. . "Such software could determine, for example, the time or other circumstances under which particular devices encrypt particular content via a particular encryption scheme, thereby limiting the exposure of that particular content to unauthorized tampering." . . .