ADD AUDIO TO YOUR WEBSITE, LEARN ABOUT DIGITAL RIGHTS MANAGEMENT
DIGITAL RIGHTS MANAGEMENT
Free Music • 1 • 2 • 3 • 4 • 5 • 6 • 7 • 8 • 9 • 10 • 11 • 12 < • > |
- DRM
- Sony Rootkit DRM
- Sony Rootkit DRM apple
- Sony Rootkit plagiarism
- Sony Rootkit Ethics
- Sony Statutory Damages
Rootkits - You Can't Sensor The Internet
Digital Rights Management and Fair Use Is resisting overbroad copyright laws in the moral equivalent of opposing tyranny, racism or slavery. Fight the RIAA, MPAA, DVD-CCA attorneys and Federal Judges who claim that CSS is a trade secret. Use your Jury Rights to stop bad laws.
Dave Touretzky's Gallery of CSS Descramblers, including photos of CSS on t- shirts, ties, and even (sigh) haiku:
A rootkit is a set of software tools used by an intruder or illegal hacker to break into a computer and obtain root privileges in order to perform unauthorized functions, hide traces of its existence and exploit its systemwide access.
You Can't Censor the Internet
2007 DVD DRM row sparks user rebellion.
SlySoft's AnyDVD HD program can apparently be used to rip HD DVD discs that use AACS version 3. A Caribbean firm called SlySoft claims to
have
broken the copy protection technology used on some Blu-ray discs designed to prevent video content from
being
copied and pirated. Blu-Ray cracked by Slysoft, rips pouring from air.
The recent massive increase in amount of Blu-Ray rips has an obvious reason: cracked protection BD+. SlySoft
has long sold a product called AnyDVD which is a utility that disables a DVDs Content Scramble System (CSS)
copy protection technology. Once a DVDs copy protection is disabled, you can copy its content using one of
several third-party programs. Now the company SlySoft is upping the DRM-busting ante with a new version of
AnyDVD HD 6.4.0.0 ($47) that promises to crack Blu-ray disc copy protection.
May 4, 2007 Digg founder Kevin Rose explained his decision to allow posts containing an HD DVD security code during his appearance at OnHollywood. Rose spoke just a few hours after a user rebellion.
DVD Key Censorship - Readers
did not 'dig' censorship. Attempts to gag the blogosphere from publishing details of a DVD crack
have
led to a user revolt. The row centred on a 'cease and desist' letter sent by the body that oversees
the digital rights management technology on high-definition DVDs. It requested that blogs and websites
removed
details of a software key that breaks the encryption on HD-DVDs. The removal of the information from
community
news website Digg was a step too far for its fans. The AACS LA's vigilance in trying to keep the existence of HD DVD
cracks out of the
public eye has backfired in a truly spectacular manner.
As quickly as stories relating to the issue were removed, they were re-submitted in their thousands, in an
act
described by one user as a "21st Century revolt". Is resisting overbroad copyright laws in the moral
equivalent of opposing tyranny, racism or slavery? See Thoreau
- The Key 09F911029D74E35BD84156C5635688C0 in White numbers and Letters on a Tee Shirt
- The Earth has a message for you
- EFF's Fred von Lohmann has posted a little legal primer on the HD-DVD key.
- Last May 2 - 3 the 24 hours
- Decryption software for AACS released the scheme used to encrypt content on both next-gen DVD systems (HD-DVD and Blu-ray), was released recently by an anonymous programmer called Muslix. His software, called BackupHDDVD, is now available online. As shipped, it can decrypt HD-DVDs (according to its author), but it could easily be adapted to decrypt Blu-ray discs.
HACKER ETHICS
Both the XCP and MediaMax CDs include outrageous, anti-consumer terms in their "clickwrap" EULAs. The suit will also demand Sony BMG remove unconscionable terms from its EULA. If purchasers declare personal bankruptcy, the EULA requires them to delete any digital copies on their computers or portable music players. The same is true if a customer's house gets burglarized and his CDs stolen, since the EULA allows purchasers to keep copies only so long as they retain physical possession of the original CD.
Sony: Dangerous Decloaking Patch, EULAs and Phoning Home
After more than 5 years of trying,
recording industry hasn't shown a workable
DRM scheme for music CDs. Gartner believes that it will never achieve this goal as long as CDs
must
be playable by stand-alone CD players. The industry may now refocus its attention on seeking legislation
requiring the PC industry to include DRM technology in its products. Gartner believes the industry would
be
better-served by efforts to develop solutions that use DRM as an accounting/tracking tool, rather than as a
lock. This approach would enable them to move to play-based business models not tied to hardware, and to
track their digital assets without complicating users' ability to move legitimately acquired content to
whatever devices they choose."
The problem is the CD is completely unprotected so the lables will kill it.
lala.com
has got a permanent watermark that connects the track to you. If you buy a track directly from them, it
contains a watermark, if you give it to someone else it won't play, unless ownership is transferred to
this new individual, and then the original purchaser can't play it. And trying to add DRM to it cost
Andy Lack his job. You buy the CD, rip it, and then trade it anonymously on the Net to ANYBODY! By
eliminating the CD leak, they force you to either buy non-transferable tracks online or rent them, and
piracy
is stemmed. It pays to kill the CD and move everybody into the file world, just like the labels killed
vinyl,
even though it still had demand, twenty five years ago when they moved everybody into the CD world.
With every change in technology there has been an effect on the business model that has to change with it. There is a history of recording technology change.
DEFEAT DRM
You can very easily defeat ANY and ALL
DRM
schemes on music CDs with a black (felt tip) magic marker. How does this work? By obliterating part of the
data track with a black marker pen. The trick is to identify where the data track starts, not too difficult
because of the track gap, so as to not impair the audio portion." It turns out that the marker
renders
the data track unreadable, forcing the PC to simply skip to the music section of the disc. The
copy-protection
technology works by adding a bogus data track to the outside of the disc,
and
since computers always read data tracks from a CD first they will never play the music
tracks. The discovered workaround is the computer never locates the data track and so
goes
ahead with music playback. Blacken the edge of the really shiny side of the disc with a black felt tip
marker.
The effect is that the copy-protected disc will play on standard CD players but not on computer CD-ROM
drives,
some portable devices and even some car stereo systems. Some Apple Macintosh users have reported that
playing
the disc in the computer's CD drive causes the computer to crash. The cover of the copy-protected discs
contain a warning that the album will not play on Macintoshes or other personal computers.
Hold down shift & stick in cd.
Disables autorun for that cd.
Neil Diamond "12 Songs" - Columbia
11/21/05 Sales this week: 43,167
Percentage change: -53%
12 songs you can't buy at any price, since Sony recalled all the discs because they compromised
computers. More evidence that labels don't care about careers, only the bottom line. Look at the 52
acts
whose CDs and careers have been compromised. Their public is mad at them. They look like pansies. Even
though under the onerous contracts they signed they couldn't prevent their albums being released in a
compromised form. This would have never happened thirty five years ago, when the acts had power.
Wouldn't have happened twenty five years ago, when Tom Petty refused to have his album released at
$8.98,
a new high price. MCA needed the money, Tom needed his credibility. He didn't want his fans to be
guinea
pigs.
Neil Diamond's comeback has been compromised by some suits completely out of touch with not only the
street, but careers.
"You too can rule the world.
You just have to crush everyone ELSE first!
A little crushing music, maestro..."
Open Media Commons
Sun Microsystems announced plans for an open-source, royalty-free digital rights management (DRM) standard,
called the Open Media Commons, to address the increasing number of incompatible download
schemes. Through the open-source Common Development and Distribution License, Sun is releasing the code from
its Project DReaM (DRM/everywhere available) program. The company is encouraging digital rights holders and
device makers to join it in this initiative. There are also other companies and groups making similar
efforts.
http://www.theregister.co.uk/2005/08/22/sun_open_source_drm/
Software
A German research group that developed the MP3 format in the late 1980s has developed a watermarking technology that it says will help curb illegal file sharing. Officials from the Fraunhofer Institute said that their technology is better than digital rights management (DRM) tools in that it does not require special hardware to play protected files and is less susceptible to hacking. Instead, the institute has developed a method of watermarking MP3 files and software to track those files. The result is that rather than identifying individuals who download protected files, the application tracks who has uploaded files that have been marked. According to Michael Kip, a spokesperson for the institute, "If, for instance, you purchase and download a CD, burn a copy, and give it to a friend, and that person puts it on a file sharing network, our system will trace that music back to you." That scenario, said Kip, could result in legal action against the person who originally bought the CD, depending on that person's country of residence and applicable copyright laws.
Opera integrates BitTorrent in upcoming browser
Hardware
Intel quietly embeds DRM in it's 945 chips firmware
2005 Digit
Online Magazine, reports copyright holders protection hit at the hardware level. Intel is now
embedding digital rights management in the new dual-core processor Pentium D and the 945 chipset found in
the motherboard. Furthermore it's enabled and works along side Microsofts DRM model,
unfortunately no ones tallking much about it. The new system can theoretically give content holders the
option of denying copying and re-distribution of their products. [Intel's
Australian technical manager] Tucker ducked questions regarding technical details of how embedded DRM
would work saying it was not in the interests of his company to spell out how the technology in the
interests
of security.'' Intel "dream" DRM system would allow content to be moved from one
platform to another on a network, presumably through a check-in/check-out procedure, to make sure only a
limited number of (legitimate) copies would be made and in service at any one time.
Intel's
system also acknowledges, for example, that a high- resolution (e.g. high definition video) copy of a film
could be used to create low-res (like Quicktime, Real or Windows Media) versions that could be used in
portable video players. Users might even be able to "loan" time-limited copies or be allowed to
make a small number of copies, like Apple's Fair Play DRM permits.
Cyberattackers can exploit Pentium self-defense
Your computer could hand itself over to cyberattackers when it's trying to cool off. That warning
galvanized the information technology security experts gathered this week at the CanSecWest/core06
conference
here. Computers with Intel Pentium processors can be hijacked through a built-in mode designed to
protect the processor's motherboard.
Apple to ditch IBM, switch to Intel chips 6/05
http://news.com.com/2102-1006_3-5731398.html?tag=st.util.print
See Intel's ideas for such a system, and the participation of an entertainment and consumer electronics
industry panel called the Digital Home Working Group, on which Intel sits, which has been addressing
such a system in this article from February, 2004
Don M. Whiteside
VP Technical Policy & Standards
Intel Corporation
Date: May 30, 2005
The article grossly misrepresents the discussion that occurred. The rights management technology referred
to
in the article was not a secret DRM from Intel, but the DTCP-IP technology
publicly offered by the 5C Entity; which Intel is a Founder. Intel believes that the DTCP-IP
technology is an important element in enabling protected transport of compressed content within the home
network, and we continue to promote DTCP-IP for this application which enables greater consumer
flexibility & use of premium entertainment content.
Steve Bellovin: The DTCP web site says, on its home page, The following are informational versions of the Volume 1 specification documents, which omit specific sections and sensitive information. It is not the complete Volume 1 and should not be utilized for product implementations. The complete DTCP Specification, can be obtained by executing the License Agreement and paying the associated fees as prescribed in the license agreement. The license is about 50 pages long, describes "Confidential" and "Highly Confidential" markings for parts of the technology, and requires an annual payment of $10,000 for an evaluation license which can't even be used to ship products. (If you want to ship products, you owe even more up front, plus a per-certificate fee.) See DeCSS
Music | Digital Rights Management
What are your Fair Use Rights?
"You're not buying music, you're buying a key," says Larry Kenswil, president of eLabs at Universal Music Group, the world's largest record company, which offers 99 cent digital singles "...that can be burned to a CD but not copied to certain portable devices, like the Apple iPod. 'That's what digital rights management does: it enables business models.'"
(Fox doesn't object to personal use)
“We have zero objection to anyone's ability to duplicate, to record, to play back and to save any copy-
able content whatsoever,” said Peter Chernin, the president of 20th Century Fox. “But we'd be idiots not
to be wary of the risks that come with that ability, and of the vulnerability of those of us supplying
digitally unprotected films and shows.”
Plagiarism in Dylan, or a Cultural Collage?
Woody Guthrie put the following copyright notice on one of his songs.
FAIR USE
Jon Lech Johansen, (famous as one of the authors* of DeCSS, an app that lets you rip copy-protected DVDs) better known as DVD Jon.
* The decryption code was actually written by an anonymous German programmer,
from reverse-engineering. " For people interested in background on DeCSS, the best account of the origin of DeCSS is his trial
testimony:
Q. Who wrote DeCSS?
A. I and two other people wrote DeCSS.
...
Q. Mr. Johansen, what did you do next towards making DeCSS?
A. We agreed that the person who I met would reverse engineer
a DVD
player in order to obtain the CSS algorithm and keys.
Q. Who was this person that you met on the Internet?
A. A person from Germany. I don't know his identity.
Q. Okay. What happened next?
A. About three days later when I was on line again, he messaged me and told me that he had found
the CSS algorithm. He also sent the algorithm to me with the CSS authentication source which are
written
by Eric [ed: this is a mishearing of Derek] Fawcus earlier. He also sent me information on where
inside the player he had found the algorithm, and he also sent me a single player key.
Q. Thank you very much. Now, you testified on direct that a German person, I think, had
reverse-engineered the Xing DVD player, is that correct?
A. Yes, that is correct.
Q. And that person goes by the nick Ham?
A. Yes, that's correct.
Q. And it's Ham who wrote the source code that
performed the authentication function in DeCSS, is that correct?
A. No, that is not correct. He did not write the authentication code.
He wrote the decryption code.
Q. He wrote the encryption code?
A. Decryption code.
Q. Decryption.
A. Yes.
Q. Ham is a member of Masters of Reverse Engineering or MORE?
A. That's correct.
Q. And are you also a member of MORE?
A. Yes.
Q. There are other members in Germany and Holland, is that correct?
A. Well, the third member is in the Netherlands.
Q. And it was Ham's reverse engineering of the Xing DVD player that revealed the CSS encryption
algorithm, am I right?
A. Yes, that's correct.
Q. Reverse engineering by Ham took place in or about September 1999?
A. Yes, I believe it was late in September of 1999.
Q. And you testified that it was this revelation of the CSS
encryption algorithm and not any weakness in the CSS cipher that allowed MORE to create DeCSS, is that
correct?
A. Yes, that's correct.
Q. You obtained the decryption portions of the DeCSS source code from Ham, correct?
A. Yes, that's correct.
Q. You then compiled the source code and created the executable?
A. Well, in the form I received it, it was not compatible.
See also:
http://www.lemuria.org/DeCSS/decss.html and
http://www.lemuria.org/DeCSS/dvdtruth.txt
RELATED INFORMATION
2010 Subpoena
Defense Resources
A new entity called the US Copyright Group ("USCG"), ostensibly operating on behalf of several
independent filmmakers, has filed lawsuits against thousands of Bit Torrent users in a federal court in
Washington, D.C.. The defendants, all currently unnamed individuals, called "John Does" in legal
cases, are accused of having uploaded and downloaded independent films such as "Far Cry,"
"The
Hurt Locker," "Steam Experiment," and "Uncross the Stars" in violation of copyright
law. CNET's News.com has put together a "Frequently Asked
Questions" piece that explains the litigation campaign in more detail.
The USCG has obtained IP addresses it alleges are associated with infringement, and has received permission
from the court to issue subpoenas to Internet Service Providers ("ISPs") to obtain the name and
address of subscribers associated with those IP addresses. News reports suggest that, unlike the RIAA lawsuits against alleged mp3 downloaders,
the attorneys bringing these suits are not affiliated with any major entertainment companies, but are
instead
intent on building a lucrative business model from collecting settlements from the largest possible set of
individual defendants.
RIAA Mass Litigation Strategy for Making Money
Essay, "Digital Music: Problems and Possibilities," by Professor Terry Fisher of Harvard Law School
Statement of Roger McGuinn Songwriter and Musician Formerly with The Byrds on “The Future of Digital Music: Is There an Upside to Downloading?”
Robert Raisch on Digital Rights Management and Peer-to-Peer (P2P) file sharing restrictions.
After all we have seen and experienced, have we learned nothing? Tell any reasonably sophisticated hacker
they cannot do something and they will find more ways to get around your restriction then you can (not)
imagine.
Oh, you allow text messaging traffic on your network, but not P2P? How about P2P applications reconfigured
to share songs and movies over the same ports used by AOL's AIM? Or the Web's HTTP? Or
email's
IMAP/POP? Think you can recognize P2P transmissions by their unique sequence of ones and zeros? How about
scrambling those bits using cryptographic transformations you would need several super-computers to
crack?
Without examining every bit traversing the network and understanding its state, within whatever context or
conversation it is a part of, you cannot hope to control what your users do. This is the tyranny of
information complexity turned on its head and reinvented as a crushing weight placed on the shoulders of
those who would seek to control others.
The biggest "problem" here is not P2P or file sharing or DVD
ripping or podcasting it's the simple, unalterable fact that we've come
to a time where any "intellectual property" is easily, trivially taken out of the container
we've traditionally relied upon to control its use. Books, vinyl records, cds, celluloid film, video
tape, DVDs....these are archaic prisons of rigid matter, atoms purposefully constructed to diminish what we
can accomplish, rather than clouds of electrons, indeterminately located, impossible to measure, and so,
impossible to control. We are beginning to see the affect of the Internet Age's Uncertainty
Principle: information wants to be free...and it has little to do with cost or payments or
money,
and everything to do with power and control.
How to "rip" a scene from an entire
movie
on a DVD?
CDs to Digital:
ripdigital.com
getdigitalinc.com (I used them and they were
great!)
awetechnologies.com
moondogdigital.com
riptopia.com
LPs and Tapes to Digital:
digitize-it.com
cassettes2cds.com
RESOURCES
Educational CyberPlayGround: FUTURE TRENDS IN COMPUTING
and service calls. - - DRM technology and policy There appear ... will happen with
DRM protected data in 100 years ... documents? Otherwise all DRM protected
documents, movies and films
Educational CyberPlayGround: Copyright, Copyleft,
IP,Fair Use, Research, Citation is a bubble many "DRM" proponents would
like
to burst. The term "DRM" is the same sort of deception. ~ Seth ... play it later.
Some DRM systems try to make this impossible.
Educational CyberPlayGround: Copyleft and the Creative Commons License
digital rights management (DRM) standard, called the Open Media ... its Project Dream
program. DRM DIGITAL RIGHTS MANAGMENT
Educational CyberPlayGround: Security - TOOLS
Kids' page. DIGITAL RIGHTS MANAGEMENT DRM Peer to Peer Technology peer-to-peer
computing
is ... copying or use of work DRM goal -- their products let publishers control every use
Educational CyberPlayGround: Radio Station, Ham Radio, Crystal
Radio
kits online!
DRM is all about preventing UN-VIABLE ... restrictions-management systems
(DRM) as the solution.
Educational CyberPlayGround NetHappenings
NewsLetter
How to avoid DRM spyware Hacker software will protect everybody Hackers Use
DRM To Plant Massive Amounts Of Spyware
P2P Public Education
and P2P Ripping and EnCoding CD Audio DIGITAL RIGHTS MANAGMENT - DRM ABOUT DeCSS and
DVD's
Embedding and adding sound to web pages.
COMPOSITION Ripping and EnCoding CD Audio DIGITAL RIGHTS MANAGMENT - DRM EMBEDDING SOUND
Music Deals, Music Contract Law, Copyright Law, Free
Ripping and EnCoding CD Audio DIGITAL RIGHTS MANAGMENT - DRM ABOUT DeCSS and DVD's K12
Classroom
FREE MUSIC
DOWNLOADS EMBEDDING SOUND INTO YOUR SITE
LYRICS FOR EVERY SONG PUBLIC DOMAIN COPYRIGHT FREE COMPOSITION DRM FREE SONGS - Digital
Rights Management Everything About DeCSS A program that cracks the code designed to protect
RINGTONES FROM
YOUR OWN MUSIC
It turns out it's fairly easy to install new ringtones on your phone. If your phone has bluetooth, you can pair the phone with the computer and just upload the MP3 with the song on the phone. No bluetooth? no mp3 support then look into a format called SMAF/MA-2.
Songs bought from the iTunes Music Store, are encrypted - read more about this below.
- Get WireTap Pro. This program will record the sound sent to your computer's audio output by various programs, including iTunes. With this program recording, play the portion of song you're interested in.
- When you're done recording, open the resulting .aifc file in QuickTime Pro and convert the file to a .wav file or find a free AIF to WAV converter.
- Once you have the WAV file, open it up in Audacity and select the exact portion from the song you want to become the ringtone. Then save it as .wav under a new name.
- Convert this final WAV file to a SMAF/MA-2 file. Download the Wave to SMAF
Converter from Yamaha, and convert the file. You'll end up with a .mmf file. For the file to be
recognized by the Samsung E315 phone, I had to rename it to have a .mid extension. Also make sure the file
is under 40Kb or so, and it has no more than 20 seconds.
The WAV->SMAF converter allows you to choose either 4KHz or 8KHz as sampling rate. Both will work on the phone, but the sound for the 4KHz version is just terrible, so I ended up using 8KHz. This reduced in half the length of the ringtone, compared to the 4KHz version.
- Once you have the .mid file, upload it on a web site in a known location (you do have one, don't you?), and send the phone an SMS message containing the link to the .mid file. For T-Mobile, I just send an email to phone-number-digits-only@tmomail.net containing the link.
- Once you receive the message, follow the link and download the ringtone. If you get error messages like Bad Gateway or something else, the file might be too large, or the song lasts too long. Experiment a bit with the sizes and see which ones work for you.