economics of Pirated Entertainment
The entertainment industry, facing a formidable threat from peer-topeer piracy networks, is exploring every possible means to attack these networks. The industry is also employing defensive strategies to protect media and media players from those who would extract and copy their content. These content protection systems depend on the computer industry’s newly announced ‘trusted computing’ techn...
متن کاملبررسی سامانههای تحت وب عرضه و داوری مقالات از نظر قابلیتهای نقش نویسنده در نشریات مصوب وزارت بهداشت
Background and Aim: Online submission and peer review systems are formal channels of communication among authors, journal editorial boards, and reviewers. The review process starts after authors submit their manuscripts. The aim of this study is to examine the online article submission and peer review systems in terms of the capability in medical journals of Iranian Ministry of Health, and Medi...
متن کاملTrust in Peer-to-Peer Content Distribution Protocols
The distribution of virtual goods like multimedia data relies on the trustworthiness of the distribution system. Recent concepts for the distribution based on peer to peer networks like BitTorrent require new approaches to establish the needed level of trust in the overall functionality of the system. This paper explores the integration of hardware based trust concepts from the domain of Truste...
متن کاملMitigating the Effect of Free-Riders in BitTorrent using Trusted Agents
Even though Peer-to-Peer (P2P) systems present a cost-effective and scalable solution to content distribution, most entertainment, media and software, content providers continue to rely on expensive, centralized solutions such as Content Delivery Networks. One of the main reasons is that the current P2P systems cannot guarantee reasonable performance as they depend on the willingness of users t...
متن کاملP2P Network Trust Management Survey
Peer-to-peer applications (P2P) are no longer limited to home users, and start being accepted in academic and corporate environments. While file sharing and instant messaging applications are the most traditional examples, they are no longer the only ones benefiting from the potential advantages of P2P networks. For example, network file storage, data transmission, distributed computing, and co...
متن کاملThe effect of peer and teacher scaffolding on the reading comprehension of EFL learners in asymmetrical and symmetrical groups
AbstractIn the present study, attempt has been made to examine the effectiveness of peer and teacher scaffolding in reading comprehension of intermediate EFL students in symmetrical and asymmetrical groups. To do so, sixty intermediate students were purposively selected out of 150 intermediate students in Hamadan Islamic Azad University and Kish Language Institute in Hamadan. They were divided ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2003