The DRM game

Heileman G. and Jamkhedkar P. are regular contributors for ACM DRM workshop. For many years, they have presented a paper at each workshop. An their papers are worthwhile.

Last year, they presented an interesting http://portal.acm.org/citation.cfm?id=1314287. It analyzed the different possible strategies for Vendor and Consumer using the game theory. The model was rather simplistic. Thus, there was no big surprise in the outcomes especially when analyzing the baseline game (section 2). Would DRM be unbreakable, Vendor should always sell protected content. For Vendor, it is important decrease the utility of downloaded content versus sold content. Only common sense.

The paper becomes more interesting with section 3 when it analyzes the sub-games. What does the consumer do with content and how Vendor reacts. One outcome is that the higher the penalty, the less Consumers Vendor has to sue. The interesting part is the description of a distribution mechanism with a trust valuation that defines the cost of the content and the associated bonuses. This is a trend that was initiated for many years by Philips labs based on the use of forensic watermark.

I have always problem with that philosophy because it relies on the rather strong assumption that the trust evaluation will work. I have many doubts about that, especially with B2C traitor tracing. Today, you have only limited number of sources on P2P networks, and they do not collude. Let’s now suppose that Consumers understand that they may cheat if either they collude or they issue more instances of sources just to dilute the system… I do not even speak about attacking the reputation system (look in electronic auctions).

Nevertheless, game theory seems an interesting tool to explore strategies. We may expect to see papers in the future with more complex models. I would like to see one which would differentiate authors from vendors/distributors and vendors from authorities.

Prison Break and P2P

What is currently the hottest hit on P2P trackers? Not the last Hollywood movie. It is the first episode of new season of PrisonBreak. According to TorrentFreak, more than 1 million people downloaded the torrent using BitTorrent. The broadcast audience for this episode was 6.5 million viewers according to Fox. This means that at least 20% of the audience will not use the official channel.

Like ABC, Fox has proposed a catchup TV service where users can stream legally and for free the latest episodes. Why do people prefer to use P2P?

TorrentFreak proposed the convenience as an explanation. It is true that you have two advantages compared to broadcast or streaming:

  • Possibility to store and play back on any device
  • Skip advertisements

Nevertheless, there is also another factor. What is the proportion of non-US downloaders on P2P? Currently, non-US/Canadian citizens can neither have access to broadcast nor streaming. When attempting to connect, the connection is rejected because the receiving IP address is not located in the US. Not everybody has access to a US proxy that may allow to bypass this limitation. Fans/addicts will do all there possible to get access to the newest episodes. They will not wait several months (even one year for France) to legally get them. They will download them through P2P. Furthermore, they will find subtitled version available a few days after broadcast. (I checked that the latest episode of PrisonBreak was already available with French and Italian subtitles!)

What can content owners do against it? Provide advertisement free content? This is in total contradiction with Free To Air business model based on advertisement revenue. Provide to foreign countries the episodes as soon as they are available in US? This as a cost because it requires dubbing all episodes with the main languages before initial broadcast. Subtitling is not sufficient in many countries. In France, people hate subtitles. M6 attempted to offer as paid VOD season 4 of Desperate Housewives with French subtitles. it did not work.

Unfortunately, for non US addicts, P2P is the most convenient and cheapest solution. :Sad: This may also explain why TV series are the biggest part of P2P trackers (see Mininova reaches 5 billions torrents)

Comcast, FCC and throttling (2)

In July, FCC ordered Comcast to stop throttling P2P connections ( See Comcast throttling BitTorrent: trouble). On Thursday, Comcast challenged the decision at in the U.S. District Court of Appeals in Washington. Nevertheless, Comcast will comply with the FCC order. Comcast has to stop discrimination before end of the year.

Meanwhile, two consumer interest groups and a company seek an order of court to have Comcast stopping immediately the throttling. The company is Vuze Inc. that distributes a software Vuze formerly known as Azureus. Azureus is one of the P2P software built on top of BitTorrent. Azureus has a serious “market share”.

Comcast has prepared its next move. On 1st October, Comcast will install a monthly maximum download capacity of 250GB for residential customers. This remains a rather high capacity. It represents 300 SD DiVXed movies and around 100 HD movies. Not too bad.

We could have expected Comcast to announce throttling policy in the usage conditions. This limitation is another answer. What will other ISPs do?

Blocking theft of cycles using RFID

In UK, an interesting experiment, called WASP, uses RFID against theft of bicycles. Kryptonite designed a lock equipped with RFID and a motion sensor. The concept combines several elements:

  • The lock
  • A detector of RFID that covers a zone
  • A CCTV system that covers the same zone.

If ever the lock is moved, it activates the RFID. This is detected by the RFID readers which trigger a signal in the CCTV central. It is then possible to visualize who is trying to steal the bike.

The more constraining part of the system is the activation of the system. When the user stores his bike, he has to phone to a central system to indicate the identification of the area of protection. This starts the protection phase. When the user wants to take back his cycle, he has to phone back to the central system before unlocking the bike. WASP system is currently being tested at the University of Portsmouth.

Law 6 is once more interesting. As could have been expected, many people are already not anymore activating the phone call. The lock being blinking, they expect it to be deterrent enough. The activation phase seems to me very constraining. You will have two types of false positive: people who inadvertently move the bike, thus the lock, and of course the owner who forgot to call back to trigger deactivation.

In any case, an interesting combination.

To learn more, a presentation and the operator SOS Response

FCC ruled against Comcast

Comcast was throttling BitTorrent. On Friday 1st August, FCC ruled against Comcast. Comcast is not allowed to block or throttle any P2P traffic. FCC pushes for strict net neutrality (regardless of the legality or illegality of the transferred data). Nevertheless, FCC did not fine Comcast.

FCC’s message is clear. Illegal activity on P2P cannot be fought through throttling or any other type of bandwidth shaping.

Comcast throttling BitTorrent: trouble

ISP throttling P2P networks is not new. But often, they just control the bandwidth once they identified P2P packets. It is why encrypting the transfer (BitTorrent has an encryption mode) often cures throttling. Comcast uses a new method, deployed by Sandvine, of throttling. When a comcast peer seeds a non-comcast user/peer, after a few seconds Comcast issues a reset (RST) packet to the non-Comcast user. This has two consequences:

  • The non comcast-user losses its seed
  • The comcast-user losses some upload bandwidth. This may have an impact on the transfer ratio in case of private P2P. In these P2P network, the more you seed, the more and faster you receive

Of course, the community immediately reacted and worked on the problem. The nicest solution is based on the use of Linux Firewall. It is possible to filter the RST packets, thus stopping the throttling. Some sites provide all the information to setup the filtering for different Linux distributions ( For instance Tux training)

But was is more interesting is the reaction of the FCC. It is expected that FCC will order Comcast to cease throttling. According to a majority of members of FCC, they believe it is illegal to throttle without informing customers. Decision to be announced in the coming days.

We may expect some ISPs soon to change their licensing conditions and put in it that they may throttle. If there is an obligation to announce clearly throttling, this will be an argument for choosing his/her ISP (with or without throttling).

Yahoo will not deliver new licenses

In April 2008, Microsoft was announcing that it was closing its MSN music service. As consequence, it announced that it would not anymore deliver licenses for purchased songs.This time, it is Yahoo music store that announces its closing end of September 2008.

Once more, user will loose their purchased songs if ever they change the computer, or even upgrade it. This is due to so called computer fingerprinting. The license is attached to the computer and not to the user. To attach it, the DRM embeds in the license parameters that are supposed to uniquely identify the computer, for instance mac address, serial number of the hard drive, of the OS, … This disables illegal duplication of the license. But as a consequence, if the user changes his/her computer, then the licenses are not any more valid. The user has to request new licenses to the DRM server for his/her new computer. This operation will not be any more supported.

Yahoo proposes two alternatives to its customers:

  • Reimburse the lost songs
  • Migrate the license to Rhapsody Unlimited service that will continue to operate.

Once more, this event will give arguments to the opponents of DRM. Is there any solution to this type of problem. In theory yes. The first onbe is the mythical DRM interoperability. It should be possible to migrate all the songs to another DRM seamlessly. A second one is to attach the license to the user and not to the computer. The notion of domain, initially defined by DVB-CPCM (and :Wink: SmartRight) and now adopted by OMA is a potential answer. The domain is linked to a user or a familly and not to a given device.

PS: Follow up of Microsoft story, In June, Microsoft announced that it would operate the license server until end of 2011. This is another solution.