I had an idea today that Bitcoin or a similar protocol might be used as a digital signature on computer software, movies, or any other form of digital medium. It would prevent the installation or operation of the software unless the license was granted directly to the owner or buyer of the software.
What do you think?
Most software already has some form of DRM, ...
This is not correct. Most
propriety software developed in the last 15 years has DRM. Free Libre Open Source Software (FLOSS) such as GNU/Linux does not and in fact then GPL v3 is by design highly toxic to DRM making it an excellent FLOSS license for this reason. Also Microsoft software between the mid 1980's and roughly 2000 was free of DRM. This is the period when Microsoft provided the best returns to its shareholders debunking the common myth that DRM is necessary for propriety software and content.
DRM is typically implemented in one of two ways. Hide the key somewhere on the end user's property and hope the end user will not find it. In the early days this consisted of deliberatively creating bad sectors on 5.25in floppy disks. The location of the bad sectors on the floppy "locked" the software to the floppy. Then came dongles, and the more modern method of locking the software to the hardware characteristics of the computer effectively turning the whole computer into the dongles. All of these DRM methods could be defeated with the adversary (the owner of the computer or device) finding the decryption key that had at some point in time to be on
her hardware.
The above problem was solved in a much more insidious way. Take root or administrative and thereby control away from the adversary (the owner of the computer for device). This is the model used by IOS, unrooted Android, and Windows 8 RT Windows phone. Windows Vista, 7 and 8 also use this method since the "Administrator" is not a true administrator as she is locked out from certain "protected" parts of the OS. The consequences of this are very insidious since the "protected" parts of the OS can be used to for example to spy on the user, force the user to only obtain content and software from an
approved and censored source and yes also to launch a 51% attack on a distributed cryptocurrency network such as Bitcoin.
The GPL v3 is a very effective tool against the locked device device situation above if it is present in components the OS which require root access to modify, since it requires the ability of the owner of the device to be able to modify the software as a condition of distribution. This is why modern GNU/Linux distributions provide the only assurance that an end user has complete control over their computing devices.