Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Privacy Technology

MPAA Developing Digital Fingerprinting Technology 544

Danathar writes "The MPAA is looking to use digital fingerprinting technologies that in conjunction with legislation will enable and force ISPs to look for network traffic that matches the signatures. " From the article: " Once completed, Philips' technology--along with related tools from other companies--could be a powerful weapon in Hollywood's increasingly aggressive attempts to choke off the flood of films being traded online."
This discussion has been archived. No new comments can be posted.

MPAA Developing Digital Fingerprinting Technology

Comments Filter:
  • It's funny... (Score:5, Interesting)

    by DoraLives ( 622001 ) on Sunday February 13, 2005 @07:44PM (#11663044)
    that some of the scariest 1984ish stuff would be coming out of the fricking entertainment industry fer chrissakes.
  • lol (Score:1, Interesting)

    by IncidentA5 ( 844618 ) on Sunday February 13, 2005 @07:46PM (#11663061)
    Their war is futile. Lol, you could compare the P2P community to the borg.

    "Resistance is futile, you will be assimilated."

    All of their new 'tricks' end up being incorperated into nexgen p2p apps. So whats the point; do they really want to fund the nextgen p2p apps by releasing research/specs/documentation on this?
  • Re:Forget it (Score:5, Interesting)

    by evilmousse ( 798341 ) on Sunday February 13, 2005 @07:47PM (#11663067) Journal

    aaaactually, mr wizard taught me that it's just the water's skin that's really wet--that is, it's self-adhesive properties...

    pour a shitload of babypowder on a cup of water, and stick your finger down to the bottom. it'll be baby-fresh instead of wet.
  • Screw em (Score:4, Interesting)

    by Whammy666 ( 589169 ) on Sunday February 13, 2005 @07:52PM (#11663116) Homepage
    Personally, I don't trade mp3's. But considering the extremist and blatantly arrogant posture that the **AA has adopted leaves me feeling no pity for any losses (real or imagined) that they may have suffered. With this in mind, I refuse to purchase any music or videos anymore... not that anything that gets released is worth a shit (let alone $20) anyway.

    If they want to assume an anti-consumer posture, then they can just all go out of business. Screw em.
  • Re:Encryption (Score:3, Interesting)

    by QuantumG ( 50515 ) <qg@biodome.org> on Sunday February 13, 2005 @07:52PM (#11663120) Homepage Journal
    Uhh.. I thought it was obvious that the way these systems would work is to actually fetch from the user whatever files they are offering and then process them. The only solution I can think of for this is to put one of those public turing test systems into the P2P client which forces the downloader to prove they are human before you allow them to download your files. Of course, I'm sure the MPAA's system could get around that by passing the test off to someone else who wants to download files, which would also give them the benefit of being able to inject junk files into the network.
  • by schon ( 31600 ) on Sunday February 13, 2005 @07:54PM (#11663137)
    this to me is the least offensive method of combatting piracy

    Yes, until you get your new bill from your ISP, which includes an extra $50.00 per month so that they can afford to comply with the law.

    See, I'm pretty sure that the MPAA won't be paying the ISP to implement this technology, to purchase the additional equipment to use it, and to maintain it.
  • Re:Encryption (Score:5, Interesting)

    by Breakfast Pants ( 323698 ) on Sunday February 13, 2005 @07:58PM (#11663182) Journal
    The ISPs will be legally required to do man in the middle attacks. When you start up an SSL connection they will accept it as if they were the destination and then make a request to the destination for a connection. They will then pipe all info between the two connections through their fingerprinting program, and then pipe the approved data to you and to them. None of this will ever happen.
  • by G4from128k ( 686170 ) on Sunday February 13, 2005 @08:00PM (#11663200)
    I wonder if these fingerprints can be designed to be detectable in an encrypted file? Given that the MPAA knows the pattern of the data itself (the music) and the fingerprint, it seems possble that ghosts of that known data would be detectable in the encrypted data. I remember a cautionary tale of encrypting images with a particular implementation of DES. If the image contained large expanses of pixels of an indentical value, the outline of the image appeared in the bits of the DES-encrypted output.

    Although good encrytion should make it impossible to recover unknown bits in the original file, it seems to make no gaurantees that one can't detect the presense of known data (of a sufficiently clever pattern) in the encrypted file.

    IANAC, so any expert comments about why known data is made irreversibly invisible by encryption would be appreciated
  • Freenet (Score:2, Interesting)

    by wr0x2 ( 840346 ) on Sunday February 13, 2005 @08:02PM (#11663210)
    It surprises me that no one has mentioned freenet so far. Although I believe that freenet itself is condemned to fail, it certainly sets a standard as far as privacy and encryption are concerned. http://freenet.sourceforge.net/
  • umm.... (Score:2, Interesting)

    by nukem996 ( 624036 ) on Sunday February 13, 2005 @08:04PM (#11663230)
    Wont someone figure out how to remove the finger prints? Isnt that law unconstitutional(invasion of privacy)? This hole thing seems like its going to fail horribly.
  • Re:Freenet (Score:3, Interesting)

    by swilver ( 617741 ) on Sunday February 13, 2005 @08:14PM (#11663304)
    Actually, bandwidth just keeps increasing. It seems reasonable to assume that in the near future we could have gigabit lines in every home (they've already started the roll out of 10mbit+ connections here). It does not seem as likely that the bandwidth needs of video/audio will go up anytime soon (especially not audio).

    So basically it won't be long before we'll have more bandwidth than we know what to do with... then you install Freenet (or some other P2P app that does its own routing).

  • by Anonymous Coward on Sunday February 13, 2005 @08:20PM (#11663349)
    ... consider this. If people hadn't been ripping off music on Napster et al., do you seriously think we'd be going through this DRM crap in the first place?

    And don't give me the same, lame story about music being overpriced, crappy, one good song and twelve fillers on the CD, etc. etc. If you don't like it, don't buy it. It's not AIDS vaccine. It's music. You're not going to kak without it. In fact, it's all pap, so you'll be better off without it, right?

    Yeah, yeah, the labels were nailed for price fixing. They paid the price. Two wrongs don't make a right. Move on.

    No, I'm not a musician, and I'm not with the RIAA, and I have nothing to do with whatever other conclusion to which you're about to jump.

  • by ScrewMaster ( 602015 ) on Sunday February 13, 2005 @08:27PM (#11663401)
    This is nothing more than an automated private-sector wiretap. Bad thing. I don't want the FBI monitoring private communications without proper authorization and judicial oversight, and I sure as hell don't want the likes of the RIAA, MPAA or any other AA looking at my personal communications and deciding whether or not to sue me for whatever they think they've found. The RIAA is not a law enforcement arm of the government, neither is my ISP ... and I don't want either of them to become such.

    It's generally considered wrong when private individuals or organizations take the law into their own hands (see: vigilante justice.) It's even more dangerous when the organization in question is as heavily-bankrolled and as morally bankrupt as our two favorite "entertainment industry trade groups". No thanks. They can keep their grubby little lawyer fingers out of my data stream.
  • Re:Encryption (Score:2, Interesting)

    by martok ( 7123 ) on Sunday February 13, 2005 @08:29PM (#11663417)

    It wouldn't even have to be that hard. Since the tracker part of the torrent protocol is based on http, what would stop it from using https and simply using ssl encryption? Hell, any tcp protocol can be tunneled through ssl afaik.

  • DMCA and encryption. (Score:4, Interesting)

    by Grendel Drago ( 41496 ) on Sunday February 13, 2005 @08:29PM (#11663423) Homepage
    Yes, they can.

    The DMCA makes a whole lot of statements about copyright circumvention. But not much of anything about encryption. This is why CSS, with its laughably weak encryption, can be used, and anyone who pokes at the gaping goatse vulnerability-hole is then liable for horrible, horrible damages.

    If you're not using encryption to protect your copyright---and if you're not selling all those "vacation" JPEGs and school papers, it's damn hard to show copyright damages---the DMCA is mute on this issue.

    It is designed to protect copyright holders, not to protect anyone who uses encryption.

    --grendel drago
  • by Bishop923 ( 109840 ) on Sunday February 13, 2005 @08:33PM (#11663452)
    I would think a way to go would be to use some low-grade form of encryption using random keys that aren't known to the end-user. Something that would be trivial to break on a user's home system, but would be impractical for the ISP to process on a large-scale.

    Is this feasable, or would it just turn into an arms-race of "who has the bigger processor"?
  • The scariest way ... (Score:3, Interesting)

    by RM6f9 ( 825298 ) <rwmurker@yahoo.com> on Sunday February 13, 2005 @08:34PM (#11663459) Homepage Journal
    for an ISP to deal with the pressure behind the situation: "If we can't read it, we won't pass it across our portion of the Internet."

    All too do-able in the hyper-paranoid post 9/11 US of A...

    Afraid yet?

  • Re:Encryption (Score:2, Interesting)

    by Paddo_Aus ( 700470 ) on Sunday February 13, 2005 @09:05PM (#11663682)
    "You cannot apply a technological solution to a sociological problem" - Edwards Law.

    When will they ever learn, when will they ever learn.
  • by suckmysav ( 763172 ) <suckmysav AT gmail DOT com> on Sunday February 13, 2005 @09:16PM (#11663743) Journal
    "All you need to do is a slight file format transforamtion (just uuencode and then zip) will mask the watermarks."

    You are quite correct that this will defeat the watermarking.

    There would be significant side affect though. You could say goodbye to downloading a single file from multiple sources because if we were to use your proposed solution then every copy of "The Matrix" on the P2P network would be unique, therefore you would not have the advantage of pulling in all the "parts" from disparate sources.
  • Re:Wow! (Score:3, Interesting)

    by Wylfing ( 144940 ) <brian@NOsPAm.wylfing.net> on Sunday February 13, 2005 @09:23PM (#11663787) Homepage Journal
    Wow, is this a kind of an april's fool or something? I don't even think I need to comment much on the infeasibility of this...

    Agreed. The story makes it seem like this could be implemented next month or something. The technical and legal hurdles here are huge. Even if this fingerprinting technique is the cat's meow, building a database of fingerprints by itself might take years (those masters need to be found, loaded, queued, etc.). And that says nothing about the challenge of keeping this database current! The logistics of that alone are staggering.

    In addition, think about the kind of act that Congress would pass (assuming it ever did get passed over the strenuous objections of giants like SBC). It would provide a timeline, like "All ISPs have until 2012 to implement a system that can handle this." The market will be completely changed by the time anyone is actually forced into implementing this kind of scheme.

  • Hardly (Score:5, Interesting)

    by ewe2 ( 47163 ) <ewetoo@gmail . c om> on Sunday February 13, 2005 @10:07PM (#11664075) Homepage Journal
    If they do read slashdot for a free technical review, they can hardly ignore the same points raised over and over again:

    1. Technically infeasable and economically ruinous for ISPS to scan all network traffic (unless you want to pay them for their trouble, MPAA? you could indemify us all for the resultant Internet slowdown perhaps?). You've been told so many times, you can't be that stupid.

    2. Copy-protection can always be broken. It's like King Canute live action when I go to see a movie and be insulted by MPAA movie-theft ads.

    3. If you drive the people to encryption, a lot more than your precious assets will go byebye, it will bring down the gravy train for everyone else, and won't they thank you for it.

    Using Occam's Razor I ask which is more likely: that they either don't read slashdot or do so in such a way as only read it for the pictures.
  • Re:Computer = COPY (Score:4, Interesting)

    by Prof.Phreak ( 584152 ) on Sunday February 13, 2005 @10:19PM (#11664136) Homepage
    Watermarking is overrated. To remove -any- watermark (defeat -any- watermarking scheme), you just have to re-watermark the media. That's it. In pretty much all cases, that will make the original watermark unretrievable (at least not in any statistical sense).

    There is a very strict balance between signal power and watermark power---if you increase watermark power (make it harder to remove), you're degrading the media. There is a balance that exists between the two---and to destroy the balance, you just have to re-watermark the image the 2nd time (yes, losing some quality), and all of a sudden, the original watermark is gone.

    Pretty much all papers that claim to embed their watermarks several times have either tweaked media or tweaked watermarks that specifically embed the data into different things---but if you re-apply any spread spectrum watermark to the media, all of the separate tweaked parts are gone.

    The trick is `quality loss'... but then again, most of the time it's not -that- bad.
  • Re:Encryption (Score:4, Interesting)

    by ArbitraryConstant ( 763964 ) on Sunday February 13, 2005 @10:29PM (#11664197) Homepage
    A protocol doesn't have to be invulnerable, it just has to be strong enough that stopping it would cripple the economy.

    As an example of a circumvention technique, consider if BitTorrent were to be extended to allow trackers to use encrypted connections to the clients, and to mediate keys between the various clients. Torrent files could be extended to contain the public key of the tracker. Then, regular SSL connections to the torrent websites would work.

    I can think of a few other things off the top of my head... The client-to-client connections could be made to look like SSH connections. Can't stop those without crippling the economy and people actually pay attention to the keys there so you can't proxy it either. Or, you could start putting keys in the DNS records like Yahoo! domainkeys. UDP messages would be a pretty big PITA to classify and firewall.

    The people behind most of the p2p protocols are way smarter than me and I could do any of those.
  • Simpler Solution? (Score:2, Interesting)

    by p_trekkie ( 597206 ) on Sunday February 13, 2005 @10:39PM (#11664265) Homepage
    Yes encryption would defeat the watermarking scheme... but wouldn't there be something even easier?

    Specifically, wouldn't any watermarking be lost in the process of converting from MPAA licensed stuff (i.e. DVDs, stuff shown in the theaters) to the files people download? If there was a digital watermark, I believe it would be erased in the process of encoding the file with Divx, xvid, or [insert favorite video codec here]. If the watermarking were, say, a special frame of movie, it would look different digitally depending on which codec was used, even if it looked the same on the screen.

    Granted, I'm not an expert in cryptography/watermarking, so I would love for someone with more knowledge to support or contradict my argument...
  • Would work... (Score:2, Interesting)

    by fmobus ( 831767 ) on Sunday February 13, 2005 @10:55PM (#11664352)
    Until one or more fingerprints databases leaks or get hacked. Knowing what they're looking for makes it easier to hide.
  • by Anonymous Coward on Monday February 14, 2005 @02:49AM (#11665452)
    the *iaa can cram it.

    they started treating EVERYONE like thieves.

    So why not act like it? Live up to our label.

    Until the riaa/mpaa bends over and literally kisses my ass. I say screw them. They started pissing off REAL customers who never pirated anything ever. Once they did that i said screw them. And started "stealing" all my media.

    If they are gonna treat everyone like a thief. You might as well download everything. The outcome is the same. And its for free.
  • Re:Encryption (Score:3, Interesting)

    by TGK ( 262438 ) on Monday February 14, 2005 @08:54AM (#11666489) Homepage Journal
    It doesn't matter if it's trivial. It's a catch 22 thanks to the RIAA.

    If P2P Apps implement encryption then breaking that encryption becomes a violation of the DMCA. Hell, even trying to break that encryption becomes a violation of the DMCA.

    They can legaly require breaks, but only if they get the DMCA overturned or provide a special exception to anyone who runs an ISP.

    Of course, in a world where any insecure Linksys router can be an ISP, that won't get them very far.

    They won't get this through, and even if they do, they won't be able to enforce it because the ISPs can just throw up their hands and say "we couldn't break the crypt because we didn't know before hand if it was your copyright! We only have permission to break it if it's your copyright and we can't know if it is without breaking it first!"

  • Re:Encryption (Score:1, Interesting)

    by Anonymous Coward on Monday February 14, 2005 @08:57AM (#11666506)
    Moreover, the recipients will have no idea that the man-in-the-middle exists because they had not previously exchanged public keys

    Says who? My work connection, my home connection and my next-door neighbour's unsecured WLAN all use different ISPs. That is, they will all be different men-in-the-middle and hence not have the same key. If I connect to one network to get the key, and then connect to another to do the download, and the keys don't match, I know something is going on...
  • Re:Hmm, wouldn't... (Score:2, Interesting)

    by larytet ( 859336 ) on Monday February 14, 2005 @04:08PM (#11671043) Homepage
    "The alteration is of certain items in the image." It's possible for limited distribution. still one can buy DVD in store, pay cashe (using cash is still legal in the US, right ?), rip the disk. It is going to be tough to find out who bought the disk without investigation. by some estimations number of distinct files in the file sharing network on the order of 1 bil.

    In Israel, for example, you have to show your ID when you buy TV. it is supposed to help tax collection. There is a $100/year tax from houshold owning one or more TV sets. the logic behind the tax that the money is supposed to go to the public TV and radio station which do not run ads - they run ads, of course. many people still do not pay this tax and some avoid paying the tax using IDs of their relatives who already have TV. then there is a provision in the Israel law that gives to the tax authority right to access list of the cable TV subscribers. If you are a cable TV subscriber you have to pay tax. There is also tax on radio in Israel (no kidding). But it is enforced only for radio in cars. If policeman finds radio in you car and there is no relevant stamp of the tax authority in the technical passport of the car you are screwed. Sure enough some people use MP3 (and DVD) players in their cars without actually installing them. Interesting also that there was a case in the Supreme Court when deaf person argued that he can not listen radio in the car. I think the case was lost. Radio tax is per box, not per listener and in case of TV it is per household no matter how many people and TV sets.

If you think the system is working, ask someone who's waiting for a prompt.

Working...