Hacker News new | past | comments | ask | show | jobs | submit login

>Can Apple differentiate between DRM screen recording and DRM screenshots? Can Apple differentiate between 30-second promotional clips and longer recordings, or rate limit N captures per M wallclock time? Can rightsholders add metadata to enable screenshots on a per-title basis?

DRM implementers can barely scrape together a DRM implementation that works as intended, as evidenced by all the 4K rips that are available on torrent sites. What makes you think they're competent enough to implement all the stuff you're suggesting, for marginal gains? As much as people like to dream up hypotheticals why screenshots provide "free PR" or whatever, I seriously doubt whether it's something studios care about.




> What makes you think they're competent enough to implement all the stuff you're suggesting

See Nvidia GPU licensing and market segmentation of features, enforced by GPU firmware, which yields them 50% operating margins.

See the enterprise browser market (e.g. Talon, Island), which has granular policy and security controls for web content.

DRM is typically rooted in some kind of secure enclave, designed for granular policy enforcement.


>See Nvidia GPU licensing and market segmentation of features, enforced by GPU firmware, which yields them 50% operating margins.

Disabling features, possibly at the hardware level with e-fuses is far more straightforward than trying to allow one sort framebuffer capture (screenshots) but not another (video recording).

>See the enterprise browser market (e.g. Talon, Island), which has granular policy and security controls for web content.

How secure are they though? It's one thing to make a chromium fork with "if is_porn_site(url): block()", it's whole different thing to implement a cryptographic system that can withstand physical attacks.


> Disabling features, possibly at the hardware level with e-fuses

They have a common hardware architecture configured by software (Ada), https://static.sched.com/hosted_files/riscvsummit2024/fe/Key...

> How secure are they though

Good question. That depends on whether enterprise insiders have more or less economic incentives than media pirates. One of the enterprise browser vendors exited for ~600M USD to Palo Alto, so perhaps the security bar is only at the level of corporate firewall rather than gaming console.




Consider applying for YC's Summer 2025 batch! Applications are open till May 13

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: