CD/DVD copy protection is a blanket term for various methods of
copy protection
Copy protection, also known as content protection, copy prevention and copy restriction, is any measure to enforce copyright by preventing the reproduction of software, films, music, and other media.
Copy protection is most commonly found on vid ...
for
CDs and
DVD
The DVD (common abbreviation for digital video disc or digital versatile disc) is a digital optical disc data storage format. It was invented and developed in 1995 and first released on November 1, 1996, in Japan. The medium can store any ki ...
s. Such methods include
DRM, CD-checks, Dummy Files, illegal tables of contents, over-sizing or over-burning the CD, physical errors and bad sectors. Many protection schemes rely on breaking compliance with CD and DVD standards, leading to playback problems on some devices.
Protection schemes rely on ''distinctive features'' that:
*can be applied to a medium during the manufacturing process, so that a protected medium is distinguishable from an unprotected one.
*cannot be faked, copied, or retroactively applied to an unprotected medium using typical hardware and software.
Technology
Filesystems / Dummy files
Most CD-ROMs use the
ISO9660 file system to organize the available storage space for use by a computer or player. This has the effect of establishing directories (i.e., folders) and files within those directories. Usually, the filesystem is modified to use extensions intended to overcome limitations in the ISO9660 filesystem design. These include
Joliet,
RockRidge, and
El Torito
El Torito (Spanish language, Spanish for "the little bull") is an American Restaurant chain, chain that serves Mexican food. El Torito operates 25 restaurants all in California. El Torito is one of several Mexican cuisine restaurant chains ope ...
extensions. These are, however, compatible additions to the underlying ISO9660 structure, not complete replacements or modifications. The most basic approach for a ''distinctive feature'' is to purposely fake some information within the filesystem. Early generations of software copied every single file one by one from the original medium and re-created a new filesystem on the target medium.
Sectors
A ''sector'' is the primary data structure on a CD-ROM accessible to external software (including the OS). On a Mode-1 CD-ROM, each sector contains 2048 bytes of user-data (content) and 304 bytes of structural information. Among other things, the structural information consists of
*the sector number, the sector's relative and absolute logical position
*an
error detection code
An error (from the Latin , meaning 'to wander'Oxford English Dictionary, s.v. “error (n.), Etymology,” September 2023, .) is an inaccurate or incorrect action, thought, or judgement.
In statistics, "error" refers to the difference between t ...
(EDC), which is an advanced
checksum
A checksum is a small-sized block of data derived from another block of digital data for the purpose of detecting errors that may have been introduced during its transmission or storage. By themselves, checksums are often used to verify dat ...
used to detect (if possible) read-errors
*an
error correction code
In computing, telecommunication, information theory, and coding theory, forward error correction (FEC) or channel coding is a technique used for controlling errors in data transmission over unreliable or noisy communication channels.
The centra ...
(ECC), an advanced method of detecting and correcting errors
Using the EDC and ECC information, the drive can detect and repair many (but not all) types of read-error.
Copy protections can use these fields as a ''distinctive feature'' by purposely crafting sectors with improper EDC/ECC fields during manufacture. The protection software tries to read those sectors, awaiting read-errors. As early generations of end-user soft/hardware were not able to generate sectors with illegal structural information, this feature could not be re-generated with such soft/hardware. If the sectors forming the ''distinctive feature'' have become readable, the medium is presumed to be a copy.
A modification of this approach uses large regions of unreadable sectors with small ''islands'' of readable ones interspersed. Most software trying to copy protected media will skip intervals of sectors when confronted with unreadable ones, expecting them all to be bad. In contrast to the original approach, the protection scheme expects the sectors to be readable, supposing the medium to be a copy when read-errors occur.
Sub-channels
Beside the ''main-channel'' which holds all of the user-data, a CD-ROM contains a set of eight ''
sub-channels'' where certain meta-information can be stored. (For an audio CD, the user-data is the audio itself; for a data CD, it is the filesystem and file data.) One of the sub-channels — the ''Q-channel'' — states the drive's current position relative to the beginning of the CD and the current track. This was designed for Audio-CDs (which for a few years were the only CDs), where this information is used to keep the drive on track; nevertheless the Q-channel is filled even on Data-CDs. Another sub-channel, the ''P-channel'' (which is the first of the subchannels) carries even more primitive information—a sort of semaphore—indicating the points where each track starts.
As every Q-channel field contains a 16-bit checksum over its content, copy protection can yet again use this field to distinguish between an original medium and a copy. Early generations of end-user soft/hardware calculated the Q-channel by themselves, not expecting them to carry any valuable information.
Modern software and hardware are able to write any information given into the subchannels Q and P.
Twin sectors
This technique exploits the way the sectors on a CD-ROM are addressed and how the drive seeks from one sector to another. On every CD-ROM the sectors state their logical absolute and relative position in the corresponding sector-headers. The drive can use this information when it is told to retrieve or seek to a certain sector. Note that such information is not physically "hard-wired" into the CD-ROM itself but part of user-controlled data.
A part of an unprotected CD-ROM may look like this (simplified):
When the drive is told to read from or seek to sector ''6553'', it calculates the physical distance, moves the laser-diode and starts reading from the (spinning) disc, waiting for sector ''6553'' to come by.
A protected CD-ROM may look like this:
In this example, a sector was inserted ("''Mary''") with a sector-address identical to the one right before the insertion-point (''6553''). When the drive is told to read from or seek to sector ''6553'' on such a disc, the resulting sector-content depends on the position the drive starts seeking from.
*If the drive has to seek forwards, the sector's original content "''Jill''" is returned.
*If the drive has to seek backwards, the sector's twin "''Mary''" is returned.
A protected program can check whether the CD-ROM is original by positioning the drive behind sector ''6553'' and then reading from it — expecting the ''Mary'' version to appear. When a program tries to copy such a CD-ROM, it will miss the twin-sector as the drive skips the second ''6553''-sector, seeking for sector ''6554''.
There are more details about this technique (e.g. the twin-sectors need to be recorded in large extents, the SubQ-channel has to be modified etc.) that were omitted. If the twin sectors are right next to each other as shown, the reader would always read the first one, ''Jill''; the twin sectors need to be farther apart on the disc.
Data position measurement
Stamped CDs are perfect clones and have the data always at the same position, whereas writable media differ from each other.
Data Position Measurement (DPM) detects these little physical differences to efficiently protect against duplicates. DPM was first used publicly in 1996 by Link Data Security's
CD-Cops.
SecuROM 4 and later uses this protection method, as do
Nintendo optical disc
Nintendo optical discs are physical media used to distribute video games on three of Nintendo's consoles that followed the Nintendo 64. These are the GameCube Game Disc, Wii Optical Disc, and Wii U Optical Disc. The physical size of a GameCube Ga ...
s.
Changes that followed
The Red Book
CD-DA
Compact Disc Digital Audio (CDDA or CD-DA), also known as Digital Audio Compact Disc or simply as Audio CD, is the standardization, standard format for audio compact discs. The standard is defined in the ''Rainbow Books, Red Book'' technical s ...
audio specification does not include any
copy protection
Copy protection, also known as content protection, copy prevention and copy restriction, is any measure to enforce copyright by preventing the reproduction of software, films, music, and other media.
Copy protection is most commonly found on vid ...
mechanism other than a simple
anti-copy flag. Starting in early 2002, attempts were made by record companies to market "copy-protected" non-standard compact discs. Philips stated that such discs were not permitted to bear the
trademark
A trademark (also written trade mark or trade-mark) is a form of intellectual property that consists of a word, phrase, symbol, design, or a combination that identifies a Good (economics and accounting), product or Service (economics), service f ...
ed ''Compact Disc Digital Audio'' logo because they violate the Red Book specification. There was great public outcry over copy-protected discs because many saw it as a threat to
fair use
Fair use is a Legal doctrine, doctrine in United States law that permits limited use of copyrighted material without having to first acquire permission from the copyright holder. Fair use is one of the limitations to copyright intended to bal ...
. For example, audio tracks on such media cannot be easily added to a personal music collection on a computer's
hard disk
A hard disk drive (HDD), hard disk, hard drive, or fixed disk is an electro-mechanical data storage device that stores and retrieves digital data using magnetic storage with one or more rigid rapidly rotating hard disk drive platter, pla ...
or a portable (non-CD) music player. Also, many ordinary CD audio players (e.g. in car radios) had problems playing copy-protected media, mostly because they used hardware and
firmware
In computing
Computing is any goal-oriented activity requiring, benefiting from, or creating computer, computing machinery. It includes the study and experimentation of algorithmic processes, and the development of both computer hardware, h ...
components also used in
CD-ROM
A CD-ROM (, compact disc read-only memory) is a type of read-only memory consisting of a pre-pressed optical compact disc that contains computer data storage, data computers can read, but not write or erase. Some CDs, called enhanced CDs, hold b ...
drives. The reason for this reuse is cost efficiency; the components meet the Red Book standard, so no valid reason existed not to use them. Other car stereos that supported
CD-ROM discs containing compressed audio files (such as MP3, FLAC, or Windows Media) had to use some CD-ROM drive hardware (meeting the Yellow Book
CD-ROM
A CD-ROM (, compact disc read-only memory) is a type of read-only memory consisting of a pre-pressed optical compact disc that contains computer data storage, data computers can read, but not write or erase. Some CDs, called enhanced CDs, hold b ...
standard) in order to be capable of reading those discs.
In late 2005,
Sony BMG Music sparked the
Sony CD copy protection scandal when it included a form of copy protection called
Extended Copy Protection ("XCP") on discs from 52 artists. Upon inserting such a disc in the CD drive of a computer running
Microsoft Windows
Windows is a Product lining, product line of Proprietary software, proprietary graphical user interface, graphical operating systems developed and marketed by Microsoft. It is grouped into families and subfamilies that cater to particular sec ...
, the XCP software would be installed. If
CD ripper
A CD ripper is software that ripping, extracts raw digital audio in Compact Disc Digital Audio format tracks on a compact disc to standard computer sound files, such as WAV or MP3.
A more formal term used for the process of ripping audio CDs i ...
software (or other software, such as a real-time effects program, that reads digital audio from the disc in the same way as a CD ripper) were to subsequently access the music tracks on the CD, XCP would substitute
white noise
In signal processing, white noise is a random signal having equal intensity at different frequencies, giving it a constant power spectral density. The term is used with this or similar meanings in many scientific and technical disciplines, i ...
for the audio on the disc.
Technically inclined users and computer security professionals found that XCP contains a
rootkit
A rootkit is a collection of computer software, typically malicious, designed to enable access to a computer or an area of its software that is not otherwise allowed (for example, to an unauthorized user) and often masks its existence or the exist ...
component. After installation, XCP went to great lengths to disguise its existence, and it even attempted to disable the computer's CD drive if XCP was forcibly removed. XCP's efforts to cloak itself unfortunately allowed writers of
malware
Malware (a portmanteau of ''malicious software'')Tahir, R. (2018)A study on malware and malware detection techniques . ''International Journal of Education and Management Engineering'', ''8''(2), 20. is any software intentionally designed to caus ...
to amplify the damage done by their software, hiding the malware under XCP's cloak if XCP had been installed on the victim's machine. Several publishers of
antivirus
Antivirus software (abbreviated to AV software), also known as anti-malware, is a computer program used to prevent, detect, and remove malware.
Antivirus software was originally developed to detect and remove computer viruses, hence the name ...
and anti-
spyware
Spyware (a portmanteau for spying software) is any malware that aims to gather information about a person or organization and send it to another entity in a way that harms the user by violating their privacy, endangering their device's securit ...
software updated their products to detect and remove XCP if found, on the grounds that it is a
trojan horse
In Greek mythology, the Trojan Horse () was a wooden horse said to have been used by the Greeks during the Trojan War to enter the city of Troy and win the war. The Trojan Horse is not mentioned in Homer, Homer's ''Iliad'', with the poem ending ...
or other
malware
Malware (a portmanteau of ''malicious software'')Tahir, R. (2018)A study on malware and malware detection techniques . ''International Journal of Education and Management Engineering'', ''8''(2), 20. is any software intentionally designed to caus ...
; and an assistant secretary for the United States'
Department of Homeland Security
The United States Department of Homeland Security (DHS) is the U.S. federal executive department responsible for public security, roughly comparable to the interior, home, or public security ministries in other countries. Its missions invol ...
chastised companies that would cause security holes on customers' computers, reminding the companies that they do not own the computers.
Facing resentment and
class action lawsuits
A class action is a form of lawsuit.
Class Action may also refer to:
* ''Class Action'' (film), 1991, starring Gene Hackman and Mary Elizabeth Mastrantonio
*Class Action (band), a garage house band
* "Class Action" (''Teenage Robot''), a 2002 epi ...
Sony BMG issued a product recall for all discs including XCP, and announced it was suspending use of XCP on future discs. On November 21, 2005 the Texas Attorney General
Greg Abbott
Gregory Wayne Abbott ( ; born November 13, 1957) is an American politician, attorney, and jurist who has served since 2015 as the 48th governor of Texas. A member of the Republican Party (United States), Republican Party, he served from 2002 to ...
sued Sony BMG for XCP and on December 21, 2005 sued Sony BMG for
MediaMax copy protection.
Texas Attorney General
/ref>
United Kingdom position
The provisions of law allow for redress to buyers of audio CDs with copyright protection. The Copyright, Designs and Patents Act 1988
The Copyright, Designs and Patents Act 1988 (c. 48), also known as the CDPA, is an Act of Parliament, Act of the Parliament of the United Kingdom that received royal assent on 15 November 1988. It reformulates almost completely the statutory ba ...
contains provisions in section 296ZE part VII that allow for " remedy where effective technological measures prevent permitted acts".
In practice, the consumer would make a complaint to the copyright
A copyright is a type of intellectual property that gives its owner the exclusive legal right to copy, distribute, adapt, display, and perform a creative work, usually for a limited time. The creative work may be in a literary, artistic, ...
holder of the audio CD, usually a record label
"Big Three" music labels
A record label or record company is a brand or trademark of Sound recording and reproduction, music recordings and music videos, or the company that owns it. Sometimes, a record label is also a Music publisher, ...
. The complaint would contain a request to the holder of the copyright to provide a "workaround
A workaround is a bypass of a recognized problem or limitation in a system or policy. A workaround is typically a temporary fix that implies that a genuine solution to the problem is needed. But workarounds are frequently as creative as true so ...
" in order to make use of the copy-protected CD, to the extent that a non-copyright protected CD could be used lawfully. Where the consumer
A consumer is a person or a group who intends to order, or use purchased goods, products, or services primarily for personal, social, family, household and similar needs, who is not directly related to entrepreneurial or business activities. ...
believes the copyright holder has not been reasonable in entertaining the request, they are within their rights under the Act to make an application to the Secretary of State to review the merits of the complaint and (if the complaint is upheld) to instruct the copyright holder to implement a workaround circumventing the copyright protection.
Schedule 5A of the Copyright, Designs and Patent Act 1988 lists the permitted acts, to which the provisions of section 296ZE apply (i.e. lists the cases in which the consumer can use the remedy, if the copy protection prevents the user doing a permitted act).
See also
* List of Compact Disc and DVD copy protection schemes
* List of copy protection schemes
References
External links
CDMediaWorld's CD protection page
{{Compact disc
Compact Disc and DVD