SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Technology Stocks : Security Technologies - Straight Talk

 Public ReplyPrvt ReplyMark as Last ReadFilePrevious 10Next 10PreviousNext  
To: caly who wrote (166)1/3/2000 12:48:00 PM
From: caly  Read Replies (1) of 206
 
Excellent write-up on what really happened with the DVD encryption fiasco...security at its worst.

cryptome.org

"Now one of those player keys, as well as the actual bulk cipher, were reverse engineered by two independent parties: one released a tool called SpeedRipper, the other a tool named DeCSS. Both tools used the source code developed by the Linux community. Cipher and key in DeCSS were recovered from Xing's player. The fact that Xing didn't take steps to make reverse engineering harder only made that step faster, it had not been crucial for the success.

Now someone anonymously mailed the DeCSS source code to the livid list, where in turn the code was analyzed. After a very short time, cryptanalyzers blew a couple of deadly holes into the whole scheme, making the encryption breakable without even knowing any player key in under 20 seconds."
Report TOU ViolationShare This Post
 Public ReplyPrvt ReplyMark as Last ReadFilePrevious 10Next 10PreviousNext