Blue-ray Disc Protection BD+ Cracked
-
-
SlySoft's AnyDVD is a very nice app, BTW. Marc
-
Well, it already happend many times. If someone comes up with new protection scheme, it just matter of time until others can defeat that and this protection scheme only effective for least than a year. I wonder how those people can defeat BD+ protection ? ;P
"Courage choose who will follow, Fate choose who will lead" - Lord Gunner, Septerra Core "Press any key to continue, where's the ANY key ?" - Homer Simpsons Drinking gives me amazing powers of insight. I can solve all the worlds problems when drunk, but can never remember the solutions in the morning. - Michael P Butler to Paul Watson on 12/08/03
-
The "cheers" in your signature is awfully telling, you PIRATE! ;P
Sunrise Wallpaper Project | The StartPage Randomizer | The Windows Cheerleader
-
The "cheers" in your signature is awfully telling, you PIRATE! ;P
Sunrise Wallpaper Project | The StartPage Randomizer | The Windows Cheerleader
-
-
Thats great news for people who want to make a backup of their Blu-Ray collection. Fair use! :) Why not just put copy protection on rental discs only and leave the retail discs unprotected? That way users can easily make a backup of discs they bought, and anyone trying to decrypt a disc is up to no good.
-
At the end it all boils down to 1 bit, yes or no. I think they need to start thinking outside the box, like self destructing dvd's :)
xacc.ide - now with IronScheme support
IronScheme - 1.0 alpha 2 out now -
-
At the end it all boils down to 1 bit, yes or no. I think they need to start thinking outside the box, like self destructing dvd's :)
xacc.ide - now with IronScheme support
IronScheme - 1.0 alpha 2 out nowhay leppie...you're a funny guy ... you will see much bond movies i think. they will show self destructing things.( like cars, pen, blah!!!blah!!!). it's nice for reel life not for real life. :) :) :) ***** RAM ***** i've never seen i am never going a wand to deny it it gives anything after seeing codeproject ===================================
-
Fundamentally DRM is about supplying a locked box containing something the user wants, with the key to unlock the box taped to the side in another locked box, with a label saying 'please replace this key after use.' Any of several hundred keys will unlock the main key to unlock the box. You're supplying encrypted media so that the player has to decrypt the data, so just copying the bits doesn't work, but you're also supplying the decryption key (many times over, encrypted with different player keys). All that's required is for a player to put the media decryption key in a predictable location in memory, or in some structure that can be detected, and that media can be decrypted to access the raw stream. Going a step further, it only takes sniffing one player key to break the whole scheme, until that player key is no longer used to encrypt the media decryption key. That's what happened with DeCSS, and I think the key that was obtained was widely enough distributed (there being a relatively small number of keys, so the same key would be in many different players) that deactivating that key for new media would have broken so many players as to be uneconomic. That article indicates an 'embedded virtual machine', but that assumes that the virtual machine running the BD+ code is actually legitimate. A malicious VM could probably step to the decryption code without running all the checks. I assume that the BD+ code is a common implementation, the studios aren't writing their own engine for each disc, so once one version is broken you probably unlock a fair number of discs. Ultimately, just like software licensing, you're only blocking novices who don't know where to find unlock tools. Hardware dongles can be patched around pretty easily - find the code that interrogates the dongle and stick a JMP to the return instruction in place of the first instruction. Software validates itself with a hash mechanism? Patch around the hash validation. In the end the OS doesn't provide such validation (OK, on Windows Vista you might get a different UAC prompt if elevation is requested by the manifest and the hash doesn't match the file signature, but in that case you strip out the signature so it doesn't have anything to validate.) This is also a problem for Windows Vista's own protected processes. If you really cared to find it, you could probably patch out the code that validated the OS binaries as they load, patch out the code which validates the protected processes' executables, and patch that process itself to add a f
-
Yeah!! DRM for the lose!
So the creationist says: Everything must have a designer. God designed everything. I say: Why is God the only exception? Why not make the "designs" (like man) exceptions and make God a creation of man?