Archive
Are NFTs the future of digital IP and the creative world, or just a remix of DRM and all its woes? (Part 5)
This is last in a series of posts to share some observations, opinions and conclusions on this intriguing technology which sits squarely at the intersection of digital, creativity and intellectual property. The topic is broken down into the following parts:
- What are NFTs (and the non-fungibility superpower)?
- What has this got to do with Intellectual Property (and content protection)?
- Does it mean that NFTs are like DRM remixed?
- How does it affect the creative industry today and in the future?
- Summary observations and conclusions.
Are NFTs the future of digital IP and the creative world, or just a remix of DRM and all its woes? (Part 4)
This is fourth in a series of posts to share some observations, opinions and conclusions from playing with this intriguing technology that sits squarely at the intersection of: digital technology, creative content and intellectual property. The topic is broken down into the following parts:
- What are NFTs (and the non-fungibility superpower)?
- What has this got to do with Intellectual Property (and content protection)?
- Does it mean that NFTs are like DRM remixed?
- How does it affect the creative industry today and in the future?
- Summary observations and conclusions.
Are NFTs the future of digital IP and the creative world, or just a remix of DRM and all its woes? (Part 3)
This is third in a series of posts to share some observations, opinions and conclusions from playing with this intriguing technology that sits squarely at the intersection of digital technology, creative content and intellectual property. The topic is broken down into the following parts:
- What are NFTs (and the non-fungibility superpower)?
- What has this got to do with Intellectual Property (and content protection)?
- Does it mean that NFTs are like DRM remixed?
- How does it affect the creative industry today and in the future?
- Summary observations and conclusions.
The World Beyond Blockchain – Part 2/3: The Eye of the Storm

- Increased regulation – There’s a looming threat or promise of tighter intervention by regulatory bodies and governments, especially for ICOs due to their conceptual proximity to the highly regulated securities industry. Other drivers include: reducing tax evasion, fraud, money laundering, anti-terrorism, as well as impact on PII (Personally Identifiable Information) data vs. the right to be forgotten and GDPR.
- Security – Also, many security concerns persist, particularly in light of regular headlines about hacking, outright theft and other malfeasance. Increased Cryptojacking, i.e. the practice of stealing other people’s device processing power to mine cryptocurrency, is also a concern.
- Scalability and fragmentation – it takes significant computing effort to mine Bitcoins, or to verify transactions, which has long raised concerns over its long term performance and scalability. The resulting splits or ‘ forks’ in that cryptocurrency have provided a vast array of competing coins (e.g.: Bitcoin! / Bitcoin XT / Bitcoin Unlimited / Bitcoin Cash / Segwit / Bitcoin Gold). Furthermore, there are myriad cryptocurrency wallets and exchanges to chose from, which can be rather daunting. Also the aforementioned next generation networks which use: Directed Acyclic Graphs (DAG) / voting algorithms / gossip protocols to deliver more flexibility, scale and performance.
- Energy Consumption – Furthermore, the high cost of energy required to mine proof-of-work cryptocurrencies is another growing area of concern as it contributes to the spectre of global warming.
- Privacy – Finally, the early association of Bitcoin with illicit and subversive activities on darknet sites (such as the defunct Silk Road and Alphabay) hasn’t really gone away, especially with the rise of privacy focused cryptocurrencies such as: Monero, Dash, zCash, Verge and DeepOnion. Contrary to popular belief, Bitcoin itself does not guarantee privacy because transactions can be linked to individuals (albeit with some effort), and all Bitcoin transactions are recorded for posterity on a very public Blockchain.
The World Beyond the Blockchain – Part 1/3: The Perfect Storm
- According to CBIsights Research, Bitcoin is the first decentralized, censor-proof, portable, secure, durable, and scarce digital asset.
- The underlying Blockchain is built on a solid foundation of proven technologies including public key cryptography, hashing and TCP/IP (aka the Internet protocols).
- The Blockchain is one of several disruptive technologies that will enable and drive the so-called fourth industrial revolution.
- Following 2008’s financial meltdown, with subsequent financial reforms and various other aftershocks, many institutions, including banks and governments, are suffering a major ‘crises of legitimacy‘ which is eroding their traditional role as trusted middlemen for many transactions
- Global unemployment, hunger, terrorism, wars, natural disasters and mass migration all highlight and exacerbate inequality, xenophobia, mistrust and dissatisfaction with the status quo.
- The speed and scale of disruption and adoption of Blockchain applications is phenomenal, and it challenges existing systems of production, managment and governance
Fidget spinning and the ‘big brain’ syndrome.
Looking ahead into the future, some forward thinking people might ask what key skills the younger generation should develop in order to survive, thrive and succeed in tomorrow’s world. There is no doubt in their minds that the skills, qualifications and advantages of the present day will no longer suffice in the technology infused world of tomorrow.
For obvious reasons, any answers to this question should be taken with a pinch of salt, therefore I shan’t even venture into that minefield, but suffice to say that judging from current trends in tech (e.g. biotech, AI, IoT, data analytics, and even Blockchain), the future will be something far more dynamic and fluid than we currently imagine and it’ll challenge even the best of us to compete. However, the ability to adapt to change is probably humanity’s greatest asset, and in this case, that ability resides in mankind’s evolutionary weapon of choice – the brain. It’ll require a big enough brain to recognise, comprehend and grasp the opportunities that present themselves in a post human transition.
I say post human transition because we’ll likely need superhuman abilities to engage effectively with even a mere subset of the predicted changes to come. The enabling technologies in place today only hint at possibilities beyond which we cannot easily envisage. A few weeks ago I came across someone with the big brain outlook, and based on our conversation, I came away with a few key characteristics that can help define the big brain advantage, as follows:
- It’s a lonely existence – having a big brain means stepping out on a limb. Even when others are busy fretting about current and future ghosts or bogeymen, they’ll often go out alone into the dark to explore the extent of an unfolding phenomenon.
- It takes guts – in order to be able to step out into the unknown, you’ll need a pair of big brass balls to scare any real or perceived demons in the dark. Innovators and pioneers meet this challenge head-on and forge ahead where others fear to tread.
- An eclectic worldview is essential – the ability to appreciate the big picture in all its variety, diversity and pervasive interconnectedness is crucial to this mindset. Look for it in those with atypical backgrounds and experiences, e.g. that well-travelled outlier in a homogenous group.
So what has this go to do with the humble, if irritating fidget spinner? Well a fidget spinner requires some manual dexterity as well as sensory input and feedback, and it apparently helps those with certain forms of attention deficit disorders, but it has gone viral and become a fad with school age kids (& some adults) everywhere.
Bipedal locomotion, opposing thumb digits and accompanying manual dexterity are adaptions that contributed to the evolution of ‘big brained’ Homo sapiens, aka thinking man. This evolutionary advantage led to the dominance of human beings on earth. In much the same light, it could be argued that those heads-down, hunch-shouldered, smartphone-wielding people you find everywhere these days are merely taking human cultural evolution to the next level by mastering necessary digital dexterity and information processing skills required to gain that digital advantage. So next time you see a fidget-spinning, smartphone-messaging kid, be rest assured this is a fine specimen of the next phase in human evolution – Lord help us all!
Copyright, Blockchain, Technology and the State of Digital Piracy
Predicting the (near) Future
DRM for Things – Managing rights and permissions for IOT
Given the proliferation of interconnected ‘Things’ on the Internet (aka IoT), it was only a matter of time before the pressing need for robust, pervasive governance became imperative. How can we manage the rights and permissions needed to do stuff with and / or by things? The following are some thoughts, based on a previous foray into the topic, and building on my earlier book on the related world of Digital Rights Management (aka DRM).
Does anyone remember DRM – that much maligned tool of real / perceived oppression, (somewhat ineptly deployed by a napsterized music industry)? It has all but disappeared from the spotlight of public opinion as the content industry continues to evolve and embrace the complex digital realities of today. But what has that got to do with the IoT, and what triggered the thought in the first place, you might ask…
Well, I recently had opportunity to chat with friend and mentor, Andy Mulholland (ex global CTO at Capgemini), and as usual, I got a slight headache just trying to get a grip on some of the more esoteric concepts about the future of digital technology. Naturally we touched on the future of IoT, and how some current thinking may be missing the point entirely, for example:
What is the future of IoT?
Contrary to simplistic scenarios, often demonstrated with connected sensors and actuators, IoT ultimately enables the creation and realisation of a true digital services economy. This is based on 3 key aspects of: ‘Things’, ‘Events’ and ‘Connectivity’ which will work together to deliver value via autonomous agents, systems and interactions. The real players, when it comes to IoT, actually belong outside the traditional world of IT. They include organisations in industries such as manufacturing, automotive, logistics etc., and when combined with the novel uses that people conceive for connected things, the traditional IT industry is and will continue to play catch up in this fast evolving and dynamic space.
What are key components of the IoT enabled digital services?
An autonomous or semi-autonomous IoT enabled digital service will include: an event hub (consisting of graph database and complex event processing capability) in the context of ‘fog computing‘ architectures (aka cloud edge computing) – as I said, this is headache territory (read Andy’s latest post if you dare). Together, event handling and fog computing can be used to create and deliver contextually meaningful value / services for end users. The Common Industrial Protocol (CIP) and API engines will also play key roles in the deployment of autonomous services between things and / or people. Finally, businesses looking to compete in this game need to start focusing on identifying / creating / offering such resulting services to their customers.
Why is Graph Database an important piece of the puzzle?
Graph databases provide a way to store relationships in an unstructured manner, and IoT enabled services will need five separate stores for scaled up IoT environments, as follows:
- Device Info – e.g. type, form and function, data (provided/consumed), owner etc.
- Customer/Users – e.g. Relationship of device to the user / customer
- Location – e.g. Where is device located (also relative to other things / points of reference)
- Network – e.g. network type, protocols, bandwidth, transport, data rate, connectivity constraints etc.
- Permission – e.g. who can do: what, when, where, how and with whom/what, and under what circumstances (in connection with the above 4 four graphs) – According to Andy, “it is the combination of all five sets of graph details that matter – think of it as a sort of combination lock!”
So how does this relate to the notion of “DRM for Things”?
Well, it is ultimately all about trust, as observed in another previous post. There must be real trust in: things (components and devices), agents, events, interactions and connections that make up an IoT enabled autonomous service (and its ecosystem). Secondly, the trust model and enforcement mechanisms must themselves be well implemented and trustworthy, or else the whole thing could disintegrate much like the aforementioned music industry attempts at DRM. Also, there are some key similarities in the surrounding contexts of both DRM and IoT:
- The development and introduction of DRM took place during a period of Internet enabled disruptive change for the content industry (i.e. with file sharing tools such as: Napster, Pirate Bay and Cyberlockers). This bears startling resemblance to the current era of Internet enabled disruptive change, albeit for the IT industry (i.e. via IoT, Blockchain, AI and Social, Mobile, Big Data, Cloud etc.)
- The power of DRM exists in the ability to control / manage access to content in the wild, i.e. outside of a security perimeter or business boundary. The ‘Things’ in IoT exist as everyday objects, typically with low computing overheads / footprints, which can be even more wide ranging than mere digital content.
- Central to DRM is the need for irrefutable identity and clear relationships between: device, user (intent), payload (content) and their respective permissions. This is very much similar to autonomous IoT enabled services which must rely on the 5 graphs mentioned previously.
Although I would not propose using current DRM tools to govern autonomous IoT enabled services (that would be akin to using yesterday’s technology to solve the problems of today / tomorrow), however because it requires similar deperimeterised and distributed trust / control models there is scope for a more up-to-date DRM-like mechanism or extension that can deliver this capability. Fortunately, the most likely option may already exist in the form of Blockchain and its applications. As Ahluwalia, IBM’s CTO for Cloud, so eloquently put it: “Blockchain provides a scalable, trustworthy, highly distributed, redundant and peer-to-peer verification process for processing, coordinating device interactions and sharing access to assets in an IoT network.” Enough said.
In light of the above, it is perhaps easier to glimpse how an additional Blockchain component, for irrefutable trust and ID management, might provide equivalent DRM-like governance for IoT, and I see this as a natural evolution of DRM (or whatever you want to call it) for both ‘things’ and content. However, any such development would do well to take on board lessons learnt from the original Content DRM implementations, and to understand that it is not cool to treat people as things.
Leading Digital In Practice