Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

What would be the alternative?

Build your whole machine at home?



Linux is the most obvious


On the hardware you build yourself? I don't think so.

The OS and the hardware become irrelevant when you run your apps behind DRM.

At least one thing we can thank the copyright trolls for.


I bought an AMD mini-PC. It came with windows 11, but I just yanked that NVMe drive out, and installed Linux on it. Linux support for such devices is excellent because they're basically down to just one SoC package that's been tested by AMD. This one also has an Intel Wifi/Bluetooth chip, which is exactly as flaky as any other Intel product would be with any other OS.

Anyway, there are options to disable TPM in the BIOS if you care, but I don't think any of the DRM stuff works by default.


I’m very confused. You know what DRM is right? I’m not trying to insult you, but I feel like we’re working with different definitions or something.


Is it a joke?

There are multiple alternatives, for Microsoft Windows or other Microsoft products like Office or Azure.


So, trusting someone else is a solution?


The tradeoff here is "do you want to trust this repeat abuser again, or trust someone else who has not been [as] abusive?", not "do you want to trust this repeat abuser again, or nobody ever again?"

You're presenting an extreme example of a false dichotomy.


I don't see MS as the problem, but the structure of how we, as a society, create and use IT.

Signal uses DRM to protect its users from the OS. This is nice, because now they don't have to run to some other companies that could do the same thing.


Trusting something you can verify is a solution.


Which DRM solutions like TEE and FHE are, so I don't see the issue.


The "DRM" used here by Signal is just a Win32 function that keeps a window out of screen capture, not an anti-tamper software nor a protected media path.


Fair.

But it seems to me that's a step in the right direction, even if it doesn't go far enough.


In such a case as this, yes. Not every systems product is designed to exfiltrate your data.


Yes?

Isn't that how trust works? You stop trusting those that don't deserve it. Unless you're a complete isolationist and/or sociopath living off the land in the woods, you need some level of trust in others.




Consider applying for YC's Fall 2025 batch! Applications are open till Aug 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: