Copy Protected
   HOME

TheInfoList



OR:

Copy protection, also known as content protection, copy prevention and copy restriction, describes measures to enforce
copyright A copyright is a type of intellectual property that gives its owner the exclusive right to copy, distribute, adapt, display, and perform a creative work, usually for a limited time. The creative work may be in a literary, artistic, education ...
by preventing the reproduction of software, films, music, and other media. Copy protection is most commonly found on
videotape Videotape is magnetic tape used for storing video and usually sound in addition. Information stored can be in the form of either an analog or digital signal. Videotape is used in both video tape recorders (VTRs) and, more commonly, videocassett ...
s,
DVD The DVD (common abbreviation for Digital Video Disc or Digital Versatile Disc) is a digital optical disc data storage format. It was invented and developed in 1995 and first released on November 1, 1996, in Japan. The medium can store any kind ...
s,
Blu-ray discs The Blu-ray Disc (BD), often known simply as Blu-ray, is a digital optical disc data storage format. It was invented and developed in 2005 and released on June 20, 2006 worldwide. It is designed to supersede the DVD format, and capable of sto ...
, HD-DVDs, computer software discs, video game discs and cartridges,
audio CD Compact Disc Digital Audio (CDDA or CD-DA), also known as Digital Audio Compact Disc or simply as Audio CD, is the standard format for audio compact discs. The standard is defined in the ''Red Book'', one of a series of Rainbow Books (named fo ...
s and some VCDs. Some methods of copy protection have also led to criticism because it caused inconvenience for paying consumers or secretly installed additional or unwanted software to detect copying activities on the consumer's computer. Making copy protection effective while protecting consumer rights remains a problem with media publication.


Terminology

Media corporations have always used the term copy protection, but critics argue that the term tends to sway the public into identifying with the publishers, who favor restriction technologies, rather than with the users. Copy prevention and copy control may be more neutral terms. "Copy protection" is a misnomer for some systems, because any number of copies can be made from an original and all of these copies will work, but only in one computer, or only with one
dongle A dongle is a small piece of computer hardware that connects to a port on another device to provide it with additional functionality, or enable a pass-through to such a device that adds functionality. In computing, the term was initially synonym ...
, or only with another device that cannot be easily copied. The term is also often related to, and confused with, the concept of
digital rights management Digital rights management (DRM) is the management of legal access to digital content. Various tools or technological protection measures (TPM) such as access control technologies can restrict the use of proprietary hardware and copyrighted works. ...
. Digital rights management is a more general term because it includes all sorts of management of works, including copy restrictions. Copy protection may include measures that are not digital. A more appropriate term may be "technological protection measures" (TPMs), which is often defined as the use of technological tools in order to restrict the use or access to a work.


Business rationale

Unauthorized copying and distribution accounted for $2.4 billion per year in lost revenue in the United States alone in 1990,Greg Short, Comment, Combatting Software Piracy: Can Felony Penalties for Copyright Infringement Curtail the Copying of Computer Software?, 10 Santa Clara Computer & High Tech. L.J. 221 (1994). Available at: http://digitalcommons.law.scu.edu/chtlj/vol10/iss1/7 and is assumed to be causing impact on revenues in the
music Music is generally defined as the art of arranging sound to create some combination of form, harmony, melody, rhythm or otherwise expressive content. Exact definitions of music vary considerably around the world, though it is an aspect ...
and the
video game industry The video game industry encompasses the development, marketing, and monetization of video games. The industry encompasses dozens of job disciplines and thousands of jobs worldwide. The video game industry has grown from niches to mainstream. , ...
, leading to proposal of stricter copyright laws such as
PIPA The pipa, pípá, or p'i-p'a () is a traditional Chinese musical instrument, belonging to the plucked category of instruments. Sometimes called the "Chinese lute", the instrument has a pear-shaped wooden body with a varying number of frets rang ...
. Copy protection is most commonly found on
videotape Videotape is magnetic tape used for storing video and usually sound in addition. Information stored can be in the form of either an analog or digital signal. Videotape is used in both video tape recorders (VTRs) and, more commonly, videocassett ...
s, DVDs, computer software discs, video game discs and cartridges, audio CDs and some VCDs. Many media formats are easy to copy using a machine, allowing consumers to distribute copies to their friends, a practice known as "casual copying". Companies publish works under copyright protection because they believe that the cost of implementing the copy protection will be less than the revenue produced by consumers who buy the product instead of acquiring it through casually copied media. Opponents of copy protection argue that people who obtain free copies only use what they can get for free and would not purchase their own copy if they were unable to obtain a free copy. Some even argue that free copies increase profit; people who receive a free copy of a music CD may then go and buy more of that band's music, which they would not have done otherwise. Some publishers have avoided copy-protecting their products on the theory that the resulting inconvenience to their users outweighs any benefit of frustrating "casual copying". From the perspective of the end user, copy protection is always a cost.
DRM DRM may refer to: Government, military and politics * Defense reform movement, U.S. campaign inspired by Col. John Boyd * Democratic Republic of Madagascar, a former socialist state (1975–1992) on Madagascar * Direction du renseignement milita ...
and license managers sometimes fail, are inconvenient to use, and may not afford the user all of the legal use of the product they have purchased. The term ''copy protection'' refers to the technology used to attempt to frustrate copying, and not to the legal remedies available to publishers or authors whose copyrights are violated. Software usage models range from node locking to floating licenses (where a fixed number licenses can be concurrently used across an enterprise), grid computing (where multiple computers function as one unit and so use a common license) and electronic licensing (where features can be purchased and activated online). The term ''license management'' refers to broad platforms which enable the specification, enforcement and tracking of
software license A software license is a legal instrument (usually by way of contract law, with or without printed material) governing the use or redistribution of software. Under United States copyright law, all software is copyright protected, in both source ...
s. To safeguard copy protection and license management technologies themselves against tampering and hacking, software anti-tamper methods are used. Floating licenses are also being referred to as ''Indirect Licenses'', and are licenses that at the time they are issued, there is no actually user who will use them. That has some technical influence over some of their characteristics. ''Direct Licenses'' are issued after a certain user requires it. As an example, an activated
Microsoft Microsoft Corporation is an American multinational technology corporation producing computer software, consumer electronics, personal computers, and related services headquartered at the Microsoft Redmond campus located in Redmond, Washing ...
product, contains a ''Direct License'' which is locked to the PC where the product is installed. From business standpoint, on the other hand, some services now try to monetize on additional services other than the media content so users can have better experience than simply obtaining the copied product.


Technical challenges

From a technical standpoint, it seems impossible to completely prevent users from making copies of the media they purchase, as long as a "writer" is available that can write to blank media. All types of media require a "player"—a CD player, DVD player, videotape player, computer or
video game console A video game console is an electronic device that Input/output, outputs a video signal or image to display a video game that can be played with a game controller. These may be home video game console, home consoles, which are generally placed i ...
—which must be able to read the media in order to display it to a human. Logically, a player could be built that reads the media and then writes an exact copy of what was read to the same type of media. At a minimum, digital copy protection of non-interactive works is subject to the
analog hole The analog hole (also known as the analog loophole or analog gap) is a perceived fundamental and inevitable vulnerability in copy protection schemes for noninteractive works in digital formats which can be exploited to duplicate copy-protected wo ...
: regardless of any digital restrictions, if music can be heard by the human ear, it can also be recorded (at the very least, with a microphone and tape recorder); if a film can be viewed by the human eye, it can also be recorded (at the very least, with a video camera and recorder). In practice, almost-perfect copies can typically be made by tapping into the analog output of a player (e.g. the
speaker Speaker may refer to: Society and politics * Speaker (politics), the presiding officer in a legislative assembly * Public speaker, one who gives a speech or lecture * A person producing speech: the producer of a given utterance, especially: ** I ...
output or
headphone Headphones are a pair of small loudspeaker drivers worn on or around the head over a user's ears. They are electroacoustic transducers, which convert an electrical signal to a corresponding sound. Headphones let a single user listen to an au ...
jacks) and, once redigitized into an unprotected form, duplicated indefinitely. Copying
text-based In computing, text-based user interfaces (TUI) (alternately terminal user interfaces, to reflect a dependence upon the properties of computer terminals and not just text), is a retronym describing a type of user interface (UI) common as an ear ...
content in this way is more tedious, but the same principle applies: if it can be printed or displayed, it can also be scanned and OCRed. With basic software and some patience, these techniques can be applied by a typical computer-literate user. Since these basic technical facts exist, it follows that a determined individual will definitely succeed in copying any media, given enough time and resources. Media publishers understand this; copy protection is not intended to stop professional operations involved in the unauthorized mass duplication of media, but rather to stop "casual copying". Copying of information goods which are downloaded (rather than being mass-duplicated as with physical media) can be inexpensively customized for each download, and thus restricted more effectively, in a process known as "
traitor tracing Traitor tracing schemes help trace the source of leaks when secret or proprietary data is sold to many customers. In a traitor tracing scheme, each customer is given a different personal decryption key. (Traitor tracing schemes are often combined ...
". They can be encrypted in a fashion which is unique for each user's computer, and the decryption system can be made
tamper-resistant Tamperproofing, conceptually, is a methodology used to hinder, deter or detect unauthorised access to a device or circumvention of a security system. Since any device or system can be foiled by a person with sufficient knowledge, equipment, and ti ...
.


Methods

For information on individual protection schemes and technologies, see
List of copy protection schemes This is a list of notable copy protection schemes for various medias. Computer Software protection schemes ; Dongle : Hardware key containing electronic serial number required to run the software; relatively expensive and has no recovery when the ...
or relevant category page.


Computer software

Copy protection for computer software, especially for games, has been a long cat-and-mouse struggle between publishers and crackers. These were (and are) programmers who defeated copy protection on software as a hobby, add their
alias Alias may refer to: * Pseudonym * Pen name * Nickname Arts and entertainment Film and television * ''Alias'' (2013 film), a 2013 Canadian documentary film * ''Alias'' (TV series), an American action thriller series 2001–2006 * ''Alias the ...
to the title screen, and then distribute the "cracked" product to the network of
warez Warez is a common computing and broader cultural term referring to pirated software (i.e. illegally copied, often after deactivation of anti-piracy measures) that is distributed via the Internet. Warez is used most commonly as a noun, a plural ...
BBSes or Internet sites that specialized in distributing unauthorized copies of software.


Early ages

When computer software was still distributed in audio cassettes, audio copying was unreliable, while digital copying was time consuming. Software prices were comparable with audio cassette prices.Copy Protection: A History and Outlook http://www.studio-nibble.com/countlegger/01/HistoryOfCopyProtection.html To make digital copying more difficult, many programs used non-standard loading methods (loaders incompatible with standard BASIC loaders, or loaders that used different transfer speed). Unauthorized software copying began to be a problem when floppy disks became the common storage media. The ease of copying depended on the system;
Jerry Pournelle Jerry Eugene Pournelle (; August 7, 1933 – September 8, 2017) was an American scientist in the area of operations research and human factors research, a science fiction writer, essayist, journalist, and one of the first bloggers. In the 1960s ...
wrote in ''
BYTE The byte is a unit of digital information that most commonly consists of eight bits. Historically, the byte was the number of bits used to encode a single character of text in a computer and for this reason it is the smallest addressable unit ...
'' in 1983 that "
CP/M CP/M, originally standing for Control Program/Monitor and later Control Program for Microcomputers, is a mass-market operating system created in 1974 for Intel 8080/ 85-based microcomputers by Gary Kildall of Digital Research, Inc. Initial ...
doesn't lend itself to copy protection" so its users "haven't been too worried" about it, while "
Apple An apple is an edible fruit produced by an apple tree (''Malus domestica''). Apple fruit tree, trees are agriculture, cultivated worldwide and are the most widely grown species in the genus ''Malus''. The tree originated in Central Asia, wh ...
users, though, have always had the problem. So have those who used TRS-DOS, and I understand that
MS-DOS MS-DOS ( ; acronym for Microsoft Disk Operating System, also known as Microsoft DOS) is an operating system for x86-based personal computers mostly developed by Microsoft. Collectively, MS-DOS, its rebranding as IBM PC DOS, and a few ope ...
has copy protection features".


1980s Locksmith

Pournelle disliked copy protection and, except for games, refused to review software that used it. He did not believe that it was useful, writing in 1983 that "For every copy protection scheme there's a hacker ready to defeat it. Most involve so-called nibble/nybble copiers, which try to analyze the original disk and then make a copy". IBM's
Don Estridge Philip Donald Estridge (June 23, 1937 – August 2, 1985), known as Don Estridge, was an American computer engineer who led development of the original IBM Personal Computer (PC), and thus is known as the "father of the IBM PC". His decisions dra ...
agreed: "I guarantee that whatever scheme you come up with will take less time to break than to think of it." While calling piracy "a threat to software development. It's going to dry up the software", he said "It's wrong to copy-protect programs ... There ought to be some way to stop iracywithout creating products that are unusable." Copy protection sometimes caused software not to run on clones, such as the Apple II-compatible
Laser 128 The Laser 128 is an Apple II clone, released by VTech in 1986 and comparable to the Apple IIe and Apple IIc. Description VTech Laser 128 has 128 kB of RAM. Like the Apple IIc, it is a one-piece semi-portable design with a carrying handle and ...
, or even the genuine
Commodore 64 The Commodore 64, also known as the C64, is an 8-bit home computer introduced in January 1982 by Commodore International (first shown at the Consumer Electronics Show, January 7–10, 1982, in Las Vegas). It has been listed in the Guinness ...
with certain peripherals. In 1989
Gilman Louie Gilman Louie (born 1960) is an American technology venture capitalist who got his start as a video game designer and then co-founded and ran the CIA venture capital fund In-Q-Tel. With his company Nexa Corporation he designed and developed multipl ...
, head of Spectrum Holobyte, stated that copy protection added about $0.50 per copy to the cost of production of a game. Other software relied on complexity; ''
Antic Alphanumeric Television Interface Controller (ANTIC) is an LSI ASIC dedicated to generating 2D computer graphics to be shown on a television screen or computer display. Under the direction of Jay Miner, the chip was designed in 1977-1978 by ...
'' in 1988 observed that '' WordPerfect'' for the
Atari ST The Atari ST is a line of personal computers from Atari Corporation and the successor to the Atari 8-bit family. The initial model, the Atari 520ST, had limited release in April–June 1985 and was widely available in July. It was the first pers ...
"is almost unusable without its manual of over 600 pages!". (The magazine was mistaken; the ST version was so widely pirated that the company threatened to discontinue it.) To limit reusing activation keys to install the software on multiple machines, it has been attempted to tie the installed software to a specific machine by involving some unique feature of the machine.
Serial number A serial number is a unique identifier assigned incrementally or sequentially to an item, to ''uniquely'' identify it. Serial numbers need not be strictly numerical. They may contain letters and other typographical symbols, or may consist enti ...
in
ROM Rom, or ROM may refer to: Biomechanics and medicine * Risk of mortality, a medical classification to estimate the likelihood of death for a patient * Rupture of membranes, a term used during pregnancy to describe a rupture of the amniotic sac * ...
could not be used because some machines do not have them. Some popular surrogate for a machine serial number were date and time (to the second) of initialization of the
hard disk A hard disk drive (HDD), hard disk, hard drive, or fixed disk is an electro-mechanical data storage device that stores and retrieves digital data using magnetic storage with one or more rigid rapidly rotating platters coated with magnet ...
or
MAC address A media access control address (MAC address) is a unique identifier assigned to a network interface controller (NIC) for use as a network address in communications within a network segment. This use is common in most IEEE 802 networking techno ...
of Ethernet cards (although this is programmable on modern cards). With the rise of
virtualization In computing, virtualization or virtualisation (sometimes abbreviated v12n, a numeronym) is the act of creating a virtual (rather than actual) version of something at the same abstraction level, including virtual computer hardware platforms, stor ...
, however, the practice of locking has to add to these simple hardware parameters to still prevent copying.


Early video games

During the 1980s and 1990s, video games sold on
audio cassette The Compact Cassette or Musicassette (MC), also commonly called the tape cassette, cassette tape, audio cassette, or simply tape or cassette, is an analog magnetic tape recording format for audio recording and playback. Invented by Lou Otten ...
and
floppy disk A floppy disk or floppy diskette (casually referred to as a floppy, or a diskette) is an obsolescent type of disk storage composed of a thin and flexible disk of a magnetic storage medium in a square or nearly square plastic enclosure lined w ...
s were sometimes protected with an external user-interactive method that demanded the user to have the original package or a part of it, usually the manual. Copy protection was activated not only at installation, but every time the game was executed. Several imaginative and creative methods have been employed, in order to be both fun and hard to copy. These include: * The most common method was requiring the player to enter a specific word (often chosen at random) from the manual. A variant of this technique involved matching a picture provided by the game to one in the manual and providing an answer pertaining to the picture ('' Ski or Die'', ''
4D Boxing ''4D Sports Boxing'' is a 3D boxing video game of the ''4D Sports'' series, with motion capture animation, developed by Distinctive Software. The game is part of the ''4D Sports'' series along with '' 4D Sports Driving'' and '' 4D Sports Tennis' ...
'' and '' James Bond 007; the Stealth Affair'' used this technique). ''
Buzz Aldrin's Race Into Space ''Buzz Aldrin's Race Into Space'', frequently abbreviated ''BARIS'', is a 1993 space simulation strategy game for MS-DOS. The player takes the role of Administrator of NASA or head of the Soviet space program with the ultimate goal of being the ...
'' (in the floppy version but not the CD version) required the user to input an astronaut's total duration in space (available in the manual) before the launch of certain missions. If the answer were incorrect, the mission would suffer a catastrophic failure. * Manuals containing information and hints vital to the completion of the game, like answers to riddles (''
Conquests of Camelot ''Conquests of Camelot: The Search for the Grail'' is a graphic adventure game released in 1990 by Sierra On-Line. It was the first game in the ''Conquests'' series designed by Christy Marx and her husband Peter Ledger. The only other game in the ...
'', ''
King's Quest 6 ''King's Quest VI: Heir Today, Gone Tomorrow'' is a point-and-click adventure game, first released in 1992 as the sixth installment in the ''King's Quest'' series produced by Sierra On-Line. Written by Roberta Williams and Jane Jensen, ''King's ...
''), recipes of spells ('' King's Quest 3''), keys to deciphering non-Latin writing systems ('' Ultima'' series, see also Ultima writing systems), maze guides ('' Manhunter''), dialogue spoken by other characters in the game (''
Wasteland Wasteland or waste land may refer to: * Desert or barren area * an uncultivated area of land, whether wooded or not, whether common land or not Art, entertainment, and media Comics * ''Wasteland'' (DC Comics), 1987–1989 anthology-style horror ...
'', ''
Dragon Wars ''Dragon Wars'' is a fantasy role-playing video game developed by Rebecca Heineman and published by Interplay Productions in 1989 and distributed by Activision. Gameplay The player starts the game with a party of four characters, who can be eith ...
''), excerpts of the storyline (most ''
Advanced Dungeons and Dragons Several different editions of the ''Dungeons & Dragons'' (''D&D'') fantasy role-playing game have been produced since 1974. The current publisher of ''D&D'', Wizards of the Coast, produces new materials only for the most current edition of the ga ...
'' games and ''
Wing Commander I ''Wing Commander'' is the first game in Chris Roberts' space flight simulation ''Wing Commander'' franchise'' by Origin Systems. The game was first released for MS-DOS on September 26, 1990 and was later ported to the Amiga, CD32 ( 256-color ...
''), or a radio frequency to use to communicate with a character to further a game (''
Metal Gear Solid is a series of techno-thriller stealth games created by Hideo Kojima. Developed and published by Konami, the first game, ''Metal Gear'', was released in 1987 for MSX home computers. The player often takes control of a special forces opera ...
''). * Some sort of code with symbols, not existing on the keyboard or the
ASCII ASCII ( ), abbreviated from American Standard Code for Information Interchange, is a character encoding standard for electronic communication. ASCII codes represent text in computers, telecommunications equipment, and other devices. Because of ...
code. This code was arranged in a grid, and had to be entered via a
virtual keyboard A virtual keyboard is a software component that allows the Input device, input of characters without the need for physical keys. The interaction with the virtual Computer keyboard, keyboard happens mostly via a touchscreen interface, but can also ...
at the request "''What is the code at line 3 row 2?''". These tables were printed on dark paper (''
Maniac Mansion ''Maniac Mansion'' is a 1987 graphic adventure video game developed and published by Lucasfilm Games. It follows teenage protagonist Dave Miller as he attempts to rescue his girlfriend Sandy Pantz from a mad scientist, whose mind has been ensla ...
'', ''
Uplink In a telecommunications network, a link is a communication channel that connects two or more devices for the purpose of data transmission. The link may be a dedicated physical link or a virtual circuit that uses one or more physical links or shar ...
''), or were visible only through a red transparent layer (''
Indiana Jones and the Last Crusade ''Indiana Jones and the Last Crusade'' is a 1989 American action film, action-adventure film directed by Steven Spielberg, from a story co-written by executive producer George Lucas. It is the third installment in the Indiana Jones, ''Indiana ...
''), making the paper very difficult to photocopy. Another variant of this method—most famously used on the
ZX Spectrum The ZX Spectrum () is an 8-bit computing, 8-bit home computer that was developed by Sinclair Research. It was released in the United Kingdom on 23 April 1982, and became Britain's best-selling microcomputer. Referred to during development as t ...
version of
Jet Set Willy ''Jet Set Willy'' is a platform video game originally written by Matthew Smith for the ZX Spectrum home computer. It was published in 1984 by Software Projects and ported to most home computers of the time. The game is a sequel to ''Manic ...
—was a card with color sequences at each grid reference that had to be entered before starting the game. This also prevented monochrome photocopying. It had been thought that the codes in the tables were based on a mathematical formula which could be calculated by using the row, line and page number if the formula was known, a function of the disk space requirement of the data. Later research proved that this wasn't the case. * ''
The Secret of Monkey Island ''The Secret of Monkey Island'' is a 1990 point-and-click graphic adventure game developed and published by Lucasfilm Games. It takes place in a fictional version of the Caribbean during the age of piracy. The player assumes the role of Guybr ...
'' offered a rotating wheel with halves of pirate's faces. The game showed a face composed of two different parts and asked when this pirate was hanged on a certain island. The player then had to match the faces on the wheel, and enter the year that appeared on the island-respective hole. Its ''
sequel A sequel is a work of literature, film, theatre, television, music or video game that continues the story of, or expands upon, some earlier work. In the common context of a narrative work of fiction, a sequel portrays events set in the same ...
'' had the same concept, but with magic potion ingredients. Other games that employed the
code wheel {{Refimprove, date=September 2008 A code wheel is a type of copy protection used on older computer games, often those published in the late 1980s and early 1990s. It evolved from the original "manual protection" system in which the program would ...
system include '' Star Control''. * ''
Zork ''Zork'' is a text-based adventure game first released in 1977 by developers Tim Anderson, Marc Blank, Bruce Daniels, and Dave Lebling for the PDP-10 mainframe computer. The original developers and others, as the company Infocom, expanded and ...
'' games such as ''
Beyond Zork ''Beyond Zork'' (full title: ''Beyond Zork: The Coconut of Quendor'') is an interactive fiction computer game written by Brian Moriarty and released by Infocom in 1987. It was one of the last games in the Zork series developed by Infocom (titles s ...
'' and ''
Zork Zero ''Zork Zero: The Revenge of Megaboz'' is an interactive fiction computer game, written by Steve Meretzky over nearly 18 months and published by Infocom in 1988. Although it is the ninth and last ''Zork'' game released by Infocom before the company ...
'' came with "
feelies Infocom was an American software company based in Cambridge, Massachusetts, that produced numerous works of interactive fiction. They also produced a business application, a relational database called ''Cornerstone''. Infocom was founded on ...
" which contained information vital to the completion of the game. For example, the parchment found from Zork Zero contained clues vital to solving the final puzzle. However, whenever the player attempts to read the parchment, they are referred to the game package. * The
Lenslok Lenslok is a copy protection mechanism found in some computer games and other software on the 8-bit Atari computers, Commodore 64, ZX Spectrum, Sinclair QL, MSX and Amstrad CPC. The first game to use it was '' Elite'' for the ZX Spectrum. Ove ...
system used a plastic prismatic device, shipped with the game, which was used to descramble a code displayed on screen. * Early copies of The Playroom from Broderbund Software included a game called "What is Missing?" in which every fifth time the program was booted up, the player would see a pattern and have to refer to the back of the manual to find which of 12 objects from the spinner counting game would match the pattern seen on the back of the manual in order to open the game. All of these methods proved to be troublesome and tiring for the players, and as such greatly declined in usage by the mid-1990s, at which point the emergence of CDs as the primary video game medium made copy protection largely redundant, since CD copying technology was not widely available at the time. Some game developers, such as
Markus Persson Markus Alexej Persson (; born 1 June 1979), also known as Notch, is a Swedish video game programmer and designer. He is best known for creating the sandbox video game ''Minecraft'' and for founding the video game company Mojang in 2009. Pers ...
, have encouraged consumers and other developers to embrace the reality of unlicensed copying and utilize it positively to generate increased sales and marketing interest.


Videotape

Starting in 1985 with the video release of '' The Cotton Club'' (
Beta Beta (, ; uppercase , lowercase , or cursive ; grc, βῆτα, bē̂ta or ell, βήτα, víta) is the second letter of the Greek alphabet. In the system of Greek numerals, it has a value of 2. In Modern Greek, it represents the voiced labiod ...
and VHS versions only), Macrovision licensed to publishers a technology that exploits the
automatic gain control Automatic gain control (AGC) is a closed-loop feedback regulating circuit in an amplifier or chain of amplifiers, the purpose of which is to maintain a suitable signal amplitude at its output, despite variation of the signal amplitude at the inpu ...
feature of VCRs by adding pulses to the vertical blanking sync signal.Some relevant patents are ; ; ; and . These pulses may negatively affect picture quality, but succeed in confusing the recording-level circuitry of many consumer VCRs. This technology, which is aided by U.S. legislation mandating the presence of automatic gain-control circuitry in VCRs, is said to "plug the analog hole" and make VCR-to-VCR copies impossible, although an inexpensive circuit is widely available that will defeat the protection by removing the pulses. Macrovision had patented methods of defeating copy prevention,One such patent is . giving it a more straightforward basis to shut down manufacture of any device that descrambles it than often exists in the DRM world. While used for pre-recorded tapes, the system was not adopted for television broadcasts; Michael J. Fuchs of
HBO Home Box Office (HBO) is an American premium television network, which is the flagship property of namesake parent subsidiary Home Box Office, Inc., itself a unit owned by Warner Bros. Discovery. The overall Home Box Office business unit is ba ...
said in 1985 that Macrovision was "not good technology" because it reduced picture quality and consumers could easily bypass it, while
Peter Chernin Peter Chernin (born May 29, 1951) is an American businessman and investor. He is the chairman and CEO of TCG (company), The Chernin Group (TCG), which he founded in 2010. TCG manages, operates and invests in businesses in the media, entertainment, ...
of
Showtime Showtime or Show Time may refer to: Film * ''Showtime'' (film), a 2002 American action/comedy film * ''Showtime'' (video), a 1995 live concert video by Blur Television Networks and channels * Showtime Networks, a division of Paramount Global w ...
said "we want to accommodate our subscribers and we know they like to tape our movies".


Notable payloads

Over time, software publishers (especially in the case of
video game Video games, also known as computer games, are electronic games that involves interaction with a user interface or input device such as a joystick, controller, keyboard, or motion sensing device to generate visual feedback. This fee ...
s) became creative about crippling the software in case it was duplicated. These games would initially show that the copy was successful, but eventually render themselves unplayable via subtle methods. Many games use the "code checksumming" technique to prevent alteration of code to bypass other copy protection. Important constants for the game - such as the accuracy of the player's firing, the speed of their movement, etc. - are not included in the game but calculated from the numbers making up the
machine code In computer programming, machine code is any low-level programming language, consisting of machine language instructions, which are used to control a computer's central processing unit (CPU). Each instruction causes the CPU to perform a very ...
of other parts of the game. If the code is changed, the calculation yields a result which no longer matches the original design of the game and the game plays improperly. * ''Superior Soccer'' had no outward signs of copy protection, but if it decided it was not a legitimate copy, it made the
soccer ball A football (also known as football ball, soccer ball, or association football ball specifically in the United Kingdom) is the ball used in the sport of association football. The name of the ball varies according to whether the sport is called " ...
in the game invisible, making it impossible to play the game. * In ''
Sid Meier's Pirates ''Sid Meier's Pirates!'' is a video game created by Sid Meier for the Commodore 64 and published by MicroProse in 1987. It was the first game to include the name "Sid Meier" in its title as an effort by MicroProse to attract fans of Meier's e ...
'', if the player entered in the wrong information, they could still play the game, but with substantially increased difficulty. * As a more satirical nod to the issue, if the thriller-action game ''
Alan Wake ''Alan Wake'' is an action-adventure game developed by Remedy Entertainment. The story follows best-selling thriller novelist Alan Wake as he tries to uncover the mystery behind his wife's disappearance during a vacation in the small fictional ...
'' detects that the game is cracked or a pirated copy, it will replace tips in loading screens with messages telling the player to buy the game. If a new game is created on the copied game, an additional effect will take place. As a more humorous nod to "piracy", Alan Wake will gain a black
Eyepatch An eyepatch is a small patch that is worn in front of one eye. It may be a cloth patch attached around the head by an elastic band or by a string, an adhesive bandage, or a plastic device which is clipped to a pair of glasses. It is often worn ...
over his right eye, complete with a miniature
Jolly Roger Jolly Roger is the traditional English name for the flags flown to identify a pirate ship preceding or during an attack, during the early 18th century (the later part of the Golden Age of Piracy). The flag most commonly identified as the Jolly ...
. * While the copy protection in ''
Zak McKracken and the Alien Mindbenders ''Zak McKracken and the Alien Mindbenders'' is a 1988 graphic adventure game by Lucasfilm Games. It was the second game to use the SCUMM engine, after ''Maniac Mansion''. The project was led by David Fox, with Matthew Alan Kane as the co-desig ...
'' was not hidden as such, the repercussions of missing the codes was unusual: the player ended up in jail (permanently), and the police officer gave a lengthy and condescending speech about software copying. * In case of copied versions of ''
The Settlers III ''The Settlers III'' (german: Die Siedler III) is a real-time strategy video game with city-building elements, developed and published by Blue Byte. Released for Microsoft Windows in November 1998, it is the third game in ''The Settlers'' ser ...
'', the iron smelters only produced pigs (a play on
pig iron Pig iron, also known as crude iron, is an intermediate product of the iron industry in the production of steel which is obtained by smelting iron ore in a blast furnace. Pig iron has a high carbon content, typically 3.8–4.7%, along with silic ...
); weaponsmiths require iron to produce weapons, so players couldn't amass arms. * Bohemia Interactive Studio developed a unique and very subtle protection system for its game '' Operation Flashpoint: Cold War Crisis''. Dubbed
FADE Fade or Fading may refer to: Science and technology * Fading, a loss of signal strength at a radio receiver * Color fade, the alteration of color by light * Fade (audio engineering), a gradual change in sound volume * Brake fade, in vehicle brakin ...
, if it detects an unauthorized copy, it does not inform the player immediately but instead progressively corrupts aspects of the game (such as reducing the weapon accuracy to zero) to the point that it eventually becomes unplayable. The message "Original discs don't FADE" will eventually appear if the game is detected as being an unauthorized copy. **FADE is also used in '' ArmA II'', and will similarly diminish the accuracy of the player’s weapons, as well as induce a "drunken vision" effect, where the screen becomes wavy, should the player be playing on an unauthorized copy. **This system was also used in ''
Take On Helicopters ''Take On Helicopters'' is a 2011 Amateur flight simulation, flight simulation video game developed by Bohemia Interactive. It was released on 27 October 2011 for Microsoft Windows, with its first official downloadable content, ''Take On Helicopt ...
'', where the screen blurred and distorted when playing a counterfeit copy, making it hard to safely pilot a helicopter. ** The ''IndyCar Series'' (2003 video game) also utilizes
FADE Fade or Fading may refer to: Science and technology * Fading, a loss of signal strength at a radio receiver * Color fade, the alteration of color by light * Fade (audio engineering), a gradual change in sound volume * Brake fade, in vehicle brakin ...
technology to safeguard against piracy by making races very difficult to win on a pirated version. The penultimate section of the game’s manual states:
''Copying commercial games, such as this one, is a criminal offense and copyright infringement.''
''Copying and re-supplying games such as this one can lead to a term of imprisonment.''
''Think of a pirated game as stolen property.''
''This game is protected by the FADE system. You can play with a pirated game- but not for long. The quality of a pirated game will degrade over time.''
''Purchase only genuine software at legitimate stores.''
* '' Batman: Arkham Asylum'' contained code that disabled Batman's glider cape, making some areas of the game very difficult to complete and a certain achievement/trophy impossible to unlock (gliding continuously for over 100m). * The PC version of ''
Grand Theft Auto IV ''Grand Theft Auto IV'' is a 2008 action-adventure game developed by Rockstar North and published by Rockstar Games. It is the sixth main entry in the ''Grand Theft Auto'' series, following 2004's '' Grand Theft Auto: San Andreas'', and the ...
'' has a copy protection that swings the camera as though the player was drunk. If the player enters a vehicle it will automatically throttle, making it difficult to steer. It also damages the vehicle, making it vulnerable to collisions and bullets. An update to the game prevented unauthorised copies from accessing the in-game
web browser A web browser is application software for accessing websites. When a user requests a web page from a particular website, the browser retrieves its files from a web server and then displays the page on the user's screen. Browsers are used on ...
, making it impossible to finish the game as some missions involve browsing the
web Web most often refers to: * Spider web, a silken structure created by the animal * World Wide Web or the Web, an Internet-based hypertext system Web, WEB, or the Web may also refer to: Computing * WEB, a literate programming system created by ...
for objectives. *''
EarthBound ''EarthBound'', released in Japan as is a role-playing video game developed by Creatures (company), Ape Inc. and HAL Laboratory and published by Nintendo for the Super Nintendo Entertainment System. The second entry in the Mother (video game s ...
'' is well-documented for its extensive use of
checksums A checksum is a small-sized block of data derived from another block of digital data for the purpose of detecting errors that may have been introduced during its transmission or storage. By themselves, checksums are often used to verify dat ...
to ensure that the game is being played on legitimate hardware. If the game detects that it is being played on a European
SNES The Super Nintendo Entertainment System (SNES), commonly shortened to Super NES or Super Nintendo, is a 16-bit home video game console developed by Nintendo that was released in 1990 in Japan and South Korea, 1991 in North America, 1992 in Euro ...
, it refuses to boot, as the first of several checksums has failed. A second checksum will weed out most unauthorized copies of the game, but hacking the data to get past this checksum will trigger a third checksum that makes enemy encounters appear much more often than in an authorized copy, and if the player progresses through the game without giving up (or cracks this protection), a final checksum code will activate before the final boss battle, freezing the game and deleting all the save files. A similar copy protection system was used in ''Spyro: Year of the Dragon'', although it only uses one copy protection check at the beginning of the game (see below). * In an unauthorized version of the PC edition of ''
Mass Effect ''Mass Effect'' is a military science fiction media franchise created by Casey Hudson, Drew Karpyshyn and Preston Watamaniuk. The franchise depicts a distant future where humanity and several alien civilizations have colonized the known univers ...
'', the game save mechanism did not work and the in-game galactic map caused the game to crash. As the galactic map is needed to travel to different sections of the game, the player became stuck in the first section of the game. * If an unauthorized version of '' The Sims 2'' was used, the Build Mode would not work properly. Walls could not be built on the player's property, which prevented the player from building any custom houses. Some furniture and clothing selections would not be available either. * A March 2009 update to the BeeJive IM iPhone app included special functionality for users of the unauthorized version: the screen would read "
PC LOAD LETTER PC LOAD LETTER is a printer error message that has entered popular culture as a technology meme referring to a confusing or inappropriate error message. The error message's vagueness was mocked in the 1999 comedy film ''Office Space''. The messa ...
" whenever the user tried to establish a connection to any IM service, then quickly switch to a YouTube clip from the movie ''
Office Space ''Office Space'' is a 1999 American black comedy film written and directed by Mike Judge. It satirizes the worklife of a typical 1990s software company, focusing on a handful of individuals weary of their jobs. It stars Ron Livingston, Jennifer ...
''. * ''
Red Alert 2 ''Command & Conquer: Red Alert 2'' is a real-time strategy video game which was released for Microsoft Windows on October 25, 2000 as the follow-up to '' Command & Conquer: Red Alert''. ''Red Alert 2'' picks up at the conclusion of the Allied ca ...
'' and '' The Lord of the Rings: The Battle for Middle-Earth'' have a copy protection system that completely wipes out the player's forces briefly after a battle begins on an unlicensed copy. However, some who purchased the latter have encountered a bug that caused this copy protection scheme to trigger when it was not supposed to. * If a player pirated the
Nintendo DS The is a handheld game console produced by Nintendo, released globally across 2004 and 2005. The DS, an initialism for "Developers' System" or "Dual Screen", introduced distinctive new features to handheld games: two LCD screens working in tan ...
version of '' Michael Jackson: The Experience'',
vuvuzela The vuvuzela is a horn, with an inexpensive injection-molded plastic shell about long, which produces a loud monotone note, typically around B♭ 3 (the first B♭ below middle C). Some models are made in two parts to facilitate storage, and ...
noises will play over the notes during a song, which then become invisible. The game will also freeze if the player tries to pause it. * Older versions of
Autodesk 3ds Max Autodesk 3ds Max, formerly 3D Studio and 3D Studio Max, is a professional 3D computer graphics program for making 3D animations, models, games and images. It is developed and produced by Autodesk Media and Entertainment. It has modeling capabil ...
use a
dongle A dongle is a small piece of computer hardware that connects to a port on another device to provide it with additional functionality, or enable a pass-through to such a device that adds functionality. In computing, the term was initially synonym ...
for copy protection; if it is missing, the program will randomly corrupt the points of the user's model during usage, destroying their work. * Older versions of
CDRWIN CDRWIN was a CD/DVD burning software for Microsoft Windows developed by Golden Hawk Technology company. Once popular, CDRWIN's usage diminished due to the bundling of limited versions of other software packages, such as Nero Burning ROM and Ro ...
used a serial number for initial copy protection. However, if this check was bypassed, a second hidden check would activate causing a random factor to be introduced into the CD burning process, producing corrupted "coaster" disks. * Terminate, a BBS terminal package, would appear to operate normally if cracked but would insert a warning that a pirated copy was in use into the IEMSI login packet it transmitted, where the
sysop A sysop (; an abbreviation of system operator) is an administrator of a multi-user computer system, such as a bulletin board system (BBS) or an online service virtual community.Jansen, E. & James,V. (2002). NetLingo: the Internet dictionary. Netl ...
of any BBS the user called could clearly read it. * ''Ubik's Musik'', a music creation tool for the
Commodore 64 The Commodore 64, also known as the C64, is an 8-bit home computer introduced in January 1982 by Commodore International (first shown at the Consumer Electronics Show, January 7–10, 1982, in Las Vegas). It has been listed in the Guinness ...
, would transform into a ''
Space Invaders is a 1978 shoot 'em up arcade game developed by Tomohiro Nishikado. It was manufactured and sold by Taito in Japan, and licensed to the Midway division of Bally for overseas distribution. ''Space Invaders'' was the first fixed shooter and set ...
'' game if it detected that a cartridge-based copying device had attempted to interrupt it. This copy protection system also doubles as an
easter egg Easter eggs, also called Paschal eggs, are eggs that are decorated for the Christian feast of Easter, which celebrates the resurrection of Jesus. As such, Easter eggs are common during the season of Eastertide (Easter season). The oldest tr ...
, as the message that appears when it occurs is not hostile ("Plug joystick in port 1, press fire, and no more resetting/experting!"). * The Amiga version of
Bomberman is a video game franchise originally developed by Hudson Soft and currently owned by Konami. The original game, also known as ''Bakudan Otoko'' (''爆弾男''), was released in Japan in July 1983 and has since spawned multiple sequels and sp ...
featured a
multitap :''Multi-tap also refers to a text-entry system for mobile phones.'' A multitap is a video game console peripheral that increases the number of controller ports available to the player, allowing additional controllers to be used in play, similar t ...
peripheral that also acted as a
dongle A dongle is a small piece of computer hardware that connects to a port on another device to provide it with additional functionality, or enable a pass-through to such a device that adds functionality. In computing, the term was initially synonym ...
. Data from the multitap was used to calculate the time limit of each level. If the multitap was missing, the time limit would be calculated as 0, causing the level to end immediately. * ''
Nevermind ''Nevermind'' is the second studio album by the American rock band Nirvana, released on September 24, 1991, by DGC Records. It was Nirvana's first release on a major label and the first to feature drummer Dave Grohl. Produced by Butch Vig, ''Neve ...
'', a puzzle game for the Amiga, contained code that caused an unlicensed version of the game to behave as a demo. The game would play three levels sampled from throughout the game, and then give the message "You have completed three levels; however there are 100 levels to complete on the original disc." * In '' Spyro: Year of the Dragon'' a character named Zoe will tell the player outside the room containing the balloon to Midday Garden Home and several other areas that the player is using an unlicensed copy. This conversation purposely corrupts data. When corrupted, the game would not only remove stray gems and the ability to progress in certain areas but also make the final boss unbeatable, returning the player to the beginning of the game (and removing the save file at the same time) after about 8 seconds into the battle. * The
Atari Jaguar The Atari Jaguar is a home video game console developed by Atari Corporation and released in North America in November 1993. Part of the fifth generation of video game consoles, it competed with the 16-bit Sega Genesis, the Super NES and the ...
console would freeze at startup and play the sound of an enraged jaguar snarling if the inserted cartridge failed the initial security check. * The
Lenslok Lenslok is a copy protection mechanism found in some computer games and other software on the 8-bit Atari computers, Commodore 64, ZX Spectrum, Sinclair QL, MSX and Amstrad CPC. The first game to use it was '' Elite'' for the ZX Spectrum. Ove ...
copy protection system gave an obvious message if the lens-coded letters were entered incorrectly, but if the user soft-reset the machine, the areas of memory occupied by the game would be flooded with the message "THANK YOU FOR YOUR INTEREST IN OUR PRODUCT. NICE TRY. LOVE BJ/NJ" to prevent the user examining leftover code to crack the protection. * An update to the sandbox game ''
Garry's Mod ''Garry's Mod'' is a 2006 sandbox game developed by Facepunch Studios and published by Valve. The base game mode of ''Garry's Mod'' has no set objectives and provides the player with a world in which to freely manipulate objects. Other game ...
'' enabled a copy protection mechanism that outputs the error '' "Unable to shade polygon normals" '' if the game detects that it has been copied. The error also includes the user's
Steam Steam is a substance containing water in the gas phase, and sometimes also an aerosol of liquid water droplets, or air. This may occur due to evaporation or due to boiling, where heat is applied until water reaches the enthalpy of vaporization ...
ID as an error ID, meaning that users can be identified by their Steam account when asking for help about the error over the
Internet The Internet (or internet) is the global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices. It is a '' network of networks'' that consists of private, pub ...
. * The Atari version of Alternate Reality: The Dungeon would have the player's character attacked by two unbeatable "FBI Agents" if it detected a cracked version. The FBI agents would also appear when restoring a save which was created by such a version, even if the version restoring the save was legal. * ''
VGA Planets ''VGA Planets'' is a multi-player, space strategy war game originally released in 1992. The game simulates combat in space between galactic scale empires. It follows the 4X game (eXplore, eXpand, eXploit and eXterminate) model: The players start ...
'', a play-by-BBS strategy game, contained code in its server which would check all clients' submitted turns for suspect registration codes. Any player deemed to be using a cracked copy, or cheating in the game, would have random forces destroyed throughout the game by an unbeatable enemy called "The Tim Continuum" (after the game's author, Tim Wissemann). A similar commercial game, ''
Stars! ''Stars!'' is a turn-based strategy and science fiction 4X game. ''Stars!'' was developed by Jeff Johnson and Jeff McBride ("the Jeffs") for their own use, and initially released as shareware in 1995. A retail version was later produced for, ...
'', would issue empty turn updates for players with invalid registration codes, meaning that none of their orders would ever be carried out. * On a copied version of the original PC version of ''Postal'', as soon as the game was started, the player character would immediately shoot himself in the head. * In '' Serious Sam 3: BFE'', if the game code detects what it believes to be an unauthorized copy, an invincible scorpion-like monster is spawned in the beginning of the game with high speeds, melee attacks, and attacks from a range with twin chainguns making the game extremely difficult and preventing the player from progressing further. Also in the level "Under the Iron Cloud", the player's character will spin out-of-control looking up in the air. * An unauthorized copy of ''
Pokémon Black and White and are 2010 role-playing video games developed by Game Freak, published by The Pokémon Company and Nintendo for the Nintendo DS. They are the first installments in the fifth generation of the Pokémon (video game series), ''Pokémon'' vid ...
'' and their sequels will run as if it were normal, but the Pokémon will not gain any experience points after a battle. This has since been solved by patching the game's files. * If '' Ace Attorney Investigations 2'' detects an illegitimate or downloaded copy of the game, it will convert the entire game's text into the game's symbol based foreign language, Borginian, which cannot be translated in any way. * The unlicensed version of indie game ''
Game Dev Tycoon Game Dev Tycoon is a business simulation video game developed by Greenheart Games released on 10 December 2012. The player creates and develops video games. ''Game Dev Tycoon'' was inspired by the iOS and Android game '' Game Dev Story'' (by K ...
'', in which the player runs a game development company, will dramatically increase the piracy rate of the games the player releases to the point where no money can be made at all, and disable the player's ability to take any action against it * In the stand-alone expansion to Crytek's ''
Crysis ''Crysis'' is a first-person shooter video game series created by Crytek. The series revolves around a group of military protagonists with " nanosuits", technologically advanced suits of armor that give them enhanced physical strength, speed, ...
'', ''
Crysis Warhead ''Crysis Warhead'' is a first-person shooter video game developed by the Hungarian studio Crytek Budapest and published by Electronic Arts. ''Crysis Warhead'' is a stand-alone expansion game and does not require the installation of the original ...
'', players who pirated the game will have their ammunition replaced with chickens that inflict no damage and have very little knockback, rendering ranged combat impossible. * In Crytek's ''
Crysis 3 ''Crysis 3'' is a 2013 first-person shooter video game developed by Crytek and published by Electronic Arts. It is the third game of the ''Crysis'' series, a sequel to the 2011 video game ''Crysis 2''. The multiplayer portion of the game was d ...
'', if a player used an unlicensed copy of the game, he is not able to defeat the last boss (The Alpha Ceph), thus making it impossible to beat the game. * In ''
Mirror's Edge ''Mirror's Edge'' is an action-adventure platform game developed by DICE and published by Electronic Arts. It was released for Xbox 360 and PlayStation 3 in 2008, and for Microsoft Windows in 2009. Set in a near-future city, the game follows th ...
'', copy protection will prevent its player character, Faith, from sprinting, making it impossible for players to jump over long gaps and progress further on a pirated copy. *In '' The Legend of Zelda: Spirit Tracks'' if the player is playing a pirated copy of the game it will remove the train control UI if it detects that it's been pirated, which effectively stonewalls the player at the train's tutorial section very early on and thus making the game unbeatable. The usage of copy protection payloads which lower playability of a game without making it clear that this is a result of copy protection is now generally considered unwise, due to the potential for it to result in unaware players with unlicensed copies spreading word-of-mouth that a game is of low quality. The authors of
FADE Fade or Fading may refer to: Science and technology * Fading, a loss of signal strength at a radio receiver * Color fade, the alteration of color by light * Fade (audio engineering), a gradual change in sound volume * Brake fade, in vehicle brakin ...
explicitly acknowledged this as a reason for including the explicit warning message.


Anti-piracy

Anti-piracy measures are efforts to fight against
copyright infringement Copyright infringement (at times referred to as piracy) is the use of works protected by copyright without permission for a usage where such permission is required, thereby infringing certain exclusive rights granted to the copyright holder, s ...
,
counterfeit To counterfeit means to imitate something authentic, with the intent to steal, destroy, or replace the original, for use in illegal transactions, or otherwise to deceive individuals into believing that the fake is of equal or greater value tha ...
ing, and other violations of
intellectual property Intellectual property (IP) is a category of property that includes intangible creations of the human intellect. There are many types of intellectual property, and some countries recognize more than others. The best-known types are patents, cop ...
laws. It includes, but is by no means limited to, the combined efforts of corporate associations (such as the
RIAA The Recording Industry Association of America (RIAA) is a trade organization that represents the music recording industry in the United States. Its members consist of record labels and distributors that the RIAA says "create, manufacture, and/o ...
and
MPAA The Motion Picture Association (MPA) is an American trade association representing the five major film studios of the United States, as well as the video streaming service Netflix. Founded in 1922 as the Motion Picture Producers and Distribu ...
), law enforcement agencies (such as the
FBI The Federal Bureau of Investigation (FBI) is the domestic Intelligence agency, intelligence and Security agency, security service of the United States and its principal Federal law enforcement in the United States, federal law enforcement age ...
and
Interpol The International Criminal Police Organization (ICPO; french: link=no, Organisation internationale de police criminelle), commonly known as Interpol ( , ), is an international organization that facilitates worldwide police cooperation and cri ...
), and various international governments to combat copyright infringement relating to various types of creative works, such as software, music and films. These measures often come in the form of copy protection measures such as
DRM DRM may refer to: Government, military and politics * Defense reform movement, U.S. campaign inspired by Col. John Boyd * Democratic Republic of Madagascar, a former socialist state (1975–1992) on Madagascar * Direction du renseignement milita ...
, or measures implemented through a
content protection network A content protection network (also called content protection system or web content protection) is a term for anti-web scraping services provided through a cloud infrastructure. A content protection network is claimed to be a technology that protect ...
, such as Distil Networks or Incapsula.
Richard Stallman Richard Matthew Stallman (; born March 16, 1953), also known by his initials, rms, is an American free software movement activist and programmer. He campaigns for software to be distributed in such a manner that its users have the freedom to ...
and the
GNU Project The GNU Project () is a free software, mass collaboration project announced by Richard Stallman on September 27, 1983. Its goal is to give computer users freedom and control in their use of their computers and computing devices by collaborati ...
have criticized the use of the word "piracy" in these situations, saying that publishers use the word to refer to "copying they don't approve of" and that "they ublishersimply that it is ethically equivalent to attacking ships on the high seas, kidnapping and murdering the people on them". Certain forms of Anti-Piracy (such as DRM), are considered by consumers to control the use of the products content after sale. In the case ''MPAA v. Hotfile'', Judge
Kathleen M. Williams Kathleen Mary Williams (born 1956) is United States district judge of the United States District Court for the Southern District of Florida. She previously served as the Federal Public Defender for the Southern District of Florida. Early life a ...
granted a motion to deny the prosecution the usage of words she views as "pejorative". This list included the word "piracy", the use of which, the motion by the defense stated, would serve no purpose but to misguide and inflame the jury. The plaintiff argued the common use of the terms when referring to copyright infringement should invalidate the motion, but the Judge did not concur.


Anti-piracy in file sharing

Today copyright infringement is often facilitated by the use of
file sharing File sharing is the practice of distributing or providing access to digital media, such as computer programs, multimedia (audio, images and video), documents or electronic books. Common methods of storage, transmission and dispersion include r ...
. In fact, infringement accounts for 23.8% of all internet traffic in 2013. In an effort to cut down on this, both large and small films and music corporations have issued
DMCA The Digital Millennium Copyright Act (DMCA) is a 1998 United States copyright law that implements two 1996 treaties of the World Intellectual Property Organization (WIPO). It criminalizes production and dissemination of technology, devices, or s ...
takedown notices, filed lawsuits, and pressed criminal prosecution of those who host these file sharing services.


Anti-counterfeiting and gun control

The
EURion constellation The EURion constellation (also known as Omron rings or doughnuts) is a pattern of symbols incorporated into a number of secure documents such as banknotes and ownership title certificates designs worldwide since about 1996. It is added to help ...
is used by many countries to prevent color photocopiers from producing
counterfeit currency Counterfeit money is currency produced without the legal sanction of a state or government, usually in a deliberate attempt to imitate that currency and so as to deceive its recipient. Producing or using counterfeit money is a form of fraud or ...
. The
Counterfeit Deterrence System To counterfeit means to imitate something authentic, with the intent to steal, destroy, or replace the original, for use in illegal transactions, or otherwise to deceive individuals into believing that the fake is of equal or greater value tha ...
is used to prevent counterfeit bills from being produced by image editing software. Similar technology has been proposed to prevent 3D printing of firearms, for reasons of
gun control Gun control, or firearms regulation, is the set of laws or policies that regulate the manufacture, sale, transfer, possession, modification, or use of firearms by civilians. Most countries have a restrictive firearm guiding policy, with on ...
rather than copyright.


See also

* *
Core dump In computing, a core dump, memory dump, crash dump, storage dump, system dump, or ABEND dump consists of the recorded state of the working memory of a computer program at a specific time, generally when the program has crashed or otherwise terminat ...
*
Digital rights management Digital rights management (DRM) is the management of legal access to digital content. Various tools or technological protection measures (TPM) such as access control technologies can restrict the use of proprietary hardware and copyrighted works. ...
*
Digital watermarking A digital watermark is a kind of marker covertly embedded in a noise-tolerant signal such as audio, video or image data. It is typically used to identify ownership of the copyright of such signal. "Watermarking" is the process of hiding digital inf ...
*
Floating licensing Floating licensing, also known as concurrent licensing or network licensing, is a software licensing approach in which a limited number of licenses for a software application are shared among a larger number of users over time. When an authorized ...
*
Cheat cartridge Cheating in video games involves a video game player using various methods to create an advantage beyond normal gameplay, usually in order to make the game easier. Cheats may be activated from within the game itself (a cheat code implemented by ...
*
License manager A software license manager is a software management tool used by Independent software vendors or by end-user organizations to control where and how software products are able to run. License managers protect software vendors from losses due to ...
*
List of copy protection schemes This is a list of notable copy protection schemes for various medias. Computer Software protection schemes ; Dongle : Hardware key containing electronic serial number required to run the software; relatively expensive and has no recovery when the ...
*
Software anti-tamper Anti-tamper software is software which makes it harder for an attacker to modify it. The measures involved can be passive such as obfuscation to make reverse engineering difficult or active tamper-detection techniques which aim to make a program m ...
*
Sony BMG CD copy protection scandal A scandal erupted in 2005 regarding Sony BMG's implementation of copy protection measures on about 22 million CDs. When inserted into a computer, the CDs installed one of two pieces of software that provided a form of digital rights management ...
*
Tamper resistance Tamperproofing, conceptually, is a methodology used to hinder, deter or detect unauthorised access to a device or circumvention of a security system. Since any device or system can be foiled by a person with sufficient knowledge, equipment, and ti ...
*
Trade group efforts against file sharing Arts and media industry trade groups, such as the International Federation of the Phonographic Industry (IFPI) and Motion Picture Association of America (MPAA), strongly oppose and attempt to prevent copyright infringement through file sharing. Th ...


References


External links


V-Max Copy Protection on the C64

Copy Protection in depth

Evaluating New Copy-Prevention Techniques for Audio CDs

Disk Preservation Project
Discusses and analyzes protections used on old floppy-based systems.
Comprehensive article on video game piracy and its prevention.

Several algorithms used to generate serial keys




{{DEFAULTSORT:Copy Protection Digital rights management Software licenses Warez Compact Disc and DVD copy protection Computer access control