Re: DeCSS, crypto, (regions removed??!)

2003-01-09 Thread alan
On Thu, 9 Jan 2003, Bill Stewart wrote:

> At 03:54 PM 01/08/2003 +0100, Martin Olsson wrote:
> >Hi,
> >I dont know if this is relevant to the discussion, but in Sweden (not a 
> >region-1 country) people where so pissed at the regionsystem (and the fact 
> >that most computer geeks could go around it, but the average person could 
> >not) that the whole region concept had to be removed. Ie. this forced the 
> >large companies to rethink and nowadays we have commercial region-free DVD 
> >players in most stores.
> 
> That's an interesting change - a couple of years ago,
> friends from Sweden told me that the standard was to
> strictly sell only region-enforcing DVD players
> and then charge a bit extra for installing the
> region-free mod chips that everybody bought.
> I guess they've stopped bothering with the games by now.

I wonder how they deal with the RCE (Region Code Enforced) discs?

RCE is a sceme that causes the disc not to work in region free players.  
If you want a good test disc, try the region 1 version of "Spider-man".  
In a region free player it will bring up a map of region codes and make 
nasty noises about how you need a region one player.  The disc works fine 
in players where you can set the region.  (Some region ocdeless players 
can do this, some cannot.)

You can find places that sell region free players by searching on Google 
for "Apex region free DVD".  The only one I have used is 
www.220-electronics.com and I will not order from their insecure web page. 





-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]



Re: DeCSS, crypto, law, and economics

2003-01-08 Thread Alan
On Tue, 2003-01-07 at 21:09, bear wrote:
> On Tue, 7 Jan 2003, alan wrote:
> 
> 
> > Not to mention the two seasons of Futurama that are only available
> > on Region 2 PAL DVDs.  (Or the other movies and TV shows not allowed
> > by your corporate masters.)  "They Live" is another film only
> > available from Region 2.  Maybe it tells too much about the movie
> > industry...
> 
> This makes an interesting point.  While the argument that market
> segmenting may increase the ability to provide material in all
> markets, the fact is that given region coding, the producers of
> this stuff *DON'T* provide the material in all markets.
> 
> If their argument, that the increased market size available with
> region coding enables economies of scale, were actually the driving
> force behind region coding, there should be no such thing as content
> available in one region that is unavailable in another.
> 
> Thus their actions betray that they have a different motive. Therefore
> the public skepticism regarding the truth of their assertions about
> their motivations seems fairly solidly grounded on fact.

The reasoning seems to be pure greed.  If you look at the zones, they
are more economic than anything else.

Another theory is it allows them to edit movies for different markets. 
(Such as what Miramax does to movies out of Hong Kong.  Region codes
help prevent the average viewer from being able to see the film in the
original form and realize just how much they screwed up the film.)

Another argument for the regions is the differing formats for TV
signals. (NTSC v.s. PAL.)  It is a bogus argument as you can find DVD
players that will convert the signal with little or no problem.  (Apex
produced one that was incredibly cheap and works great.)

> ( who likes a fair amount of stuff that is only available
>   coded for region 6 ).

You made me have to look up what region 6 was.  (Here is a good
reference for those of you who don't know or remember:
http://www.ilovedvd.co.nz/regioncodes.asp )

Most of the titles i have seen from China are region free.  (Hong Kong
makes a good deal of money from Americans who want to see Chinese films
uncut.  I know, because they are making a fortune off of me...)

-- 
Alan <[EMAIL PROTECTED]>


-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]



Re: DeCSS, crypto, law, and economics

2003-01-07 Thread alan
On 7 Jan 2003, Perry E. Metzger wrote:

> I don't know anyone who trades video files -- they're pretty big and
> bulky. A song takes moments to download, but a movie takes many many
> hours even on a high speed link. I have yet to meet someone who
> pirates films -- but I know lots of hardened criminals who watch DVDs
> on Linux and BSD. I'm one of these "criminals".

There is some trading of TV shows, but not movies.  (Some, but only things 
that you cannot buy legally.)  The few "pre-release" things you find on 
the file-sharing networks have the same (lack of) quality that the 
bootleg tapes have. The only large films worth the time are things that 
you cannot buy.  (Although "Song of the South" should be required viewing 
in schools.  It makes racism *boring*.)

A XVCD copy of a 22 minute TV show runs about 425 megs.  Anything smaller 
tends to look like crap.  Multiply that out to a feature length film and 
you find out why it is impractical to trade films in this manner.  (It is 
not worth the 2 days it will take for the download. Most people will go 
out and buy it than waste the time.)

> Many nights, I close the blinds and illegally use the computer I
> lawfully paid for to view the DVDs I lawfully paid for. To do that, I
> make use of DeCSS. My nice Unix based DVD player, ogle, needs it to
> read the drive. A little later this evening I'll be watching an
> episode of "I, Claudius" I bought and paid for, using this "criminal"
> software combination. Hopefully no one will learn of my shamefully
> immoral act. Please don't tell anyone.

Not to mention the two seasons of Futurama that are only available on 
Region 2 PAL DVDs.  (Or the other movies and TV shows not allowed by your 
corporate masters.)  "They Live" is another film only available from 
Region 
2.  Maybe it tells too much about the movie industry...


-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]



Re: DeCSS, crypto, law, and economics

2003-01-07 Thread alan
On Wed, 8 Jan 2003, Nomen Nescio wrote:

> John S. Denker writes:
> > The main thing the industry really had at stake in
> > this case is the "zone locking" aka "region code"
> > system.
> 
> I don't see much evidence for this.  As you go on to admit, multi-region
> players are easily available overseas.  You seem to be claiming that the
> industry's main goal was to protect zone locking when that is already
> being widely defeated.

Try selling a regionless player in this country.  It happens, but not in 
public.  Region codes make them tons of money.  (They are economic zones, 
nothing else.)

> Isn't it about a million times more probable that the industry's main
> concern was PEOPLE RIPPING DVDS AND TRADING THE FILES?  Movies are
> freely available on the net, just like MP3s, and the DeCSS software was
> the initial technology that made ripping DVD's possible.  Many people
> would rather get something for free than to pay for it, and DVD ripping
> allows that for movies.  The MPAA obviously is afraid of following the
> RIAA into oblivion.

The think that does not get press is that there is a bunch of money being 
made on the players themselves.  Having DeCSS allows you to counterfeit 
players and avoid the licence fees.

It also showed that they were generally stupid gits since the CSS 
algorythm has only 24 effective bits in the key.  Brute forcing the key 
once you know this takes *seconds* on my PC.  Snake oil makes the discs 
play so much smoother...


-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]



Re: Did you *really* zeroize that key?

2002-11-08 Thread Alan Barrett
way for an
implementation to know whether the program is running/will run in
emulated hardware rather than real hardware, nor whether or not a logic
alalyser is/will be attached to the bus.  Logic analysers and hardware
emulators would allow the accesses to volatile storage to be observed,
and the implementation would have to ensure that the observations
matched the behaviour intended by (the orthodox interpretation of) the
volatile qualifier.

>* standards-compliant compilers normally distinguish
>  between "conformant" source programs and "noncon-
>  formant" source programs. [...] so, in the case of
>  "volatile," a compiler won't necessarily be bound
>  by the "rules of the abstract machine," unless the
>  source program strictly conforms to the language
>  spec's "best practice" definition of how a C/C++
>  program ought to look.

True.  But any compiler that tried to use such arguments to weasel out
of the requirement to handle volatile in the expected way would become
unpopular.

>* finally, my friend gives the example of a compiler
>  that might decide to make a copy of our key buffer
>  at runtime, in pursuit of some optimization.  the
>  compiler might have the program zeroize one copy of
>  the key, but not the other copy.  as long as the
>  program's end result turns out to be "correct,"
>  such a bizarre trick can still fulfill the language
>  spec.

Declaring the buffer as volatile would remove the compiler's licence to
do such optimisation.

--apb (Alan Barrett)

-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]



Re: Palladium -- trivially weak in hw but "secure in software"??(Re: palladium presentation - anyone going?)

2002-10-22 Thread alan
On Tue, 22 Oct 2002, Rick Wash wrote:

> Hardware-based attacks cannot be redistributed.  If I figure out how
> to hack my system, I can post instructions on the web but it still
> requires techinical competence on your end if you want to hack your
> system too.
> 
> While this doesn't help a whole lot for a DRM goal (once you get the
> non-DRM version of the media data, you can redistribute it all you
> want), it can be very useful for security.  It can help to eliminate
> the 'script kiddie' style of attackers.

Not really.  It depends on what they are exploiting.  Does every piece of 
code need to be validated all the time? Once a program is running, does 
something running in its code space get revalidated or soes it just run?

I don't see how paladium stops buffer overflows or heap exploits or format 
bugs or any of the standard exploits that are in use today.  (Not without 
crippling the entire system for bot the user and the programmer.)

It seems to change little for script kiddies if the machines are going to 
communicate with other systems.  (Unless the DRM holders will control who 
and how you can connect as well.  And they just might do that as well...)

The perveyors of this also claim it will stop spam and e-mail viruses. 
They only way it can do that is by making paladium based systems 
incompatable with every non-DRM machine on the planet.  (So much for 
getting e-mail from your relatives!)

The only problem this hardware seems to solve is shackling the user into 
what data they can see and use.  If Microsoft follows their standard 
coding practices, the script kiddie problem will not go away with this 
technology. It will probably increase.  

And it will be illegal to effectivly stop them.



-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]



Re: Palladium -- trivially weak in hw but "secure in software"??(Re: palladium presentation - anyone going?)

2002-10-22 Thread alan
On Tue, 22 Oct 2002, Nelson Minar wrote:

> I doubt it, though. Even a paper-thin shred of hardware protection is
> enough to prevent 99% of the people from circumventing DRM technology.
> Joe Sixpack isn't going to install a mod chip, and his local computer
> store can't do it for him for fear of prosecution for circumventing
> copyright protection. If the appliance enforces DRM when you buy it,
> that's good enough to guarantee revenue to the copyright holders. In
> the US, at least.

Until they find out that proper backups are in violation of copyright.

Or what happens when the company that controls the DRM mechanism goes 
under.  (Just ask DIVX users how much they enjpy the movies they bought 
from Circuit City.)



-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]



Re: Horseman Number 3: Osama Used 40 bits

2002-01-22 Thread Alan Ramsbottom

From: "Stef Caunter" <[EMAIL PROTECTED]>

> An attacker with floppy boot access to a Win2K system would get reverse
> access to that machine's encrypted files only if the recovery cert for
> the domain was locally available (unlikely), or if the machine was not
> part of a domain.

In the two years or so since that EFS attack surfaced, I don't recall ever
seeing anyone ask *why* you get access in the stand-alone case.

The theory says a private key is encrypted under a random account 'master
key' which in turn is encrypted under a key derived from account credentials
(password and SID). Since the floppy based chntpw program works by simply
overwriting an account's password hash, any subsequent attempt to access a
private key should fail.

It works because the protected storage service can't handle password resets
when they are performed via a different (administrative) account, so it
maintains a second copy of each account's master key to recover from such
events. I believe the second copy is encrypted under some system secret (in
a domain this secret lives on the domain controller), but information about
this Win2K feature is scarce or opaque.

The documentation for WinXP implies this has changed i.e. there is no
automagic recovery of an account's master key if the password is reset via
another account. However there is a suggested recovery method that uses the
umm.. innovative Password Reset Disk.

-Alan-




-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]



Re: password-cracking by journalists...

2002-01-22 Thread Alan Barrett

On Mon, 21 Jan 2002, Peter Trei wrote:
> >17 USC 1201(a)(1)(A):
> >No person shall circumvent a technological measure that
> >effectively controls access to a work protected under
> >this title.
> 
> I'm sure I'm picking nits here (and I praise God every day that
> I Am Not A L*wy*r), but what does 'effectively' mean? If it can be
> broken, was it effective? What level of work is required to make
> it an 'effective technological measure'? If the standard is 'anything,
> including rot13', then why is the word present in the rule at all?

When I last brought this up (29 to 30 July 2001, Subject: Effective
and ineffective technological measures), people posted references to
two slightly different sections that try to define what "effectively
protects" and "effectively controls" means:

1201(b)(2)(B): a technological measure ''effectively protects a right of
a copyright owner under this title'' if the measure, in the ordinary
course of its operation, prevents, restricts, or otherwise limits
the exercise of a right of a copyright owner under this title.

1201(a)(3)(B): a technological measure ''effectively controls access to
a work'' if the measure, in the ordinary course of its operation,
requires the application of information, or a process or a
treatment, with the authority of the copyright owner, to gain access
to the work.'

The key phrase seems to be "in the ordinary course of its operation".
If you publish the fact that you use rot to protect your copyrighted
material, but keep secret the fact that n = 13, then the ordinary course
of operation of the decryption process requires the application of
this secret value, so the process "effectively controls access" and
"effectively protects".  The fact that somebody can guess the secret
value would seem to have no bearing on whether rot "effectively" does
anything.

--apb (Alan Barrett)



-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]



Re: Criminalizing crypto criticism

2001-07-31 Thread Alan Olsen

On Tue, 31 Jul 2001, Rick Smith at Secure Computing wrote:

> There are probably enough "cryptography researchers" out there that even a 
> large vendor won't feel tempted to harass them all proactively.

All they have to do is make a messy example out of one or two. (It also
helps if you can get a prosecutor that is working on a promotion to help
out.)

[EMAIL PROTECTED] | Note to AOL users: for a quick shortcut to reply
Alan Olsen| to my mail, just hit the ctrl, alt and del keys.
 "All power is derived from the barrel of a gnu." - Mao Tse Stallman




-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]



Re: Company Awarded Patent for "Digital Tickets" (was Re: GigaLaw.com Daily News, July 30, 2001)

2001-07-31 Thread Alan Olsen

On 31 Jul 2001, Derek Atkins wrote:

> This also looks very similar to my Master's Thesis, where I even use
> the term "digital ticket"!  Sheesh.

It also sounds a lot like Kerberos.

> Peter Wayner <[EMAIL PROTECTED]> writes:
> 
> > I discuss this in both editiions of _Digital Cash_. I wonder if this 
> > is prior art that reads against the patent.
> > 
> > -Peter
> 
> -- 
>Derek Atkins, SB '93 MIT EE, SM '95 MIT Media Laboratory
>Member, MIT Student Information Processing Board  (SIPB)
>URL: http://web.mit.edu/warlord/PP-ASEL-IA N1NWH
>[EMAIL PROTECTED]PGP key available
> 
> 
> 
> -
> The Cryptography Mailing List
> Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]
> 

[EMAIL PROTECTED] | Note to AOL users: for a quick shortcut to reply
Alan Olsen| to my mail, just hit the ctrl, alt and del keys.
 "All power is derived from the barrel of a gnu." - Mao Tse Stallman




-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]



Re: Criminalizing crypto criticism

2001-07-31 Thread Alan

On Friday 27 July 2001 11:13, Steven M. Bellovin wrote:
> In message <[EMAIL PROTECTED]>, Declan McCullagh writes:
> >One of those -- and you can thank groups like ACM for this, if my
> >legislative memory is correct -- explicitly permits encryption
> >research. You can argue fairly persuasively that it's not broad
> >enough, and certainly 2600 found in the DeCSS case that the judge
> >wasn't convinced by their arguments, but at least it's a shield of
> >sorts. See below.
>
> It's certainly not broad enough -- it protects "encryption" research,
> and the definition of "encryption" in the law is meant to cover just
> that, not "cryptography".  And the good-faith effort to get permission
> is really an invitation to harrassment, since you don't have to
> actually get permission, merely seek it.

Even worse is if the "encryption" is in bad faith to begin with. (i.e. They 
know it is broken and/or worthless, but don't want the general public to find 
out.)

Imagine some of the usual snake-oil cryto-schemes applied to copyrighted 
material.  Then imagine that they use the same bunch of lawyers as the 
Scientologists. 

This could work out to be a great money-making scam!  Invent a bogus copy 
protection scheme.  Con a bunch of suckers to buy it for their products. Sue 
anyone who breaks it or tries to expose you as a fraud for damages.


I mean if they can go after people for breaking things that use ROT-13 
(eBooks) and 22 bit encryption (or whatever CSS actually uses), then you can 
go after just about anyone who threatens your business model.

I guess we *do* have the best government money can buy.  We just were not the 
ones writing the checks...



-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]



Effective and ineffective technological measures

2001-07-29 Thread Alan Barrett

The DMCA said:
> 1201(a)(1)(A):
>No person shall circumvent a technological measure that effectively
>controls access to a work protected under this title.

What does "effectively" mean here?

If it has its plain english meaning, then one could argue that ROT13,
CSS (and anything else that can easily be broken) are *ineffective*
technological measures, so circumventing them is not prohibited by this
clause.  Distinguishing effective measures from ineffective measures
might reduce to measuring the resources required to break them.

Or does the clause really mean "No person shall circumvent a
technological measure that *purports to control* access to a work
protected under this title"?

--apb (Alan Barrett)




-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]