Conclusion
To thwart piracy the entertainment industry must keep distribution costs high, reduce the size of distribution networks, and (if possible) raise the cost of extracting content. However, if ‘trusted computing’ mechanisms deliver on their promises, large peer-to-peer distribution networks will be more robust against attack and trading in pirated entertainment will become safer, more reliable, and thus cheaper. Since it will always be possible for some individuals to extract content from the media on which it is stored, future entertainment may be more vulnerable to piracy than before the introduction of ‘trusted computing’ technologies.
‘Trusted computing’ technologies promise to enable media players within a PC to execute with the same level of resistance to piracy that one would expect from a proprietary hardware player.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Alliance, The Trusted Computing Platform (2000). Building a foundation of trust in the PC Technical report.
Anderson, Ross J. (2001). Security Engineering: A Guide to Building Dependable Distributed Systems. John Wiley & Sons, Inc., first edition.
Arbaugh, William A., Farber, David J., and Smith, Jonathan M. (1997). A secure and reliable bootstrap architecture. In Proceedings of the IEEE Symposium on Security and Privacy, pages 65–71.
Borland, John (2002a). Customers put kibosh on anti-copy CD. CNET News.Com.
Borland, John (2002b). U.S. liability looms over Kazaa. CNET News.Com.
Borland, John (2003). Fingerprinting P2P pirates. CNET News.Com.
Cornelli, Fabrizio, Damiani, Ernesto, Capitani di Vimercati, Sabrina De, Paraboschi, Stefano, and Samarati, Pierangela (2002). Choosing reputable servents in a P2P network. In Proceedings of The Eleventh International World Wide Web Conference.
Corporation, Macrovision. Solutions > video technology > copy protection. http://www.macrovision.com/solutions/video/copyprotect/index.php3.
Dean, Drew and Stubblefield, Adam (2001). Using client puzzles to protect TLS. In Proceedings of the 10th USENIX Security Symposium.
Dwork, Cynthia and Naor, Moni (1992). Pricing via processing or combatting junk mail. In Proceedings of Advances in Cryptology-CRYPTO’ 92, 12th Annual International Cryptology Conference, volume 740 of Lecture Notes in Computer Science, pages 137–147. Springer.
Hansen, Evan (2001). Ban on DVD-cracking code upheld. CNET News.Com.
Harmon, Amy (2001). Judges weigh copyright suit on unlocking DVD shield. The New York Times.
Harmon, Amy (2003a). Music swappers get a message on PC screens: Stop it now. The New York Times.
Harmon, Amy (2003b). Record concerns sue to end piracy. The New York Times.
Juels, Ari and Brainard, John (1999). Client puzzles: A cryptographic countermeasure against connection depletion attacks. In Proceedings of the 1999 Network and Distributed System Security Symposium.
Kamvar, Sepandar D., Schlosser, Mario T., and Garcia-Molina, Hector (2003). The EigenTrust algorithm for reputation management in P2P networks. In Proceedings of The Twelfth International World Wide Web Conference.
Lie, David, Thekkath, Chandramohan A., Mitchell, Mark, Lincoln, Patrick, Boneh, Dan, Mitchell, John C., and Horowitz, Mark (2000). Architectural support for copy and tamper resistant software. In ASPLOSIX Proceedings of the 9th International Conference on Architectural Support for Programming Languages and Operating Systems, pages 168–177.
McCullagh, Declan (2002). File-swapping foes exert P2P pressure. CNET News.Com.
Olsen, Stefanie (2002). Record labels sue Napster investor. CNET News.Com.
Reiter, Michael K. and Rubin, Aviel D. (1998). Crowds: anonymity for Web transactions. ACM Transactions on Information and System Security, 1(1):66–92.
Suh, G. Edward, Clarke, Dwaine, Gassend, Blaise, van Dijk, Marten, and Devadas, Srinivas (2003). AEGIS: Architecture for tamper-evident and tamper-resistant processing. In 17th Annual ACM International Conference on Supercomputing.
Syverson, Paul F., Goldschlag, David M., and Reed, Michael G. (1997). Anonymous connections and onion routing. In Proceedings of the IEEE Symposium on Security and Privacy, pages 44–54.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer Science + Business Media, Inc.
About this chapter
Cite this chapter
Schechter, S.E., Greenstadt, R.A., Smith, M.D. (2004). Trusted Computing, Peer-to-Peer Distribution, and The Economics of Pirated Entertainment. In: Camp, L.J., Lewis, S. (eds) Economics of Information Security. Advances in Information Security, vol 12. Springer, Boston, MA. https://doi.org/10.1007/1-4020-8090-5_5
Download citation
DOI: https://doi.org/10.1007/1-4020-8090-5_5
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4020-8089-0
Online ISBN: 978-1-4020-8090-6
eBook Packages: Springer Book Archive