Year-end 2008, Darknet Assumptions = True
2008 was another tough year for proponents of digital rights management (DRM). As we have pointed out in years past, the infamous Darknet assumptions — three big reasons that DRM copy protection will never work, as set forth in 2002 by a team of Microsoft engineers — continue to be proven true by events.
Let's review the three Darknet assumptions one at a time, and see how they fared in 2008.
1. Any widely distributed object will be available to a fraction of users in a form that permits copying.
2008 may be remembered as the year online music went DRM-free. But other industries remain enamored with DRM, and in 2008 their customers continued to circumvent copy protections and make unauthorized copies for free.
When the PC game Spore was released, fans were outraged to find the program installed a separate program called SecuROM intended prevent copying of the game, and many protested by quickly posting cracked versions of the game. Spore soon became the most pirated game on the Internet — no surprise, since most new games are available almost immediately for free over P2P sites. Some users say downloading cracked copies is the only way the games will play properly on their systems.
Meanwhile, DVD ripper software remains popular (despite Hollywood's attempt to sue the software makers out of business). Even the supposedly unbreakable Blu-ray and DVD-HD DRM was easily cracked — twice in 2008 — by SlySoft.
And for all the effort that the rightsholders' lobby to restrict regular consumers' technology, what are the most sought after, and therefore most widely-distributed infringing files on underground sites? Screener DVDs, pristine copies of currently showing films which emerge from Hollywood itself.
2008 also saw a rise in the sharing of expensive textbooks online, showing that with enough incentive (and a lack of convenient ebook equivalents), individuals will spend hours scanning, OCRing and correcting thousands of physical printed pages.
2. Users will copy objects if it is possible and interesting to do so.
P2P filesharing continued to grow in popularity in 2008, and even showed signs of joining the mainstream. Pirate Bay claimed to be the world's largest P2P network, with over 22 million users. Comcast claimed that vast amounts of P2P traffic was choking their networks (leading them to surreptitiously block BitTorrent traffic).
While it's hard to find accurate figures for P2P usage, there is no evidence that filesharing networks are declining, and anecdotal evidence suggests the opposite. An informal student poll cited by an LA Times Blog found that 64% of students enrolled in a media business course regularly download entertainment through unauthorized sources. 43% were "not concerned" about getting caught.
3. Users will share copies as long as they are connected by high-bandwidth channels.
With the failure of DRM to prevent copying, and the continuing popularity of file sharing, that leaves only one way for the entertainment industry to try to prevent copying: filtering content at the point of connection to the Internet. That's why in 2008 we saw the RIAA and other industry voices dropping attempts to prosecute individuals and shifting towards calls for ISPs to filter content — as well as legislation with a similar purpose.
The rise of filtering may make sense to content industries, given the fact that the Darknet appears most vulnerable at point #3. But the filtering strategy relies on ISPs making a regular practice of inspecting packets coming across their networks, a practice that does not bode well for the right of privacy, as Professor Paul Ohm warned in a 2008 paper. ISP filtering will simply trigger a new privacy arms race, as users fortify their encryption methods and ISPs step up surveillance.
Then there is the worry that sharing of files could move off the net entirely. Already, the exponential increase in size and speed of digital storage is making it easier than ever for files to be traded outside of P2P networks, simply by passing flash drives hand to hand. ISP filtering could end up simply driving the Darknet further underground, making it harder than ever to track and monetize online sharing. As of January 2009, an external terabyte of storage costs around $180. Even relatively pessimistic estimates of the future cost of drives suggest that the terabyte drive will drop below $100 in the next three years. The next generation of file-sharers may be as likely to swap the entire corpus of modern music by hand as they will pick off individual songs online.
Like other attempts to stop digital files from doing what digital files do best — make copies — these attempts will do nothing to get artists, musicians or game designers paid. As EFF and others have been arguing for years, the relative ease of copying digital information is a fact of life in the digital world. Attempts to prevent widespread copying are doomed to failure. Rather than make criminals out of fans, we can work to create systems that help get artists paid while delivering content to more homes than ever before. That's a better way forward.
Recent DeepLinks Posts
Aug 23, 2016
Aug 22, 2016
Aug 22, 2016
Aug 19, 2016
Aug 18, 2016
- Abortion Reporting
- Analog Hole
- Anti-Counterfeiting Trade Agreement
- Artificial Intelligence & Machine Learning
- Bloggers' Rights
- Border Searches
- Broadcast Flag
- Broadcasting Treaty
- Cell Tracking
- Coders' Rights Project
- Computer Fraud And Abuse Act Reform
- Content Blocking
- Copyright Trolls
- Council of Europe
- Cyber Security Legislation
- Defend Your Right to Repair!
- Development Agenda
- Digital Books
- Digital Radio
- Digital Video
- DMCA Rulemaking
- Do Not Track
- E-Voting Rights
- EFF Europe
- Electronic Frontier Alliance
- Encrypting the Web
- Export Controls
- Fair Use and Intellectual Property: Defending the Balance
- FAQs for Lodsys Targets
- File Sharing
- Fixing Copyright? The 2013-2016 Copyright Review Process
- Free Speech
- Genetic Information Privacy
- Government Hacking and Subversion of Digital Security
- Hollywood v. DVD
- How Patents Hinder Innovation (Graphic)
- International Privacy Standards
- Internet Governance Forum
- Know Your Rights
- Law Enforcement Access
- Legislative Solutions for Patent Reform
- Locational Privacy
- Mandatory Data Retention
- Mandatory National IDs and Biometric Databases
- Mass Surveillance Technologies
- Medical Privacy
- Mobile devices
- National Security and Medical Information
- National Security Letters
- Net Neutrality
- No Downtime for Free Speech
- NSA Spying
- Offline : Imprisoned Bloggers and Technologists
- Online Behavioral Tracking
- Open Access
- Open Wireless
- Patent Busting Project
- Patent Trolls
- PATRIOT Act
- Pen Trap
- Policy Analysis
- Public Health Reporting and Hospital Discharge Data
- Reading Accessibility
- Real ID
- Reclaim Invention
- Search Engines
- Search Incident to Arrest
- Section 230 of the Communications Decency Act
- Social Networks
- SOPA/PIPA: Internet Blacklist Legislation
- State-Sponsored Malware
- Student Privacy
- Stupid Patent of the Month
- Surveillance and Human Rights
- Surveillance Drones
- Terms Of (Ab)Use
- Test Your ISP
- The "Six Strikes" Copyright Surveillance Machine
- The Global Network Initiative
- The Law and Medical Privacy
- TPP's Copyright Trap
- Trade Agreements and Digital Rights
- Trans-Pacific Partnership Agreement
- Travel Screening
- Trusted Computing
- UK Investigatory Powers Bill
- Video Games