Feeds

Blu-ray BD+ crypto tech to be cracked by year's end?

Method discovered, claims software developer

Top 5 reasons to deploy VMware with Tegile

Bullish optical disc decryption software developer Slysoft has claimed it has cracked Blu-ray Disc's BD+ copy-protection technology, though the most recent version of its disc hacking tool only extends to the AACS anti-rip mechanism.

Slysoft announced AnyDVD 6.1.9.3 earlier this week. Among its features, the developer claimed, is the ability to circumvent the latest incarnation of AACS' Media Key Block, aka MKBv4, a vital part of HD DVD and Blu-ray Disc encryption.

In a statement, Slysoft's head of development, James Wong, said: "We already found a way to crack BD+ and we have just turned to fine-tuning." The technique, which the Blu-ray Disc format incorporates in addition to AACS, is "on the verge of being circumvented", Slysoft said, adding it expects to ship a version of its software that can do just that "by the end of this year".

Of course, even at its most basic level - bypassing a DVD's CSS technology - Slysoft's code is verboten in the US and Europe under the terms of, respectively, the Digital Millenium Copyright Act (DMCA) and EU Copyright Directives, all of which criminalise the act of circumventing any copyright protection mechanism.

That's probably why Slysoft is based in Antigua. Though we hear the weather there's pretty pleasant too.

AnyDVD costs $49, plus a further $30 for folk who want the ability to open HD discs. That's just the decryption - to copy the data, you can use the company's CloneDVD, which is another $39. So Slysoft isn't doing all this out of altruism or the desire to get discs played on a platform the studios refuse to support.

But whatever the company's motives, its latest announcement is a blow for a part of the content that's industry seeking to prevent its work being ripped off by consumers who'd rather not cough up.

BD+ is based upon a virtual machine that runs disc-stored programs capable of checking the host's integrity and the security of the encryption keys. It can also add a further level of data-scrambling to the content.

Security for virtualized datacentres

More from The Register

next story
'Kim Kardashian snaps naked selfies with a BLACKBERRY'. *Twitterati gasps*
More alleged private, nude celeb pics appear online
Home Depot ignored staff warnings of security fail laundry list
'Just use cash', former security staffer warns friends
Hackers pop Brazil newspaper to root home routers
Step One: try default passwords. Step Two: Repeat Step One until success
UK.gov lobs another fistful of change at SME infosec nightmares
Senior Lib Dem in 'trying to be relevant' shocker. It's only taxpayers' money, after all
Who.is does the Harlem Shake
Blame it on LOLing XSS terroristas
Snowden, Dotcom, throw bombs into NZ election campaign
Claim of tapped undersea cable refuted by Kiwi PM as Kim claims extradition plot
Freenode IRC users told to change passwords after securo-breach
Miscreants probably got in, you guys know the drill by now
THREE QUARTERS of Android mobes open to web page spy bug
Metasploit module gobbles KitKat SOP slop
BitTorrent's peer-to-peer chat app Bleep goes live as public alpha
A good day for privacy as invisble.im also reveals its approach to untraceable chats
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
The next step in data security
With recent increased privacy concerns and computers becoming more powerful, the chance of hackers being able to crack smaller-sized RSA keys increases.