No Code SaaS Mobile App Security.  

Start Free Trial

"It only took 3 minutes for a page to spread."

Why blocking DRM bypass for e-books and web novels is the top priority for content apps.

"It only took 3 minutes for a page to spread."
Why blocking DRM bypass for e-books and web novels is the top priority for content apps.

"It was clearly a paid serialized episode. But when I searched, I found it was already available for free."

This was a tip received by a web novel platform operator early in the morning. The episode in question was the latest, uploaded just a few minutes ago. Unbeknownst to the author or the platform, the content was already spreading through illegal online communities and Telegram chatrooms.

From this point on, the problem with content apps shifted from simply illegal downloads to the survival of the platform.

 

The Real Problem – Why DRM Collapsed?
The investigation revealed that the attack method was simpler than expected. • Screen capture and screen recording using a modified app
• Viewer resources were directly extracted to secure original images and text
• DRM-removed files were played on illegal viewers
• Subsequently, they were redistributed as data for online communities, web hard drives, and AI training.

A particularly problematic aspect was that all of this was accomplished without attacking the server, but rather by manipulating the app execution environment.

While the server was secure, the DRM was disabled the moment the app was launched.

 

Security Collapse Point – Why Was It Not Prevented?
The platform structure at the time had critical vulnerabilities.

• No verification of app forgery or modification
• Failure to detect capture, recording, and hooking environments
• Lack of blocking of abnormal execution environments (emulators, rooted devices)
• DRM operated based on the assumption that the app was legitimate. Ultimately, the attacker was able to extract DRM-protected content from an environment that appeared to be a legitimate app.

 

LIAPP, LISS, and LIKEY-based DRM Defense Strategy
The defense employed to address this issue was a practical mobile DRM defense.

 

LIAPP – App Integrity and Forgery Detection (DRM Starting Point)
•Immediately blocks repackaged and modified apps
•Detects hooking frameworks and debugging environments
•Detects macros

 

LISS – Screen Capture and Recording Blocking
•Blurs and blocks content when running screen recording apps
•Detects screen capture mirroring

 

LIKEY – Input and Viewer Section Protection (Supplementary Role)
•Automatic Input Blocking Based on Illegal Viewers

 

What Changed After Implementation?
The changes after the security implementation were clear.

•Content access blocked from illegal viewer and modified apps
•Plummeting number of leaks of the latest episodes
•Maintaining writer contracts and restoring trust
•Reducing costs of responding to illegal distribution
•Creating a user perception of "capture-proof apps"

The most significant change was that both writers and platforms regained control.

 

 A Word from an Official
"I know it's impossible to completely eliminate leaks. But now, at least in normal apps, they never leak. This difference is a living wage for authors and a criterion for survival for platforms."

 

Lesson
DRM for e-books and web novels cannot be secured solely by file encryption technology.

• The app has not been tampered with.
• The screen has not been duplicated.
• It cannot be scraped automatically.
Only when all of these conditions are met does DRM truly become a shield to protect content.
LIAPP, LISS, and LIKEY are the minimum requirements for content apps to create an environment that "allows only normal consumption."

#eBookSecurity #WebNovelDRM #ContentSecurity #IllegalDistributionBlocking #ScreenCaptureBlocking #ScreenRecordingBlocking #RepackagingBlocking #MobileDRM #PublishingPlatformSecurity #CopyrightProtection #ContentProfitProtection #LIAPP #LISS #LIKEY #AppSecurity #WebNovelPlatform #EBookPlatform #ContentIPProtection

Contact Us