It’s touted to be as disruptive as the internet was when that came on the scene. Blockchain is the technology that gained notoriety for powering Bitcoin; ensuring that the crypto currency was not spent more than once. A hot topic, for sure, but what is it?
Isn’t it just a distributed version of Google Docs?
A simple way to look at the technology is that it’s a global Peer-2-Peer network and timestamping database that tracks all transactions which anyone with internet access can use.
Forensic watermarking is an essential part of any anti-piracy program. The best approach is an end-2-end solution, combining watermarking technology with proactive detection and enforcement services. Yet we’re seeing a distinct split in how watermarking is implemented. Content owners and pay-media providers sometimes see things differently.
Sure, people share their Netflix – or your OTT service – user names and passwords with their buddies and families. Or their credentials get stolen and posted on the internet for illegal use. But is this a “solvable” problem, in the practical sense of the word? Or can you grow your OTT service despite credentials sharing?
Credentials sharing isn’t necessarily Darth Vader in the OTT galaxy
Trying to solve the “credentials sharing problem” is an impressive goal, but possibly a wasteful one and a diversion from the real problem – service abuse.
Pirates know what sells in their market. While content redistribution over the internet is a major global problem, we shouldn’t overlook control word sharing. In Africa, this is still a highly profitable business for pirates. Well, until they’re raided and sentenced that is!
Setting the scene As part of a long running investigation working with Multichoice Africa Limited (MAL), a cybercrime syndicate was identified in Egypt.
Android TV is a hot topic in the industry. Many operators appreciate the benefits it offers. Some of these are described in my blog comparing Android TV to middleware. But a major concern remains: “how much control will I give up to Google?” Probably less than you think!
You have full control of the STB, not Google.
Yes, it’s true.
Pirates move at internet speed. Unhindered by rules and regulations they continually adapt; leaving the content owners, media industry and legal institutions to play catchup. My earlier blog highlighted 3 initiatives in the fight against piracy , and in the last month or so there are more examples of how the tide might be starting to turn against the pirates.
European Court of Justice (ECJ) ruling
Recently, the ECJ ruledon a long running case between BREIN (the Dutch anti-piracy group) and Filmspeler.nl, that selling streaming devices preloaded with pirate streaming links and add-ons is illegal.
For the past 30 years, the growth in hacking has correlated directly with the proliferation of personal computing and mobile communication devices. And with the world now firmly in the digital age, concerns over “lone wolf” hackers have been re-focused on what are now resilient, complex and sophisticated crime organizations conducting global cyber attacks.
Of course, lone wolf attackers and small hacking groups still exist in every corner of the internet, often launching ransomware and Wi-Fi attacks, or implanting malware on PCs.
New content protection requirements around premium content are upping the ante for delivery to unmanaged devices. Many of these requirements we’ve come to expect in managed devices, but with the emergence of OTT services the requirements have softened to accommodate the app on CE device consumption model.
Ultimately many of these security components including hardware root of trust or hardware decode pipeline exist on most CE devices.
For the average consumer, hopping online to shop is as commonplace as physically going to the mall. No one thinks for a moment about how relatively unsafe it is to conduct business on the web. But in spite of our years’ long dependence on the web for commerce, it’s still astonishingly easy for cybercriminals to hack web-based transactions.
The reason? Web browsers. The fundamental insecurity of web browsers is arguably the weakest link in cyber security today.
Getting your OTT service to as many screens as possible is key to win customers. But the industry has made this difficult, with competing technologies doing the same thing on different devices. But reaching every device is about to get simpler.
Step 1, package once, serve many
The root of all evil started with DRM fragmentation.