473,396 Members | 2,039 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,396 software developers and data experts.

Copyright Protection ? Is it really possible ?


I was wondering whether I can postulate:
A tamperproof copyright protection of any kind of media is impossible.
Whatever you do with the original media it will have to be converted
to something intelligible to human beings just before it leaves the
computer or the media player. As long as this is going to happen I can
either read the audio or video buffer and make a copy of the original
data.
Is there any point doing research on copyright protection ?

(Not sure whether this is right group to post this message)

Apr 13 '07 #1
1 1070
al*******@rediffmail.com writes:
I was wondering whether I can postulate:
A tamperproof copyright protection of any kind of media is impossible.
Whatever you do with the original media it will have to be converted
to something intelligible to human beings just before it leaves the
computer or the media player. As long as this is going to happen I can
either read the audio or video buffer and make a copy of the original
data.
Is there any point doing research on copyright protection ?

(Not sure whether this is right group to post this message)
It isn't.

--
Keith Thompson (The_Other_Keith) ks***@mib.org <http://www.ghoti.net/~kst>
San Diego Supercomputer Center <* <http://users.sdsc.edu/~kst>
"We must do something. This is something. Therefore, we must do this."
-- Antony Jay and Jonathan Lynn, "Yes Minister"
Apr 13 '07 #2

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

75
by: Massimo | last post by:
I'm planning to develop a .NET application using C#, in order to sell it as a shareware and/or as a full package, so I'll need a good way to protect it against piracy. I know some ways to protect...
0
by: SoftComplete Development | last post by:
SoftComplete Development Updates EXECryptor to v. 2.1.20 Software piracy! Cracked serial numbers! Thousands of commercial products are posted on the warez sites and become available to all who...
4
by: Jacob | last post by:
I am writing commersial code for clients. It sometime seems like common practice to add a copyright header to each source file (.cpp and .h). The header might look something like this: /* *...
159
by: petantik | last post by:
Are there any commercial, or otherwise obfuscators for python source code or byte code and what are their relative advantages or disadvantages. I wonder because there are some byte code protection...
13
by: Zellan | last post by:
I am starting a small business designing Access databases and have a potential client where several different users would be able to use the same database I have designed. I want to know what I...
9
by: Saso Zagoranski | last post by:
Hi! I have recently completed an application, written in C#. When I opened one of the files with a hex editor I was amazed by the lack of protection for the assemblies. My application uses SQL...
1
by: Martin | last post by:
Dear Group Sory for posting this here. Hope it's not too off-topic but thought that someone minght know about. Can you give tips about intellectual property / copyright registration for...
3
by: Tom the Canuck | last post by:
I am writing code for a friend of mine. We may want to sell it. The demo version will have a few data files in sub folders with a TXT extension. If the prospective buyers want to, they can add...
19
by: Neelesh Bodas | last post by:
This is not exactly a question on C++ std, rather it is a "metaquestion" on C++ std. The C++ ISO std has a copyright notice saying that "No part of this publication may be reproduced in any...
0
by: Charles Arthur | last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
1
by: nemocccc | last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
0
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
0
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers,...
0
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows...
0
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each...
0
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome a new...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.