Feeds

Blu-ray BD+ crypto tech to be cracked by year's end?

Method discovered, claims software developer

The Power of One eBook: Top reasons to choose HP BladeSystem

Bullish optical disc decryption software developer Slysoft has claimed it has cracked Blu-ray Disc's BD+ copy-protection technology, though the most recent version of its disc hacking tool only extends to the AACS anti-rip mechanism.

Slysoft announced AnyDVD 6.1.9.3 earlier this week. Among its features, the developer claimed, is the ability to circumvent the latest incarnation of AACS' Media Key Block, aka MKBv4, a vital part of HD DVD and Blu-ray Disc encryption.

In a statement, Slysoft's head of development, James Wong, said: "We already found a way to crack BD+ and we have just turned to fine-tuning." The technique, which the Blu-ray Disc format incorporates in addition to AACS, is "on the verge of being circumvented", Slysoft said, adding it expects to ship a version of its software that can do just that "by the end of this year".

Of course, even at its most basic level - bypassing a DVD's CSS technology - Slysoft's code is verboten in the US and Europe under the terms of, respectively, the Digital Millenium Copyright Act (DMCA) and EU Copyright Directives, all of which criminalise the act of circumventing any copyright protection mechanism.

That's probably why Slysoft is based in Antigua. Though we hear the weather there's pretty pleasant too.

AnyDVD costs $49, plus a further $30 for folk who want the ability to open HD discs. That's just the decryption - to copy the data, you can use the company's CloneDVD, which is another $39. So Slysoft isn't doing all this out of altruism or the desire to get discs played on a platform the studios refuse to support.

But whatever the company's motives, its latest announcement is a blow for a part of the content that's industry seeking to prevent its work being ripped off by consumers who'd rather not cough up.

BD+ is based upon a virtual machine that runs disc-stored programs capable of checking the host's integrity and the security of the encryption keys. It can also add a further level of data-scrambling to the content.

Designing a Defense for Mobile Applications

More from The Register

next story
Secure microkernel that uses maths to be 'bug free' goes open source
Hacker-repelling, drone-protecting code will soon be yours to tweak as you see fit
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
Four fake Google haxbots hit YOUR WEBSITE every day
Goog the perfect ruse to slip into SEO orfice
Putin: Crack Tor for me and I'll make you a MILLIONAIRE
Russian Interior Ministry offers big pile o' roubles for busting pro-privacy browser
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.