SlideShare une entreprise Scribd logo
1  sur  15
Télécharger pour lire hors ligne
The Future of DRM :

How would you like it “served” ?
Deceptive, Dystopian or Hopeful

      Copyright & Technology 2010
           Technology Track
                New York

                                          Jean-Henry Morin
                                University of Geneva – CUI
                               Dept. of Information Systems

                               Jean-Henry.Morin@unige.ch
                                     http://jean-henry.com/
               June 17, 2010
How did we get here…
                      … a dystopian scenario ?




http://www.flickr.com/search/?q=DRM

      J.-H. Morin
Extremism
    • Larry Lessig Speech at Italian
      Parliament: Internet is Freedom
            http://blip.tv/file/3332375/




VS 2 M iPads sold in 60 days !!!
                                               3
   J.-H. Morin
Remix, © and Fair Use
  Universal Music VS dancing toddler




   • How creativity is being strangled by the law, TED Talk of
        Larry Lessig, March 2007
         http://www.ted.com/talks/lang/eng/larry_lessig_says_the_law_is_strangling_creativity.html
                                                                                                4
J.-H. Morin
Legal Complexity vs Global
                   eServices led Economy
 • Total Control and Anticipation :
        • Unrealistic, impossible and undesirable


                               Rules & Policies
              Content



              100 kb
                                   1 Mb



J.-H. Morin
Deceptive and Inapplicable Laws
French HADOPI Three-
Strikes invites itself to the
land of Shakespeare




UK Digital Economy Act (June 12, 2010)


           Regulatory
           Humility
                                         French Three-Strikes Graduated Response HADOPI Law

           • See also : Larry Lessig Speech at Italian Parliament:
                Internet is Freedom
                                                      http://blip.tv/file/3332375/
                                                                                          6
        J.-H. Morin
Doomed initiatives !

 • Fundamental Rights:
        •     Internet access has been recognized as a fundamental
              right, EU Parliament massively rejects three strikes
              graduated responses (481 votes against 25)

 • Technically inapplicable:
        •     Deep Packet Inspection and false positives
              http://dmca.cs.washington.edu/


 • Legally inapplicable:
        •     Territorial nature of such laws VS global media
        •     Germany rejects Three-Strikes approach (June, 2010)

 • ACTA : removed Three-Strikes provision from
      public draft
                                                                     7
J.-H. Morin
Where did we go wrong?

• Where did User Experience go ?

• Where did Superdistribution go ?

• Where are the innovative Business Models, the
      Real-time Marketers, etc. ?

• Did DRM curb those that it meant ?

• Wasn’t DRM supposed to be an enabler ?

J.-H. Morin
Can we finally make DRM
        “FUN” (i.e., User Friendly ;-) ?
 • Assuming       :
        • DRM is likely to stay and be needed (managed content)
        • Absolute security is neither achievable nor desirable
        • Given the right User Experience and Business Models
          most users smoothly comply (e.g., iTunes)
        • Most users aren’t criminals

 • We needed to take a step back to :
        • Critically re-think DRM
        • Reconsider the debate outside the either/or extremes of
          total vs. no security
        • Re-design DRM from ground up

                                                                    9
J.-H. Morin
Rethinking & Redesigning DRM
• Acknowledge the Central role of the User and User
  Experience
   • Reinstate Users in their roles & rights
   • Presumption of innocence & the burden of proof
• Fundamental guiding principle to Rethink and Redesign
  DRM : Feltens’ “Copyright Balance” principle (Felten,
  2005)
         “Since lawful use, including fair use, of copyrighted works is in the
                      public interest, a user wishing to make lawful use of
             copyrighted material should not be prevented from doing so
                                                        by any DRM system.”
• Claim and Proposition :
   • Put the trust back into the hands of the users
   • Reverse the distrust assumption
   • Requires a major paradigm shift & change of mindset
                                                                           10
 J.-H. Morin
The Exception Management Model
Rethinking & Redesigning DRM
                                     (cont.)
• Exception Management in DRM environments, mixing
  water with fire ? Not necessarily !
    • Reversing the distrust assumption puts the user “in
      charge”, facing his responsibilities
    • Allow users to make Exception Claims, granting them
      Short Lived Licenses based on some form of logging and
      monitoring
    • Use Credentials as tokens for logging to detect and
      monitor abuses
    • Credential are Revocable in order to deal with abuse and
      misuse situations
    • Mutually acknowledged need for managed content while
      allowing all actors a smooth usability experience

                            (Morin and Pawlak, 2007, 2008); (Morin 2008, 2009) 12
J.-H. Morin
Exception Management in DRM
                     Environments
 • What is an Exception ?
        • A claim made by a user wishing to rightfully access /
          use content
 • Based on « real world » credential patterns
        •     Delegation model based on chained authorities
        •     Credential authorities closer to the users
        •     Locally managed and held (credential store)
        •     Short lived or fixed life time
        •     Revocable
        •     Late binding (enforcement point)
 • Model is auditable for abuse and includes
   revocation capabilities
        • Burden of proof on the party having a justifiable reason
          to claim abuse (presumption of innocence)
        • Monitoring in near real time of security policies       13
J.-H. Morin
Conclusion

 • Can DRM “go green” before we all “go dark” ?
 • If so, we might be able to address some
      “Serious” societal issues while restoring User
      Experience along the way !
 • Moving forward : A Call For ACTION !
       •      Critically re-think and re-design DRM out of the box
       •      Involve equally all stakeholders
       •      Find new innovative Business Models
       •      Limit law to a “justifiable” level
       •      Remember technology is just the means

 • What Information Society do we want to
      live in ?                                                      14
J.-H. Morin
Security is bypassed not
                       attacked
                    Inspired by Adi Shamir, Turing Award lecture, 2002




                                                              Thank you

                                                             Join the
                                                           Conversation…



                                                                   Jean-Henry Morin
                                                         University of Geneva – CUI
                                                        Dept. of Information Systems

                                                        Jean-Henry.Morin@unige.ch
                                                              http://jean-henry.com/

                                                                                  15
J.-H. Morin

Contenu connexe

Similaire à Jean-Henry Morin, University of Geneva

Privacy by Design (ECREA Preconference 12)
Privacy by Design (ECREA Preconference 12)Privacy by Design (ECREA Preconference 12)
Privacy by Design (ECREA Preconference 12)
lbaruh
 
Political Economy
Political EconomyPolitical Economy
Political Economy
pumascomm
 

Similaire à Jean-Henry Morin, University of Geneva (20)

Reinstating Trust in the Digital Age
Reinstating Trust in the Digital AgeReinstating Trust in the Digital Age
Reinstating Trust in the Digital Age
 
Ftc Drm Future Morin
Ftc Drm Future MorinFtc Drm Future Morin
Ftc Drm Future Morin
 
Motivations behind Software Piracy: Relevance to Computer Ethics Theories
Motivations behind Software Piracy: Relevance to Computer Ethics Theories Motivations behind Software Piracy: Relevance to Computer Ethics Theories
Motivations behind Software Piracy: Relevance to Computer Ethics Theories
 
Citizen (Online / Social) Media Ethics
Citizen (Online / Social) Media EthicsCitizen (Online / Social) Media Ethics
Citizen (Online / Social) Media Ethics
 
The internet of things..perspectives for the Nigerian legal system
The internet of things..perspectives for the Nigerian legal systemThe internet of things..perspectives for the Nigerian legal system
The internet of things..perspectives for the Nigerian legal system
 
Social Media Privacy Laws and Legal Liabilities
Social Media Privacy Laws and Legal LiabilitiesSocial Media Privacy Laws and Legal Liabilities
Social Media Privacy Laws and Legal Liabilities
 
Protecting assets on social media. The example of trademarks
Protecting assets on social media. The example of trademarksProtecting assets on social media. The example of trademarks
Protecting assets on social media. The example of trademarks
 
Privacy by Design (ECREA Preconference 12)
Privacy by Design (ECREA Preconference 12)Privacy by Design (ECREA Preconference 12)
Privacy by Design (ECREA Preconference 12)
 
Ethics of Computing in Pharmaceutical Research
Ethics of Computing in Pharmaceutical ResearchEthics of Computing in Pharmaceutical Research
Ethics of Computing in Pharmaceutical Research
 
AI & Democracy
AI & DemocracyAI & Democracy
AI & Democracy
 
Multimedia Privacy
Multimedia PrivacyMultimedia Privacy
Multimedia Privacy
 
George konstantakis iot and product design
George konstantakis iot and product designGeorge konstantakis iot and product design
George konstantakis iot and product design
 
Internal social networks
Internal social networksInternal social networks
Internal social networks
 
“Permissionless Innovation” & the Grand Tech Policy Clash of Visions to Come
“Permissionless Innovation” & the Grand Tech Policy Clash of Visions to Come“Permissionless Innovation” & the Grand Tech Policy Clash of Visions to Come
“Permissionless Innovation” & the Grand Tech Policy Clash of Visions to Come
 
Introduction to ethics
Introduction to ethicsIntroduction to ethics
Introduction to ethics
 
Five moral dimensions of information systems pdf
Five moral dimensions of information systems pdfFive moral dimensions of information systems pdf
Five moral dimensions of information systems pdf
 
UW Fair Use Guidelines
UW Fair Use Guidelines UW Fair Use Guidelines
UW Fair Use Guidelines
 
Topic-2.2_InfoPrivacy-IT-Ethics.pptx
Topic-2.2_InfoPrivacy-IT-Ethics.pptxTopic-2.2_InfoPrivacy-IT-Ethics.pptx
Topic-2.2_InfoPrivacy-IT-Ethics.pptx
 
Political Economy
Political EconomyPolitical Economy
Political Economy
 
Social Media London Presentation 5th April 2011
Social Media London Presentation 5th April 2011Social Media London Presentation 5th April 2011
Social Media London Presentation 5th April 2011
 

Plus de GiantSteps Media Technology Strategies

Copyright and Technology London 2012: Multiplatform Video Security - Susanne ...
Copyright and Technology London 2012: Multiplatform Video Security - Susanne ...Copyright and Technology London 2012: Multiplatform Video Security - Susanne ...
Copyright and Technology London 2012: Multiplatform Video Security - Susanne ...
GiantSteps Media Technology Strategies
 
International Perspectives on Digital Copyright Arthur Hoyle, Univ of Canberra
International Perspectives on Digital Copyright   Arthur Hoyle, Univ of CanberraInternational Perspectives on Digital Copyright   Arthur Hoyle, Univ of Canberra
International Perspectives on Digital Copyright Arthur Hoyle, Univ of Canberra
GiantSteps Media Technology Strategies
 
Copyright and Technology London 2012: Opening Remarks - Bill Rosenblatt, Gian...
Copyright and Technology London 2012: Opening Remarks - Bill Rosenblatt, Gian...Copyright and Technology London 2012: Opening Remarks - Bill Rosenblatt, Gian...
Copyright and Technology London 2012: Opening Remarks - Bill Rosenblatt, Gian...
GiantSteps Media Technology Strategies
 
Copyright and Technology London 2012: Content Identification - Werner Strydom...
Copyright and Technology London 2012: Content Identification - Werner Strydom...Copyright and Technology London 2012: Content Identification - Werner Strydom...
Copyright and Technology London 2012: Content Identification - Werner Strydom...
GiantSteps Media Technology Strategies
 
Copyright and Technology London 2012: Content Identification - Alex Terpstra,...
Copyright and Technology London 2012: Content Identification - Alex Terpstra,...Copyright and Technology London 2012: Content Identification - Alex Terpstra,...
Copyright and Technology London 2012: Content Identification - Alex Terpstra,...
GiantSteps Media Technology Strategies
 
Copyright and Technology London 2012: Rights Registries - Nicholas Bentley, C...
Copyright and Technology London 2012: Rights Registries - Nicholas Bentley, C...Copyright and Technology London 2012: Rights Registries - Nicholas Bentley, C...
Copyright and Technology London 2012: Rights Registries - Nicholas Bentley, C...
GiantSteps Media Technology Strategies
 
Copyright and Technology London 2012: Multiplatform Video Security - Jude Ume...
Copyright and Technology London 2012: Multiplatform Video Security - Jude Ume...Copyright and Technology London 2012: Multiplatform Video Security - Jude Ume...
Copyright and Technology London 2012: Multiplatform Video Security - Jude Ume...
GiantSteps Media Technology Strategies
 
Copyright and Technology London 2012: Rights Registries - Paul Jessop, County...
Copyright and Technology London 2012: Rights Registries - Paul Jessop, County...Copyright and Technology London 2012: Rights Registries - Paul Jessop, County...
Copyright and Technology London 2012: Rights Registries - Paul Jessop, County...
GiantSteps Media Technology Strategies
 

Plus de GiantSteps Media Technology Strategies (20)

Enabling Efficient and Fair Markets for Digital Content
Enabling Efficient and Fair Markets for Digital ContentEnabling Efficient and Fair Markets for Digital Content
Enabling Efficient and Fair Markets for Digital Content
 
Digital Disruption of the Book Publishing Industry
Digital Disruption of the Book Publishing IndustryDigital Disruption of the Book Publishing Industry
Digital Disruption of the Book Publishing Industry
 
Is the CJEU likely to extend the UsedSoft ruling to works other than software?
Is the CJEU likely to extend the UsedSoft ruling to works other than software?Is the CJEU likely to extend the UsedSoft ruling to works other than software?
Is the CJEU likely to extend the UsedSoft ruling to works other than software?
 
Copyright and Technology Conference Observation protocol & impact analysis
Copyright and Technology Conference Observation protocol & impact analysisCopyright and Technology Conference Observation protocol & impact analysis
Copyright and Technology Conference Observation protocol & impact analysis
 
The Carrot or the Stick: Opportunities and Challenges in Rights Technologies
The Carrot or the Stick: Opportunities and Challenges in Rights TechnologiesThe Carrot or the Stick: Opportunities and Challenges in Rights Technologies
The Carrot or the Stick: Opportunities and Challenges in Rights Technologies
 
The landscape of content protection technology
The landscape of content protection technologyThe landscape of content protection technology
The landscape of content protection technology
 
You bought it, but do you own it?
You bought it, but do you own it?You bought it, but do you own it?
You bought it, but do you own it?
 
Standards success factors
Standards success factorsStandards success factors
Standards success factors
 
Rights Technologies for E-Publishing
Rights Technologies for E-PublishingRights Technologies for E-Publishing
Rights Technologies for E-Publishing
 
Copyright and Technology London 2012: Multiplatform Video Security - Susanne ...
Copyright and Technology London 2012: Multiplatform Video Security - Susanne ...Copyright and Technology London 2012: Multiplatform Video Security - Susanne ...
Copyright and Technology London 2012: Multiplatform Video Security - Susanne ...
 
International Perspectives on Digital Copyright Arthur Hoyle, Univ of Canberra
International Perspectives on Digital Copyright   Arthur Hoyle, Univ of CanberraInternational Perspectives on Digital Copyright   Arthur Hoyle, Univ of Canberra
International Perspectives on Digital Copyright Arthur Hoyle, Univ of Canberra
 
Copyright and Technology London 2012: Opening Remarks - Bill Rosenblatt, Gian...
Copyright and Technology London 2012: Opening Remarks - Bill Rosenblatt, Gian...Copyright and Technology London 2012: Opening Remarks - Bill Rosenblatt, Gian...
Copyright and Technology London 2012: Opening Remarks - Bill Rosenblatt, Gian...
 
Copyright and Technology London 2012: Eric Walter, Hadopi
Copyright and Technology London 2012: Eric Walter, HadopiCopyright and Technology London 2012: Eric Walter, Hadopi
Copyright and Technology London 2012: Eric Walter, Hadopi
 
Copyright and Technology London 2012: Content Identification - Werner Strydom...
Copyright and Technology London 2012: Content Identification - Werner Strydom...Copyright and Technology London 2012: Content Identification - Werner Strydom...
Copyright and Technology London 2012: Content Identification - Werner Strydom...
 
Copyright and Technology London 2012: Content Identification - Alex Terpstra,...
Copyright and Technology London 2012: Content Identification - Alex Terpstra,...Copyright and Technology London 2012: Content Identification - Alex Terpstra,...
Copyright and Technology London 2012: Content Identification - Alex Terpstra,...
 
Copyright and Technology London 2012: Rights Registries - Nicholas Bentley, C...
Copyright and Technology London 2012: Rights Registries - Nicholas Bentley, C...Copyright and Technology London 2012: Rights Registries - Nicholas Bentley, C...
Copyright and Technology London 2012: Rights Registries - Nicholas Bentley, C...
 
Copyright and Technology London 2012: Multiplatform Video Security - Jude Ume...
Copyright and Technology London 2012: Multiplatform Video Security - Jude Ume...Copyright and Technology London 2012: Multiplatform Video Security - Jude Ume...
Copyright and Technology London 2012: Multiplatform Video Security - Jude Ume...
 
Copyright and Technology London 2012: Rights Registries - Paul Jessop, County...
Copyright and Technology London 2012: Rights Registries - Paul Jessop, County...Copyright and Technology London 2012: Rights Registries - Paul Jessop, County...
Copyright and Technology London 2012: Rights Registries - Paul Jessop, County...
 
Copyright and Technology 2011: Ron Wheeler Presentation
Copyright and Technology 2011: Ron Wheeler PresentationCopyright and Technology 2011: Ron Wheeler Presentation
Copyright and Technology 2011: Ron Wheeler Presentation
 
Copyright and Technology 2011: Ron Wheeler Presentation
Copyright and Technology 2011: Ron Wheeler PresentationCopyright and Technology 2011: Ron Wheeler Presentation
Copyright and Technology 2011: Ron Wheeler Presentation
 

Dernier

Dernier (20)

General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIFood Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 

Jean-Henry Morin, University of Geneva

  • 1. The Future of DRM : How would you like it “served” ? Deceptive, Dystopian or Hopeful Copyright & Technology 2010 Technology Track New York Jean-Henry Morin University of Geneva – CUI Dept. of Information Systems Jean-Henry.Morin@unige.ch http://jean-henry.com/ June 17, 2010
  • 2. How did we get here… … a dystopian scenario ? http://www.flickr.com/search/?q=DRM J.-H. Morin
  • 3. Extremism • Larry Lessig Speech at Italian Parliament: Internet is Freedom http://blip.tv/file/3332375/ VS 2 M iPads sold in 60 days !!! 3 J.-H. Morin
  • 4. Remix, © and Fair Use Universal Music VS dancing toddler • How creativity is being strangled by the law, TED Talk of Larry Lessig, March 2007 http://www.ted.com/talks/lang/eng/larry_lessig_says_the_law_is_strangling_creativity.html 4 J.-H. Morin
  • 5. Legal Complexity vs Global eServices led Economy • Total Control and Anticipation : • Unrealistic, impossible and undesirable Rules & Policies Content 100 kb 1 Mb J.-H. Morin
  • 6. Deceptive and Inapplicable Laws French HADOPI Three- Strikes invites itself to the land of Shakespeare UK Digital Economy Act (June 12, 2010) Regulatory Humility French Three-Strikes Graduated Response HADOPI Law • See also : Larry Lessig Speech at Italian Parliament: Internet is Freedom http://blip.tv/file/3332375/ 6 J.-H. Morin
  • 7. Doomed initiatives ! • Fundamental Rights: • Internet access has been recognized as a fundamental right, EU Parliament massively rejects three strikes graduated responses (481 votes against 25) • Technically inapplicable: • Deep Packet Inspection and false positives http://dmca.cs.washington.edu/ • Legally inapplicable: • Territorial nature of such laws VS global media • Germany rejects Three-Strikes approach (June, 2010) • ACTA : removed Three-Strikes provision from public draft 7 J.-H. Morin
  • 8. Where did we go wrong? • Where did User Experience go ? • Where did Superdistribution go ? • Where are the innovative Business Models, the Real-time Marketers, etc. ? • Did DRM curb those that it meant ? • Wasn’t DRM supposed to be an enabler ? J.-H. Morin
  • 9. Can we finally make DRM “FUN” (i.e., User Friendly ;-) ? • Assuming : • DRM is likely to stay and be needed (managed content) • Absolute security is neither achievable nor desirable • Given the right User Experience and Business Models most users smoothly comply (e.g., iTunes) • Most users aren’t criminals • We needed to take a step back to : • Critically re-think DRM • Reconsider the debate outside the either/or extremes of total vs. no security • Re-design DRM from ground up 9 J.-H. Morin
  • 10. Rethinking & Redesigning DRM • Acknowledge the Central role of the User and User Experience • Reinstate Users in their roles & rights • Presumption of innocence & the burden of proof • Fundamental guiding principle to Rethink and Redesign DRM : Feltens’ “Copyright Balance” principle (Felten, 2005) “Since lawful use, including fair use, of copyrighted works is in the public interest, a user wishing to make lawful use of copyrighted material should not be prevented from doing so by any DRM system.” • Claim and Proposition : • Put the trust back into the hands of the users • Reverse the distrust assumption • Requires a major paradigm shift & change of mindset 10 J.-H. Morin
  • 12. Rethinking & Redesigning DRM (cont.) • Exception Management in DRM environments, mixing water with fire ? Not necessarily ! • Reversing the distrust assumption puts the user “in charge”, facing his responsibilities • Allow users to make Exception Claims, granting them Short Lived Licenses based on some form of logging and monitoring • Use Credentials as tokens for logging to detect and monitor abuses • Credential are Revocable in order to deal with abuse and misuse situations • Mutually acknowledged need for managed content while allowing all actors a smooth usability experience (Morin and Pawlak, 2007, 2008); (Morin 2008, 2009) 12 J.-H. Morin
  • 13. Exception Management in DRM Environments • What is an Exception ? • A claim made by a user wishing to rightfully access / use content • Based on « real world » credential patterns • Delegation model based on chained authorities • Credential authorities closer to the users • Locally managed and held (credential store) • Short lived or fixed life time • Revocable • Late binding (enforcement point) • Model is auditable for abuse and includes revocation capabilities • Burden of proof on the party having a justifiable reason to claim abuse (presumption of innocence) • Monitoring in near real time of security policies 13 J.-H. Morin
  • 14. Conclusion • Can DRM “go green” before we all “go dark” ? • If so, we might be able to address some “Serious” societal issues while restoring User Experience along the way ! • Moving forward : A Call For ACTION ! • Critically re-think and re-design DRM out of the box • Involve equally all stakeholders • Find new innovative Business Models • Limit law to a “justifiable” level • Remember technology is just the means • What Information Society do we want to live in ? 14 J.-H. Morin
  • 15. Security is bypassed not attacked Inspired by Adi Shamir, Turing Award lecture, 2002 Thank you Join the Conversation… Jean-Henry Morin University of Geneva – CUI Dept. of Information Systems Jean-Henry.Morin@unige.ch http://jean-henry.com/ 15 J.-H. Morin