Hacker News new | past | comments | ask | show | jobs | submit login

That was my thinking too. I don't think this K2.0 scheme really fits into the typical DRM scenarios. I'm trying to compare the main components of this set up and other DRM set ups. I can't quite make them match up logically. But something just doesn't add up for me.



Consider applying for YC's Spring batch! Applications are open till Feb 11.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: