Category: Uncategorized

  • AACS: Game Theory of Blacklisting

    [Posts in this series: 1, 2, 3, 4, 5, 6, 7.] This is the fourth post in our series on AACS, the encryption scheme used for HD-DVD and Blu-Ray discs. We’ve already discussed how it’s possible to reverse engineer an AACS-compatible player to extract its secret set of device keys. With these device keys you…

  • AACS: Blacklisting, Oracles, and Traitor Tracing

    [Posts in this series: 1, 2, 3, 4, 5, 6, 7.] This is the third post in our discussion of AACS, the encryption scheme used for HD-DVD and Blu-Ray discs. Yesterday Ed explained how it is possible to reverse-engineer a player to learn its secret device keys. With the device keys, you can extract the…

  • AACS: Extracting and Using Keys

    [Posts in this series: 1, 2, 3, 4, 5, 6, 7.] Let’s continue our discussion of AACS (the encryption scheme used on HD-DVD and Blu-Ray discs) and how it is starting to break down. In Monday’s post I gave some background on AACS and the newly released BackupHDDVD tool. Recall that AACS decryption goes in…

  • AACS Decryption Code Released

    [Posts in this series: 1, 2, 3, 4, 5, 6, 7.] Decryption software for AACS, the scheme used to encrypt content on both next-gen DVD systems (HD-DVD and Blu-ray), was released recently by an anonymous programmer called Muslix. His software, called BackupHDDVD, is now available online. As shipped, it can decrypt HD-DVDs (according to its…

  • 2007 Predictions

    This year, Alex Halderman, Scott Karlin and I put our heads together to come up with a single list of predictions. Each prediction is supported by at least two of us, except the predictions that turn out to be wrong, which must have slipped in by mistake. Our predictions for 2007: (1) DRM technology will…

  • 2006 Predictions Scorecard

    As usual, we’ll start the new year by reviewing the predictions we made for the previous year. After our surprisingly accurate 2005 predictions, we decided to take more risks having more 2006 predictions, and making them more specific. The results, as we’ll see, were … predictable. Here now, our 2006 predictions, in italics, with hindsight…

  • Holiday Stories

    It’s time for our holiday hiatus. See you back here in the new year. As a small holiday gift, we’re pleased to offer updated versions of some classic Christmas stories. How the Grinch Pwned Christmas: The Grinch, determined to stop Christmas, hacks into Amazon’s servers and cancels all deliveries to Who-ville. The Whos celebrate anyway,…

  • Sharecropping 2.0? Not Likely

    Nick Carr has an interesting post arguing that sites like MySpace and Facebook are essentially high-tech sharecropping, exploiting the labor of the many to enrich the few. He’s wrong, I think, but in an instructive way. Here’s the core of his argument: What’s being concentrated, in other words, is not content but the economic value…

  • Soft Coercion and the Secret Ballot

    Today I want to continue our discussion of the secret ballot. (Previous posts: 1, 2.) One purpose of the secret ballot is to prevent coercion: if ballots are strongly secret, then the voter cannot produce evidence of how he voted, allowing him to lie safely to the would-be coercer about how he voted. Talk about…

  • Erosion of the Secret Ballot

    Voting technology has changed greatly in recent years, leading to problems with accuracy and auditability. These are important, but another trend has gotten less attention: the gradual erosion of the secret ballot. It’s useful to distinguish two separate conceptions of the secret ballot. Let’s define weak secrecy to mean that the voter has the option…