Self expire content in pen drive which can’t be copied

Welcome to Programming Tutorial official website. Today - we are going to cover how to solve / find the solution of this error Self expire content in pen drive which can’t be copied on this date .

My friend has been working on few lectures and study material from past few years and now he want to sell his content. He is worried about his content being stolen or being used without purchase. Most of his customers are regional person to whom he will give the content manually. He as following requirement –

  1. User won’t be able to copy paste content (Video lectures and documents) to their PC.
  2. Only 1 person can use it on one PC.
  3. Content should self expire in 1 year.

Is there any way I can suggest him? I don’t want his hard work go in vain. I can understand that this requirement is quite difficult to achieve but I would appreciate any suggestion which can assist him.

Answer

Since you can’t prevent users from copying files from a USB drive the best you can do is make them useless to them.

To that end:

  1. Each file is encrypted with a different key and different per USB stick.
  2. Obviously 2048 bit encryption and etc
  3. Software provided that phones home to a server to check whether the user is still eligible for access to the content. Username and password required of course.

You will have to have a custom viewer that has access to said decryption keys which you will have to use and immediately destroy. Fetching new copies from the server each time a file is required. When the keys is in RAM the RAM its in has 2 levels of encryption so even if the RAM is dumped its meaningless. Obviously change the random decryption keys of the RAM every 5 minutes for added difficulty.

This is a lot of work to implement.

Even then a persistent hacker might be able to man-in-the-middle and get decryption keys. If a breach is detected you can void the decryption keys. A hacker could use screen recording software, or etc to re-record the material and OCR on the text.

However, you have dramatically raised the difficult for both you and the hacker.