Locklizard
  • Products
    • DRM software
      • Safeguard PDF Security
      • Safeguard Enterprise
      • DRM Software Features
        • Restrict PDF use
        • Watermark PDF
        • Expire PDF
        • Revoke PDF
        • Disable Print
        • Track PDF
    • Secure PDF Viewers
      • Viewer Overview
      • Viewer Demo
      • Web Viewer
      • USB Viewer
    • Add-ons
      • All Add-ons
      • Web Publisher
      • Safeguard Portable USB
      • Ecommerce API
      • Command Line
      • Own Branding
      • Custom Email
    • Purchase & Pricing
    • Book a Demo
  • Solutions
    • Industry sectors
      • All Industries
      • Auctions
      • Engineering
      • Government
      • Healthcare
      • Libraries
      • Mergers & Acquisitions
      • Publishing Ebooks
      • Publishing Media
      • Publishing Standards
      • Membership Associations
      • Reports & Analysis
      • Tax Advisors
      • Training & Education
    • Vertical sectors
      • All Sectors
      • Board Documents
      • Internal Company Use
      • Large Publishers
      • Small Publishers
    • Business processes
      • Processes Overview
      • Secure Document Sharing
      • Sell Documents Securely
      • Document Retention
      • Prevent Document Leakage
      • Internal Document Control
      • Regulatory Compliance
      • Secure PDF Forms
      • Secure Data Rooms
      • Data Room Security
      • Application Integration
    • Business benefits
    • Regulatory compliance
      • Compliance Overview
      • NIST & DFAR Compliance
  • Downloads
    • Free 15 day trial
    • Viewers
      • Windows Viewer
      • Mac Viewer
      • iOS Viewer
      • Android Viewer
    • Writers
    • Manuals
  • Support
    • Support
    • FAQs
    • Guides
    • Videos
    • White papers
  • About Us
    • Contact us
    • Our customers
      • Customer Overiew
      • Case Studies
      • Testimonials
    • Our technology
      • What is DRM?
    • Blog
    • Why Locklizard?
      • Competitors
      • PDF DRM protection
      • Password protect PDF
      • Product Awards
  • Click to open the search input field Click to open the search input field Search
  • Menu Menu

Document DRM & the honor system

in Blog, Document Security, DRM, PDF Security

Document, email & PDF DRM honor systems.

Document, PDF and email DRM relying on the honor system is like putting up a sign asking a burglar nicely not to steal your property.  In practise you need proper security (e.g. a decent lock) and some way of enforcing effective controls.

 

A few days ago Boingboing published a blog explaining that Google has been introducing Digital Rights Management (DRM) features into Gmail messaging and Google Docs – Google’s new ‘confidential mode’ for Gmail and Google Docs, which purports to allow you to send people documents without letting them print, copy or forward them.

They then proceeded to suggest ways of circumventing the DRM controls being introduced.  At the time of writing the article could be found at Google DRM for email can be circumvented and another source at Archiving self-destructing Gmail messages with Firefox.  These studies are, of course purely academic research into the adequacy of security controls.

It seems that underpinning the scheme are two factors:

  • For emails, the original text is held on a Google server (Google Docs) and only linked through to the email
  • The processing is being hidden from view using CSS style sheets and JavaScript that attempts to prevent copying hosted text

So the essence of the DRM protection is relying upon the browser to honor the commands that Google are relying on and hoping that our old adversary the Law of Unintended Consequences does not unleash too many disasters along the way.  Indeed, it is not even a simple matter to send an encrypted email in Gmail – with end-to-end encryption requiring both parties’ organizations to have subscribed to have set up S/MIME.

Enforcing DRM controls

The first problem is that not all browsers implement controls in the same way.  Firefox, for instance, has its own screenshots system that allows it to make copies of pages.  More importantly, you can disable style sheets using its web console without having to leave the browser. You remove the style sheets that are preventing you from seeing what is really going on, allowing you to find the download link and download the text as HTML, where it can be saved.

As Grokprivacy point out, another aspect of the Google DRM implementation is that it allows the sender to recall the message by causing it to self-destruct at the recipient’s mailbox by ceasing access.  This can be a problem if the email or document is awarding a contract or agreeing business terms, and the recipient is not aware that it is a DRM protected document.

But the fundamental issue is the manner of implementation of the “built-in Information Rights Management (IRM)” that is being used to “reduce, the risk of confidential information being accidentally shared with the wrong people.”

Instead of being designed and built with DRM or IRM enforcement in mind, the approach seems more to fit in with available tools and implementations in the expectation that the infrastructure and browser controls will honor the requirements being requested and cannot be subverted by the users.

Grokprivacy are rather sanguine about the ways around these controls using simple steps such as Save Page As, or removing the Style Sheet that prevents printing and then saving a ‘printed’ copy.

The honor system in DRM

The reason why it is so trivial to remove Adobe PDF permissions passwords (the restrictions that stop people from copying, modifying, printing a PDF) is because Adobe relies on the honor system for PDF password security (i.e. please obey the restrictions placed on this document).  Ironically you can print a password protected PDF or permanently remove print restrictions with Google Drive – Print secured PDF files & remove restrictions passwords.  So it is not like Google did not know that the honor system (or bad implementation if you prefer some different words) was a bad idea.

And there is the problem with the honor system – relying on components that you are going to plug in to (just the same as the plug-ins provided by suppliers such as FileOpen Systems that work with Adobe Acrobat).  For instance, “When Acrobat DC is installed using Adobe Creative Cloud Desktop application, it removes Adobe XI along with all plug-ins” (source Acrobat Trial removed previous version plugins).  This followed changing from 32 bit plug-ins to 64 bit on Mac computers.  This article goes into further depth on the issues of PDF plugins and PDF plug in vulnerabilities.

I say honor system because when you use a system that relies on independent third-party software delivering an interface that is fixed and reliable in order that your system will also work, you are relying on other people to behave according to the (often unwritten) rules.  These exist with IT manufacturers through published interfaces (APIs), but there is little if any testing of plug-ins to see if they obey the interface specification correctly or that they don’t mishandle data field lengths and corrupt data used elsewhere in the application.  Often plug-ins are used as a means of gaining access to the code of the application they are plugged into so that they can manipulate other controls – a technique that doesn’t work very well if the application code is changed but the interface definition is not.  After all, the application developer has no reason to think there is a problem – they haven’t changed the interface definition at all, so they aren’t the cause of the problem.  And if data was being overwritten before, but in a way that caused no harm, but now has gone critical – it is still not their problem.

Do honor systems work in practice?

To answer philosophical questions we turn to the academe, who research complicated questions.  Reading Harvard college adopts honor code, Harvard, along with other institutions, studied very carefully how to strengthen a “Culture of Academic Integrity ….excelling in scholarship as inseparable from excellence in character.”  These are the aspirations of those of high principles committed to reversing “the largest recent case of suspected misconduct on an examination.”

What I take this to mean is that although you can have rules and regulations, they do not go far enough.  There needs to be something extra to make the honor system work effectively.  One of the interviewees at Harvard commenting on the approach noted, “Honor codes are a good idea,” says Allison Giebisch ’16, “but there has to be a combination of an honor code and enforceable rules—honor codes help to internalize these values, and rules provide external force.”

What secure alternatives are there for a document DRM system?

Rather than using plugins, Locklizard provide a series of installed Secure PDF Viewers for controlling their PDF DRM documents.

We only protect PDF files because the PDF document definition is a stable working environment even if the number of applications producing files in the PDF format has increased steadily since it was launched as an ISO standard format as ISO 32000-1 2008.  Changing rarely allows for stability and reliability.

Using a specialised application to view protected PDF documents means not being exposed to attacks (intentional or not) against the integrity of your own system, and the ability to provide a strong shell to prevent hacking and mishandling of data fields and so on.  It also means that you can develop systems that lack features that could be used to obtain unprotected copies.  This is difficult to do if there is no Save function and the Print function is directly controlled by the Viewer and not easy to switch on or off.

So not having to rely on the honor system has some very powerful benefits when you are looking to apply security to digital documents.  It also means that you are using applications that were specifically designed to secure PDF documents rather than applications that are trying to patch security into a system that was not designed for it in the first place. This does not necessarily mean that you have to give up your Google Workplace subscription, either. As covered in How to add PDF to Google Docs, it’s possible to embed a protected PDF into an existing Google Doc. You can also of course send your protected PDF via Gmail or Google Drive.

 

Tags: document drm, document security, email document securely, email drm, email pdf securely, pdf drm, pdf security, revoke pdf, send document securely, send pdf securely, sending pdfs securely, share document securely, share pdf securely
Share this entry
  • Share on Facebook
  • Share on X
  • Share on WhatsApp
  • Share on Pinterest
  • Share on LinkedIn
  • Share on Tumblr
  • Share on Reddit
  • Share by Mail

Free Trial

“Fantastic product… outstanding support.”

“We would recommend Locklizard to others”

“The clear leader for PDF DRM protection”

“Our ebook sales have gone through the roof”

“Simple & secure – protects IPR from theft”

Trusted by:

Protect IPR

See why thousands of companies use Locklizard to safeguard their documents and increase revenue streams.

  • Our Customers
  • Customer Testimonials
  • Customer Case Studies
  • Locklizard vs Competitors

Latest Posts

  • Cloud Document Collaboration & Document SecurityFebruary 18, 2025 - 10:22 am
  • Stopping Screen Sharing & Recording of DocumentsJanuary 30, 2025 - 10:58 pm
  • ISO 9001 and Document SecurityJanuary 8, 2025 - 9:02 pm
  • How to expire links for file sharing and downloadsDecember 17, 2024 - 10:14 pm
  • Digital Libraries, Controlled Digital Lending & eBook DRMNovember 30, 2024 - 4:19 pm
PDF DRM Features
  • Protect PDF files
  • Stop PDF sharing
  • Stop PDF copying
  • Restrict PDF editing
  • Add PDF watermarks
  • Disable PDF printing
  • Stop screenshots
  • Expire PDF files
  • Revoke PDF files
  • Lock PDF to devices
  • Lock PDF to IP
  • Track PDF opens

How To Guides

How to stop sharing screen
How to expire download links
How to sell study notes
How to print to PDF
How to protect Autocad files
How to protect a document
How to unlock a protected PDF
How to expire Excel files
How to watermark in Excel
How to protect Excel files
Save a Google Doc as PDF
How to share a PDF online
How to insert PDF into Word
How to edit a protected PDF
How to convert ePub to PDF
How to prevent PDF download
How to share Google Docs
How to prevent PDF download
Enforce do not copy distribute
Share sell PDF in WordPress
How to remove a watermark
How to add security to PDF
Publish digital publications
How to share a PDF as a link
How to timestamp a PDF
Insert PDF into Google Doc
How to convert Word to PDF
How to convert PDF to Word
Share securely in SharePoint
How to encrypt email in Gmail
How to encrypt PDF files
How to recall unsend an email
How to watermark PowerPoint
How to lock a Word document
How to santize PDF files
How to lock a Google doc
Prevent PDF security removal
Protect Word without password
Add a dynamic watermark
Password protect Google Doc
Add a watermark in Word
Make a PDF non editable
How to create a stamped PDF
How to prevent ebook piracy
Password protect a Word doc
How to protect a PDF securely
How to revoke document access
Change PDF security settings
How to disable printing of PDFs
Sell online courses securely
How to add security to a PDF
Encrypt a PDF without Acrobat
Share documents securely
How to prevent PDF sharing
Protect confidential documents
How to publish ebooks securely
How to restrict PDF editing
How to password protect a PDF
How to protect ebooks
How to sell Reports securely
How to make a PDF read only
How to send a PDF securely
How to watermark a PDF
How to lock a PDF from editing
How to encrypt a PDF
How to make a PDF expire
How to password protect a PDF
How to protect online courses
How to email a PDF securely

Try Safeguard today

Start protecting your PDF files and documents from sharing & piracy

PRODUCTS

DRM Software
Safeguard
Safeguard Enterprise

Add-ons

  • eCommerce API
  • Command Line
  • USB Protect
  • Web Publisher
  • Own Branding
  • Custom Email

Secure PDF Viewers

  • Web Viewer
  • USB Viewer

SECURITY FEATURES

Stop copying, editing, saving
Disable PDF Prints
Block Screenshots
Disable Copy Paste
Dynamic Watermarks
Expiry & Self Destruct
Revoke Documents
Device Locking
Location Locking
Track PDF Use

PRICING

Purchase & Pricing

RESOURCES

FAQs
Locklizard Blog
Knowledgebase
Security Guides
White Papers
Viewer Demo
Videos

DOWNLOADS

Secure Viewers

  • Windows
  • Mac OS X
  • iOS
  • Android

Writers
Product Manuals
FREE Trial

DOCUMENT SECURITY

Share Documents Securely
Protect Online Courses
Stop Ebook Piracy
Document Encryption
Secure PDF Distribution
Protect Confidential Documents
Ebook DRM

Protect PDF Files

  • PDF Copy Protection
  • Lock PDF files
  • Encrypt PDF
  • Secure PDF
  • PDF DRM

INDUSTRY SECTORS

Training & Elearning
Publishing Ebooks
Publishing Standards
Online Libraries
Membership Associations
Engineering
Government
Healthcare
Mergers & Acquisitions
Secure Reports From Theft

  ABOUT US

About Us

Our DRM Technology

  • What is DRM?

Customers

  • Case Studies
  • Testimonials

Locklizard vs Competitors

  • Secure Data Rooms

Company Brochure

  CONTACT

sales@locklizard.com
support@locklizard.com

Business Hours:
US: 8AM to 17.00PM EST
UK: 9AM to 17.30PM GMT

© Copyright 2004-2025 Locklizard Limited. All rights reserved.Privacy Policy|GDPR Policy|Cookie Policy|SITE MAP

Link to: How to send PDFs securely by email with DRM security Link to: How to send PDFs securely by email with DRM security How to send PDFs securely by email with DRM securityLink to: Finance Document Protection Link to: Finance Document Protection Finance Document Protection
Scroll to top Scroll to top Scroll to top