Oh we're all ignorant about this? You're the only one informed? I see you talking about this so called system in a roundabout way but never giving any specifics. Please give us a detailed accounting of this DRMs internal systems, how they have no need to interact with the operating environment yet can somehow ensure the content hasn't been tampered with and why it is any different from previous iterations of Fade. You know all about it and are 100% convinced of its effectiveness so you're obviously well educated on the subject and can speak about it with authority. So please, let's hear all about it and how it accomplishes these things without ever affecting a legitimate user.
Technical details on how a DRM system determines it is not a legitimate copy without interacting with its surrounding operating environment in the slightest, I am especially interested in those considering how easy it is to spoof hashes and function responses in memory. I've consulted the forums and do not see this information. Please feel free to be blindingly technical, I am not a novice user
If you lack this information, then please explain how exactly you have arrived at these conclusions without any first hand technical knowledge about the subject, armed only with a handful of forum postings and a press release.