Based on a recent study, the movie and video business misplaced $29B to piracy final yr alone. That interprets to an estimated 230,000-560,000 jobs killed by piracy.
Now you may assume that piracy is simply an issue for giant studios and Hollywood blockbusters, however piracy impacts all of us.
In case your artistic or enterprise companions take a success from a leaked mission, that interprets into misplaced alternatives so that you can proceed to work with them down the street. Even worse, in case your crew or facility is liable for the leak, that may very well be recreation over for your small business.
So whether or not or not you’ve ever had a chunk of content material leak on-line, workflow safety needs to be one among your first issues if you wish to succeed on this business.
In our newest episode of Body.io Defined, Workflow Architect Patrick Southern exhibits us how one can maintain your media, workflow, and crew secure.
Air-gap
To fight the chance of piracy, some studios are taking the air-gapped method, the place All computer systems concerned in post-production are disconnected from the web.
Is smart, proper?
Sadly, it’s not that straightforward. Most situations of piracy occur whether or not the post-production firm’s computer systems are on-line or not.
The primary rule of safety is to imagine that no system is secure. Identical to with backing up media, computer systems fail, software program crashes, and other people make errors. Depend on it.
So in terms of workflow safety, air gapping will not be sufficient to cease leaks. You want extra sturdy safeguards that may really reply to leaks once they occur.
Catching the pirates
For instance, in 2005, Star Wars Episode V was leaked to the world simply hours earlier than its extensive launch.
Albert Valente stole a duplicate of the film from the post-production home the place he labored. He then despatched it round to a bunch of his pals, together with a man named Mark Hoaglin. Hoaglin subsequently posted it to the web just a few days later.
The FBI was capable of hint the leak to Hoaglin, and had been at his dwelling inside hours.
However that’s only one high-profile instance. In 2009, Gilberto Sanchez purchased a duplicate of X-Males: Origins on DVD on the streets of New York, earlier than it was launched. Sanchez purchased pirated motion pictures steadily, however this time he uploaded it to MegaUpload.com as nicely. Once more, the FBI’s response was fast and decisive.
In yet one more incident, the film Tremendous 8 was leaked to the web in 2011. However this leak was completely different. Embedded within the video was a watermark that mentioned “H. Stern.”
Howard Stern’s crew had been despatched a duplicate of the DVD in order that Howard might interview J.J. Abrams concerning the movie. Within the case of Tremendous 8, they had been capable of monitor the leak to the Howard Stern present, however couldn’t monitor to the precise workers member liable for importing the film.
So the watermark labored, however solely to some extent.
Identifiable watermarks
Today, watermarks might be way more particular. New session-based watermarking instruments can embed figuring out details about the precise particular person watching the video into the video file itself.
Body.io’s Watermark ID function goes even additional, by letting you embed the identify, e-mail deal with, and even IP deal with of the particular person watching the video on the precise time of playback.
Watermark ID brings top-level safety and workflow customization to our Enterprise prospects. You possibly can place the textual content wherever within the body, and it could actually mechanically align the textual content primarily based on its place. It’s nice for sharing issues with folks outdoors of your crew, like administrators, producers…and even Howard Stern.
Nevertheless it’s additionally an effective way to maintain issues secure inside your crew for folks like Albert Valente and his pals.
If somebody in your crew must obtain a file, Watermark ID writes their watermark to the file in the course of the transcode course of, all within the background.
It is a a lot quicker method to embedded safety, and removes the numerous delays of different techniques.
Sharing unmarked information securely
In fact, there are occasions when your crew wants unmarked variations of those information for grading, VFX, or different mastering work. And Watermark ID can deal with that, too.
Account directors can grant particular crew members entry to scrub variations. Or, if you happen to favor, you’ll be able to enable sure customers to override parts of the watermark itself.
For instance, you’ll be able to let members of the crew alter points of the watermark, like positioning, opacity, and coloration, however with out having the ability to take away it utterly. To allow them to get on with their work with out compromising the safety of the content material.
Inform us about your workflow
Every single day brings new safety challenges to our workflows, however we predict Watermark ID can maintain your media and workflow secure. We’re excited to see how groups are assembly the challenges of an ever-changing safety panorama.
If in case you have an important concept about how Watermark ID might enhance your workflow, tell us within the feedback beneath. We love to listen to from artistic professionals doing superior work.
Leave a Reply