HOME

TheInfoList



OR:

A controversy surrounding the AACS cryptographic key arose in April 2007 when the
Motion Picture Association of America The Motion Picture Association (MPA) is an American trade association representing the five major film studios of the United States, as well as the video streaming service Netflix. Founded in 1922 as the Motion Picture Producers and Distribu ...
and the Advanced Access Content System Licensing Administrator, LLC (AACS LA) began issuing
cease and desist A cease and desist letter is a document sent to an individual or business to stop alleged illegal activity. The phrase "cease and desist" is a legal doublet, made up of two near-synonyms. The letter may warn that, if the recipient does not dis ...
letters to websites publishing a 128-
bit The bit is the most basic unit of information in computing and digital communications. The name is a portmanteau of binary digit. The bit represents a logical state with one of two possible values. These values are most commonly represente ...
(16-
byte The byte is a unit of digital information that most commonly consists of eight bits. Historically, the byte was the number of bits used to encode a single character of text in a computer and for this reason it is the smallest addressable unit ...
)
number A number is a mathematical object used to count, measure, and label. The original examples are the natural numbers 1, 2, 3, 4, and so forth. Numbers can be represented in language with number words. More universally, individual numbers c ...
, represented in
hexadecimal In mathematics and computing, the hexadecimal (also base-16 or simply hex) numeral system is a positional numeral system that represents numbers using a radix (base) of 16. Unlike the decimal system representing numbers using 10 symbols, hexa ...
as 09 F9 11 02 9D 74 E3 5B D8 41 56 C5 63 56 88 C0 (commonly referred to as 09 F9), a
cryptographic Cryptography, or cryptology (from grc, , translit=kryptós "hidden, secret"; and ''graphein'', "to write", or '' -logia'', "study", respectively), is the practice and study of techniques for secure communication in the presence of adve ...
key Key or The Key may refer to: Common meanings * Key (cryptography), a piece of information that controls the operation of a cryptography algorithm * Key (lock), device used to control access to places or facilities restricted by a lock * Key (map ...
for
HD DVD HD DVD (short for High Definition Digital Versatile Disc) is an obsolete high-density optical disc format for storing data and playback of high-definition video. Supported principally by Toshiba, HD DVD was envisioned to be the successor to th ...
s and
Blu-ray Disc The Blu-ray Disc (BD), often known simply as Blu-ray, is a Digital media, digital optical disc data storage format. It was invented and developed in 2005 and released on June 20, 2006 worldwide. It is designed to supersede the DVD format, and c ...
s. The letters demanded the immediate removal of the key and any links to it, citing the anti-circumvention provisions of the United States
Digital Millennium Copyright Act The Digital Millennium Copyright Act (DMCA) is a 1998 United States copyright law that implements two 1996 treaties of the World Intellectual Property Organization (WIPO). It criminalizes production and dissemination of technology, devices, or s ...
(DMCA). In response to widespread Internet postings of the key, the AACS LA issued various press statements, praising those websites that complied with their requests for acting in a "responsible manner" and warning that "legal and technical tools" were adapting to the situation. The controversy was further escalated in early May 2007, when aggregate news site
Digg Digg, stylized in lowercase as digg, is an American news aggregator with a curated front page, aiming to select stories specifically for the Internet audience such as science, trending political issues, and viral Internet issues. It was launch ...
received a DMCA
cease and desist A cease and desist letter is a document sent to an individual or business to stop alleged illegal activity. The phrase "cease and desist" is a legal doublet, made up of two near-synonyms. The letter may warn that, if the recipient does not dis ...
notice and then removed numerous articles on the matter and
banned A ban is a formal or informal prohibition of something. Bans are formed for the prohibition of activities within a certain political territory. Some bans in commerce are referred to as embargoes. ''Ban'' is also used as a verb similar in meaning ...
users reposting the information. This sparked what some describe as a digital revolt or "cyber-riot", in which users posted and spread the key on Digg, and throughout the Internet ''en masse'', thereby leading to a
Streisand effect Attempts to hide, remove, or censor information often have the unintended consequence of increasing awareness of that information via the Internet. This is called the Streisand effect. It is named after American singer and actress Barbra Streis ...
. The AACS LA described this situation as an "interesting new twist".


Background

Hexadecimal In mathematics and computing, the hexadecimal (also base-16 or simply hex) numeral system is a positional numeral system that represents numbers using a radix (base) of 16. Unlike the decimal system representing numbers using 10 symbols, hexa ...
is a base-16
numeral system A numeral system (or system of numeration) is a writing system for expressing numbers; that is, a mathematical notation for representing numbers of a given set, using Numerical digit, digits or other symbols in a consistent manner. The same s ...
used in the fields of
computer programming Computer programming is the process of performing a particular computation (or more generally, accomplishing a specific computing result), usually by designing and building an executable computer program. Programming involves tasks such as ana ...
and
mathematics Mathematics is an area of knowledge that includes the topics of numbers, formulas and related structures, shapes and the spaces in which they are contained, and quantities and their changes. These topics are represented in modern mathematics ...
. The key is an ordinary number most widely known by its hexadecimal representation; in
decimal The decimal numeral system (also called the base-ten positional numeral system and denary or decanary) is the standard system for denoting integer and non-integer numbers. It is the extension to non-integer numbers of the Hindu–Arabic numeral ...
notation, when interpreted as an integer, it is 13,256,278,887,989,457,651,018,865,901,401,704,640. Because the encryption key may be used as part of circumvention technology forbidden by the
DMCA The Digital Millennium Copyright Act (DMCA) is a 1998 United States copyright law that implements two 1996 treaties of the World Intellectual Property Organization (WIPO). It criminalizes production and dissemination of technology, devices, or s ...
, its possession and distribution has been viewed as illegal by the AACS, as well as by some legal professionals. Since it is a
128-bit While there are currently no mainstream general-purpose processors built to operate on 128-bit ''integers'' or addresses, a number of processors do have specialized ways to operate on 128-bit chunks of data. Representation 128-bit processors co ...
numerical value, it was dubbed an
illegal number An illegal number is a number that represents information which is illegal to possess, utter, propagate, or otherwise transmit in some legal jurisdiction. Any piece of digital information is representable as a number; consequently, if communicat ...
. Opponents to the expansion of the scope of
copyright A copyright is a type of intellectual property that gives its owner the exclusive right to copy, distribute, adapt, display, and perform a creative work, usually for a limited time. The creative work may be in a literary, artistic, education ...
criticize the idea of making a particular number illegal. Commercial HD DVDs and Blu-ray discs integrate copy protection technology specified by the AACS LA. There are several interlocking encryption mechanisms, such that cracking one part of the system does not necessarily crack other parts. Therefore, the "09 F9" key is only one of many parts that are needed to play a disc on an unlicensed player. AACS can be used to revoke a key of a specific playback device, after it is known to have been compromised, as it has for
WinDVD WinDVD (owned by Corel Corporation which bought InterVideo in 2006) is a commercial video player and music player software for Microsoft Windows. It enables the viewing of DVD-Video movies on the user's PC. DVD-Video backups stored on hard disk ...
. The compromised players can still be used to view old discs, but not newer releases without encryption keys for the compromised players. If other players are then cracked, further revocation would lead to legitimate users of compromised players being forced to upgrade or replace their player software or
firmware In computing, firmware is a specific class of computer software that provides the low-level control for a device's specific hardware. Firmware, such as the BIOS of a personal computer, may contain basic functions of a device, and may provide h ...
in order to view new discs. Each playback device comes with a
binary tree In computer science, a binary tree is a k-ary k = 2 tree data structure in which each node has at most two children, which are referred to as the ' and the '. A recursive definition using just set theory notions is that a (non-empty) binary t ...
of secret device and processing keys. The processing key in this tree, a requirement to play the AACS encrypted discs, is selected based on the device key and the information on the disc to be played. As such, a processing key such as the "09 F9" key is not revoked, but newly produced discs cause the playback devices to select a different valid processing key to decrypt the discs.


Timeline of AACS cracking


2006

On December 26, 2006, a person using the alias ''muslix64'' published a utility named
BackupHDDVD BackupHDDVD is a small computer software utility program available in command line interface, command line and Graphical user interface, GUI versions which aids in the cryptography, decryption of commercial HD DVD discs protected by the Advanced ...
and its
source code In computing, source code, or simply code, is any collection of code, with or without comments, written using a human-readable programming language, usually as plain text. The source code of a program is specially designed to facilitate the wo ...
on the DVD decryption
forum Forum or The Forum (plural forums or fora) may refer to: Common uses * Forum (legal), designated space for public expression in the United States *Forum (Roman), open public space within a Roman city **Roman Forum, most famous example *Internet ...
at the website ''
Doom9 Doom9 is a website featuring information on digital audio and video manipulation (mostly video) and digital copyrights. It is also the forum username of the author of the page, an Austrian who was a college student at the time of the creation of ...
''. BackupHDDVD can be used to decrypt AACS protected content once one knows the encryption key. muslix64 claimed to have found title and volume keys in main memory while playing HD DVDs using a software player, and that finding them is not difficult.


2007

On January 1, 2007, muslix64 published a new version of the program, with volume key support. On January 12, 2007, other forum members detailed how to find other title and volume keys, stating they had also found the keys of several movies in
RAM Ram, ram, or RAM may refer to: Animals * A male sheep * Ram cichlid, a freshwater tropical fish People * Ram (given name) * Ram (surname) * Ram (director) (Ramsubramaniam), an Indian Tamil film director * RAM (musician) (born 1974), Dutch * ...
while running
WinDVD WinDVD (owned by Corel Corporation which bought InterVideo in 2006) is a commercial video player and music player software for Microsoft Windows. It enables the viewing of DVD-Video movies on the user's PC. DVD-Video backups stored on hard disk ...
. On or about January 13, a title key was posted on
pastebin A pastebin or text storage site is a type of online content-hosting service where users can store plain text (e.g. source code snippet (programming), snippets for code review via Internet Relay Chat (IRC)). The first pastebin was the eponymous ...
.com in the form of a riddle, which was solved by entering terms into the
Google Google LLC () is an American multinational technology company focusing on search engine technology, online advertising, cloud computing, computer software, quantum computing, e-commerce, artificial intelligence, and consumer electronics. ...
search engine. By converting these results to hexadecimal, a correct key could be formed. Later that day, the first cracked HD DVD, ''
Serenity Serenity may refer to: Arts, entertainment, and media * ''Serenity'' (2019 film), a thriller starring Matthew McConaughey, Anne Hathaway and Diane Lane * Sailor Moon (character), also known as Princess Serenity and Neo-Queen Serenity, in the ' ...
'', was uploaded on a private torrent tracker. The AACS LA confirmed on January 26 that the title keys on certain HD DVDs had been published without authorization. Doom9.org forum user ''arnezami'' found and published the "09 F9" AACS processing key on February 11: This key is not specific to any playback device or DVD title. Doom9.org forum user ''jx6bpm'' claimed on March 4 to have revealed
CyberLink CyberLink Corp. () is a Taiwanese multimedia software company headquartered in New Taipei City, Taiwan. Its products include PC and mobile applications for playback of movies and media, editing of videos and photos, and disc burning and backup s ...
's
PowerDVD CyberLink PowerDVD is a universal media player for movie discs, video files, photos and music. During 2016, PowerDVD achieved certification from the Blu-ray Disc Association (BDA) for the playback of Ultra HD Blu-ray Discs, and became the world's ...
's key, and that it was the key in use by
AnyDVD AnyDVD is a device driver for Microsoft Windows which allows decryption of DVDs on the fly, as well as targeted removal of copy preventions and user operation prohibitions (UOPs). With an upgrade, it will also do the same for HD DVD and Blu-r ...
. The AACS LA announced on April 16 that it had revoked the decryption keys associated with certain software high-definition DVD players, which will not be able to decrypt AACS encrypted disks mastered after April 23, without an update of the software. On May 17, one week before any discs with the updated processing key had reached retail, claims were reported of the new keys having been retrieved from a preview disc of ''
The Matrix Trilogy ''The Matrix'' is an American media franchise consisting of four feature films, beginning with ''The Matrix'' (1999) and continuing with three sequels, '' The Matrix Reloaded'', '' The Matrix Revolutions'' (both 2003), and ''The Matrix Resurrec ...
''. On May 23, the key was posted on
Edward Felten Edward William Felten (born March 25, 1963) is the Robert E. Kahn Professor of Computer Science and Public Affairs at Princeton University, where he was also the Director of the Center for Information Technology Policy from 2007 to 2015 and fro ...
's ''Freedom to Tinker Blog'' and confirmed a week later by ''arnezami'' on Doom9 as the new processing key ( MKB v3).


DMCA notices and Digg

As early as April 17, 2007, AACS LA had issued
DMCA The Digital Millennium Copyright Act (DMCA) is a 1998 United States copyright law that implements two 1996 treaties of the World Intellectual Property Organization (WIPO). It criminalizes production and dissemination of technology, devices, or s ...
violation notices, sent by Charles S. Sims of
Proskauer Rose Proskauer Rose LLP (formerly known as Proskauer, Rose, Goetz & Mendelsohn, LLP) is an international law firm headquartered in New York City. The firm was founded in 1875 and currently employs more than 800 attorneys in twelve offices worldwide. P ...
. Following this, dozens of notices were sent to various websites hosted in the United States. On May 1, 2007, in response to a DMCA demand letter, technology news site
Digg Digg, stylized in lowercase as digg, is an American news aggregator with a curated front page, aiming to select stories specifically for the Internet audience such as science, trending political issues, and viral Internet issues. It was launch ...
began closing accounts and removing posts containing or alluding to the key. The Digg community reacted by creating a flood of posts containing the key, many using creative ways of disguising the key, by semi-directly or indirectly inserting the number, such as in song or images (either representing the digits pictorially or directly representing bytes from the key as colors) or on merchandise. At one point, Digg's "entire homepage was covered with links to the HD-DVD code or anti-Digg references." Eventually the Digg administrators reversed their position, with founder Kevin Rose stating:


Legal opinions

Lawyers and other representatives of the entertainment industry, including Michael Ayers, an attorney for
Toshiba , commonly known as Toshiba and stylized as TOSHIBA, is a Japanese multinational conglomerate corporation headquartered in Minato, Tokyo, Japan. Its diversified products and services include power, industrial and social infrastructure system ...
Corporation, expressed surprise at Digg's decision, but suggested that a suit aimed at Digg might merely spread the information more widely. The
American Bar Association The American Bar Association (ABA) is a voluntary bar association of lawyers and law students, which is not specific to any jurisdiction in the United States. Founded in 1878, the ABA's most important stated activities are the setting of acad ...
's '' eReport'' published a discussion of the controversy, in which
Eric Goldman Eric Goldman (born April 15, 1968) is a law professor at Santa Clara University School of Law. He also co-directs the law school's High Tech Law Institute. and co-supervises the law school's Privacy Law Certificate. Career overview Goldman is ...
at
Santa Clara University Santa Clara University is a private Jesuit university in Santa Clara, California. Established in 1851, Santa Clara University is the oldest operating institution of higher learning in California. The university's campus surrounds the historic Mis ...
's High Tech Law Institute noted that the illegality of putting the code up is questionable (that
Section 230 of the Communications Decency Act Section 230 is a section of Title 47 of the United States Code that was enacted as part of the United States Communications Decency Act and generally provides immunity for website platforms with respect to third-party content. At its core, Secti ...
may protect the provider when the material itself is not copyrighted), although continuing to allow posting of the key may be "risky", and entertainment lawyer Carole Handler noted that even if the material is illegal, laws such as the DMCA may prove ineffective in a practical sense.


Impact

In a response to the events occurring on
Digg Digg, stylized in lowercase as digg, is an American news aggregator with a curated front page, aiming to select stories specifically for the Internet audience such as science, trending political issues, and viral Internet issues. It was launch ...
and the call to "Spread this number", the key was rapidly posted to thousands of pages, blogs and
wiki A wiki ( ) is an online hypertext publication collaboratively edited and managed by its own audience, using a web browser. A typical wiki contains multiple pages for the subjects or scope of the project, and could be either open to the pu ...
s across the Internet. The reaction was an example of the
Streisand effect Attempts to hide, remove, or censor information often have the unintended consequence of increasing awareness of that information via the Internet. This is called the Streisand effect. It is named after American singer and actress Barbra Streis ...
.
Intellectual property Intellectual property (IP) is a category of property that includes intangible creations of the human intellect. There are many types of intellectual property, and some countries recognize more than others. The best-known types are patents, cop ...
lawyer Douglas J. Sorocco noted, "People are getting creative. It shows the futility of trying to stop this. Once the information is out there, cease-and-desist letters are going to infuriate this community more." Outside the Internet and the
mass media Mass media refers to a diverse array of media technologies that reach a large audience via mass communication. The technologies through which this communication takes place include a variety of outlets. Broadcast media transmit information ...
, the key has appeared in or on T-shirts, poetry, songs and music videos, illustrations and other graphic artworks, tattoos and body art, and comic strips. On Tuesday afternoon, May 1, 2007, a
Google Google LLC () is an American multinational technology company focusing on search engine technology, online advertising, cloud computing, computer software, quantum computing, e-commerce, artificial intelligence, and consumer electronics. ...
search for the key returned 9,410 results, while the same search the next morning returned nearly 300,000 results. On Friday, the
BBC #REDIRECT BBC #REDIRECT BBC #REDIRECT BBC Here i going to introduce about the best teacher of my life b BALAJI sir. He is the precious gift that I got befor 2yrs . How has helped and thought all the concept and made my success in the 10th board ex ...
reported that a search on Google shows almost 700,000 pages have published the key, despite the fact that on April 17, the AACS LA sent a DMCA notice to Google, demanding that Google stop returning any results for searches for the key. Widespread news coverage included speculation on the development of user-driven websites, the legal liability of running a user-driven website, the perception of acceptance of
DRM DRM may refer to: Government, military and politics * Defense reform movement, U.S. campaign inspired by Col. John Boyd * Democratic Republic of Madagascar, a former socialist state (1975–1992) on Madagascar * Direction du renseignement militai ...
, the failure as a business model of "secrecy based businesses ... in every aspect" in the Internet era, and the harm an industry can cause itself with harshly-perceived legal action. In an opposing move, Carter Wood of the
National Association of Manufacturers The National Association of Manufacturers (NAM) is an advocacy group headquartered in Washington, D.C., with additional offices across the United States. It is the nation's largest manufacturing industrial trade association, representing 14,000 s ...
said they had removed the "Digg It"-link from their weblog. Media coverage initially avoided quoting the key itself. However, several US-based news sources have run stories containing the key, quoting its use on Digg, though none are known to have received DMCA notices as a result. Later reports have discussed this, quoting the key.
Current TV Current TV was an American television channel which broadcast from August 1, 2005, to August 20, 2013. Prior INdTV founders Al Gore and Joel Hyatt, with Ronald Burkle, each held a sizable stake in Current TV. Comcast and DirecTV each held a smalle ...
broadcast the key during a ''Google Current'' story on the Digg incident on May 3, 2007, displaying it in full on screen for several seconds and placing the story on the station website.
Wikipedia Wikipedia is a multilingual free online encyclopedia written and maintained by a community of volunteers, known as Wikipedians, through open collaboration and using a wiki-based editing system. Wikipedia is the largest and most-read refer ...
, on May 1, 2007, locked out the page named for the number "to prevent the former secret from being posted again. The page on HD DVD was locked, too, to keep out The Number." This action was later reversed.All Public Logs 09 F9 11 02 9D 74 E3 5B D8 41 56 C5 63 56 88 C0 Wikipedia
/ref> No one has been arrested or charged for finding or publishing the original key.


AACS LA reaction

On May 7, 2007, the AACS LA announced on its website that it had "requested the removal solely of illegal circumvention tools, including encryption keys, from a number of web sites", and that it had "not requested the removal or deletion of any ... discussion or commentary". The statement continued, "AACS LA is encouraged by the cooperation it has received thus far from the numerous web sites that have chosen to address their legal obligations in a responsible manner."
BBC News BBC News is an operational business division of the British Broadcasting Corporation (BBC) responsible for the gathering and broadcasting of news and current affairs in the UK and around the world. The department is the world's largest broadca ...
had earlier quoted an AACS executive saying that
blog A blog (a truncation of "weblog") is a discussion or informational website published on the World Wide Web consisting of discrete, often informal diary-style text entries (posts). Posts are typically displayed in reverse chronological order ...
gers "crossed the line", that AACS was looking at "legal and technical tools" to confront those who published the key, and that the events involving Digg were an "interesting new twist".


See also

*
DVD Copy Control Association The DVD Copy Control Association (DVD CCA) is an organization primarily responsible for the copy protection of DVDs. The Content Scramble System (CSS) was devised for this purpose to make copyright infringement difficult, but also presents obstacles ...
*
DeCSS DeCSS is one of the first free computer programs capable of decrypting content on a commercially produced DVD video disc. Before the release of DeCSS, open source operating systems (such as Berkeley Software Distribution, BSD and Linux) could n ...
*
FCKGW In Software license, software licensing, a volume licensing is the practice of selling a license authorizing one computer program to be used on a large number of computers or by a large number of users. Customers of such licensing schemes are ty ...
(
Microsoft Windows Windows is a group of several proprietary graphical operating system families developed and marketed by Microsoft. Each family caters to a certain sector of the computing industry. For example, Windows NT for consumers, Windows Server for serv ...
) * PlayStation 3 private key compromised * HDCP master key release *
Texas Instruments signing key controversy The Texas Instruments signing key controversy resulted from Texas Instruments' (TI) response to a project to factorize the 512- bit RSA cryptographic keys needed to write custom firmware to TI devices. Project In July 2009, Benjamin Moody, a ...
*
Security through obscurity Security through obscurity (or security by obscurity) is the reliance in security engineering on design or implementation secrecy as the main method of providing security to a system or component. History An early opponent of security through ob ...
*
Streisand effect Attempts to hide, remove, or censor information often have the unintended consequence of increasing awareness of that information via the Internet. This is called the Streisand effect. It is named after American singer and actress Barbra Streis ...


References


External links


Doom9's Forum
original focus of the controversy *
09 f9: A Legal Primer
' —
Electronic Frontier Foundation The Electronic Frontier Foundation (EFF) is an international non-profit digital rights group based in San Francisco, California. The foundation was formed on 10 July 1990 by John Gilmore, John Perry Barlow and Mitch Kapor to promote Internet ci ...
(EFF)
Original images posted
Some of the images that accompanied the Digg articles on the front page from the day of the user revolt. {{DEFAULTSORT:Aacs Encryption Key Controversy Advanced Access Content System Compact Disc and DVD copy protection History of cryptography Internet memes Key management Motion Picture Association Digital Millennium Copyright Act takedown incidents Cryptography law