Introduction
In a recent project, we replaced our existing file encryption solution from DRM to a new system based on MIP.
If all files had simply been processed with MIP, the task would have been straightforward. However, one of the key requirements was to maintain compatibility with legacy DRM files