An Anti-Piracy Team was being gathered by Roku to protect it’s content

Online streaming piracy crime is on the rise and several people use dedicated media players to view unofficial content during their regular TV.

Although the media players themselves can be applied through perfectly legal means, third-party add-ons transform them into pirate machines, giving access to movies, TV-shows and more.

The game industry isn’t happy with this progress and is trying to halt additional growth wherever possible.

Just a few months ago, Roku was seriously confronted with this new certainty when a Mexican court established local retailers to exercise its media player off the shelves. This right battle is still continuing, but it’s clear that Roku itself is now becoming a more proactive role.

While Roku never allowed any infringing content, the organization is taking steps to properly deal with the problem. The organization has already started warning users of copyright-infringing third-party carriers, but that was only the opening.

Two new job demands posted by Roku a few days ago show that the company is setting together an in-house anti-piracy company to keep the query under control.

One of the new areas is that of Director Anti-Piracy and Content Security. Roku emphasizes that this is a brand new position, which involves developing the company’s anti-piracy strategy.

“The Director, Anti-Piracy and Content Security is accountable for defining the technology roadmap and managing the implementation of anti-piracy and content security initiatives at Roku,” the application reads.

“This role needs the ability to benchmark Roku upon best practices i.e. MPAA, Studio & Customer but also wants an emphasis on having deep insight into the evolving threat aspect and technical challenges of combating piracy.”

“In this role, you will be accountable for implementing anti-piracy and comfortable protection technology as it pertains to Roku OS,” the statement explains.

Take your time to comment on this article.

Related posts

Hard-Coded Credentials Vulnerability Found In Kubernetes Image Builder

Critical Vulnerability Patched In Jetpack WordPress Plugin

Astaroth Banking Malware Runs Actively Targets Users In Brazil