Strategy 2: Containment
•Approach:
–distribute content in a virtual lockbox
–only authorized player devices can unlock it
–authorized player devices enforce limits on use
•Typical implementation:
–distribute content in encrypted form
–authorized player knows decryption key
•Can enforce any limits on usage