Copy link to clipboard
Copied
Copy link to clipboard
Copied
Copy link to clipboard
Copied
The answers are maybe (but with a fair bit of hassle) and it depends.
For Acrobat and Reader permissions apply to a document as a whole, ie there are specific page level permissions. However if you split the documents with pages that can be printed, and documents with pages that can be printed. You can the combine the two (or more than two depending upon how you split it up) document back into a package (From Acrobat 8 - File->Combine Files..., Select Documents, when asked to either Combine into single PDF or put into a Package, choose Package). The resulting file will only work well in Acrobat 8 and above and the user experience may not be what you were hoping for, but I'd play with it to find out.
Now if for the question of it is secure - it depends. The key length used is beside the point for DRM because the key to decrypt the content must exist on the user's machine which means this is a clear example of the currently unsolved CS problem of running trusted code on an untrusted host. (ie the strength of the algorithm doesn't matter because the attack comes through key recovery not through brute forcing the algorithm). For Password security on PDF files where you choose to only use a Permissions password and not an Open password (the most common case for over the Web distribution with some protection), this is actually worse, since the algorithm to generate the password to open the file in this case is published as part of the PDF Specification and because of this there are any number of tools available to remove permissions on these files. (If you have an open password this is still as secure as the combination of the password you used and the underlying algorithm).
Since perfect DRM is not currently achievable you should think about this as more of typical IS Security problem where you should be doing threat modeling to determine the risk of exposure versus the costs of mitigation. For instance there are more expensive options (such as Adobe LiveCycle Policy Server) that would include additional capabilities (such as dynamic watermarking so you could at least tell who leaked it to the public), that may or may not be suitable for what your trying to do.
Copy link to clipboard
Copied
Copy link to clipboard
Copied