Feeds

Blu-ray body confirms format to use 'interim' copy protection code

Won't limit the consumer, apparently

3 Big data security analytics techniques

CeBIT Blu-ray Disc's lack of full AACS support will not limit the consumer in any way, Blu-ray Disc Association (BDA) spokesman Frank Simonis said today after confirming the next-generation optical disc format will incorporate an "interim" version of the copy-protection technology.

The organisation also indicated the format's European launch timeframe will be formally announced after Blu-ray's US launch in May. This despite comments from Samsung, Panasonic and others that they will ship BD players over here in the Autumn.

AACS (Advanced Access Content System) is a cornerstone of both HD DVD and Blu-ray Disc. Hints that the technology - currently being developed separately from either optical format - was running behind schedule emerged last month when Sony warned that its PlayStation 3 might be delayed by an unnamed industry consortium being unable to come up with their final specifications in time.

We suggested Sony might have AACS in mind - it's part of the PS3's BD drive - and sure enough it quickly emerged as the front runner for potential PS3 delays.

The BDA's comments yesterday confirm that AACS isn't done - but there's enough of it in place to allow HD DVD and BD hardware and content providers to offer product. Whatever technology is incorporated into initial units must remain compatible with future versions of AACS, and Simonis indicated that would indeed be the case. If not, the consumer backlash is likely to be considerable.

Simonis added that BD will ship with the format's BD+ and ROMmark security systems - both of which come in addition to AACS. BD+ allows the BDA to update at a future date the Blu-ray encryption keys should they be cracked or made public at a future date. ROMmark is essentially a 'genuine disc' stamp encoded on each BD as it comes out of a pressing machine.

As for a European launch, Phillipe Coppens, of BDA member company Philips, said an announcement would come in the near future - essentially, when the US launch has taken place, he added. ®

SANS - Survey on application security programs

More from The Register

next story
Leaked pics show EMBIGGENED iPhone 6 screen
Fat-fingered fanbois rejoice over Chinternet snaps
Oh no, Joe: WinPhone users already griping over 8.1 mega-update
Hang on. Which bit of Developer Preview don't you understand?
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
True optical zoom coming to HTC smartphone cameras
Time to ditch that heavy DSLR? Maybe in a year, year and a half
Rounded corners? Pah! Amazon's '3D phone has eye-tracking tech'
Now THAT'S what we call a proper new feature
Leaked photos may indicate slimmer next-generation iPad
Will iPad Air evolve into iPad Helium?
Feast your PUNY eyes on highest resolution phone display EVER
Too much pixel dust for your strained eyeballs to handle
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
US mobile firms cave on kill switch, agree to install anti-theft code
Slow and kludgy rollout will protect corporate profits
prev story

Whitepapers

SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.