1 00:00:04,400 --> 00:00:07,800 Speaker 1: Welcome to tech Stuff, a production from I Heart Radio. 2 00:00:11,760 --> 00:00:14,200 Speaker 1: He there, and welcome to tech Stuff. I'm your host, 3 00:00:14,320 --> 00:00:18,360 Speaker 1: Jonathan Strickland. I'm an executive producer with I Heart Radio 4 00:00:18,480 --> 00:00:22,000 Speaker 1: and how the tech are you so? Earlier this year, 5 00:00:22,440 --> 00:00:26,400 Speaker 1: I did an episode titled the DRM Episode, and it 6 00:00:26,560 --> 00:00:31,000 Speaker 1: was fittingly enough about the history and evolution of DRM 7 00:00:31,080 --> 00:00:35,320 Speaker 1: that published back in January. D r M is digital 8 00:00:35,520 --> 00:00:40,080 Speaker 1: rights management, and simply but digital rights management is all 9 00:00:40,120 --> 00:00:44,479 Speaker 1: about finding ways to restrict access to digital material to 10 00:00:44,840 --> 00:00:48,600 Speaker 1: only those who have permission to access it. Now, we 11 00:00:48,680 --> 00:00:51,720 Speaker 1: mostly think about it as a way of preventing theft 12 00:00:52,360 --> 00:00:55,680 Speaker 1: and piracy, though it does not do those things very 13 00:00:55,720 --> 00:01:00,000 Speaker 1: well at all. DRM has also introduced a legal puzz 14 00:01:00,000 --> 00:01:04,080 Speaker 1: old here in the United States. See it has long 15 00:01:04,120 --> 00:01:07,760 Speaker 1: been held that it is totally legal for someone to 16 00:01:07,880 --> 00:01:10,920 Speaker 1: make a copy of media they have purchased for the 17 00:01:10,959 --> 00:01:14,520 Speaker 1: purposes of having a backup. So, while it would be 18 00:01:14,600 --> 00:01:17,319 Speaker 1: copyright infringement, if I were to go out and say, 19 00:01:17,640 --> 00:01:20,920 Speaker 1: buy a compact disc, and then come back home and 20 00:01:21,080 --> 00:01:24,920 Speaker 1: use my computer to copy that compact disc onto blank 21 00:01:25,080 --> 00:01:27,520 Speaker 1: compact discs, and then I go out on the street 22 00:01:27,560 --> 00:01:30,640 Speaker 1: and start selling those to passers by for a huge 23 00:01:30,680 --> 00:01:35,160 Speaker 1: markdown that would be illegal. It is, however, totally legal 24 00:01:35,400 --> 00:01:37,440 Speaker 1: if I were to go out and buy that same CD, 25 00:01:37,920 --> 00:01:40,959 Speaker 1: come home, copy it with my computer, put it on 26 00:01:41,000 --> 00:01:43,840 Speaker 1: a second CD, and use that as a backup for 27 00:01:43,880 --> 00:01:49,920 Speaker 1: my own personal use. That's Toad's fine, completely acceptable. Well, 28 00:01:50,960 --> 00:01:54,040 Speaker 1: then we come to copy protection, and there are lots 29 00:01:54,080 --> 00:01:57,360 Speaker 1: of different kinds of copy protection, and it is against 30 00:01:57,400 --> 00:02:00,720 Speaker 1: the law to circumvent or to make or even own 31 00:02:01,040 --> 00:02:06,360 Speaker 1: tools intended to circumvent copy protection. So it would be 32 00:02:06,480 --> 00:02:09,960 Speaker 1: legal for me to produce a copy for my own use, 33 00:02:10,400 --> 00:02:14,880 Speaker 1: but it's illegal to get around the copy protection. Though 34 00:02:14,919 --> 00:02:17,160 Speaker 1: I should add there's some disagreement on that point. Some 35 00:02:17,240 --> 00:02:21,600 Speaker 1: say technically it is legal to bypass DRM in order 36 00:02:21,639 --> 00:02:23,680 Speaker 1: to make a copy of something if it's just for 37 00:02:23,720 --> 00:02:27,400 Speaker 1: your own personal use. However, it's still illegal to own 38 00:02:27,480 --> 00:02:30,959 Speaker 1: the software that makes it possible to bypass dr M 39 00:02:31,040 --> 00:02:33,840 Speaker 1: in the first place. So again you still run into 40 00:02:33,880 --> 00:02:37,200 Speaker 1: this circular argument. Yes, you can make a copy, but 41 00:02:37,440 --> 00:02:39,440 Speaker 1: it's illegal for you to get around the thing that 42 00:02:39,520 --> 00:02:42,679 Speaker 1: prevents you from making a copy. And if you can't 43 00:02:42,720 --> 00:02:45,720 Speaker 1: get around copy protection, then there's no way for you 44 00:02:45,760 --> 00:02:48,360 Speaker 1: to make a copy. So it might be legal for 45 00:02:48,440 --> 00:02:51,000 Speaker 1: you to create a copy. It's just illegal to get 46 00:02:51,040 --> 00:02:53,240 Speaker 1: around the thing that prevents you from doing that. Because 47 00:02:53,320 --> 00:02:58,480 Speaker 1: laws are fun, right, and there are a ton of consequences. 48 00:02:59,200 --> 00:03:03,440 Speaker 1: Uh in how DRM was defined in the Digital Millennium 49 00:03:03,480 --> 00:03:07,639 Speaker 1: Copyright Act and section twelve oh one in particular, which 50 00:03:08,120 --> 00:03:10,240 Speaker 1: is the bit that says it's illegal to try and 51 00:03:10,280 --> 00:03:15,480 Speaker 1: get around copy protection or DRM. So companies have used 52 00:03:15,880 --> 00:03:19,960 Speaker 1: that passage for the justification of all sorts of shenanigans, 53 00:03:20,000 --> 00:03:23,880 Speaker 1: including denying the right to repair or to restrict who 54 00:03:23,880 --> 00:03:27,280 Speaker 1: can actually make software for their products. There's a lot 55 00:03:27,320 --> 00:03:31,680 Speaker 1: of anticompetitive behavior that has been fueled by this frankly 56 00:03:31,800 --> 00:03:36,160 Speaker 1: poorly worded piece of legislation. So there are a lot 57 00:03:36,200 --> 00:03:40,520 Speaker 1: of ways where the Digital Millennium Copyright Act or d 58 00:03:40,680 --> 00:03:45,600 Speaker 1: m c A has really hurt consumers and companies. So 59 00:03:45,720 --> 00:03:50,480 Speaker 1: today I wanted to talk about a different, unintended consequence, 60 00:03:50,920 --> 00:03:54,880 Speaker 1: one that is particularly infuriating. So the whole point of 61 00:03:54,920 --> 00:03:57,160 Speaker 1: the d m c A was to create rules that 62 00:03:57,160 --> 00:04:01,880 Speaker 1: would stop people from stealing dit dull stuff right to 63 00:04:02,000 --> 00:04:06,920 Speaker 1: stop piracy. However, people are still doing that. There are 64 00:04:06,960 --> 00:04:10,680 Speaker 1: still plenty of people stealing digital content. In fact, the 65 00:04:10,720 --> 00:04:13,680 Speaker 1: folks who are doing the stealing are the ones who 66 00:04:13,720 --> 00:04:17,640 Speaker 1: are breaking dr M and they're getting unfettered access to 67 00:04:17,800 --> 00:04:20,479 Speaker 1: the stuff they stole. So in the process of stealing 68 00:04:20,520 --> 00:04:23,720 Speaker 1: whatever it is they're going after, they're stripping the d 69 00:04:23,920 --> 00:04:27,640 Speaker 1: r M from that thing. That means they get to 70 00:04:27,720 --> 00:04:32,559 Speaker 1: experience that thing without any DRM. Meanwhile, law abiding folk 71 00:04:32,960 --> 00:04:37,400 Speaker 1: like you and me, I assume we are stuck with 72 00:04:37,520 --> 00:04:41,719 Speaker 1: the busted products that have dr M all up on them. 73 00:04:41,760 --> 00:04:43,760 Speaker 1: So in other words, the people what are doing the 74 00:04:43,800 --> 00:04:48,200 Speaker 1: stealing have a superior product as the scarlet which once said, 75 00:04:49,160 --> 00:04:53,760 Speaker 1: that doesn't seem fair. So in today's episode, we're going 76 00:04:53,800 --> 00:04:56,279 Speaker 1: to look at some examples of how dr M had 77 00:04:56,360 --> 00:05:00,880 Speaker 1: a negative impact on legitimate customers. And I was really 78 00:05:00,920 --> 00:05:04,600 Speaker 1: inspired to do this because of something going on at 79 00:05:04,640 --> 00:05:10,640 Speaker 1: Microsoft and its Xbox Online service. So, as the name suggests, 80 00:05:10,880 --> 00:05:14,600 Speaker 1: Xbox Online is an online component for the Xbox line 81 00:05:14,600 --> 00:05:19,640 Speaker 1: of consoles. Microsoft has servers running and Xbox consoles will 82 00:05:19,760 --> 00:05:23,080 Speaker 1: check in with those servers. Now, it was almost a 83 00:05:23,120 --> 00:05:27,240 Speaker 1: decade ago when Microsoft announced how the Xbox One console 84 00:05:27,520 --> 00:05:31,440 Speaker 1: was supposed to work, And when that announcement went out, 85 00:05:31,960 --> 00:05:34,080 Speaker 1: it was that the Xbox one was going to be 86 00:05:34,160 --> 00:05:38,760 Speaker 1: online all the time. It would have a persistent online connection. 87 00:05:39,560 --> 00:05:43,760 Speaker 1: In fact, it would require a persistent online connection, and 88 00:05:43,800 --> 00:05:46,919 Speaker 1: that this would end up having big benefits for players. 89 00:05:46,920 --> 00:05:49,159 Speaker 1: There'll be a lot of features that would be enabled 90 00:05:49,160 --> 00:05:52,960 Speaker 1: because of this connection. However, a lot of people got 91 00:05:53,000 --> 00:05:57,400 Speaker 1: really concerned about some elements, like would that prevent you 92 00:05:57,480 --> 00:06:01,000 Speaker 1: from being able to purchase used games, something that a 93 00:06:01,000 --> 00:06:03,840 Speaker 1: lot of people really depend upon. They can't necessarily afford 94 00:06:03,880 --> 00:06:06,960 Speaker 1: to buy a game at full price, so they wait, 95 00:06:07,440 --> 00:06:09,880 Speaker 1: they go out, and they buy it used once the 96 00:06:09,920 --> 00:06:13,280 Speaker 1: price comes down, and they play their games that way. 97 00:06:13,560 --> 00:06:16,599 Speaker 1: But would this online component kind of act like a 98 00:06:16,760 --> 00:06:20,520 Speaker 1: type of DRM. Would it check in with that copy 99 00:06:20,560 --> 00:06:22,440 Speaker 1: of the game with the server look to see if 100 00:06:22,480 --> 00:06:25,840 Speaker 1: that copy of the game had been registered with some 101 00:06:25,960 --> 00:06:29,719 Speaker 1: other console, and would it then prevent you from playing 102 00:06:29,800 --> 00:06:32,000 Speaker 1: the game. This was a real concern because it is 103 00:06:32,000 --> 00:06:34,800 Speaker 1: a possibility. In fact, a lot of people are arguing 104 00:06:34,800 --> 00:06:37,039 Speaker 1: that this could have just been a scheme to sell 105 00:06:37,080 --> 00:06:41,520 Speaker 1: more copies of games, eliminate the secondary market entirely, and 106 00:06:41,640 --> 00:06:47,360 Speaker 1: hurt the consumer. Ultimately, Microsoft would walk back the announcement 107 00:06:47,400 --> 00:06:51,480 Speaker 1: and changed its plans and no longer required the Xbox 108 00:06:51,520 --> 00:06:55,120 Speaker 1: One to have this persistent internet connection, which totally change 109 00:06:55,160 --> 00:06:58,560 Speaker 1: things up. That was a weird E three, But there's 110 00:06:58,600 --> 00:07:02,400 Speaker 1: still an online component it for Xbox, and there still 111 00:07:02,560 --> 00:07:05,880 Speaker 1: is DRM sitting on top of that online component, and 112 00:07:05,960 --> 00:07:10,080 Speaker 1: it's active for lots of games. And on Friday May six, 113 00:07:10,280 --> 00:07:14,240 Speaker 1: two thousand twenty two, the servers running this DRM started 114 00:07:14,280 --> 00:07:17,880 Speaker 1: to have some problems, which meant that Xbox owners found 115 00:07:17,880 --> 00:07:22,160 Speaker 1: themselves unable to purchase new games, or to start online 116 00:07:22,200 --> 00:07:25,720 Speaker 1: gaming sessions, or even launch some of their games that 117 00:07:25,800 --> 00:07:29,760 Speaker 1: they already have purchased and downloaded to their machine because 118 00:07:30,160 --> 00:07:34,480 Speaker 1: server side DRM runs a quick check to make sure 119 00:07:34,840 --> 00:07:38,520 Speaker 1: that the copy of a game that is being initiated 120 00:07:39,040 --> 00:07:41,320 Speaker 1: is a legitimate copy of the game, meaning that the 121 00:07:41,360 --> 00:07:44,680 Speaker 1: person who's running it actually bought it. So this is 122 00:07:44,840 --> 00:07:47,760 Speaker 1: kind of like a parent calling in to check on 123 00:07:47,800 --> 00:07:52,440 Speaker 1: their kid a lot, and if the answers aren't satisfactory, 124 00:07:52,520 --> 00:07:55,920 Speaker 1: that kid is grounded. So with these servers being down, 125 00:07:55,960 --> 00:07:59,160 Speaker 1: it meant that this check in could not happen. The 126 00:07:59,200 --> 00:08:01,840 Speaker 1: copy of the game not be able to get the 127 00:08:01,920 --> 00:08:05,360 Speaker 1: go ahead from the server to allow the game to load, 128 00:08:05,920 --> 00:08:09,040 Speaker 1: so without that verified check in, the games would not launch. 129 00:08:10,040 --> 00:08:13,760 Speaker 1: It's now May nine, and some Xbox users report they 130 00:08:13,760 --> 00:08:17,360 Speaker 1: are still experiencing this problem. So people who went through 131 00:08:17,400 --> 00:08:21,880 Speaker 1: all the right steps, they bought their games legitimately, they 132 00:08:21,920 --> 00:08:24,600 Speaker 1: have a connection to the internet, they are finding themselves 133 00:08:24,720 --> 00:08:29,280 Speaker 1: unable to play certain titles. They are being punished for 134 00:08:29,400 --> 00:08:34,960 Speaker 1: playing properly. Meanwhile, people who might have a pirated copy 135 00:08:35,040 --> 00:08:37,480 Speaker 1: of the game with the DRM stripped from it where 136 00:08:37,480 --> 00:08:41,840 Speaker 1: it's not doing this online check in, they could potentially 137 00:08:41,880 --> 00:08:45,520 Speaker 1: still be playing those games. DRM critics have argued that 138 00:08:46,000 --> 00:08:49,600 Speaker 1: Microsoft should really change it's DRM policy so that games 139 00:08:49,640 --> 00:08:53,720 Speaker 1: that are meant to be played offline can be played 140 00:08:53,760 --> 00:08:57,920 Speaker 1: offline even if the Microsoft servers are down. So, in 141 00:08:57,920 --> 00:09:01,360 Speaker 1: other words, these are games that are not online dependent. 142 00:09:01,400 --> 00:09:06,480 Speaker 1: There's no competitive or cooperative play. It's meant to be 143 00:09:06,559 --> 00:09:12,160 Speaker 1: played on your native Xbox in your home and that's it. 144 00:09:12,840 --> 00:09:14,920 Speaker 1: And you know, you have to also remember some folks 145 00:09:14,960 --> 00:09:18,120 Speaker 1: live in places where they might not even have a 146 00:09:18,200 --> 00:09:22,280 Speaker 1: good Internet connection. It seems reasonable to expect that you 147 00:09:22,320 --> 00:09:25,920 Speaker 1: should be able to play an offline single player game 148 00:09:26,679 --> 00:09:30,320 Speaker 1: because you know there's no online component. But here we are. 149 00:09:30,360 --> 00:09:33,640 Speaker 1: There are people who are being affected by this, and 150 00:09:33,720 --> 00:09:37,880 Speaker 1: in fact, we've had so many examples of games doing 151 00:09:37,960 --> 00:09:42,080 Speaker 1: this specific thing. In particular I am reminded of the 152 00:09:42,160 --> 00:09:45,800 Speaker 1: hit Man series because I've certainly encountered this. Anyone who 153 00:09:45,840 --> 00:09:49,080 Speaker 1: has played hit Man three has likely run into the 154 00:09:49,120 --> 00:09:53,040 Speaker 1: message that the hit Man servers are offline, or you 155 00:09:53,120 --> 00:09:55,120 Speaker 1: might end up in the middle of a gaming session 156 00:09:55,200 --> 00:09:59,280 Speaker 1: get a temporary disconnection and you can't play anymore, or 157 00:09:59,360 --> 00:10:03,920 Speaker 1: it'll let you play, but it's like nothing's really counting anymore. 158 00:10:04,320 --> 00:10:07,280 Speaker 1: In fact, some players would get into situations where server 159 00:10:07,400 --> 00:10:11,559 Speaker 1: disconnects happened so frequently that the game would become unplayable. 160 00:10:12,200 --> 00:10:14,160 Speaker 1: And you would think that shouldn't be an issue because 161 00:10:14,240 --> 00:10:17,520 Speaker 1: hit Man is a game that runs natively on your computer. 162 00:10:17,640 --> 00:10:21,680 Speaker 1: But there are just enough connected features in hit Man 163 00:10:21,760 --> 00:10:26,040 Speaker 1: three that it's required to have these check ins. One 164 00:10:26,080 --> 00:10:29,400 Speaker 1: to verify that the copy you're playing is legit, and 165 00:10:29,480 --> 00:10:32,680 Speaker 1: too to keep track of things like how you're doing 166 00:10:32,880 --> 00:10:35,679 Speaker 1: versus say, your friends who also play hit Man three. 167 00:10:35,920 --> 00:10:39,920 Speaker 1: So there are some value added features in there. I 168 00:10:39,960 --> 00:10:44,440 Speaker 1: don't know how many people really use those that much 169 00:10:44,600 --> 00:10:47,600 Speaker 1: compared to just playing the game, but they do exist. Now. 170 00:10:47,640 --> 00:10:51,199 Speaker 1: When hit Man three became available on Good Old Games 171 00:10:51,480 --> 00:10:55,839 Speaker 1: or go o G, things got ugly because generally g 172 00:10:56,080 --> 00:10:59,720 Speaker 1: o G has this policy of offering up DRM free games, 173 00:11:00,040 --> 00:11:04,719 Speaker 1: specifically because DRM can hinder a legit players experiences. But 174 00:11:04,840 --> 00:11:08,080 Speaker 1: hit Man three has this requirement of checking in with 175 00:11:08,200 --> 00:11:12,040 Speaker 1: a server, and the inclusion of server based DRM prompted 176 00:11:12,080 --> 00:11:15,720 Speaker 1: many g o G customers to review Bomb hit Man three, 177 00:11:15,760 --> 00:11:19,080 Speaker 1: giving it very low ratings due to the server requirement. 178 00:11:19,840 --> 00:11:22,720 Speaker 1: Go O G contacted hit Man three customers and gave 179 00:11:22,800 --> 00:11:27,600 Speaker 1: them the option to refund their purchase. When we come back, 180 00:11:27,720 --> 00:11:29,439 Speaker 1: i'll talk a little bit more about d r M 181 00:11:29,480 --> 00:11:31,760 Speaker 1: and video games, and then we're gonna go beyond that 182 00:11:31,920 --> 00:11:35,280 Speaker 1: to look at d r M in other areas of tech. 183 00:11:35,679 --> 00:11:47,360 Speaker 1: But first let's listen to these messages, all right. One 184 00:11:47,600 --> 00:11:52,160 Speaker 1: of the big companies that specializes in video game DRM 185 00:11:52,200 --> 00:11:57,280 Speaker 1: and also anti cheat technology is called Deneuveau d E 186 00:11:57,440 --> 00:12:02,559 Speaker 1: n U v O. Now, anti cheat is really understandable, 187 00:12:02,640 --> 00:12:05,719 Speaker 1: right because, at least for competitive online games, it's kind 188 00:12:05,720 --> 00:12:10,160 Speaker 1: of a necessity. It is incredibly frustrating to hop online 189 00:12:10,200 --> 00:12:12,719 Speaker 1: to play a game only to get shut down immediately 190 00:12:13,080 --> 00:12:15,800 Speaker 1: because someone else is using cheat software that gives them 191 00:12:15,800 --> 00:12:20,600 Speaker 1: an unfair advantage. So a strong anti cheat strategy is 192 00:12:20,720 --> 00:12:25,720 Speaker 1: really useful in those respects. And and I certainly like that. 193 00:12:25,920 --> 00:12:28,560 Speaker 1: But the d r M side is another matter. So 194 00:12:28,640 --> 00:12:33,640 Speaker 1: critics say that Deneuvos software over taxes your you know, 195 00:12:33,679 --> 00:12:37,760 Speaker 1: the players computers and their CPUs, as well as rights 196 00:12:37,800 --> 00:12:43,120 Speaker 1: to players storage a lot, which can decrease the lifespan 197 00:12:43,280 --> 00:12:45,880 Speaker 1: of storage, like if it's a solid state drive, it 198 00:12:45,920 --> 00:12:50,520 Speaker 1: can start to really affect the longevity of that drive. 199 00:12:51,080 --> 00:12:54,120 Speaker 1: These are charges that the company has denied, but several 200 00:12:54,200 --> 00:12:58,400 Speaker 1: journalists have performed tests of games both running with Deneuvo's 201 00:12:58,559 --> 00:13:03,840 Speaker 1: software being active of and running with Deneuvo's software disabled, 202 00:13:04,080 --> 00:13:07,080 Speaker 1: and the tests seem to support the accusation that the 203 00:13:07,160 --> 00:13:12,120 Speaker 1: software has a measurable negative impact on computer performance. And 204 00:13:12,360 --> 00:13:15,680 Speaker 1: that's assuming that the software is working. Like the Hitman 205 00:13:15,800 --> 00:13:18,760 Speaker 1: three example, there have been cases in which games using 206 00:13:18,800 --> 00:13:25,720 Speaker 1: Deneuvo solutions became unplayable because of server issues. But let's 207 00:13:25,800 --> 00:13:28,840 Speaker 1: move away from video games. We could spend all day 208 00:13:28,880 --> 00:13:31,720 Speaker 1: talking about how DRM has had a negative impact on 209 00:13:31,880 --> 00:13:35,120 Speaker 1: video games. We could even talk about the earliest times 210 00:13:35,120 --> 00:13:39,360 Speaker 1: where you had computer companies or game companies saying that 211 00:13:39,440 --> 00:13:43,120 Speaker 1: there would be a requirement for an online persistent connection 212 00:13:43,240 --> 00:13:46,760 Speaker 1: even for single player games, and how players reacted to that. 213 00:13:47,120 --> 00:13:49,319 Speaker 1: But there are a lot of other examples of DRM 214 00:13:49,400 --> 00:13:52,160 Speaker 1: going wrong outside of the video game world, so we'll 215 00:13:52,200 --> 00:13:56,439 Speaker 1: look at a few more. So, let's talk about printers 216 00:13:56,880 --> 00:14:01,720 Speaker 1: and toner. Several printer manufacturers have implemented DRM in an 217 00:14:01,720 --> 00:14:06,480 Speaker 1: effort to funnel customers into purchasing official toner cartridges from 218 00:14:06,520 --> 00:14:10,120 Speaker 1: those companies. You know, it's a long standing joke that 219 00:14:10,520 --> 00:14:13,000 Speaker 1: buying a new printer is super cheap. It's the toner 220 00:14:13,160 --> 00:14:16,679 Speaker 1: that'll that will really set you back. That's thoroughly a joke. 221 00:14:17,200 --> 00:14:20,880 Speaker 1: I mean, it's it's the idea of printer companies selling 222 00:14:20,880 --> 00:14:24,120 Speaker 1: you a printer because it will lock you into their 223 00:14:24,160 --> 00:14:27,080 Speaker 1: ecosystem where they can continuously sell you the toner for 224 00:14:27,200 --> 00:14:31,880 Speaker 1: much more money, and they keep making cash off of 225 00:14:31,880 --> 00:14:34,120 Speaker 1: a single customer. Right because you're going to run out 226 00:14:34,160 --> 00:14:36,440 Speaker 1: of towner, you're gonna have to buy new ones. So 227 00:14:36,480 --> 00:14:40,600 Speaker 1: obviously these companies are going to take steps to restrict 228 00:14:40,640 --> 00:14:42,960 Speaker 1: what kind of toner you can use so that you 229 00:14:43,080 --> 00:14:45,480 Speaker 1: have to buy it from them. That's how they're gonna 230 00:14:45,480 --> 00:14:47,160 Speaker 1: make all their money. They can do all they could 231 00:14:47,160 --> 00:14:50,280 Speaker 1: be a loss leader on printers and make it up 232 00:14:50,880 --> 00:14:54,440 Speaker 1: with the toner they sell. HP for example, started doing 233 00:14:54,480 --> 00:14:59,920 Speaker 1: this in the HP printer would scan the toner cartridges, 234 00:15:00,120 --> 00:15:03,400 Speaker 1: and if the cartridge proved to not be an official 235 00:15:03,560 --> 00:15:06,600 Speaker 1: HP cartridge, the printer would then give the user a 236 00:15:06,640 --> 00:15:10,680 Speaker 1: message reading quote the following ink cartridges appeared to be 237 00:15:10,800 --> 00:15:15,160 Speaker 1: undetected or damaged. Replaced the ink cartridges to continue printing 238 00:15:15,280 --> 00:15:18,160 Speaker 1: end quote. The printer wouldn't let you print even if 239 00:15:18,160 --> 00:15:24,360 Speaker 1: the third party cartridges were otherwise perfectly compatible, So even 240 00:15:24,400 --> 00:15:28,400 Speaker 1: if for any other reason it should work, the printer 241 00:15:28,520 --> 00:15:30,840 Speaker 1: would say, Nope, these are bad, these are defective, get 242 00:15:30,960 --> 00:15:34,840 Speaker 1: rid of them. Cannon actually went a step further. The 243 00:15:34,960 --> 00:15:39,600 Speaker 1: Pixma MG six three twenty model is like a lot 244 00:15:39,600 --> 00:15:42,440 Speaker 1: of printers, and that it has a built in scanner 245 00:15:42,560 --> 00:15:45,320 Speaker 1: so that you can scan documents and get a digital 246 00:15:45,480 --> 00:15:49,080 Speaker 1: version of your document. But the Cannon, once it would 247 00:15:49,160 --> 00:15:54,480 Speaker 1: run out of toner, would disable all functions, including the scanner. Now, 248 00:15:54,560 --> 00:15:58,160 Speaker 1: scanners don't use any toner at all. They literally just 249 00:15:58,480 --> 00:16:01,800 Speaker 1: scan a document and create a digital copy, so not 250 00:16:02,040 --> 00:16:05,360 Speaker 1: one dot of toner has to be used to do that. 251 00:16:06,120 --> 00:16:09,880 Speaker 1: So users complained that Cannon was purposefully deactivating its printers 252 00:16:09,920 --> 00:16:14,480 Speaker 1: functions to force folks into buying more expensive Cannon toner 253 00:16:15,600 --> 00:16:19,440 Speaker 1: then we got the chip shortage, which caused way more 254 00:16:19,480 --> 00:16:23,560 Speaker 1: headaches for both Cannon and its customers. See, the way 255 00:16:23,600 --> 00:16:28,240 Speaker 1: that Canon was implementing DRM in its toner cartridges was 256 00:16:28,280 --> 00:16:32,360 Speaker 1: to include a very small microchip that identified the toner 257 00:16:32,480 --> 00:16:37,200 Speaker 1: as being a Cannon branded cartridge. But then we get 258 00:16:37,200 --> 00:16:40,000 Speaker 1: into the pandemic, and then not long after that, we 259 00:16:40,040 --> 00:16:43,600 Speaker 1: started hitting that massive semiconductor shortage that we are still 260 00:16:43,640 --> 00:16:48,200 Speaker 1: into this day. Among the many technologies affected by this 261 00:16:48,280 --> 00:16:53,800 Speaker 1: shortage where Cannon toner cartridges. But this created an awkward problem. 262 00:16:53,880 --> 00:16:57,880 Speaker 1: The new Cannon cartridges didn't have the DRM chips because 263 00:16:57,880 --> 00:17:02,640 Speaker 1: of the semiconductor shortage. That meant that Cannon printers were 264 00:17:02,720 --> 00:17:06,399 Speaker 1: looking for DRM confirmation and couldn't find it even with 265 00:17:06,560 --> 00:17:10,560 Speaker 1: official Cannon cartridges. So even if you went through the 266 00:17:10,640 --> 00:17:14,920 Speaker 1: trouble and expense of buying an actual Cannon toner cartridge, 267 00:17:15,320 --> 00:17:19,639 Speaker 1: your Cannon printer wouldn't recognize them, and Cannon's own d 268 00:17:19,880 --> 00:17:25,560 Speaker 1: r M would prevent you from using your printer. So 269 00:17:25,680 --> 00:17:28,920 Speaker 1: Cannon had to send out information to customers on how 270 00:17:28,960 --> 00:17:33,159 Speaker 1: to bypass the DRM, which means, of course, that you 271 00:17:33,200 --> 00:17:37,040 Speaker 1: could have tried that same method without using Cannon cartridges 272 00:17:37,119 --> 00:17:39,600 Speaker 1: at all, so Cannon actually had to tell its customers 273 00:17:39,840 --> 00:17:42,960 Speaker 1: how to get around the gate keeping it had put 274 00:17:42,960 --> 00:17:46,080 Speaker 1: into place in order to restrict what kind of ink 275 00:17:46,359 --> 00:17:51,960 Speaker 1: you could use. Now, in some cases a company may 276 00:17:52,000 --> 00:17:56,080 Speaker 1: have had no choice but to develop and deploy DRM. 277 00:17:56,440 --> 00:18:01,200 Speaker 1: So let's talk about Apple's fair Play DRMS solution, which 278 00:18:01,280 --> 00:18:03,879 Speaker 1: hasn't been a thing for many years, so this is 279 00:18:03,920 --> 00:18:08,320 Speaker 1: not a current issue. But back in the day, here's 280 00:18:08,320 --> 00:18:12,160 Speaker 1: how you would listen to digital music on a personal 281 00:18:12,200 --> 00:18:15,240 Speaker 1: device like an MP three players. Specifically, we're gonna be 282 00:18:15,240 --> 00:18:18,399 Speaker 1: talking about iPods, So you would go and you would 283 00:18:18,400 --> 00:18:22,800 Speaker 1: buy your brand new iPod. Uh, So you would get 284 00:18:22,880 --> 00:18:25,480 Speaker 1: some sort of music management software. In this case, we 285 00:18:25,520 --> 00:18:28,840 Speaker 1: have to talk about iTunes, the Apple version of that. 286 00:18:29,440 --> 00:18:33,679 Speaker 1: So this is how you organize music, how you get music, 287 00:18:34,280 --> 00:18:38,679 Speaker 1: and you would put music on that management software iTunes 288 00:18:39,400 --> 00:18:42,160 Speaker 1: in a couple of different ways. So in the very 289 00:18:42,240 --> 00:18:45,600 Speaker 1: earliest days, the only way was really to purchase a 290 00:18:45,680 --> 00:18:49,000 Speaker 1: music c D, put it into your computer that has 291 00:18:49,080 --> 00:18:53,040 Speaker 1: your music management software on it, your iTunes, and use 292 00:18:53,119 --> 00:18:57,520 Speaker 1: iTunes to then rip the music off the CD. Not literally, 293 00:18:57,640 --> 00:18:59,159 Speaker 1: the music would still be on the CD. You're just 294 00:18:59,200 --> 00:19:02,880 Speaker 1: really copying the music files. Um and converting them into 295 00:19:02,920 --> 00:19:07,720 Speaker 1: a format that is easier to store, and this would 296 00:19:07,760 --> 00:19:11,679 Speaker 1: go into your iTunes software. It would be in a 297 00:19:11,760 --> 00:19:15,359 Speaker 1: database and it would be something you could easily get to, 298 00:19:15,960 --> 00:19:18,480 Speaker 1: and you would have a digital copy of those songs, 299 00:19:18,920 --> 00:19:21,280 Speaker 1: and there'll be no DRM on that music. You would 300 00:19:21,280 --> 00:19:23,320 Speaker 1: have ripped it from the c D and it would 301 00:19:23,320 --> 00:19:26,880 Speaker 1: be DRM free music files. And in the very earliest 302 00:19:26,920 --> 00:19:29,040 Speaker 1: days of iTunes, this was the only way you could 303 00:19:29,040 --> 00:19:33,800 Speaker 1: get music the iTunes system, as in the management system 304 00:19:33,880 --> 00:19:38,200 Speaker 1: for music that existed before the iTunes Music Store did, 305 00:19:38,880 --> 00:19:42,199 Speaker 1: so you would use it to really just organize your 306 00:19:42,280 --> 00:19:46,240 Speaker 1: music collection and then transfer that music collection to your iPod. 307 00:19:46,960 --> 00:19:51,240 Speaker 1: But once the iTunes Music Store opened up, well, then 308 00:19:51,320 --> 00:19:55,760 Speaker 1: you had another option. You could buy music, either entire 309 00:19:55,800 --> 00:20:00,880 Speaker 1: albums or often individual tracks off the digital store. Now, 310 00:20:01,080 --> 00:20:04,520 Speaker 1: in either case, if you wanted to put digital music 311 00:20:04,560 --> 00:20:08,840 Speaker 1: onto your iPod, you had to connect your iPod to 312 00:20:08,960 --> 00:20:12,920 Speaker 1: your computer using an actual physical cable and you would 313 00:20:12,960 --> 00:20:18,720 Speaker 1: synchronize the iPods library to that of your computer's library. 314 00:20:18,760 --> 00:20:21,840 Speaker 1: So with Apple is pretty easy assuming you were working 315 00:20:21,840 --> 00:20:26,880 Speaker 1: with all Apple products. Uh, if you had a Mac 316 00:20:27,119 --> 00:20:29,840 Speaker 1: and an iPod, it was pretty easy. If you had 317 00:20:29,880 --> 00:20:31,800 Speaker 1: a PC and you were running iTunes on it, it 318 00:20:31,960 --> 00:20:36,320 Speaker 1: was more of a headache. So you could rip music 319 00:20:36,359 --> 00:20:38,160 Speaker 1: from your CD s where you could buy new music 320 00:20:38,200 --> 00:20:42,359 Speaker 1: tracks which would get added into your iTunes management software, 321 00:20:43,040 --> 00:20:46,919 Speaker 1: and then Apple would just automatically add those tunes to 322 00:20:47,080 --> 00:20:49,600 Speaker 1: your iPod the next time you connected it to your 323 00:20:49,600 --> 00:20:54,920 Speaker 1: computer to synchronize with your iTunes database. But the big 324 00:20:55,040 --> 00:20:58,679 Speaker 1: music publishers were wary of digital music. They had already 325 00:20:58,720 --> 00:21:01,919 Speaker 1: weathered the storm of recy in the napster days, and 326 00:21:02,000 --> 00:21:05,520 Speaker 1: so the music labels, which pretty much had the leverage, 327 00:21:05,760 --> 00:21:10,440 Speaker 1: demanded that Apple create and used DRM to protect music files. 328 00:21:10,480 --> 00:21:14,399 Speaker 1: And so Apple did because if it didn't, it wouldn't 329 00:21:14,440 --> 00:21:19,439 Speaker 1: have access to these massive companies music libraries, and the 330 00:21:19,480 --> 00:21:22,399 Speaker 1: iTunes music store would have gone nowhere. You wouldn't have 331 00:21:22,440 --> 00:21:26,160 Speaker 1: had anything to sell on it. So Apple thus created 332 00:21:26,320 --> 00:21:29,879 Speaker 1: fair play. Now, one of the things Apple did was 333 00:21:29,920 --> 00:21:32,600 Speaker 1: that it would not allow any other d r M 334 00:21:32,920 --> 00:21:36,359 Speaker 1: music onto an iPod. It had to be fair play, 335 00:21:36,480 --> 00:21:40,760 Speaker 1: DRM or nothing, which meant if you bought a track 336 00:21:40,960 --> 00:21:44,879 Speaker 1: from a different digital store, you would be out of 337 00:21:44,960 --> 00:21:47,880 Speaker 1: luck when it came to putting that track on your 338 00:21:47,920 --> 00:21:52,280 Speaker 1: iPod because these other digital stores also had to comply 339 00:21:52,600 --> 00:21:55,800 Speaker 1: with the music labels and include DRM on their tracks, 340 00:21:56,280 --> 00:21:59,160 Speaker 1: and Apple would not allow any DRM other than fair 341 00:21:59,160 --> 00:22:02,960 Speaker 1: Play in its ghos system, and Apple wouldn't license fair 342 00:22:03,000 --> 00:22:07,320 Speaker 1: play to any other company. So it essentially was either 343 00:22:07,440 --> 00:22:10,240 Speaker 1: you rip music from CDs or you have to go 344 00:22:10,320 --> 00:22:13,040 Speaker 1: through the iTunes music store. Those are the only two 345 00:22:13,040 --> 00:22:16,240 Speaker 1: options you have. You can't buy music from other digital stores, 346 00:22:16,840 --> 00:22:21,000 Speaker 1: so companies like real Player or real Play began to 347 00:22:21,160 --> 00:22:25,880 Speaker 1: reverse engineer Apple's fair play in order to develop similar 348 00:22:26,000 --> 00:22:29,600 Speaker 1: DRM that would fool Apple's ecosystem into thinking it was 349 00:22:29,680 --> 00:22:33,320 Speaker 1: fair play. That way, you could purchase music from these 350 00:22:33,480 --> 00:22:36,760 Speaker 1: other stores and get that music on your iPod. That 351 00:22:36,800 --> 00:22:39,520 Speaker 1: would give you operate options to buy music that's not 352 00:22:39,600 --> 00:22:43,320 Speaker 1: on Apple's store, or you can buy it for less money. 353 00:22:43,440 --> 00:22:47,040 Speaker 1: Like you know, real Plays tracks were sometimes half as 354 00:22:47,119 --> 00:22:50,959 Speaker 1: much as what Apple was charging. So Apple then accused 355 00:22:51,240 --> 00:22:54,199 Speaker 1: the real Player company of essentially acting like a hacker, 356 00:22:54,640 --> 00:22:58,000 Speaker 1: and Apple updated its fair play systems, and subsequently, once 357 00:22:58,080 --> 00:23:02,040 Speaker 1: the update went out, when you synchronized your iPod with 358 00:23:02,119 --> 00:23:05,040 Speaker 1: your computer, you would find that any tracks you had 359 00:23:05,119 --> 00:23:09,080 Speaker 1: bought from those other digital stores like the Harmony store 360 00:23:09,440 --> 00:23:12,600 Speaker 1: would go bye bye. They'd get deleted. And there was 361 00:23:12,640 --> 00:23:15,119 Speaker 1: a whole class action lawsuit brought against Apple for this 362 00:23:15,840 --> 00:23:18,320 Speaker 1: because people wanted the freedom to buy music wherever they 363 00:23:18,400 --> 00:23:21,399 Speaker 1: liked and then put it on their iPods. Apple actually 364 00:23:21,480 --> 00:23:25,119 Speaker 1: ended up winning that lawsuit, however, and ultimately it all 365 00:23:25,160 --> 00:23:27,720 Speaker 1: became a moot point because a few years later, Apple 366 00:23:27,760 --> 00:23:30,639 Speaker 1: discontinued fair play entirely, and at that point it was 367 00:23:30,720 --> 00:23:34,359 Speaker 1: Apple that had the leverage over the music companies. Steve 368 00:23:34,400 --> 00:23:38,200 Speaker 1: Jobs himself actually argued that DRM really only hurt legitimate 369 00:23:38,240 --> 00:23:41,720 Speaker 1: customers and so it was just a terrible business idea 370 00:23:42,320 --> 00:23:45,680 Speaker 1: to use it. Okay, We've got a couple more examples 371 00:23:45,680 --> 00:23:48,080 Speaker 1: I want to give before we end this episode, but 372 00:23:48,160 --> 00:23:58,520 Speaker 1: first let's take another quick break. Earlier in the episode, 373 00:23:58,560 --> 00:24:01,600 Speaker 1: I mentioned that you could music on an iPod by 374 00:24:01,720 --> 00:24:04,560 Speaker 1: ripping the music from a compact disc, and that is true, 375 00:24:05,240 --> 00:24:09,119 Speaker 1: but compact discs could also have their own DRM copy 376 00:24:09,119 --> 00:24:11,760 Speaker 1: of protection on them, and this brings us to one 377 00:24:11,760 --> 00:24:16,159 Speaker 1: of the most famous DRM catastrophes, that of Sony b 378 00:24:16,320 --> 00:24:21,040 Speaker 1: mg s copy protection strategy in two thousand five. So 379 00:24:21,040 --> 00:24:24,280 Speaker 1: Sony b MG decides that it wants to really control 380 00:24:24,480 --> 00:24:29,200 Speaker 1: how customers can listen or rip music from Sony b 381 00:24:29,359 --> 00:24:33,679 Speaker 1: MG albums, and to do that they leaned on some 382 00:24:33,880 --> 00:24:37,879 Speaker 1: software XCP, which was a copy protection software, and another 383 00:24:37,960 --> 00:24:41,920 Speaker 1: best called Media Max c D three. Now, this pair 384 00:24:41,960 --> 00:24:46,920 Speaker 1: of software programs were included on something like fifty different 385 00:24:46,960 --> 00:24:50,680 Speaker 1: albums within Sony b mg s library, and there were 386 00:24:50,680 --> 00:24:54,679 Speaker 1: thousands and thousands of copies of these fifty albums. So 387 00:24:54,720 --> 00:24:57,399 Speaker 1: if you were to purchase one of those c d s, 388 00:24:57,880 --> 00:24:59,760 Speaker 1: and then you were to put that c D in 389 00:25:00,119 --> 00:25:03,240 Speaker 1: or a computer, you would be presented with an end 390 00:25:03,440 --> 00:25:07,000 Speaker 1: User License Agreement or you LA e u l A. 391 00:25:07,480 --> 00:25:12,719 Speaker 1: Now we all know that hardly anyone reads those things. However, 392 00:25:12,760 --> 00:25:15,360 Speaker 1: it turns out that even if you had read it, 393 00:25:15,960 --> 00:25:19,200 Speaker 1: you wouldn't have known about what would happen next because 394 00:25:19,240 --> 00:25:22,000 Speaker 1: there was no mention of it within the u LA, 395 00:25:22,640 --> 00:25:27,679 Speaker 1: And what would happen was ridiculous. Whether you clicked on 396 00:25:27,880 --> 00:25:32,760 Speaker 1: accepting the ULA or not, the CD would surreptitiously install 397 00:25:33,400 --> 00:25:37,159 Speaker 1: that DRM software on your computer. Those two programs. Now, 398 00:25:37,200 --> 00:25:39,520 Speaker 1: if you had a Mac, there was some good news 399 00:25:39,640 --> 00:25:43,320 Speaker 1: because the software would be secretly installed on your computer, 400 00:25:43,480 --> 00:25:45,840 Speaker 1: but you would get a message from the Mac operating 401 00:25:45,880 --> 00:25:49,960 Speaker 1: system once the software tried to change the operating system 402 00:25:50,000 --> 00:25:52,800 Speaker 1: and it would ask are you cool with this, and 403 00:25:53,000 --> 00:25:56,080 Speaker 1: you could say no, I'm totally not cool with that. However, 404 00:25:56,119 --> 00:26:00,160 Speaker 1: for Windows machines, Windows of machine owners didn't get any 405 00:26:00,200 --> 00:26:04,639 Speaker 1: warning at all. It just happened. So the software would 406 00:26:04,640 --> 00:26:09,080 Speaker 1: alter the operating system, essentially behaving the same way a 407 00:26:09,160 --> 00:26:13,639 Speaker 1: root kit would from malware. So a root kit is 408 00:26:13,680 --> 00:26:19,320 Speaker 1: software that gives someone root access to your machine. Essentially, 409 00:26:20,240 --> 00:26:23,600 Speaker 1: this is the worst case scenario where a hacker gets 410 00:26:23,640 --> 00:26:27,160 Speaker 1: total control over your computer. They might lock you out, 411 00:26:27,240 --> 00:26:30,640 Speaker 1: they might secretly use it without you knowing. They could 412 00:26:30,680 --> 00:26:34,520 Speaker 1: do all sorts of things. While the software that Sony 413 00:26:34,560 --> 00:26:37,840 Speaker 1: b MG but on its CDs didn't do this explicitly. 414 00:26:37,920 --> 00:26:40,760 Speaker 1: It did not actually act like a root kit, it 415 00:26:40,800 --> 00:26:44,240 Speaker 1: behaved in a way similar to it. Like from the outside, 416 00:26:44,720 --> 00:26:47,000 Speaker 1: it would look like it was behaving like a root kit, 417 00:26:47,640 --> 00:26:51,159 Speaker 1: which meant that anti virus software would likely identify it 418 00:26:51,359 --> 00:26:55,520 Speaker 1: as a root kit installed on that computer. Plus, it 419 00:26:55,600 --> 00:26:59,560 Speaker 1: actually did create security vulnerabilities that could be exploited by hackers, 420 00:26:59,600 --> 00:27:02,879 Speaker 1: and that did happen once hackers figured it out. So 421 00:27:03,000 --> 00:27:05,800 Speaker 1: just by putting the CD into a Windows PC, you 422 00:27:05,840 --> 00:27:09,560 Speaker 1: would make that PC more vulnerable to attack, and it 423 00:27:09,600 --> 00:27:14,200 Speaker 1: gets worse, there was no way to uninstall the software, 424 00:27:14,640 --> 00:27:18,240 Speaker 1: and meanwhile, the software was always running in the background, 425 00:27:18,359 --> 00:27:23,040 Speaker 1: so it was also consuming processing power and impacting computer performance. 426 00:27:23,560 --> 00:27:25,760 Speaker 1: So not only was there no way to get rid 427 00:27:25,760 --> 00:27:28,160 Speaker 1: of it, not only did it make your computer more vulnerable, 428 00:27:28,200 --> 00:27:32,080 Speaker 1: it also made everything run worse on your machine. And 429 00:27:32,160 --> 00:27:35,000 Speaker 1: to say that Sony b MG faced a backlash would 430 00:27:35,040 --> 00:27:38,920 Speaker 1: be putting it lightly. The company scrambled to address the problem, 431 00:27:39,359 --> 00:27:42,920 Speaker 1: h its first solution actually ended up creating new security 432 00:27:43,000 --> 00:27:49,520 Speaker 1: vulnerabilities while it was supposedly deactivating the initial software. Uh 433 00:27:49,600 --> 00:27:53,399 Speaker 1: so that was not great, right when your solution is 434 00:27:53,440 --> 00:27:56,760 Speaker 1: at least as bad as the original problem, and also 435 00:27:56,800 --> 00:28:00,879 Speaker 1: a point of irony. Later on, researchers would accused Sony 436 00:28:00,920 --> 00:28:04,520 Speaker 1: b m G S DRM of containing code from various 437 00:28:04,560 --> 00:28:11,000 Speaker 1: open source programs in violation of those programs individual licensing agreements. 438 00:28:11,440 --> 00:28:14,960 Speaker 1: So in other words, Sony b MG was making use 439 00:28:15,000 --> 00:28:19,080 Speaker 1: of code without proper permission to use that code, which 440 00:28:19,119 --> 00:28:22,119 Speaker 1: meant Sony b m G, S d r M was 441 00:28:22,320 --> 00:28:27,240 Speaker 1: in itself a sort of copyright violation, which is kind 442 00:28:27,240 --> 00:28:31,800 Speaker 1: of poetic. Sony would issue a recall of all unsold 443 00:28:31,840 --> 00:28:35,440 Speaker 1: CDs that were harboring this DRM uh and a couple 444 00:28:35,480 --> 00:28:38,440 Speaker 1: of class action lawsuits followed, and it ended up being 445 00:28:38,480 --> 00:28:43,800 Speaker 1: a highly publicized and extremely expensive PR disaster for the company, 446 00:28:44,200 --> 00:28:49,240 Speaker 1: and yet DRM persisted. Now, there are lots of other examples. 447 00:28:49,240 --> 00:28:53,680 Speaker 1: We could talk about. Curig, for instance, instituted DRM with 448 00:28:53,840 --> 00:28:58,200 Speaker 1: its Curig two point oh machine moving forward, and that 449 00:28:58,240 --> 00:29:01,240 Speaker 1: would mean that these Curig machine, which are coffee machines. 450 00:29:01,280 --> 00:29:03,520 Speaker 1: If you're not familiar, you put a little pod of 451 00:29:03,560 --> 00:29:05,880 Speaker 1: coffee into the machine and you push a button and 452 00:29:05,920 --> 00:29:08,840 Speaker 1: it brews a cup of coffee for you. Well, the 453 00:29:08,920 --> 00:29:12,440 Speaker 1: DRM meant that these machines would only operate with Curig 454 00:29:12,440 --> 00:29:15,960 Speaker 1: branded coffee pods or k cups as they called them, 455 00:29:16,880 --> 00:29:20,240 Speaker 1: Kurig printed special ink. There's like a sticker on the 456 00:29:20,280 --> 00:29:22,920 Speaker 1: tops of the pods that the Curig two point o 457 00:29:23,040 --> 00:29:26,560 Speaker 1: machine and later would scan for. So the machine would 458 00:29:26,560 --> 00:29:29,160 Speaker 1: scan to look for the presence of this stuff on 459 00:29:29,200 --> 00:29:32,280 Speaker 1: the pod, and if there were no ink found, while 460 00:29:32,320 --> 00:29:35,360 Speaker 1: the machine would not work. It would not it wouldn't 461 00:29:35,480 --> 00:29:37,959 Speaker 1: allow you to brew that cup of coffee. So if 462 00:29:37,960 --> 00:29:40,000 Speaker 1: you bought it from a third party and it lacked 463 00:29:40,040 --> 00:29:44,120 Speaker 1: that sticker or that ink, no dice even if it 464 00:29:44,160 --> 00:29:48,320 Speaker 1: was a Curig branded pod from before they started doing 465 00:29:48,360 --> 00:29:52,680 Speaker 1: this practice. It wouldn't work because the earlier Curig pods 466 00:29:52,760 --> 00:29:56,400 Speaker 1: didn't have this this ink on them, and what followed 467 00:29:57,120 --> 00:30:00,880 Speaker 1: was a massive backlash from customers. Kurig saw an influx 468 00:30:00,920 --> 00:30:04,040 Speaker 1: of negative reviews and a drop in sales as well. 469 00:30:04,360 --> 00:30:07,520 Speaker 1: Third party companies began to produce pods that would fool 470 00:30:07,560 --> 00:30:10,280 Speaker 1: the Curig into thinking that it was a Curig branded 471 00:30:10,280 --> 00:30:13,840 Speaker 1: pod when it wasn't. Customers were upset that Kurig was 472 00:30:14,000 --> 00:30:17,880 Speaker 1: essentially deciding which coffees they should be allowed to drink. 473 00:30:18,440 --> 00:30:22,880 Speaker 1: It was really messy. Kurig weathered the storm mostly but 474 00:30:22,960 --> 00:30:26,520 Speaker 1: eventually settled a lawsuit accusing the company of using anti 475 00:30:26,520 --> 00:30:30,000 Speaker 1: competitive practices to prevent anyone else from producing pods that 476 00:30:30,000 --> 00:30:34,680 Speaker 1: were compatible with Curig brewing machines. The company also brought 477 00:30:34,800 --> 00:30:38,760 Speaker 1: back a device that they had discontinued called the my 478 00:30:39,080 --> 00:30:43,320 Speaker 1: K Cup, which is actually a reusable coffee filter slash 479 00:30:43,360 --> 00:30:48,040 Speaker 1: cup that allows customers to put their own coffee into 480 00:30:48,080 --> 00:30:51,160 Speaker 1: the cup and use that within a Curig machine. So 481 00:30:51,200 --> 00:30:53,239 Speaker 1: that's one way of stepping around it where you're not 482 00:30:53,600 --> 00:30:57,640 Speaker 1: having to buy the coffee straight from Curig. But yeah, 483 00:30:58,000 --> 00:31:00,240 Speaker 1: we've seen this sort of stuff a lot. In fact, 484 00:31:00,280 --> 00:31:03,680 Speaker 1: we've seen it a ton, I'd say, like the last 485 00:31:03,720 --> 00:31:07,520 Speaker 1: decade or so, maybe the last fifteen years. Really, we 486 00:31:07,560 --> 00:31:12,040 Speaker 1: started seeing companies looking for ways to create new revenue streams. 487 00:31:12,120 --> 00:31:14,600 Speaker 1: And the main way a lot of companies focused on 488 00:31:14,680 --> 00:31:17,640 Speaker 1: was how can we get customers locked into like a 489 00:31:17,680 --> 00:31:22,640 Speaker 1: subscription based model or a model where they must continue 490 00:31:22,640 --> 00:31:25,880 Speaker 1: to purchase things from us so that the thing that 491 00:31:25,920 --> 00:31:29,360 Speaker 1: they initially bought continues to work. That that has been 492 00:31:29,440 --> 00:31:34,680 Speaker 1: like a massive strategy that customers in general hate, are 493 00:31:34,800 --> 00:31:37,680 Speaker 1: typically hate UM And it's one of the reasons why 494 00:31:37,760 --> 00:31:41,320 Speaker 1: DRM is necessary because without DRM, then the customer has 495 00:31:41,320 --> 00:31:44,640 Speaker 1: the freedom to go wherever they want to get the 496 00:31:44,760 --> 00:31:48,200 Speaker 1: stuff what makes the device continue to work. And that 497 00:31:48,320 --> 00:31:53,280 Speaker 1: might be a different source, right Like for my my printer, 498 00:31:53,720 --> 00:31:58,160 Speaker 1: I might find a compatible cartridge that costs, you know, 499 00:31:58,360 --> 00:32:00,720 Speaker 1: a third of what it would cost me to buy 500 00:32:00,760 --> 00:32:04,160 Speaker 1: the official brand. I'm obviously going to be tempted to 501 00:32:04,200 --> 00:32:08,280 Speaker 1: go with that one, assuming that my printer will actually 502 00:32:08,400 --> 00:32:13,880 Speaker 1: let me use it. Um. Yeah, it's a it's a mess. 503 00:32:14,200 --> 00:32:17,160 Speaker 1: And like I said, DRM plays an important part in that. 504 00:32:17,440 --> 00:32:21,800 Speaker 1: And uh, I guess the alternative would be these companies 505 00:32:21,840 --> 00:32:25,880 Speaker 1: would eventually phase out dr M, but it would likely 506 00:32:25,960 --> 00:32:29,920 Speaker 1: mean that we would see much higher price tags on 507 00:32:30,000 --> 00:32:33,640 Speaker 1: some of these devices because the company would want to 508 00:32:33,720 --> 00:32:37,280 Speaker 1: make up that revenue elsewhere. And it might mean that, oh, well, 509 00:32:37,280 --> 00:32:40,320 Speaker 1: we're gonna have to sell this at a higher cost 510 00:32:40,920 --> 00:32:43,720 Speaker 1: because previously we were selling it low since we knew 511 00:32:43,720 --> 00:32:47,640 Speaker 1: we would make it up in the subscriptions or additional products. 512 00:32:47,680 --> 00:32:50,160 Speaker 1: So there there is a tradeoff here that even if 513 00:32:50,160 --> 00:32:51,760 Speaker 1: we get rid of d r M, it may mean 514 00:32:51,840 --> 00:32:57,400 Speaker 1: that the things we have been purchasing will get more expensive. Uh, 515 00:32:57,520 --> 00:33:00,560 Speaker 1: the individual stuff that we use on those machines might 516 00:33:00,600 --> 00:33:03,960 Speaker 1: not get more expensive, but the machines themselves could, and 517 00:33:04,120 --> 00:33:06,600 Speaker 1: I don't think people are super keen on that either. 518 00:33:06,720 --> 00:33:08,600 Speaker 1: We would like the best of both worlds, like no 519 00:33:08,720 --> 00:33:12,120 Speaker 1: DRM and still low prices, but you can't get at 520 00:33:12,120 --> 00:33:16,200 Speaker 1: all anyway. That wraps up this episode. I know it's 521 00:33:16,200 --> 00:33:18,400 Speaker 1: a quick one, but we've got a special episode tomorrow, 522 00:33:18,520 --> 00:33:21,440 Speaker 1: so I just wanted to do a fast episode for today, 523 00:33:21,800 --> 00:33:24,000 Speaker 1: and I definitely wanted to talk about it because of 524 00:33:24,040 --> 00:33:28,120 Speaker 1: the Xbox Online issue that I saw earlier today. If 525 00:33:28,160 --> 00:33:30,520 Speaker 1: you have suggestions for topics I should cover in future 526 00:33:30,560 --> 00:33:32,880 Speaker 1: episodes of tech Stuff, please reach out to me. The 527 00:33:32,920 --> 00:33:36,120 Speaker 1: best way to do that is on Twitter. The handle 528 00:33:36,120 --> 00:33:39,400 Speaker 1: for the show is text Stuff hs W and I'll 529 00:33:39,400 --> 00:33:48,560 Speaker 1: talk to you again really soon. Text Stuff is an 530 00:33:48,560 --> 00:33:52,280 Speaker 1: I Heart Radio production. For more podcasts from My Heart Radio, 531 00:33:52,600 --> 00:33:55,760 Speaker 1: visit the i Heart Radio app, Apple Podcasts, or wherever 532 00:33:55,840 --> 00:34:00,280 Speaker 1: you listen to your favorite shows. Zero