CPRM Lecture 102
QuantumG writes: "I've written a summary of the lecture at Stanford by Jeffery B. Lotspiech / IBM. John Gilmore (EFF) was there and other than hounding Lotspiech with ethical questions, gave me a free T-shirt." We can't argue with that. Stanford has the video online, in a format so proprietary and restricted that the current version of the player has no concept of "saving" a video download to your computer. There's some sort of lesson there, I think. But the video is good, well worth watching.
What CPRM means (Score:1)
rm = remove
Hey, it's UNIX! I know this!
Re:Closed minds (Score:1)
Of course, they guarded that knowledge for reasons completely different to the reasons IP is guarded today. Nevertheless, it *was* guarded.
Tree isn't current model (Score:2)
The keyspace currently is a matrix. The tree model was proposed as a means for addressing several concerns, incluing enlarging the keyspace, discouraging certain attacks, and minimizing storage requirements for holding the keyspace. The tree is designed such that a minscule subset (several hundred?) keys would actually describe (and allow to be derived) all keys in the tree.
What part of "Gestalt" don't you understand?
Re:MS is actually the freedom choice (Score:2)
- ASF is patented, however.
- Microsoft did force the author of VirtualDub [virtualdub.org] to abandon ASF support in its product.
There may be a copy of the file VirtualDub_source-v1.3c.zip out there somewhere, though.
--
Summary? (Score:1)
It's nice qg bothered to do this. But this isn't a summary of a lecture, it is qg's opinions about CPRM with a small amount of summary intermingled.
cbd.
Re:Summary? (Score:1)
To brevity! :)
If you have time to provide a bit more info on the questions that were asked and answers I'd appreciate it.
best,
cbd.
Re:The real problem.... (Score:1)
Yet another removable drive that uses ATA is Castlewood's ORB. Still, this is a very small minority.
Re:So you can't save it.. [or can you] (Score:2)
Looks like the future of computer technology is getting permission to use the stuff we just bought. Great progress in exchange for our pocketbook.
Re:The backup protection system (Score:2)
The best attack is to not let it get implemented at all, ever. Ignoring by assuming that it can be cracked, or that it won't sell (even when there are no alternatives) is not going to help our side of things. We should also crack it, and also refuse to buy the hardware whenever possible, but that's not all that we should do.
why not use mpeg? (Score:1)
___
Socket Spy log on windows (for winsock people) (Score:1)
It's on the long side, and includes a little bit of the video data (from b4 I killed media player, as all I wanted was how media player convinced it to download)
(slashdot is evil, can't post the code, stupid lameness filter)
find it at http://yucs.mc.yu.edu/~spotter/hello.txt
Re:Yes you can save it. (Score:1)
Yes you can save it. (Score:2)
http://cobb.stanford.edu/ee380/010404-ee380-100
easy enough to save.
Re:Yes you can save it. (Score:2)
i love these lectures. (Score:1)
but then you get these bone heads who like to be the first to post here and mess up our lives..
(turns on the TV)
Re:Why didn't more slashdotters attend...? (Score:2)
Re:Highly confusing. (Score:2)
Re:Highly confusing. (Score:2)
But, if I have a fast enough system to DeCSS a disk on-the-fly, such that no encrypted data ever touches my CPRM-enabled hard drive (although I'm not sure if I'd have to go to those lengths anyway), then as far as CPRM is concerned, that raw, unencrypted video file is mine - I own it, I created it, and I have the right/ability (in the TECHNICAL sense, not the LEGAL sense) to do whatever I like with it.
In this limited case, the weak link is the DVD spec, not CPRM. Since DVD is broken, unless they change the DVD spec, I can produce unencrypted data which, AFAIK, CPRM has no way of knowing actually belongs to someone else.
And I don't believe for a minute that a watermark yet exists that can't be scrubbed away (who know about tomorrow, though?). There's only so much you can do to digital media without affecting quality, and I've seen no evidence that watermarks exist which can survive the sorts of conversions/compressions/modifications that even normal users do, let alone someone actively attacking the watermark. If you want to wipe a Digimarc watermark, for example, it's not exactly hard - no statistical analyses of LSB's or any crap like that.
Or am I missing something? I don't claim to be an expert on CPRM, and I make no claims about more secure media which doesn't exit yet,so if I'm totally off-base, please let me know - I hate to wander around all ignorant like
Whoops... (Score:2)
I stand corrected. And that's more of an admission than you'll get from most people here.
On the other hand, "everything you know is wrong" is a pretty strong statement that I will take issue with
Re:Closed minds (Score:1)
The greeks, or at least some of them, were no stranger to this sort of secrecy. As someone pointed out, pythagoras was pretty bad about this too. He was a cult leader as well as a mathematician - he supposedly (though this is probably an exageration) had someone executed for pointing out that the hypotenuse of some triangles weren't rational numbers. (he really like rational numbers)
And you are talking mostly about philosophers, but mathematicians used to be mostly philosophers.
Getting Keys from Black Boxes (Score:2)
cya
Re:So you can't save it.. [OT] (Score:1)
Very useful for getting around short-comings of certain streaming video applications. Search for it [google.com]
Re:No problems saving it (Score:1)
Makes you wonder what sort of desktop box Michael is using, doesn't it? Ah well, as long as you can get perl on it it's good enough for /. :)
Re:Closed minds (Score:1)
As my first grade teacher pointed out to my everlasting shame, there's no such word as "firstly". :)
The big issue with CPRM is content (music, video), not software protection. Software copyright protection has been tried and pretty much rejected by consumers. Although if CPRM becomes a reality, I could see software companies making use of it.
Although I applaud the efforts that have prevented CPRM from being part of the spec., there will continue to be some sort of HW-based protection mechanism in the works as long as hardware makers think they can make money off of the content industries from it. Consumer disdain is the only real deterrent to CPRM, and it remains to be seen if consumers will care enough or even notice. You might say I'm prepared to be disappointed :)
Re:3 results from websters.com (Score:1)
All I can say is:
"I never heard that word where I grew up in Shelbyville."
"I don't know why, it's a perfectly cromulent word."
(now I'm mad I didn't stand up to her!)
Re:No problems saving it (Score:2)
*sing* I'm a karma whore and I'm okay....
I work all night and I post all day
redirection and circular reference (Score:2)
*sing* I'm a karma whore and I'm okay....
I work all night and I post all day
No problems saving it (Score:1)
I'm willing to bet the same thing would happen if you browsed the site with Lynx.
If you're actually using a Windows box (and I pity but understand your reasons for doing so), you should be able to just remove the MIME association in your browser and click the link.
On second thought, what about right clicking the link, or shift-click? Don't those allow saving the content to your local drive?
Re:Yes you can save it. (Score:2)
I would post the (50+M) asf on my website but I can't handle being slashdotted.
If you have a decent mirror, respond here.
Re:So you can't save it.. [OT] (Score:1)
HTH. HAND.
Re:The backup protection system (Score:2)
But, I doubt it'll take long for the watermarking to be cracked. Detecting watermarking isn't something you're going to do in an custom chip, it's going to require a fair bit of horsepower and a general purpose CPU. This essentially means that the watermark reader is 'just' software, and thus much easier to crack. Once it's cracked, we'll know what it looks for and how to block it. Watermarking is *only* security by obscurity. Once you know what they're doing, you know what to undo.
This assumes that the watermark checking is done in the speakers and monitors. If it's done in Media Player, for example, it'll be even easier to crack. (That is, assuming the next hacker at MS doesn't just grab the source for WMP.)
Re:The backup protection system (Score:2)
And as to the sticking with the computer... My Apple2 couldn't play music and videos as well as a stereo and TV. If they go with the watermarking and it can't be cracked, I'll simply wait for the DeCSS of the future and play the watermarked video on my current PC.
I don't mean I'll never upgrade, just that I'll keep my current hardware as well, if they build backdoors into the new stuff.
Finding the purloined key (Score:3)
Whereas hackers can't do this because we'd have to try all possible keys, not just a short list of potentially valid ones.
Hackers also aren't likely to build a device in such a way as to make reverse engineering the hardware difficult. (My company makes custom hardware and it's quite expensive to make something that a skilled engineer can't figure out.)
FPGAs are out, because you send the 'program' to them on startup. You can do clever bootstrapping where there are multiple layers of encryption, but that just takes more time - proportionally more of yours than of the attackers. ASICs are more expensive (being custom) and are usually a fairly standard chip, like an FPGA, except that it's preconfigured (and static). This means that if you do open it up and examine it, it's not that hard to decipher. So you're looking at a special-made chip, designed not for efficiency, but to be hard to understand.
That's massively expensive, you need HUGE volume to make the cost bearable.
A hacker would just use an FPGA and some flash-ram, to allow reconfiguring with new keys when they were needed. Who cares about killing WMP by invalidating all its keys...
As for why it's hard to get all the keys from a device...
It would decrypt one key at a time and use it. Only if that key didn't work would it use another, probably encrypted much differently. You'd have to wait till media without the first key was released to be able to 'easily' snoop on the device with logic probes and capture the key.
Finally, software... The idea is to not give WMP a decryption key. WMP would have an access key, to perform the basic 'release the encrypted data stream.' It'd then pass this off to the USB speakers which would perform the actual decryption, in a chip right on the back of the actual speaker, to reduce the length of the wire with the unencrypted signal in it.
The industry won't do another DVD CSS, where it plays on 'open' hardware. They know the weak link is software. They'll put CPRM in all the devices, without using it, and when the market is saturated with it, they'll release media that requires a CPRM HD, a CPRM monitor, and CPRM speakers.
Of course, now that the DeCSS has woken us up, and more people know/care about the issue, it'll be worth a few talented engineers ripping the actual hardware apart and decoding this. And when it does come tumbling down, it'll *kill* the industry behind it. They'll have basically given the encryption chips away for free to manufacturers (to encourage their use) intending to make it up on licensing fees from the media people. When the scheme gets broken and companies get POed that their DVD player is being excluded from new media, they'll drop the scheme. And when the media people realize that their user base is drying up they won't try anything basic on hardware again.
It does raise the bar on hackers, but it REALLY raises the bar on designers and implementers. And it only takes one skilled hacker to bring it tumbling down.
Saving ASX (Score:1)
Ummm learn how to use google.
asfRecorder [linuxberg.at]
Re:So you can't save it.. [or can you] (Score:2)
Re:So you can't save it.. [or can you] (Score:2)
However, we already have proof that many other systems (see DVDs for an example) don't necessarily do a good job of the protection they do implement.
Unique Media Key? (Score:1)
What would prevent people from creating their own media players that don't follow the CPRM standard, and play the data (video, audio, etc.) regardless of the media key.
Please correct me if I'm wrong.
Watching the lecture now... (Score:2)
Oh well...
Re:The backup protection system (Score:2)
It would be virtually impossible to sell users a system which does not play their existing non-watermarked content. I own >300 CDs, which would cost me £3-4000 to replace (and that's just CDs!). The cost of a PC is sub £1000, and a CD player is peanuts. Hence I (and others) would far rather buy an alternative device to play on than replace my media. So, you're not going to get rid of non-CPRM data for a long time yet.
Attempts to introduce uncopyable CDs as a stopgap, like Gmbh did, have foundered on peoples unwillingness to buy media which might not play on their own machine (10% of players in Gmbhs case).
The bottom line is, theres nothing here for consumers. Unless theres something in it for me, why would I buy CPRM hardware? To turn your argument around, 'few consumers will bother with having a special nonstandard system (CPRM?) to NOT PLAY their content'
-Baz
Re:Interesting Lecture. (Score:2)
Re:arg (Score:1)
Re:arg (Score:1)
Re:Whoops... (Score:1)
Re:Why didn't more slashdotters attend...? (Score:2)
Re:Interesting Lecture. (Score:2)
Thanks for thinking about this. I specifically asked Lotspiech this question and outlined the senario. His response was "umm, so you dont believe in tamperproof software" I told him I didn't and he said "no, neither than I" he then repeated his statement about this being a "little speedbump". As for the question of this going into harddrives and harddrives doing the decoding, it's not going to happen for the sole reason that there will not be standard and 4C cant control the manufacturers.
Re:Finding the purloined key (Score:2)
Re:i love these lectures. (Score:2)
No, that would be the only person who went. There was a guy from The Register there, so you might see a story come out of it, but basically we had access to the creator of a technology that everyone makes a big stink about, who you could have asked questions, interrogated (and John did man) or otherwise annoyed, but no-one went.
Re:Getting Keys from Black Boxes (Score:2)
Re:Unique Media Key? (Score:2)
Re:Summary? (Score:2)
Re:why not use mpeg? (Score:2)
Re:Highly confusing. (Score:2)
Re:Missing the Point (Score:2)
Re:Missing the Point (Score:2)
Re:Summary? (Score:2)
Re:Highly confusing. (Score:2)
Re:Highly confusing. (Score:2)
Re:Missing the Point (Score:2)
Re:Missing the Point (Score:2)
Re:Missing the Point (Score:2)
Re:So you can't save it.. (Score:1)
That's not a bug, it's a feature. After all, if you could view it, you could tell us what you saw, and that'd be violating their copyright, right?
Unviewable media is the best form of copy control of all!
Re:Interesting Lecture. (Score:2)
Re:So you can't save it.. [OT] (Score:1)
PLEASE READ, MICHAEL (Score:2)
a link to asf recorder is in my
-----
Re:So you can't save it.. (Score:1)
No idea what Cougar is, but the reason you only ever get back the asx is that it checks the USER_AGENT. Only if it == WMP will it send the actual file. I feel a hack coming on...
So you can't save it.. (Score:1)
What's the big deal about not being able to save it? If ya can't save it that's a very effective form of copy protection. I can't seem to get my stupid windows box to view it :( oh well.
--
The real problem.... (Score:4)
AFAIK, the only mainstream removable device that uses ATA is onstream's series of ADR tape drives.
Why didn't more slashdotters attend...? (Score:3)
That's one of the nice things about the 'net -- we *don't* all have to be there. (And John doesn't have to lug as many t-shirts.)
Thanks for the article.
Re:So you can't save it.. (Score:1)
+++
Re:So you can't save it.. (Score:1)
Normally, this wouldn't be such a big deal, but what about us with slow connections to the net? Not being able to download it on a fast connection and watch it at home just ensures that people with slow connection won't watch it.
----
The backup protection system (Score:2)
That's what really makes it work. The concept is that a consumer's unmodified system won't play cracked content, and few consumers will bother with having a special nonstandard system (Linux?) to play such content.
There's been some success in removing watermarks from audio, because it's hard to put a good watermark in audio without damaging the sound. But there's so much information in video in which to hide watermarks that watermarked video will probably resist attack.
Re:So you can't save it.. [OT] (Score:2)
Sounds like a perfect use for Freenet [sourceforge.net].
saving it... (Score:2)
so i opened a connection from a windows media player to a url on my linux box, and captured the GET query with ngrep (Accept:*/*, User-Agent:NSPlayer/4.1.0.3856, + host and pragma info relating to framerates, and an xClientGUID).
pasting that line into a quick and dirty perl script does get you binary output, but it's too short to be the actual stream (~1k) so i'm assuming that it's another redirect-like command.
not really interested enough to actually try to get this part of it down at this point, at least not while there's downloadable utilities that'll do it for me. just thought this was interesting and not really off-topic because this story *is* about copy protection, after all, and this 'streaming-only' enforced through client software obviously isn't anything more than mildly annoying.
if this is the wave of the future, it's not going to do a whole lot in terms of stopping anyone curious, let alone malicious...
(email addr is at acm, not mca)
We are Number One. All others are Number Two, or lower.
Re:Interesting Lecture. (Score:2)
I suspect that there will be a generic crack of this whole CPRM system in fairly short order since it does not appear to be a real improvement over what was done with DVD.
Ok what are the variables:
For recording it works a bit different:
Copying is doing the above two togeter, it just requires that the software honor the copy permission data, and to get licenced to use CPRM you must play by the rules or dire consequences will ensue.
The bright side I see is the tree scheme seems to depend on approx 500 root keys, and if you can figure out the algorthm for calculating the rest in the tree you have every key in that tree.
Result:
Do I have it right or am I missing something?
- subsolar
Posting Lecture notes??? (Score:1)
My interpretation... (Score:1)
i.e. Microsoft sucks
Additionally I am sick and tired of intellectual property
i.e. Microsoft sucks
the open source software community is such an amazing addition to the all the sub-groups of software developers out there
i.e. Open source software is better than Microsoft, which clearly sucks
But wait... here it comes...
And for an additional quick stab at Microsoft
Get ready...
I haven't upgraded MS-Word to the 2K edition because there's just no need.
i.e. MS Word has so many nice features that I don't even need to upgrade it.
If you're going to slam Microsoft, slam them across the board. "The right tool for the job" idea is strictly forbidden here.
Re:My interpretation... (Score:1)
Re:So you can't save it.. [OT] (Score:3)
Oh well in the future we can just release utilities like that anonymously, until the software enforcement bureau comes and raids our homes because we were suspected of sending a controversial file over the internet.
Re:MS is actually the freedom choice (Score:2)
?!?
Your basic assumption (that most people here are OK with Real but not with WMP) is, AFAIK completely wrong. Real are every bit the bastards M$ are, possibly moreso (for reasons you point out).
Saying WMP is bad is not saying that Real is Ok, it's saying that WMP is bad. If the format was Real, I'm pretty confident the no-save remark would have been made just the same - when you try to save and are denied, that pisses you off a lot more than any MS-but-only-MS-hating agenda would.
No-one has said that the shit Real pulls is acceptable. It isn't. But just because Real pulls it doesn't mean that MS should be exempt from criticism when they do the same.
If the excuse "don't blame us - we're not the only ones doing it" had any validity, the world would noticably be even worse off than already is.
Re:Unique Media Key? (Score:1)
The law, i.e. DMCA. Sure, they won't go after someone building something by themselves for their own use, but they will go after any Consumer Electronics firm who tires to come out with a mass produced, non compliant player (look what happened with the Rio and DAT).
N.
If you don't have anything nice to say, say it often.
not as interesting as weird. (Score:1)
I have a shotgun, a shovel and 30 acres behind the barn.
digital-analog-digital (Score:2)
Then again, I think it's a pretty sad commentary on the free information movement if all everyone wants to focus on is taking information instead of making some. The reason you've heard of Linus Torvalds isn't because he cracked the copy protection on a proprietary Unix. Sure, it's loathsome to have this kind of copy protection shoved down your throat the next time you buy a computer, but I'd rather see a vibrant, independent culture based on free information than a parasitic one that just whines a lot and sponges off of the big-business media.
The Assayer [theassayer.org] - free-information book reviews
Closed minds (Score:2)
Firstly, as players like Microsoft move towards, the leased software
Additionally I am sick and tired of intellectual property. Sure we all need to get ours but... if half the ancient texts were "copyrighted" and guarded as intellectual property (and I'm talking mostly philosophers here), then we would be missing critical portions of our fundamental knowledge base, like the Pythagoran theorums, and many of our claims about the universe, which began with Plato and his fellow thinkers.
This illustrates yet another reason why the open source software community is such an amazing addition to the all the sub-groups of software developers out there. It's not that they are against intellectual property, far from it, but they are willing to share. A amazing example ot a simple childhood concept comming back to change the world. "Now Johnny, share your Quake 3 game with little Debbie, she wants to kill and main too!"
And for an additional quick stab at Microsoft, because that's the order of the day here at Slashdot anyway, I haven't upgraded MS-Word to the 2K edition because there's just no need. It already does word processing, web pages, document summaries, cooks breakfast and dusts around the house, do I really need the next version to make my bed and wipes my ass?
yoink
Off topic, coment on sig (Score:1)
Mmmm, they use a BSD mascot... (Score:1)
The mascot is copyrighted, actually. Something tells me, they don't have the permission to use it :)
The very people who give lectures on protection of copyrighted content...
Re:Closed minds (Troll) (Score:1)
He's barely on topic, and the whole thing could be pasted onto any copyright discussion. But, since no one else is discussing the story, free mod points!
Of course, there often appears to be no difference between the clever paste-from-file troll and the poster who hasn't figured out the culture yet (post on topic, few if any offtopic "additional stabs"). Letting this rambling stuff get modded up just encourages this kind of behaviour.
Since I'm breaking my own rules, should I post or not?... sure, it's a slow day.
If it isn't a troll, then - The topic was not intellectual property or software copyrights. The topic, if you cared, was about a contraversial new technology that promises to allow media copyright holders (recording companies, movie studios, cable broadcasters, etc) to enforce, in hardware, their copyright restrictions. On one hand, this seems preferable to enforcing the restrictions in law, since that would involve violating privacy and getting the government more into people's lives. The bad part is it gives the consumer no advantage, except perhaps the studios would release more copyrighted materials if they thought they would be safe.
To argue that this is a good thing, is to say that copyrights promote artistic progress, since innovators and creators and facilitators can be sure that they will earn a living off what they created. John Carmak et all made Quake 3 only because enough John's and Debbie's would buy it to make it worth their time. To argue that John Carmak should freely share what he created is like saying "Johnny, you get 2 dollars allowance, but Debbie didn't do her chores, so she gets none. But to be fair, give her one of your dollars."
Sharing and open-source work well for those who want to share, and who have independant means to support themselves. Those who live off their work deserve to be compensated for it. Forget about nursery school and childhood, this is the adult world. If you have a talent, and you make your living off of that talent, then if people steal your creation, then they are attacking your ability to survive, and discouraging other talented folks. If record companies, Napster users, movie studios, and Gnutella users could find a way to fairly compensate those people who worked to create the art, then the world would be a little better. If Linus couldn't afford to pay the electric bill, then Linux wouldn't be in such great shape today.
Re:Interesting Lecture. (Score:1)
The idea is that there is a tree of all possible keys, and each manufacturer is assigned a branch. If the manufacturer is a rogue manufacturer (gets a large number of keys to use, then violates the licsense by distributing them publicly), then you can just specify a root node as being invalidated, and all the rogue keys are invalidated.
It sounded to me, however, that a node was a set of sixteen keys. The tree structure simply makes it possible to test if a node was a child node of a rogue parent, and thus invalidate ALL the keys. This was to mitigate the rogue manufacturer strategy, not the clever hacker attack. BTW, it would also help if a clueless manufacturer leaves his keys in a easily retrievable form - the bad manufacturer's keys can all be invalidated.
It also seems that the clever hacker gets the best of all possible worlds. If he can get the keys for a device, and can fool the software into running for him, he can play anything he likes, without consequence - none of the information is sent back to a central server. When he shares this info, and it becomes popular, his hard-won keys are invalidated, and he has to start over. Unless he is motivated, he will eventually quit sharing, and keep his keys to himself. If he distributes a method to get keys, based on one manufacturer, all that manufacturer's keys might be revoked. If it breaks the encryption (a posibility they won't even consider), then all keys are open, and all bets are off.
There is a bit of confusion about what this technology really is, which is increased by the fact that the impementers don't want to give out the details. It would be nice if someone put together a web page of what we know about this technology, so we can come to some concensus on it.
It would also be nice to have the "rogue hacker in Norway" chart, outlining when he was mentioned, and his movements about Europe. Different people refered to him being from Norway, Sweeden, and I even heard a Germany. That hacker's on the run!!!
Re:Interesting Lecture. (Score:2)
Mass consumer piracy is harder. If everyone is doing it, then you have a problem enforcing the law. There are few squealers, and it fails a cost / benefit test. The best way to prevent it is to make it technologically difficult to pirate media, and ocassionaly beat the bush to get the pirates, spending all the enforcement time, money and energy at once. It is possible to pirate cable TV, but you need the equipment, and every three years or so they run around looking for cable lines that shouldn't be there.
So, yeah, this is aimed at Average Jones, not the mass-market pirates. The alternative may be no digital content. Back to the VHS (macrovision) and audio cassettes!
BTW, the guy was arguing that perfect copying was possible, and that this was a benefit. The difference is the decryption, which is difficult and propriatary, and the licsense, which means the reader and the media itself have to shake hands and decide the user is permitted to play the data. What happens when companies close, or media goes out of style? For a preview of what's to come, ask someone who bought a DIVX player what they did with all their movies.
Interesting Lecture. (Score:4)
The speaker is fairly vague about the whole thing, or perhaps I'm not familiar with the tech. The idea seems to be that each device gets 16 (out of 2^64?) keys, that will allow the device to decode a file in their propriatary and patented C2 algorithm. Devices may, by chance, share one or more keys, but not all 16. In addition, keys appear to be serially numbered, so that decryption uses Key 7892's data, as well as the fact that it is key #7892.
If key X is compromised, and the powers-that-be discover it on Day 0, then on Day 1 all new media would return garbage when key X was used. The distributer of the key wouldn't be affected - he has 15 keys left. Other users shouldn't be affected - most still have 16, some have 15 left. Users of the illegal key would be unable to see new media, but Day -1 media and earlier would still be accessible.
In any case, new media has a serial number, and some standard fields (some in write-only space) that encode the permissions on the media - if copies are permitted, if instead copies are "check out", deleting the original. Complying devices, the only ones with keys, obey these fields because they agreed to when they liscensed the technology. The speaker claims that there is no restriction on copying data, but you either have to know the decryption algortihm (very hard) or have a keyed device to decode the file.
Under the scheme, you could have a peice of media with serial #4, with encrypted data and instructions that the data can only be played if it resides on media with serial #4. Since you need industrial equipment to write a serial number, you can make a perfect copy of the Matrix DVD (onto media with a different factory-endoded serial number), and a compliant player would refuse to play it. If my Matrix DVD was re-writable, I could image the DVD to my hard disk, for back-up purposes, tape South Park on the DVD, then when I wanted to watch the Matrix again, copy it back to the original DVD, and only then it would play. If the original was physically destroyed, I'm out of luck. Backups, in the traditional sense, would not be allowed. He aluded that all complying media would have some writable areas, to allow the accounting needed to make backups, etc.
So it's a combo of technology, licsensing, and patents. Great.
The submitter's webpage argues that software players would break the system. It might be hard to retreive a key from hardware, but not as hard from software. He argues that Window's Media Player would have 16 keys for all copies, all these could be found, and soon WMP would no longer work. Microsoft would have to issue a new WMP, and the cycle would continue.
I disagree. Either the protection would be a the disk drive level, WMP would have different keys for every copy, or hard-drive based software would be outside of the realm of CPRM. If the protection is at the disk drive level, WMP would rely on the hard drive to provide keys and decoding, and by distributing keys you would only be limiting your own ability to play new media. If each copy of WMP has its own keys, then again, you aren't damaging Microsoft, but you may be linking yourself to the crime. If you compromise two keys, then Microsoft may me able to link you to breaking the keys.
However, I doubt that this tech will be used on hard drives. They would have to standardize the encryption, which they don't want to do. More likely is that CD-ROM and DVD-ROM drives will be unable to play CPRM CDs at all. We'll complain, the content providers will say tough shit, buy a new CD player. Since all previous technology would become obselete, I doubt this will catch on like wildfire.
Re:So you can't save it.. [OT] (Score:2)
Re:Interesting Lecture. (Score:1)
Re:You are showing your age. (Score:2)
Re:So you can't save it.. (Score:2)
Of course you can save it. It is buffered to your harddrive, in a temp directory under some bizarro name. All you have to do is NOT close your player after viewing it and do a search of your temp files looking for a big file in the many megabytes range. Chances are that is the video. Copy it to another name somewhere and you have it.
Re:Yes you can save it. NOT (Score:1)
Don't whine, send them an e-mail (Score:1)
So just send off an e-mail and they should put other formats. This worked when I sent in a request for a non-streaming copy of the Future of IP debate with Jack Valenti a while back at another Law School. They not only sent me one, but also put it on the web site.
Re:Converting Real to Wav/MP3? (Mildly OT) (Score:1)
Re:Yes you can save it. (Score:1)
Couldn't attend (Score:1)
ASF (Score:1)
its a shame really..
They're coming up with things you can't even save on your disk, but can see on your computer.
Downloading Proprietary Format (Score:1)