https://bugzilla.mozilla.org/show_bug.cgi?id=923590
(I am not the reporter of the above bug, but some comments on the bug suggest 
it should be posted about on these forums: I agree.)

In summary, in addition to all the other ways that it would violate the 
principles of openness, HTML5 DRM would cripple any meaningful security in the 
browser.


It would:
- require closed binary blobs.
- prevent security verification of that code.
- prevent projects like TOR and TAILS from using the browser.
- permit the NSA and others to invisibly embed security breaches.
- permit tracking of the browser even when all tracking is off.

I don't feel that having a checkbox to turn it off is a sufficient solution, 
given the huge security and privacy issues, and the potential for feature creep.

So I'd agree with the bug report's argument against implementing any form of 
DRM by any name, whether "content protection" or "Encrypted Media Extensions".

Instead I'd recommend to remain fully open, implementing the HTML Living 
Standard of the WHATWG, rather than the HTML5.1 of the W3C, and just continue 
to permit separately-distributed, closed-blob plugins within a careful security 
sandbox.


Five of the ten principles from the Mozilla Manifesto 
(http://www.mozilla.org/en-US/about/manifesto/) are directly relevant here:

2. The Internet is a global public resource that must remain open and 
accessible.
4. Individuals’ security on the Internet is fundamental and cannot be treated 
as optional.
5. Individuals must have the ability to shape their own experiences on the 
Internet.
7. Free and open source software promotes the development of the Internet as a 
public resource.
8. Transparent community-based processes promote participation, accountability, 
and trust.
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to