Presentation is loading. Please wait.

Presentation is loading. Please wait.

Trusted Computing, Peer-To-Peer Distribution, and the Economics of Pirated Entertainment Peter Scott Based on paper by S. E. Schechter, R. A. Greenstadt,

Similar presentations


Presentation on theme: "Trusted Computing, Peer-To-Peer Distribution, and the Economics of Pirated Entertainment Peter Scott Based on paper by S. E. Schechter, R. A. Greenstadt,"— Presentation transcript:

1 Trusted Computing, Peer-To-Peer Distribution, and the Economics of Pirated Entertainment Peter Scott Based on paper by S. E. Schechter, R. A. Greenstadt, and M. D. Smith

2 Digital Rights Management One of the big reasons for pushing trusted computing is preventing piracy. Remote attestation: only play media on trusted player hardware/software. Sealed storage: prevent other programs from reading media. Secure memory: hide player memory from OS Secure output: create trusted path from computer to monitor, speakers, etc.

3 The Analog Hole Problem: video cameras, audio recorders. Trusted computing can’t secure sound waves, or the light coming from a computer screen. Upper bound: DRM can never make piracy harder than making an analog recording. – It’s not hard to make good-quality analog recordings, and the cost keeps falling.

4 Cost of piracy (to pirates) Two components of the cost: – One-time extraction cost e – Per-copy distribution cost d Cost per copy (for n copies total):

5 Costs depend on technology Before high-speed Internet: per-copy distribution costs dominated. Currently: per-copy costs almost 0, extraction cost very low. DRM raises extraction cost, with upper bound imposed by analog hole. Attacking file-sharing raises distribution costs, with no upper bound.

6 Attacks on P2P file-sharing Gather IP addresses and log their activity. Sue the top uploaders. (“The nuclear option”) Share fake files. Drown out signal with noise. Pretend to be other users, to mess up reputation mechanisms (e.g. share ratio) Denial of service attacks, e.g. – Flood network with search requests – Mess up network topology information.

7 Trusted clients only! Remote attestation to ensure trusted client/OS combination. Encrypt all connections with securely-stored session keys, and sign data with keyed hash. – Prevents snooping, spoofing. Use reputation system to prevent DoS attacks and sharing fake files.

8 How to stay anonymous? How can P2P networks protect against their uploaders getting sued? 1.Encrypt all data end-to-end. 2.Re-route traffic through intermediate nodes, like The Onion Router, to foil network analysis. 3.Keep as much of the routing data in secure memory as possible. This all works better with trusted clients.

9 Example: BitTorrent Malicious client connects to central tracker, gets list of peers. Then: 1.Connect to peers, request download of copyrighted files. 2.Store all information – filename, IP address, time, etc., in a database. 3.Do DNS WHOIS search, notify ISP and/or file lawsuits. To prevent: use relay nodes, and trusted client to prevent network topology discovery.

10 Relay nodes Don’t have Alice send a message to Bob. Instead: – Alice sends message to Tom, – Tom sends message to Ulysses, – Ulysses sends message to Veronica, – Veronica sends message to Bob. Encrypt the message so that nobody knows who’s sending what to whom except for Alice and Bob. (How?)

11 Untrusted clients: Onion routing Alice comes up with a sequence of node hops, She sends the first relay an “Onion” data structure: – Next node info – Onion for the rest of the relays Each relay knows only part of the path. Uses layered encryption

12 Trusted clients: known relay topology Route packets in a randomized way. Load balance dynamically, for speed. Don’t worry about keeping relays in the dark; they have curtained memory and trusted software! Increases resistance to traffic analysis. (Problem: adversaries who can break the TPM.)

13 Back to the economics Trusted computing raises e, to a point. It can also lower d, a lot, by making distribution easier and safer. Trusted Computing for DRM may backfire spectacularly!

14 Back to the economics Trusted computing raises e, to a point. It can also lower d, a lot, by making distribution easier and safer. Trusted Computing for DRM may backfire spectacularly! Questions?


Download ppt "Trusted Computing, Peer-To-Peer Distribution, and the Economics of Pirated Entertainment Peter Scott Based on paper by S. E. Schechter, R. A. Greenstadt,"

Similar presentations


Ads by Google