Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Is it abuse? Are there rules about what sorts of media can and cannot be protected by DRM?


Yeah, technically this seems like exactly a DRM scenario: Party A sends information to party B intended for use in a specific context, but wants to limit the risk of it being stored or forwarded for use by other parties or in other contexts.


It's not even DRM, just a Win32 call that hides the window from screen capture. There's no anti-tamper or protected media path.




Consider applying for YC's Fall 2025 batch! Applications are open till Aug 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: