Hardware restrictions

Hardware restrictions (sometimes called Hardware DRM[1][2][3][4][5][6]) refers to restrictions in any device that places technical restrictions on what content can run/play on said device or what users can do with certain content. Hardware restrictions can be used with software DRM and digital signatures. Hardware restrictions are common on video game consoles (PlayStation, Xbox, Nintendo Wii and many others) and other devices like Macintosh computers[7], the iPhone[8], the iPad, the iPod and the Amazon Kindle.

Contents

High-bandwidth Digital Content Protection

High-bandwidth Digital Content Protection (HDCP) is a form of digital copy protection developed to prevent copying of digital audio and video content as it travels across connections (eg. from a Blu-Ray player to a TV)

SIM lock

The SIM lock in mobile phones is a form of hardware restriction.

Trusted Computing

Trusted Computing, while described as a security measure, has the potential of denying users access to some of their data.

Upgradeable Intel processors

Some Intel processors are sold with some features "locked", that can later be unlocked after payment.[9][10]

Intel Insider

Intel insider, a technology that provides a "protected path" for digital content[11], can be considered a form of DRM.[12][13][14]

Verified/trusted/secure boot

Some devices implement a feature called "verified boot", "trusted boot" or "secure boot", which will only allow signed software to run on the device, usually from the device manufacturer. This is considered a restriction if the users do not have the ability to disable it.

Android devices

Some Android devices (with the notable exception of "official line", the Nexus series) come with the bootloader locked. The process of overcoming those restrictions is called rooting.

Apple devices

Several Apple Inc. devices feature several restrictions. In the iPhone case, those are designed to prevent the installation of application, only allowing apps from the official App Store.

Chromebooks

Verified boot[15] is used in some Chromebooks with Google Chrome OS, with the stated goal of ensuring a malware-free system, but can be disabled by the users, by entering the "developer mode".

TiVo

If a device only runs software approved by the hardware vendor, and a certain version of a free software program is allowed to run on the device, the user cannot exercise the rights he theoretically has, because he cannot install modified versions.

OLPC

Another case of trusted boot is the One Laptop per Child XO laptop which will only boot from software signed by a private cryptographic key known only to the OLPC non-profit organisation. However, the laptop and the OLPC organisation provide a way to disable the restrictions, by requesting a "developer key" unique to that laptop, over the Internet, waiting 24 hours to receive it, installing it, and running the firmware command "disable-security". The stated goal is to deter mass theft of laptops from children or via distribution channels, by making the laptops refuse to boot, making it hard to reprogram them so they will boot and delaying the issuance of developer keys to allow time to check whether a key-requesting laptop had been stolen.

Windows 8

Certified Windows 8 hardware will require secure boot.[16][17][18][19]

See also

References

  1. ^ http://www.neoseeker.com/news/4420-hardware-drm-is-upon-us/
  2. ^ http://hothardware.com/News/Intel-Insider-Hardware-DRM-At-Home-In-Sandy-Bridge/
  3. ^ http://www.itworld.com/answers/topic/hardware/question/how-can-i-avoid-tpm-hardware-drm-has-new-name
  4. ^ http://www.cultofmac.com/hardware-drm-has-apple-joined-the-dark-side/9575
  5. ^ http://www.techspot.com/news/24929-amd-to-introduce-hardware-drm-with-new-gpus.html
  6. ^ http://www.ehomeupgrade.com/2006/04/10/hardware-drm-is-evil/
  7. ^ http://arstechnica.com/apple/news/2008/11/apple-brings-hdcp-to-a-new-aluminum-macbook-near-you.ars
  8. ^ http://www.nytimes.com/2007/01/14/business/yourmoney/14digi.html
  9. ^ http://www.engadget.com/2010/09/18/intel-wants-to-charge-50-to-unlock-stuff-your-cpu-can-already-d/
  10. ^ http://boingboing.net/2010/09/19/intel-drm-a-crippled.html
  11. ^ http://www.computerworld.com/s/article/9203799/Intel_Sandy_Bridge_s_Insider_is_not_DRM
  12. ^ http://www.techdirt.com/articles/20110107/10153912573/intel-claims-drmd-chip-is-not-drm-its-just-copy-protection.shtml
  13. ^ http://www.pcmag.com/article2/0,2817,2375215,00.asp
  14. ^ http://www.theinquirer.net/inquirer/news/1934536/intels-sandy-bridge-sucks-hollywood-drm
  15. ^ http://sites.google.com/a/chromium.org/dev/chromium-os/chromiumos-design-docs/verified-boot
  16. ^ http://www.theregister.co.uk/2011/09/21/secure_boot_firmware_linux_exclusion_fears/
  17. ^ http://arstechnica.com/business/news/2011/09/windows-8-secure-boot-will-complicate-linux-installs.ars
  18. ^ http://www.zdnet.com.au/windows-8-secure-boot-to-block-linux-339322781.htm
  19. ^ http://www.osnews.com/story/25180

External links