how are copy protections implemented?

Printable View