Deciphering blockchain

It’s touted to be as disruptive as the internet was when that came on the scene. Blockchain is the technology that gained notoriety for powering Bitcoin; ensuring that the crypto currency was not spent more than once. A hot topic, for sure, but what is it?

Isn’t it just a distributed version of Google Docs?
A simple way to look at the technology is that it’s a global Peer-2-Peer network and timestamping database that tracks all transactions which anyone with internet access can use.

2 sides of forensic watermarking

Forensic watermarking is an essential part of any anti-piracy program. The best approach is an end-2-end solution, combining watermarking technology with proactive detection and enforcement services. Yet we’re seeing a distinct split in how watermarking is implemented. Content owners and pay-media providers sometimes see things differently.

Both sides
Let’s start with the product.

Grow your OTT business despite credentials sharing

Sure, people share their Netflix – or your OTT service – user names and passwords with their buddies and families. Or their credentials get stolen and posted on the internet for illegal use. But is this a “solvable” problem, in the practical sense of the word? Or can you grow your OTT service despite credentials sharing?

Credentials sharing isn’t necessarily Darth Vader in the OTT galaxy
Trying to solve the “credentials sharing problem” is an impressive goal, but possibly a wasteful one and a diversion from the real problem – service abuse.

A successful pirate raid combines investigative skills and teamwork

Pirates know what sells in their market. While content redistribution over the internet is a major global problem, we shouldn’t overlook control word sharing. In Africa, this is still a highly profitable business for pirates. Well, until they’re raided and sentenced that is!

Setting the scene
As part of a long running investigation working with Multichoice Africa Limited (MAL), a cybercrime syndicate was identified in Egypt.

Is the tide turning against online pirates?

Pirates move at internet speed. Unhindered by rules and regulations they continually adapt; leaving the content owners, media industry and legal institutions to play catchup. My earlier blog highlighted 3 initiatives in the fight against piracy , and in the last month or so there are more examples of how the tide might be starting to turn against the pirates.

European Court of Justice (ECJ) ruling
Recently, the ECJ ruled on a long running case between BREIN (the Dutch anti-piracy group) and Filmspeler.nl, that selling streaming devices preloaded with pirate streaming links and add-ons is illegal.

Cybercrime: the pros and cons

For the past 30 years, the growth in hacking has correlated directly with the proliferation of personal computing and mobile communication devices. And with the world now firmly in the digital age, concerns over “lone wolf” hackers have been re-focused on what are now resilient, complex and sophisticated crime organizations conducting global cyber attacks.
Of course, lone wolf attackers and small hacking groups still exist in every corner of the internet, often launching ransomware and Wi-Fi attacks, or implanting malware on PCs.

Maintaining control in an unmanaged world

New content protection requirements around premium content are upping the ante for delivery to unmanaged devices. Many of these requirements we’ve come to expect in managed devices, but with the emergence of OTT services the requirements have softened to accommodate the app on CE device consumption model.

Ultimately many of these security components including hardware root of trust or hardware decode pipeline exist on most CE devices.

Making secure browsers a reality

Making secure browsers a reality

For the average consumer, hopping online to shop is as commonplace as physically going to the mall. No one thinks for a moment about how relatively unsafe it is to conduct business on the web. But in spite of our years’ long dependence on the web for commerce, it’s still astonishingly easy for cybercriminals to hack web-based transactions.

The reason? Web browsers. The fundamental insecurity of web browsers is arguably the weakest link in cyber security today.