1. Hacking
The most blatant example of this shift involves DVD technology, and the relatively new idea of "Second-Level Access Controls". ... For instance, DVD manufacturers have the power to control who uses their products, and how they are used. "To control the use of their product, the MPAA encrypts their DVDs and then sells the decryption code to the manufacturers of DVD players. So if you wanted to build your own DVD player to play the DVDs you owned, you couldn't without first paying them a licensing fee and being somebody they want to contract with." ...
- Word Count: 2186
- Approx Pages: 9
- Has Bibliography