Feeds

iTunes Plus - plus user details that is

DRM-free tracks can be traced to original owner

Intelligent flash storage arrays

Apple's much touted DRM-free music download service launched yesterday under the moniker iTunes Plus.

But apparently such freedom comes at a price as the computer giant failed to highlight one important point: customers using iTunes Plus will have their username and email address embedded in each DRM-free track they download.

According to speculation on Slashdot and elsewhere it seems Apple has done this possibly to monitor the volume of tracks uploaded by its customers onto peer-to-peer networks.

In other words, the firm headed by Steve Jobs has given itself a built-in copyright insurance policy whereby illegally shared music can be traced back to the original owner.

But, seeing as such information can be easily spoofed, proving copyright has been infringed could be tricky for Apple.

Arstechnica.com, which spotted the hidden user account details, said that Apple already embedded account information on DRM tracks. But this was obviously not a major issue for files encumbered by digital rights management.

Apple signed up EMI in April this year. The music giant is the first of the so-called Big Four to join the DRM-free party.

Its extensive catalogue which includes music from the likes of Sir Paul McCartney, Frank Sinatra and Coldplay is now available via the iTunes Plus service with each AAC encoded track costing $1.29 to download.

EMI CEO Eric Nicoli described the DRM crossover as a "tremendous milestone for digital music" and reckoned "consumers are going to love listening to higher quality iTunes Plus tracks from their favorite EMI artists with no usage restrictions."

Jobs said: "Our customers are very excited about the freedom and amazing sound quality of iTunes Plus.

"We expect more than half of the songs on iTunes will be offered in iTunes Plus versions by the end of this year."

El Reg is awaiting a response from Apple to clarify why the data is stored in this way. ®

Internet Security Threat Report 2014

More from The Register

next story
The 'fun-nification' of computer education – good idea?
Compulsory code schools, luvvies love it, but what about Maths and Physics?
Facebook, Apple: LADIES! Why not FREEZE your EGGS? It's on the company!
No biological clockwatching when you work in Silicon Valley
Happiness economics is bollocks. Oh, UK.gov just adopted it? Er ...
Opportunity doesn't knock; it costs us instead
Ex-US Navy fighter pilot MIT prof: Drones beat humans - I should know
'Missy' Cummings on UAVs, smartcars and dying from boredom
Yes, yes, Steve Jobs. Look what I'VE done for you lately – Tim Cook
New iPhone biz baron points to Apple's (his) greatest successes
Lords take revenge on REVENGE PORN publishers
Jilted Johns and Jennies with busy fingers face two years inside
Sysadmin with EBOLA? Gartner's issued advice to debug your biz
Start hoarding cleaning supplies, analyst firm says, and assume your team will scatter
Edward who? GCHQ boss dodges Snowden topic during last speech
UK spies would rather 'walk' than do 'mass surveillance'
Doctor Who's Flatline: Cool monsters, yes, but utterly limp subplots
We know what the Doctor does, stop going on about it already
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Three 1TB solid state scorchers up for grabs
Big SSDs can be expensive but think big and think free because you could be the lucky winner of one of three 1TB Samsung SSD 840 EVO drives that we’re giving away worth over £300 apiece.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.