Feeds

Mozilla CTO blasts WC3 plans to bless anti-piracy DRM tech in HTML5

Brendan Eich warns of 'The Bridge of Khazad-DRM'

The smart choice: opportunity from uncertainty

The co-founder and CTO of Mozilla Brendan Eich has issued a strongly worded statement decrying moves by the World Wide Web Consortium (W3C) to allow digital rights management plugins to be included in the specifications for HTML5 and future code iterations.

Last year Microsoft, Google and Netflix submitted a proposal to web standards overlord W3C to allow the use of Encrypted Media Extensions (EME) that would allow companies to build plugins for watching DRMed content in browsers.

The proposals are supported by the W3C and Sir Tim Berners-Lee – the web's daddy basically told users to get over it and accept that anti-piracy tech such as DRM was going to be in their future. But the Free Software Foundation and EFF have both objected strongly to the proposals, and have now been joined by Eich and, by inference, Mozilla itself.

"We see DRM in general as profoundly hostile to all three of: users, open-source software, and browser vendors who aren’t also DRM vendors," he said in a blog post titled "The Bridge of Khazad-DRM".

"What the W3C is entertaining, due to Netflix, Google, and Microsoft’s efforts, is the EME API, which introduces new plugins that are neither Silverlight nor Flash, called Content Decryption Modules (CDM for short), into HTML5. We see serious problems with this approach. One is that the W3C apparently will not specify the CDM, so each browser may end up having its own system."

Eich said Mozilla wasn't against any plugins using DRM, indeed Mozilla's browsers supported some such code. But the he feels W3C is making a major mistake in not specifying the exact form of DRM that can be used, which could leave browser manufacturers having to deal with competing and possibly incompatible systems.

He likened the situation to the bad old days when Microsoft's ActiveX was rife, and said that for the open-source community any move to DRM would cause massive problems in coding and implementation. Some plugins could even be dependent on having the right kind of operating system, and as such Mozilla is taking a stand against the proposed EME system.

"Here is a narrow bridge on which to stand and fight — and perhaps fall, but (like Gandalf) live again and prevail in the longer run. If we lose this battle, there will be others where the world needs Mozilla," Eich concluded. ®

Securing Web Applications Made Simple and Scalable

More from The Register

next story
NO MORE ALL CAPS and other pleasures of Visual Studio 14
Unpicking a packed preview that breaks down ASP.NET
Cheer up, Nokia fans. It can start making mobes again in 18 months
The real winner of the Nokia sale is *drumroll* ... Nokia
Mozilla fixes CRITICAL security holes in Firefox, urges v31 upgrade
Misc memory hazards 'could be exploited' - and guess what, one's a Javascript vuln
Put down that Oracle database patch: It could cost $23,000 per CPU
On-by-default INMEMORY tech a boon for developers ... as long as they can afford it
Google shows off new Chrome OS look
Athena springs full-grown from Chromium project's head
Apple: We'll unleash OS X Yosemite beta on the MASSES on 24 July
Starting today, regular fanbois will be guinea pigs, it tells Reg
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.