This is more like publishing hashes of a file you download. You can use it to verify the identity of an object, but that's it.
This differs from DRM in a fundamental way, namely that you are not required to do this. You can choose to ignore it if it turns out the object isn't authentic. Whereas DRM relies on making you enforce certain rules, and putting technological or legal barriers in your way to prevent you from breaking them.
This differs from DRM in a fundamental way, namely that you are not required to do this. You can choose to ignore it if it turns out the object isn't authentic. Whereas DRM relies on making you enforce certain rules, and putting technological or legal barriers in your way to prevent you from breaking them.