Game and DRM

Grand Theft Auto IV will be protected by SecuRom. The fury starts again. It seems to be a shame that a game is protected by a DRM. 2008 will be the year where things changed:
– For many years, games were protected by anti copy systems. No body was seriously complaining. You found hacked versions of the games. Some ripping software (for instance Alcohol 120) were even providing tools to by pass the protections (physically, or in virtual drives).
– SecuRom, LaserLock, … were not called DRMs. They were called game protection systems.

And nobody complained! Gamers were happy. In my editorial of security newsletter #3, I was even highlighting this difference between game protection and DRM.

And suddenly, the world changes. Game protection becomes DRM (although using the same tricks and limitations). Game protections become unacceptable for users. The first fury was Spore. GTA IV will be the next one. Nevertheless, I am sure that GTA IV will be a blockbuster even with “DRM”.

What has changed? Media focus? Has somebody a good explanation to propose?

Some updates concerning older topics

In September, I reported that the French TV recording service wizzgo was not allowed to record M6 and W9. Last week, the court banished TF1 and NT1 (a subsidiary of TF1) from the service. Meanwhile, all the channels of France Television group were also banned. Only a few channels remain available through this service.

More and more Free To Air broadcasters propose a system of catchup TV. And of course, they expect to secure their advertising revenues. This type of service would cannibalize these revenues. Wizzgo wil have to find another business model.

In September, I also reported the massive campaign against DRM for the game Spore. The creators of the game “World of Goo” have reported that they estimate that the PC version of their game has been pirated at 90% (more accurately 82%). On their blog, they explain their measurement methods. They record the IP addresses of the highest scores reported to their server. World of Goo is not protected by DRM.

The conclusions of the creators is that DRM is worthless, because another game that was protected by DRM had the same piracy level. :Sad: His conclusion is also that for 1000 deterred pirated instances, you gain one purchased version. I am not sure that this ratio would be valid for a blockbuster. If you sadly want the game, and have no alternate solution than purchase it, would you miss the game?

Feedback from ACM DRM Workshop

On Monday, I attended the 8th ACM DRM workshop. Here are my feedbacks on this workshop.

There were two invited talks.
KAHN Robert (from CNRI) presented The role of identifiers in information access . The talk was about the Digital Object Architecture (DOA). The idea behind that is to redraw Internet from a communication centric system to a digital object centric system. Every digital object would be identified by a unique handle and servers/proxies would resolve it and provide the actual location of repository (reminds you something :Wink:?, Kahn is behind TCP/IP). This is what is used for DOI.
The link with DRM? The message was that it is important to separate the terms and conditions (expressed as metadata) from the actual enforcement. I fully agree. . His attempt to apply it to the Broadcast Flag was more dubious.

The second invited speaker was YACOV Yacobi. He is the lead of Microsoft’s anti-piracy group. He presented Content Identification He tackled three issues: piracy versus counterfeiting, new DRM and economics of fight against counterfeiters. His distinction between pirated goods and counterfeited goods seemed not extremely good to me. A counterfeited good is a physical good that looks like the original and is sold at about the same price. Thus, the sorting is mainly on the price.
His new DRM approach was the use of media hashing (what we currently call fingerprinting or perceptual hash). Clearly, he was not aware of the state of the art in the field, both about existing solutions, and approaches like the one proposed by Philips many years ago.
In the last part, he presented a complex modeling of economics to determine the optimal effort in counterstriking counterfeiters. It would have been more interesting to focus all his presentation only on this topic.

About the other papers:
JIN Hei (IBM) presented Adaptive traitor tracing for anonymous attack. The starting point is the sequence keys traitor tracing scheme of AACS. It was an extensive analysis on how many movies you had to retrieve to safely incriminate one infringer within a non cooperating coalition. The figures are still very high. As we stated many years ago, sequence keys will probably never be useful in AACS. Furthermore, the analysis assumes that the infringer does not collude content with other members. Would I be an attacker, this is what I would do. Nevertheless, nice theoretical work using probability.

YUNG M. (Microsoft) presented Public-key traitor tracing from efficient decoding and unbounded enrollment . A traitor tracing scheme based on El Gamal. I will let Marc JOYE comment :Wink:

JAMKHEDAR Pramod presented Formal Modeling of Rights. He proposed a scheme that should encompass any Rights Expression Language. Compared to the work of GUTH or CHONG, there is the addition of obligations inside the model. Obligations are external conditions that have to be accomplished prior to granted this action.

DOERR (with Ton KALKER) presented Design rules for interoperable domains – Controlling content dilution and content sharing . It was a presentation of two interesting concepts of CORAL: the rights token (a REL that is independent from the DRMs) and management of domains. The most interesting part was the ideas on how to control the size an dilution. He proposed three mechanisms: proximity, cardinals, and time-out. I think that we did not dare to embed time-out for contents within DVB-CPCM. I am not sure that people would appreciate.

Discussions were extremely interesting. Long discussion with the representative of EFF (but that is another story)

And of course, I presented my paper A Four Layer Model for Security of DRM

Compliance rules?

HDCP strippers are devices that input an HDCP/HDMI signal and output a non-HDCP signal. Many such devices are available on the marker. I just went across a product called HDfury. It looks like a dongle with on one side a HDMI connector and on the other side a VGA-like connector. Gold plated connectors for the quality!

What I find interesting was the section dedicated on HDCP compliance in the product definition.

HDCP rules compliant: no end-user easy access to decrypted analog video.
Once screwed, this module becomes “a part of the display itself”.
The HDfury module is DIRECTLY screwed to the back of the RGB display (where SUB-D15 VGA port stand).

What about screwing it on a video acquisition card? I am not sure that the lawyers who drafted HDCP compliance and robustness rules did expect this understanding of their rules. The no easy access to analog video was for internal video. If I remember well the compliance rules, the analog output should be both resolution downsized (not 1080p) and also copy protected.

Nevertheless, they at least addressed the problem. To make the consumers feel happy? or to calm lawyers? :Wink:

The DRM game

Heileman G. and Jamkhedkar P. are regular contributors for ACM DRM workshop. For many years, they have presented a paper at each workshop. An their papers are worthwhile.

Last year, they presented an interesting http://portal.acm.org/citation.cfm?id=1314287. It analyzed the different possible strategies for Vendor and Consumer using the game theory. The model was rather simplistic. Thus, there was no big surprise in the outcomes especially when analyzing the baseline game (section 2). Would DRM be unbreakable, Vendor should always sell protected content. For Vendor, it is important decrease the utility of downloaded content versus sold content. Only common sense.

The paper becomes more interesting with section 3 when it analyzes the sub-games. What does the consumer do with content and how Vendor reacts. One outcome is that the higher the penalty, the less Consumers Vendor has to sue. The interesting part is the description of a distribution mechanism with a trust valuation that defines the cost of the content and the associated bonuses. This is a trend that was initiated for many years by Philips labs based on the use of forensic watermark.

I have always problem with that philosophy because it relies on the rather strong assumption that the trust evaluation will work. I have many doubts about that, especially with B2C traitor tracing. Today, you have only limited number of sources on P2P networks, and they do not collude. Let’s now suppose that Consumers understand that they may cheat if either they collude or they issue more instances of sources just to dilute the system… I do not even speak about attacking the reputation system (look in electronic auctions).

Nevertheless, game theory seems an interesting tool to explore strategies. We may expect to see papers in the future with more complex models. I would like to see one which would differentiate authors from vendors/distributors and vendors from authorities.

Yahoo will not deliver new licenses

In April 2008, Microsoft was announcing that it was closing its MSN music service. As consequence, it announced that it would not anymore deliver licenses for purchased songs.This time, it is Yahoo music store that announces its closing end of September 2008.

Once more, user will loose their purchased songs if ever they change the computer, or even upgrade it. This is due to so called computer fingerprinting. The license is attached to the computer and not to the user. To attach it, the DRM embeds in the license parameters that are supposed to uniquely identify the computer, for instance mac address, serial number of the hard drive, of the OS, … This disables illegal duplication of the license. But as a consequence, if the user changes his/her computer, then the licenses are not any more valid. The user has to request new licenses to the DRM server for his/her new computer. This operation will not be any more supported.

Yahoo proposes two alternatives to its customers:

  • Reimburse the lost songs
  • Migrate the license to Rhapsody Unlimited service that will continue to operate.

Once more, this event will give arguments to the opponents of DRM. Is there any solution to this type of problem. In theory yes. The first onbe is the mythical DRM interoperability. It should be possible to migrate all the songs to another DRM seamlessly. A second one is to attach the license to the user and not to the computer. The notion of domain, initially defined by DVB-CPCM (and :Wink: SmartRight) and now adopted by OMA is a potential answer. The domain is linked to a user or a familly and not to a given device.

PS: Follow up of Microsoft story, In June, Microsoft announced that it would operate the license server until end of 2011. This is another solution.

DRM and Individualized Pricing

Michael Lesk, from Rutgers University, attempted to answer why online music stores sell to each customer at the same price. Interestingly, every song is sold at the same price, regardless of its performer. The price of the corresponding CD varies depending on the artist’s fame. Online stores have good profiling of Alice. Thus, they could easily propose a personalized price slightly lower than the price she would be ready to pay. According to Lesk, it is not a privacy issue but a feeling of resentment that frightens the sellers.

One alternative that make price differentiation acceptable is versioning. People accept that a hard-bounded book is more expensive then a paper back. People may accept to pay more for a content they will be able to view several times, than for a content that they will view only once. This is the role of DRM. DRM may allow to decrease the average price by offering different versions. Unfortunately, today DRM is not used for that, probably because it is simpler and safer for merchants to offer one unique price.

Reference of the paper
LESK Michael, Digital Rights Management and Individualized Pricing, in IEEE Security & Privacy, May/June 2008