How stupid, one can already do this by converting to aiff then reimporting in any way one chooses. There, I'm a big hacker! Put my name all over the internet and give me tons of press! What a joke.
Originally posted by rog
How stupid, one can already do this by converting to aiff then reimporting in any way one chooses. There, I'm a big hacker! Put my name all over the internet and give me tons of press! What a joke.
Originally posted by dov
What is the point of this effort? To save $.99? It costs more in my time to go thru the hassle than I could possible save trying to pirate a cheap song.
Originally posted by rog
How stupid, one can already do this by converting to aiff then reimporting in any way one chooses. There, I'm a big hacker! Put my name all over the internet and give me tons of press! What a joke.
Originally posted by dov
What is the point of this effort? To save $.99? It costs more in my time to go thru the hassle than I could possible save trying to pirate a cheap song. Seems to me the author is doing it "just because" he can. Thanks but no thanks - I will spend my extra time with my kids teaching them how to use their computers!!
Originally posted by FZappa
I'm glad to see the system is being challenged, not being a user of ITunes I didn't realize there were copying limitations on the files.
It works like this: I end up paying $15-20 dollars for a CD and get no physical product. The record company gets to sell it for the same price but pays nothing for manufacturing and distribution.
Originally posted by arn
I think the reason cited by the author is to play his iTunes songs in Linux... which can not be done with protected files.
arn
Originally posted by coolsoldier
There are many more advantages to compromising the protection than just the ability to pirate music. Additional advantages:
3) Music can be played on older computers (OS 9, Win 98/ME -- people do still use these, even if not as their primary computers)
4) Music can be played on non-iPod music players.
5) Music can be converted to mp3 to play in cheap players or burn to mp3 cd's
6) Windows users can now (like mac users have been able to all along) use their music files in movies, etc. -- iMovie supports AAC-p, but there is no windows movie software that does.
7) If, for some reason, people want to switch music software at some point in the future. Even if iTunes is the best jukebox software out there now (this has been disputed), odds are that it won't stay the best forever. This gives them the option to switch software in the future.
So,there are many advantages to this, not all of which are piracy-related.
Originally posted by 1macker1
the_dalex
I'm sure plenty of people have been hackin away at UNIX and OS X, but no where near the volume that Windows sees.
And hackers can look for vulnerabilities in the source code of many Unix systems, not just experiment with the object code. Open source projects don't hide their flaws. Instead, they depend on the community for help in finding and fixing the bugs and security holes that show up.Originally posted by Ysean
As a unix & windows administrator I can honestly say that outright hack attempts are more prevelant on unix systems than windows. (Largely due to the fact they are more common when it comes to real servers on the net and being text based so everything can be done via the command line once you do break in.) You hear more about windows because of it's horrible coding and the ease at which worms propogate.
Originally posted by Doctor Q
And hackers can look for vulnerabilities in the source code of many Unix systems, not just experiment with the object code. Open source projects don't hide their flaws. Instead, they depend on the community for help in finding and fixing the bugs and security holes that show up.
I think the thread got into the hacker discussion because of the idea that more people would be trying to break Apple's music protection scheme now that iTunes runs on Windows.Originally posted by Ysean
The more important question here: What does open source have to do with circumventing a copy protection method? Using "open source" & "copy protection circumvention" in the same sentance does not sound good for "open source."
Originally posted by Doctor Q
I think the thread got into the hacker discussion because of the idea that more people would be trying to break Apple's music protection scheme now that iTunes runs on Windows.
However, I was thinking of another connection. I think that protection schemes are better when they depend on a secure algorithm, as opposed to a secret algorithm. For example, you might beat DES or Blowfish encryption or public key cryptography with brute computing force, but I think such methods hold up better over time because they don't rely on keeping the method from "falling into the wrong hands". (Although, at the risk of mentioning a side issue while discussing a side issue, I think there's a major exception: I haven't heard yet that anyone has fully reverse engineered the VCR Plus system.)
However, unlike secure transmission of sensitive information, music distribution has the problem that the music has to eventually reach our ears. If it's encrypted, it eventually has to be unencrypted, and a copy can be made at that point. Which brings us to watermarking and the idea that you can harmlessly "tag" music even if you can't control its distribution. I still wonder if these are the only two choices, short of declaring all music free or trusting uses to pay for it whether enforced or not.
Except, it seems, for VCR Plus! As far as I can tell, Gemstar has kept the wraps on it for over 10 years. There are programs available to generate and interpret VCR Plus codes for TV shows that start and end on the half hour, but none to handle the longer VCR Plus codes for arbitrary start/top times minute by minute. I gave up looking for one. My use was legitimate: I wanted to program my VCR to start a couple of minutes early and end a couple of minutes late in case my clock was off. Since my intended use of their encoding has been prevented, I don't use their product at all.Originally posted by Ysean
What RIAA and apparently others don't realize is that eventually EVERYTHING is circumvented.
Originally posted by Doctor Q
Similarly, it seems that if you left it up to the RIAA, they'd choose methods that would cause a reasonable customer to want to circumvent the inconveniences that interfere with normal and legal use. Or to avoid buying their "products" at all.
Originally posted by Doctor Q
I know what the RIAA would like. Music reception & decryption devices implanted in your inner ear! With a RFID chip that identifies you. When an authorized listener passes close to an authorized computer storing an authorized tune, the encrypted sound can be transmitted into your head, still encrypted, then decrypted so your auditory system can be stimulated. This would minimize the danger of music being intercepted by those few unreasonable people who didn't want to submit to the music surgery!
Originally posted by trog
So. If this works, why is it important, it isn't doing anything novel?
And if it doesn't work, what does that prove, that Apple's DRM is tough to crack?
What am I missing here that is interesting?
Originally posted by Ysean
And guess what?! You can do all of these things once you've burned the tracks to CD (which iTMS allows without question)
So much for that argument![]()
Originally posted by FZappa
I'm glad to see the system is being challenged, not being a user of ITunes I didn't realize there were copying limitations on the files. For the life of me I can't figure out why on earth ANYONE would be willing to spend $1.00 per song and get nothing more than a file. This seems to me that the consumer is being screwed royally by the RIAA. It works like this: I end up paying $15-20 dollars for a CD and get no physical product. The record company gets to sell it for the same price but pays nothing for manufacturing and distribution. No middle men to speak of, the public gets hosed. But that's what they've been doing for years anyway. Just curious, does the artists cut increase with online ditribution? Support the artists but boycott the RIAA and overpriced online music.
Originally posted by savar
The only concern that I can see here is that hacked AAC files can be redistributed on a large scale. That is, because AAC files can be stripped of DRM in one step, in software (as opposed to burning a CD, or ripping a lossy stream), it can now be an automated process. Say a ring of file sharers each set this up to happen automatically with any songs they download.
It's farfetched, however, and I personally don't think it should be a big problem, but lord knows the press will run with this and act as though Apple will surely go out of business after this "blunder".
Note that the guy who wrote this is the same guy who wrote DeCSS, the much maligned-by-the-industry utility which was actually pretty innocent. I doubt he intends to do anything malicious. Certainly if I had developed an extensive encryption system and it got hacked 2 months after I released into the wild [Window's world], I would be upset.
=2 cents