This article seems to completely omit the failure modes of DRM and how it will always be a game of cat & mouse and breakable with enough effort because ultimately you are always sending the decryption key to the same hostile party you’re trying to defend against.