31st May 03, 01:11 PM
|
|
Senior Member
|
|
Join Date: Dec 2001
Location: Illinois
Posts: 2,409
|
|
BusinessWeek Online
MAY 29, 2003
By Jane Black
Kocher's approach to taming piracy, however, is vastly different -- and less privacy-invasive -- than the proposed solutions from technology giants such as Microsoft (MSFT ) or the legislative solutions being sought on Capitol Hill. Instead of trying to track everyone's habits and patterns, Kocher's code would create a forensic trail to allow law-enforcement authorities to hunt down criminals -- but only after there is evidence that illegal copies have been made. Says Kocher: "We're trying to create a system where there will be consequences if people don't obey the laws, but anonymity will be protected if they do."
Though Kocher's work is still in the research stage, his ideas are getting rave reviews from Hollywood studios, as well as DVD-player manufacturers. Small wonder. Whiz kid Kocher, 29, is the creator of Secure Socket Layer (SSL), a security protocol that allows Internet users to make secure online purchases. His eight-person company, San Francisco-based Cryptography Research, serves multinational clients, including Netscape, Microsoft, Visa Intl., and Mondex, MasterCard's smart-card division.
On May 15, I sat down with Kocher in New York to discuss his approach to battling piracy. Following are edited excerpts of our conversation:
Q: Protecting intellectual property and copyrighted works is tricky. What's your solution?
A: We've been trying to come up with a compromise. We've figured a way that, rather than reporting what customers are doing over phone lines or cable pipes -- which is really a serious problem from a privacy perspective -- we put any information you want to carry actually into the content itself.
If somebody makes a copy of a complete work, you can trace that back to the device that was used. But if you're not making a copy, or if you're making copies and only using them within your house or even giving them to a friend who doesn't distribute them, then there's no record of what happens.
Q: That makes sense. Why hasn't someone done it before?
A: Technologically, this is really quite difficult to do. Right now, in a normal security device -- like a DVD player -- there's some code that sits in the player that decrypts data using keys that are "baked" into the player.
In order to get a technique like mine to work, what you actually have to do is make it so that, instead of decrypting the disk the same way in every player, each player decrypts in its own unique way. That way, when illegal copies are found, they can be traced back to the specific disk and machine from which they were made.
In fact, you have to actually go beyond that, because your bad guy or bad people may take multiple players, for example, and compare the output and try to eradicate the differences, so that law enforcement can't then figure out which devices were used. So you need to build the key management using some fairly sophisticated techniques. And that means putting a lot of that logic on as program code with the content.
Q: What does this mean to the consumer?
A: From a customer perspective, it would be the same. You drop a disk in your DVD player and hit "play." But what actually ends up happening is a little bit of code from that disk works with information stored on the player and, together, they control the decryption process.
Q: How does this help prevent copyright infringement and protect privacy?
A: The approach doesn't prevent anything. But it lets an investigator, who has already got proof that there was a crime, go through and trace it back to the device. We call it forensic marketing.
My research group believes it's the most customer-friendly thing you can do. Unless you're breaking the rules, you get your anonymity. But when you start breaking the rules, then it's easy to see who's doing what.
Q: How are entertainment companies responding to the idea? Until now, many studios have tried to foist the responsibility of copy protection onto technology companies.
A: We're getting a very warm reception from Hollywood studios. And that's good. My philosophy on this -- which is kind of reflected in the research we're doing -- is that Hollywood takes the risk and it's their problem. To a large extent, they should bear the costs of developing countermeasures against attacks.
There are two reasons why I think Hollywood should be paying for it. One is that it's their content, so they'll make the most rational choices about how much to spend on security. Two, from a financial perspective, the consumer-electronic device makers have no incentive to do it right. Their job is to produce boxes that customers want to buy and not to go around solving somebody else's problem.
Q: Is this a model that exists in other industries?
A: Yeah. The direction we're coming from here is, in a large part, motivated by work we've done for credit-card companies. If your card is stolen and used for fraudulent purposes, theoretically you can lose $50 out of it, but really, it's nothing. You don't have any liability as a customer. It's up to the banks to control fraud because they take the hit. And they do a pretty good job.
They'll never get rid of it, but fraud rates for the credit-card networks are around 0.07%. And if Hollywood could have their piracy rates be 0.07%, they would probably be delighted. That's vastly better than what anybody would expect to achieve.
Q: So when will we see products that embed your ideal security?
A: This is still very much in the research phase. It's not going to pop up in any products next month.
Source - http://www.businessweek.com/technolo...4913_tc073.htm
__________________
|
|
31st May 03, 01:20 PM
|
|
Administrator
|
|
Join Date: Jan 2002
Posts: 649
|
|
As far as I am concerned it is still an invasion of privacy. I dont want some machine to record and store information on every movie I ever watch. Besides that who is to say what is illegal and what isn't, Kocher says it himself,
If somebody makes a copy of a complete work, you can trace that back to the device that was used. But if you're not making a copy, or if you're making copies and only using them within your house or even giving them to a friend who doesn't distribute them, then there's no record of what happens.
What if I have a huge amount of friends, and those friends have friends, would that be considered illegal. Give me a break.
|
|
31st May 03, 01:21 PM
|
|
Senior Member
|
|
Join Date: Dec 2001
Location: Illinois
Posts: 2,409
|
|
In order to get a technique like mine to work, what you actually have to do is make it so that, instead of decrypting the disk the same way in every player, each player decrypts in its own unique way. That way, when illegal copies are found, they can be traced back to the specific disk and machine from which they were made.
Q: How does this help prevent copyright infringement and protect privacy?
A: The approach doesn't prevent anything. But it lets an investigator, who has already got proof that there was a crime, go through and trace it back to the device. We call it forensic marketing.
Sounds to me like IF this guys idea ever gets off the ground you just by you equiptment with cash and NEVER send the reg card in to the company, or even sign for a warranty from the store to be safe.
__________________
|
|
31st May 03, 01:52 PM
|
|
Administrator
|
|
Join Date: Jan 2002
Posts: 649
|
|
The problem I see is that I think what this guy is not telling everyone how they plan on uniquely identifing a piece of hardware. In computers they use a burned on code, but inorder for someone to tract that individual code you have to plug into the internet, a perfect example is plus dme, it used something like 7 individual hash marks in it reg, so that piriting it was virually impossible. from my understanding it bassically cross referenced everything, so if you changed your hardware or activated it to many times it went kapooey. The only other way I can see to actually track a piece of hardware w/o an internet connection is through your eletric company. You have to use a real name for them..
Basically I see it working like this. The electric company figures a way to individually and uniquely identify each home, apartment, dwelling that has electricity suppied to it. That code is then burned into each new piece of electric equipment that is plugged into the electric source, now every electrical piece of equipment is "known". Now comes this guys DVD player or what ever, you plug it in, it creates a hash sequence, unique to it, you by a dvd and play it, that dvd has it's own has sequence that combines with the has sequence that is in the dvd player, creating a new hash. Now say you decide to make a legal backup of that movie with your computer that has a DVD burner, once that movie is inserted into the computer, the same sequence happens. So now you have your copy, you give it to a friend, he plays it, the same sequence happens, now since the electric companys unique identifying hash is different, your copy that you gave to your friend sends a signal to the electric company saying hey i am copied and playing at a new location. your friend gives it to another friend, same sequence, and some government official knocks on your door accusing you of piracy. Granted this is extreme, and would take some engineering, teamwork, and money, but if the recording industry and the film industry get anymore serious about piracy this may become a very real problem in the future, and those industries have enough money to make it happen. The idea of tracking a persons viewing of material at home on their personal AV equipment makes me sick. The government allready spies on us too much, but spying on TV takes it far beyond that.
|
|
Currently Active Users Viewing This Thread: 1 (0 members and 1 guests)
|
|
Thread Tools |
|
Display Modes |
Linear Mode
|
Posting Rules
|
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts
HTML code is Off
|
|
|
All times are GMT +1. The time now is 02:50 PM.
|
|