Content in lockdown

It's easy to write off content owners as a money-grubbing cartel; but the work they do to protect what they own matters

I'm increasingly aghast at the erosion of the traditional freedom we've enjoyed to do whatever we please with our personal computers -- but intrigued by the science behind it.

My latest revelation came during a recent visit to AMD for a day of briefings, mostly about the Barcelona quad-core Opteron and the Torrenza direct-connect coprocessor interface. During that visit, I got the briefest of updates on ATI's new GPU (graphics processing unit) technology. It will ship with software that plays movies on Blu-ray discs. The AMD rep spelled it out in words that would have been undiplomatic coming from me: He said that the new chips will "block unauthorized access to the frame buffer." In short, that means an unauthorized party can't save the contents of the display to a file on disk unless the content owner approves it.

There is a short list of parties who will be unauthorized to access your frame buffer: You. There is a long list of parties who are authorized to access your frame buffer, and that list includes Microsoft, Apple, AMD, Intel, ATI, NVidia, Sony Pictures, Paramount, HBO, CBS, Macrovision, and all other content owners and enablers that want your machine to themselves whenever you're watching, listening to, reading, or shooting monsters with their products.

Video, audio, and software will all drive a similar road, that being a single, unmodifiable path from the original encoded, licensed source to rendering, and on to delivery (display, headphones, portable device, printer, or memory for execution of software). This bit of progress seems to have little relevance to IT until you expand the meaning of the word "content" to encompass that which you create that is consumed by human eyes and ears.

As people working the IT side of business, academia, and government, we know all too well that personal and customer information, trade secrets, and other varieties of confidential data can be intercepted using tricks similar to those that are used to swipe movies and music. IT content needs that direct path from source media to delivery, too, so that possession of encoded media -- say, a Blu-ray disc -- is critical to viewing, listening, or executing.

For example, right now there is no unbreakable way to arrange that a PDF or other sort of viewable document can't be copied or at least stored as a snapshot of the display. The audio portion of a classified presentation can be recorded as easily as hooking an analog or digital recorder into the headphone output. HTML would be a much more viable means of rendering rich content if it could be protected. Rich document and multimedia rendering engines would know if they were talking to delivery devices that were specifically matched with physically secure equipment. If a renderer couldn't verify that a display or headset that it trusts was the sole source of delivery, nothing would appear or be heard.

It's easy to write off entertainment content owners and distributors as a money-grubbing cartel; for the most part, they are. But the technical work they do to protect what they own matters, even that work which we find distasteful given needless extremes of use such as pay-per-single-view. They've got the money to drive the science of data and content protection. If they perfect that unbreakable link between the media and the delivery end point, if there's never another DVD image splattered all over the Internet, then IT will be able to make a promise that, to date, it couldn't: Nobody can view or copy your data without authorization.

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.
Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Tom Yager

InfoWorld
Show Comments

Father’s Day Gift Guide

Brand Post

Bitdefender 2019

Bitdefender solutions stop attacks before they even begin! Get cybersecurity that 500 MILLION users already have and trust.

Most Popular Reviews

Latest Articles

Resources

PCW Evaluation Team

Luke Hill

MSI GT75 TITAN

I need power and lots of it. As a Front End Web developer anything less just won’t cut it which is why the MSI GT75 is an outstanding laptop for me. It’s a sleek and futuristic looking, high quality, beast that has a touch of sci-fi flare about it.

Emily Tyson

MSI GE63 Raider

If you’re looking to invest in your next work horse laptop for work or home use, you can’t go wrong with the MSI GE63.

Laura Johnston

MSI GS65 Stealth Thin

If you can afford the price tag, it is well worth the money. It out performs any other laptop I have tried for gaming, and the transportable design and incredible display also make it ideal for work.

Andrew Teoh

Brother MFC-L9570CDW Multifunction Printer

Touch screen visibility and operation was great and easy to navigate. Each menu and sub-menu was in an understandable order and category

Louise Coady

Brother MFC-L9570CDW Multifunction Printer

The printer was convenient, produced clear and vibrant images and was very easy to use

Edwina Hargreaves

WD My Cloud Home

I would recommend this device for families and small businesses who want one safe place to store all their important digital content and a way to easily share it with friends, family, business partners, or customers.

Featured Content

Product Launch Showcase

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?