Home Hard drive copy-protection scheme planned

Hard drive copy-protection scheme planned

Scott Wasson Former Editor-in-Chief Author expertise
In our content, we occasionally include affiliate links. Should you click on these links, we may earn a commission, though this incurs no additional cost to you. Your use of this website signifies your acceptance of our terms and conditions as well as our privacy policy.

This really, really shouldn’t happen, but The Register’s report looks like the real thing. They’ve even confirmed it with IBM. Big Brother is moving into the ATA interface in a big way:

The proposals are already at an advanced stage: three drafts have already been discussed for incorporating CPRM (Content Protection for Recordable Media) into the ATA specification by the NCTIS T.13 committee. The committee next meets in February. If, as expected, the CPRM extensions become part of the ATA specification, copyright protection will be in every industry-standard hard disk by next summer, according to IBM.

Apparently, the copy-protection scheme encrypts data written to drives, while each drive gets a unique identifier. Rendered useless by the new drives: image copy programs like Norton Ghost, backup programs, disk-to-disk copies, and transfers of data from protected drives to non-protected drives—depending, of course, upon the wishes of content providers. (“Content providers” would include everything from music companies to software houses, near as I can tell.) Drive fail? You’ll have to connect to a central server to retrieve your data.

On a philosophical front, this sounds like both a massive hassle and a sweeping, unwelcome intrusion into our personal business. For the better part of my lifetime, first the PC and then the Internet represented a broadening of individual horizons in ways we could almost create just by imagining them. Such a draconion hard drive copy-protection scheme would be the beginning of the end of the PC’s unique role as an all-purpose enabling technological tool.

No, really.

On a practical front, the likelihood of hardware copy-protection succeeding seems rather low. In order for it to really suceed, all types of digital media would have to adhere to such standards. And the scheme would have to be air-tight, or it’d get busted open like a rock-filled pinata in a crack house. (As I type, instant messages are coming in suggesting ways around it: “just do a zip-2 or rar-3 and encrypt whatever.” True.) Not to mention that this kind of thing would be a huge, splitting headache for consumers and corporate IT departments alike.

Long and short of it: The benefits would be grossly outweighed by the problems such a scheme would create, for both hard drive manufacters and their customers. Does that mean it won’t happen? Heck, no. Best buckle up. We may be in for a fight.

The Tech Report - Editorial ProcessOur Editorial Process

The Tech Report editorial policy is centered on providing helpful, accurate content that offers real value to our readers. We only work with experienced writers who have specific knowledge in the topics they cover, including latest developments in technology, online privacy, cryptocurrencies, software, and more. Our editorial policy ensures that each topic is researched and curated by our in-house editors. We maintain rigorous journalistic standards, and every article is 100% written by real authors.

Scott Wasson Former Editor-in-Chief

Scott Wasson Former Editor-in-Chief

Scott Wasson is a veteran in the tech industry and the former Editor-in-Chief at Tech Report. With a laser focus on tech product reviews, Wasson's expertise shines in evaluating CPUs and graphics cards, and much more.