Contents
INTRODUCTION
CHAPTER 1: THE HISTORICAL CONTEXT
Past trusted systems
Copyright legislation
Defenders of the public domain
Technological defenses against infringement
The TCPA
The CBDTPA
Information security concerns
Summary
CHAPTER 2: ANNOUNCEMENTS AND CRITICAL REACTIONS
Customer lock-in
Censorship
Prevention of first sale and fair use
Invasion of privacy
Failure to protect against viruses
Summary
CHAPTER 3: THE INDUSTRY