Jump to content

Talk:DeCSS

Omigosh

Omigosh!!! It has been 7 months since this case is decided and this article is still not updated... O well 'tis rectified now! -- EmperorBMA|話す 01:06, 16 Aug 2004 (UTC)


If the program is illegal, why is there an image of it sitting right on Wik.ipedia.Pro? Pingveno

The image only shows one part of the program. Without the rest, it can't work. – Quadell (talk) (sleuth) 12:58, Mar 25, 2005 (UTC)
If you're interested, here is the original anonymous C source
Extended content
unsigned int CSStab0[11]={5,0,1,2,3,4,0,1,2,3,4};

unsigned char CSStab1[256]=
{
	0x33,0x73,0x3b,0x26,0x63,0x23,0x6b,0x76,0x3e,0x7e,0x36,0x2b,0x6e,0x2e,0x66,0x7b,
	0xd3,0x93,0xdb,0x06,0x43,0x03,0x4b,0x96,0xde,0x9e,0xd6,0x0b,0x4e,0x0e,0x46,0x9b,
	0x57,0x17,0x5f,0x82,0xc7,0x87,0xcf,0x12,0x5a,0x1a,0x52,0x8f,0xca,0x8a,0xc2,0x1f,
	0xd9,0x99,0xd1,0x00,0x49,0x09,0x41,0x90,0xd8,0x98,0xd0,0x01,0x48,0x08,0x40,0x91,
	0x3d,0x7d,0x35,0x24,0x6d,0x2d,0x65,0x74,0x3c,0x7c,0x34,0x25,0x6c,0x2c,0x64,0x75,
	0xdd,0x9d,0xd5,0x04,0x4d,0x0d,0x45,0x94,0xdc,0x9c,0xd4,0x05,0x4c,0x0c,0x44,0x95,
	0x59,0x19,0x51,0x80,0xc9,0x89,0xc1,0x10,0x58,0x18,0x50,0x81,0xc8,0x88,0xc0,0x11,
	0xd7,0x97,0xdf,0x02,0x47,0x07,0x4f,0x92,0xda,0x9a,0xd2,0x0f,0x4a,0x0a,0x42,0x9f,
	0x53,0x13,0x5b,0x86,0xc3,0x83,0xcb,0x16,0x5e,0x1e,0x56,0x8b,0xce,0x8e,0xc6,0x1b,
	0xb3,0xf3,0xbb,0xa6,0xe3,0xa3,0xeb,0xf6,0xbe,0xfe,0xb6,0xab,0xee,0xae,0xe6,0xfb,
	0x37,0x77,0x3f,0x22,0x67,0x27,0x6f,0x72,0x3a,0x7a,0x32,0x2f,0x6a,0x2a,0x62,0x7f,
	0xb9,0xf9,0xb1,0xa0,0xe9,0xa9,0xe1,0xf0,0xb8,0xf8,0xb0,0xa1,0xe8,0xa8,0xe0,0xf1,
	0x5d,0x1d,0x55,0x84,0xcd,0x8d,0xc5,0x14,0x5c,0x1c,0x54,0x85,0xcc,0x8c,0xc4,0x15,
	0xbd,0xfd,0xb5,0xa4,0xed,0xad,0xe5,0xf4,0xbc,0xfc,0xb4,0xa5,0xec,0xac,0xe4,0xf5,
	0x39,0x79,0x31,0x20,0x69,0x29,0x61,0x70,0x38,0x78,0x30,0x21,0x68,0x28,0x60,0x71,
	0xb7,0xf7,0xbf,0xa2,0xe7,0xa7,0xef,0xf2,0xba,0xfa,0xb2,0xaf,0xea,0xaa,0xe2,0xff
};

unsigned char CSStab2[256]=
{
	0x00,0x01,0x02,0x03,0x04,0x05,0x06,0x07,0x09,0x08,0x0b,0x0a,0x0d,0x0c,0x0f,0x0e,
	0x12,0x13,0x10,0x11,0x16,0x17,0x14,0x15,0x1b,0x1a,0x19,0x18,0x1f,0x1e,0x1d,0x1c,
	0x24,0x25,0x26,0x27,0x20,0x21,0x22,0x23,0x2d,0x2c,0x2f,0x2e,0x29,0x28,0x2b,0x2a,
	0x36,0x37,0x34,0x35,0x32,0x33,0x30,0x31,0x3f,0x3e,0x3d,0x3c,0x3b,0x3a,0x39,0x38,
	0x49,0x48,0x4b,0x4a,0x4d,0x4c,0x4f,0x4e,0x40,0x41,0x42,0x43,0x44,0x45,0x46,0x47,
	0x5b,0x5a,0x59,0x58,0x5f,0x5e,0x5d,0x5c,0x52,0x53,0x50,0x51,0x56,0x57,0x54,0x55,
	0x6d,0x6c,0x6f,0x6e,0x69,0x68,0x6b,0x6a,0x64,0x65,0x66,0x67,0x60,0x61,0x62,0x63,
	0x7f,0x7e,0x7d,0x7c,0x7b,0x7a,0x79,0x78,0x76,0x77,0x74,0x75,0x72,0x73,0x70,0x71,
	0x92,0x93,0x90,0x91,0x96,0x97,0x94,0x95,0x9b,0x9a,0x99,0x98,0x9f,0x9e,0x9d,0x9c,
	0x80,0x81,0x82,0x83,0x84,0x85,0x86,0x87,0x89,0x88,0x8b,0x8a,0x8d,0x8c,0x8f,0x8e,
	0xb6,0xb7,0xb4,0xb5,0xb2,0xb3,0xb0,0xb1,0xbf,0xbe,0xbd,0xbc,0xbb,0xba,0xb9,0xb8,
	0xa4,0xa5,0xa6,0xa7,0xa0,0xa1,0xa2,0xa3,0xad,0xac,0xaf,0xae,0xa9,0xa8,0xab,0xaa,
	0xdb,0xda,0xd9,0xd8,0xdf,0xde,0xdd,0xdc,0xd2,0xd3,0xd0,0xd1,0xd6,0xd7,0xd4,0xd5,
	0xc9,0xc8,0xcb,0xca,0xcd,0xcc,0xcf,0xce,0xc0,0xc1,0xc2,0xc3,0xc4,0xc5,0xc6,0xc7,
	0xff,0xfe,0xfd,0xfc,0xfb,0xfa,0xf9,0xf8,0xf6,0xf7,0xf4,0xf5,0xf2,0xf3,0xf0,0xf1,
	0xed,0xec,0xef,0xee,0xe9,0xe8,0xeb,0xea,0xe4,0xe5,0xe6,0xe7,0xe0,0xe1,0xe2,0xe3
};

unsigned char CSStab3[512]=
{
	0x00,0x24,0x49,0x6d,0x92,0xb6,0xdb,0xff,0x00,0x24,0x49,0x6d,0x92,0xb6,0xdb,0xff,
	0x00,0x24,0x49,0x6d,0x92,0xb6,0xdb,0xff,0x00,0x24,0x49,0x6d,0x92,0xb6,0xdb,0xff,
	0x00,0x24,0x49,0x6d,0x92,0xb6,0xdb,0xff,0x00,0x24,0x49,0x6d,0x92,0xb6,0xdb,0xff,
	0x00,0x24,0x49,0x6d,0x92,0xb6,0xdb,0xff,0x00,0x24,0x49,0x6d,0x92,0xb6,0xdb,0xff,
	0x00,0x24,0x49,0x6d,0x92,0xb6,0xdb,0xff,0x00,0x24,0x49,0x6d,0x92,0xb6,0xdb,0xff,
	0x00,0x24,0x49,0x6d,0x92,0xb6,0xdb,0xff,0x00,0x24,0x49,0x6d,0x92,0xb6,0xdb,0xff,
	0x00,0x24,0x49,0x6d,0x92,0xb6,0xdb,0xff,0x00,0x24,0x49,0x6d,0x92,0xb6,0xdb,0xff,
	0x00,0x24,0x49,0x6d,0x92,0xb6,0xdb,0xff,0x00,0x24,0x49,0x6d,0x92,0xb6,0xdb,0xff,
	0x00,0x24,0x49,0x6d,0x92,0xb6,0xdb,0xff,0x00,0x24,0x49,0x6d,0x92,0xb6,0xdb,0xff,
	0x00,0x24,0x49,0x6d,0x92,0xb6,0xdb,0xff,0x00,0x24,0x49,0x6d,0x92,0xb6,0xdb,0xff,
	0x00,0x24,0x49,0x6d,0x92,0xb6,0xdb,0xff,0x00,0x24,0x49,0x6d,0x92,0xb6,0xdb,0xff,
	0x00,0x24,0x49,0x6d,0x92,0xb6,0xdb,0xff,0x00,0x24,0x49,0x6d,0x92,0xb6,0xdb,0xff,
	0x00,0x24,0x49,0x6d,0x92,0xb6,0xdb,0xff,0x00,0x24,0x49,0x6d,0x92,0xb6,0xdb,0xff,
	0x00,0x24,0x49,0x6d,0x92,0xb6,0xdb,0xff,0x00,0x24,0x49,0x6d,0x92,0xb6,0xdb,0xff,
	0x00,0x24,0x49,0x6d,0x92,0xb6,0xdb,0xff,0x00,0x24,0x49,0x6d,0x92,0xb6,0xdb,0xff,
	0x00,0x24,0x49,0x6d,0x92,0xb6,0xdb,0xff,0x00,0x24,0x49,0x6d,0x92,0xb6,0xdb,0xff,
	0x00,0x24,0x49,0x6d,0x92,0xb6,0xdb,0xff,0x00,0x24,0x49,0x6d,0x92,0xb6,0xdb,0xff,
	0x00,0x24,0x49,0x6d,0x92,0xb6,0xdb,0xff,0x00,0x24,0x49,0x6d,0x92,0xb6,0xdb,0xff,
	0x00,0x24,0x49,0x6d,0x92,0xb6,0xdb,0xff,0x00,0x24,0x49,0x6d,0x92,0xb6,0xdb,0xff,
	0x00,0x24,0x49,0x6d,0x92,0xb6,0xdb,0xff,0x00,0x24,0x49,0x6d,0x92,0xb6,0xdb,0xff,
	0x00,0x24,0x49,0x6d,0x92,0xb6,0xdb,0xff,0x00,0x24,0x49,0x6d,0x92,0xb6,0xdb,0xff,
	0x00,0x24,0x49,0x6d,0x92,0xb6,0xdb,0xff,0x00,0x24,0x49,0x6d,0x92,0xb6,0xdb,0xff,
	0x00,0x24,0x49,0x6d,0x92,0xb6,0xdb,0xff,0x00,0x24,0x49,0x6d,0x92,0xb6,0xdb,0xff,
	0x00,0x24,0x49,0x6d,0x92,0xb6,0xdb,0xff,0x00,0x24,0x49,0x6d,0x92,0xb6,0xdb,0xff,
	0x00,0x24,0x49,0x6d,0x92,0xb6,0xdb,0xff,0x00,0x24,0x49,0x6d,0x92,0xb6,0xdb,0xff,
	0x00,0x24,0x49,0x6d,0x92,0xb6,0xdb,0xff,0x00,0x24,0x49,0x6d,0x92,0xb6,0xdb,0xff,
	0x00,0x24,0x49,0x6d,0x92,0xb6,0xdb,0xff,0x00,0x24,0x49,0x6d,0x92,0xb6,0xdb,0xff,
	0x00,0x24,0x49,0x6d,0x92,0xb6,0xdb,0xff,0x00,0x24,0x49,0x6d,0x92,0xb6,0xdb,0xff,
	0x00,0x24,0x49,0x6d,0x92,0xb6,0xdb,0xff,0x00,0x24,0x49,0x6d,0x92,0xb6,0xdb,0xff,
	0x00,0x24,0x49,0x6d,0x92,0xb6,0xdb,0xff,0x00,0x24,0x49,0x6d,0x92,0xb6,0xdb,0xff,
	0x00,0x24,0x49,0x6d,0x92,0xb6,0xdb,0xff,0x00,0x24,0x49,0x6d,0x92,0xb6,0xdb,0xff,
	0x00,0x24,0x49,0x6d,0x92,0xb6,0xdb,0xff,0x00,0x24,0x49,0x6d,0x92,0xb6,0xdb,0xff
};

unsigned char CSStab4[256]=
{
	0x00,0x80,0x40,0xc0,0x20,0xa0,0x60,0xe0,0x10,0x90,0x50,0xd0,0x30,0xb0,0x70,0xf0,
	0x08,0x88,0x48,0xc8,0x28,0xa8,0x68,0xe8,0x18,0x98,0x58,0xd8,0x38,0xb8,0x78,0xf8,
	0x04,0x84,0x44,0xc4,0x24,0xa4,0x64,0xe4,0x14,0x94,0x54,0xd4,0x34,0xb4,0x74,0xf4,
	0x0c,0x8c,0x4c,0xcc,0x2c,0xac,0x6c,0xec,0x1c,0x9c,0x5c,0xdc,0x3c,0xbc,0x7c,0xfc,
	0x02,0x82,0x42,0xc2,0x22,0xa2,0x62,0xe2,0x12,0x92,0x52,0xd2,0x32,0xb2,0x72,0xf2,
	0x0a,0x8a,0x4a,0xca,0x2a,0xaa,0x6a,0xea,0x1a,0x9a,0x5a,0xda,0x3a,0xba,0x7a,0xfa,
	0x06,0x86,0x46,0xc6,0x26,0xa6,0x66,0xe6,0x16,0x96,0x56,0xd6,0x36,0xb6,0x76,0xf6,
	0x0e,0x8e,0x4e,0xce,0x2e,0xae,0x6e,0xee,0x1e,0x9e,0x5e,0xde,0x3e,0xbe,0x7e,0xfe,
	0x01,0x81,0x41,0xc1,0x21,0xa1,0x61,0xe1,0x11,0x91,0x51,0xd1,0x31,0xb1,0x71,0xf1,
	0x09,0x89,0x49,0xc9,0x29,0xa9,0x69,0xe9,0x19,0x99,0x59,0xd9,0x39,0xb9,0x79,0xf9,
	0x05,0x85,0x45,0xc5,0x25,0xa5,0x65,0xe5,0x15,0x95,0x55,0xd5,0x35,0xb5,0x75,0xf5,
	0x0d,0x8d,0x4d,0xcd,0x2d,0xad,0x6d,0xed,0x1d,0x9d,0x5d,0xdd,0x3d,0xbd,0x7d,0xfd,
	0x03,0x83,0x43,0xc3,0x23,0xa3,0x63,0xe3,0x13,0x93,0x53,0xd3,0x33,0xb3,0x73,0xf3,
	0x0b,0x8b,0x4b,0xcb,0x2b,0xab,0x6b,0xeb,0x1b,0x9b,0x5b,0xdb,0x3b,0xbb,0x7b,0xfb,
	0x07,0x87,0x47,0xc7,0x27,0xa7,0x67,0xe7,0x17,0x97,0x57,0xd7,0x37,0xb7,0x77,0xf7,
	0x0f,0x8f,0x4f,0xcf,0x2f,0xaf,0x6f,0xef,0x1f,0x9f,0x5f,0xdf,0x3f,0xbf,0x7f,0xff
};

unsigned char CSStab5[256]=
{
	0xff,0x7f,0xbf,0x3f,0xdf,0x5f,0x9f,0x1f,0xef,0x6f,0xaf,0x2f,0xcf,0x4f,0x8f,0x0f,
	0xf7,0x77,0xb7,0x37,0xd7,0x57,0x97,0x17,0xe7,0x67,0xa7,0x27,0xc7,0x47,0x87,0x07,
	0xfb,0x7b,0xbb,0x3b,0xdb,0x5b,0x9b,0x1b,0xeb,0x6b,0xab,0x2b,0xcb,0x4b,0x8b,0x0b,
	0xf3,0x73,0xb3,0x33,0xd3,0x53,0x93,0x13,0xe3,0x63,0xa3,0x23,0xc3,0x43,0x83,0x03,
	0xfd,0x7d,0xbd,0x3d,0xdd,0x5d,0x9d,0x1d,0xed,0x6d,0xad,0x2d,0xcd,0x4d,0x8d,0x0d,
	0xf5,0x75,0xb5,0x35,0xd5,0x55,0x95,0x15,0xe5,0x65,0xa5,0x25,0xc5,0x45,0x85,0x05,
	0xf9,0x79,0xb9,0x39,0xd9,0x59,0x99,0x19,0xe9,0x69,0xa9,0x29,0xc9,0x49,0x89,0x09,
	0xf1,0x71,0xb1,0x31,0xd1,0x51,0x91,0x11,0xe1,0x61,0xa1,0x21,0xc1,0x41,0x81,0x01,
	0xfe,0x7e,0xbe,0x3e,0xde,0x5e,0x9e,0x1e,0xee,0x6e,0xae,0x2e,0xce,0x4e,0x8e,0x0e,
	0xf6,0x76,0xb6,0x36,0xd6,0x56,0x96,0x16,0xe6,0x66,0xa6,0x26,0xc6,0x46,0x86,0x06,
	0xfa,0x7a,0xba,0x3a,0xda,0x5a,0x9a,0x1a,0xea,0x6a,0xaa,0x2a,0xca,0x4a,0x8a,0x0a,
	0xf2,0x72,0xb2,0x32,0xd2,0x52,0x92,0x12,0xe2,0x62,0xa2,0x22,0xc2,0x42,0x82,0x02,
	0xfc,0x7c,0xbc,0x3c,0xdc,0x5c,0x9c,0x1c,0xec,0x6c,0xac,0x2c,0xcc,0x4c,0x8c,0x0c,
	0xf4,0x74,0xb4,0x34,0xd4,0x54,0x94,0x14,0xe4,0x64,0xa4,0x24,0xc4,0x44,0x84,0x04,
	0xf8,0x78,0xb8,0x38,0xd8,0x58,0x98,0x18,0xe8,0x68,0xa8,0x28,0xc8,0x48,0x88,0x08,
	0xf0,0x70,0xb0,0x30,0xd0,0x50,0x90,0x10,0xe0,0x60,0xa0,0x20,0xc0,0x40,0x80,0x00
};

void CSSdescramble(unsigned char *sec,unsigned char *key)
{
	unsigned int t1,t2,t3,t4,t5,t6;
	unsigned char *end=sec+0x800;

	t1=key[0]^sec[0x54]|0x100;
	t2=key[1]^sec[0x55];
	t3=(*((unsigned int *)(key+2)))^(*((unsigned int *)(sec+0x56)));
	t4=t3&7;
	t3=t3*2+8-t4;
	sec+=0x80;
	t5=0;
	while(sec!=end)
	{
		t4=CSStab2[t2]^CSStab3[t1];
		t2=t1>>1;
		t1=((t1&1)<<8)^t4;
		t4=CSStab5[t4];
		t6=(((((((t3>>3)^t3)>>1)^t3)>>8)^t3)>>5)&0xff;
		t3=(t3<<8)|t6;
		t6=CSStab4[t6];
		t5+=t6+t4;
		*sec++=CSStab1[*sec]^(t5&0xff);
		t5>>=8;
	}
}

void CSStitlekey1(unsigned char *key,unsigned char *im)
{
	unsigned int t1,t2,t3,t4,t5,t6;
	unsigned char k[5];
	int i;

	t1=im[0]|0x100;
	t2=im[1];
	t3=*((unsigned int *)(im+2));
	t4=t3&7;
	t3=t3*2+8-t4;
	t5=0;
	for(i=0;i<5;i++)
	{
		t4=CSStab2[t2]^CSStab3[t1];
		t2=t1>>1;
		t1=((t1&1)<<8)^t4;
		t4=CSStab4[t4];
		t6=(((((((t3>>3)^t3)>>1)^t3)>>8)^t3)>>5)&0xff;
		t3=(t3<<8)|t6;
		t6=CSStab4[t6];
		t5+=t6+t4;
		k[i]=t5&0xff;
		t5>>=8;
	}
	for(i=9;i>=0;i--)
		key[CSStab0[i+1]]=k[CSStab0[i+1]]^CSStab1[key[CSStab0[i+1]]]^key[CSStab0[i]];
}

void CSStitlekey2(unsigned char *key,unsigned char *im)
{
	unsigned int t1,t2,t3,t4,t5,t6;
	unsigned char k[5];
	int i;

	t1=im[0]|0x100;
	t2=im[1];
	t3=*((unsigned int *)(im+2));
	t4=t3&7;
	t3=t3*2+8-t4;
	t5=0;
	for(i=0;i<5;i++)
	{
		t4=CSStab2[t2]^CSStab3[t1];
		t2=t1>>1;
		t1=((t1&1)<<8)^t4;
		t4=CSStab4[t4];
		t6=(((((((t3>>3)^t3)>>1)^t3)>>8)^t3)>>5)&0xff;
		t3=(t3<<8)|t6;
		t6=CSStab5[t6];
		t5+=t6+t4;
		k[i]=t5&0xff;
		t5>>=8;
	}
	for(i=9;i>=0;i--)
		key[CSStab0[i+1]]=k[CSStab0[i+1]]^CSStab1[key[CSStab0[i+1]]]^key[CSStab0[i]];
}

void CSSdecrypttitlekey(unsigned char *tkey,unsigned char *dkey)
{
	int i;
	unsigned char im1[6];
	unsigned char im2[6]={0x51,0x67,0x67,0xc5,0xe0,0x00};
	
	for(i=0;i<6;i++)
		im1[i]=dkey[i];

	CSStitlekey1(im1,im2);
	CSStitlekey2(tkey,im1);
}

I probably shouldn't have posted that 203.101.232.75 (talk) 10:29, 1 December 2008 (UTC)[reply]

Of course you can post it, don't you want to own your own DVD's? You can buy þem, you can play þem, but you can't back þem up. Økokrim and RIAA are just making life harder for lawful people - þose who want to break þe law will break þe law, þe rest (who obey þe law) will only get a more restricted life. Anti-piracy kills music. Takk for at du har plassert Nord-Norge på kartet, Jon! — Preceding unsigned comment added by 85.166.1.42 (talk) 14:45, 1 December 2008 (UTC)[reply]

Making more NPOV

I have toned down the section where the article parrots the old "CSS doesn't stop piracy" argument by pointing out that CSS does stop casual copies of DVDs to DVD+/-R blanks. Samboy 17:14, 2 Apr 2005 (UTC)

BTW, the act of copying a DVD to DVD-R is perfectly legal. Piracy involves stealing and/or distribution of stolen goods. CSS has certainly been proven not to prevent piracy. What it does do is prevent the consumer from their legal right to make a personal copy. --Thoric 22:08, 20 May 2005 (UTC)[reply]

Under the WIPO Copyright Treaty, it is illegal to bypass copyright protection, or to distribute something that's meant to do so. This partially supercedes previous personal-copy laws. The treaty is implemented in the U.S. with the DMCA, in the EU with the EUCD, and in various other places with other laws. Most of the world signed the WCT. There's no place for clear-cut violations of it on Wik.ipedia.Pro. —Simetrical (talk) 17:12, 4 August 2005 (UTC)[reply]

Where do you see a "clear-cut violation"? – Quadell (talk) (sleuth) 17:44, August 4, 2005 (UTC)

Okay, I admit, there isn't one. There is a clear violation of both the DMCA (see subparagraphs (a)(1)(A) and (a)(2)-(3)) and the EUCD (similar language there). But as long as the illegality in those countries is noted with the links, I have to agree that places like Australia, Canada, and New Zealand (which might not have similar restrictions) as well as non-English-speaking countries are enough to justify allowing the inclusion of the link with appropriate notices. —Simetrical (talk) 09:16, 5 August 2005 (UTC)[reply]

Remove flamewar history

I believe the section about the flamewar over DeCSS licensing is very much out of place. I'll remove it soon. DonDiego 22:44, 3 October 2005 (UTC)[reply]

It's pretty material: DeCSS was initally a closed source microsoft windows application... the argument the it was itself created to play content under Linux could only be considered suspect at best. The discussion about the argument over the GPL is important because it shows the context. Jon was not liked by the folks working on Livid because his premature relaease of a tool only useful for ripping (and not linux playback) sabotaged their efforts.... Later they were forced to help defend his actions because the fate of all CSS decryption code had become inexorably tied to Jon. --Gmaxwell 18:05, 17 January 2006 (UTC)[reply]

Technology and derived works

"Technology and derived works" makes it absolutely clear that DeCSS aids video "pirates". It doesn't. The CSS description keys and code are available in any "licensed" player, and as a result, because many licensed players don't produce an analog output- the output can be copied trivially- and even prior to DeCSS there were (and are) a number of programs that do this. These were frequently marketed as DVD "backup" utilities. The article does (vaguely) mention that mass-production-pirates aren't encumbered at all- but doesn't make this clear.

DeCSS has much more value in producing unlicensed players- which may or many not be illegal- it wasn't at the time DeCSS was published (in the US), and it isn't in most countries- and moreover, if anyone realized that CSS was about protecting player licenses, and not about protecting pirates, it might be easier to get this point across:

Some systems, places, countries, states, and operating systems, simply do not have a licensed player to choose from. None is sold, and no licenses are even being offered. DeCSS is most useful here as it makes playing legally purchased (and owned) DVDs playable without having to purchase a so-called licensed player. 216.169.144.254 21:03, 17 March 2006 (UTC)[reply]

On the speed of bruteforcing

It might have taken a personal computer "less than 24 hours" to entirely bruteforce the CSS algorithm's keyspace in 1999, but today's computers (and what I gather is an improved key-finding technique) can find a working disk and/or player key in a matter of seconds even if no pre-existing key is present. It might thus be prudent to note that CSS, today, is little more than a really minor speedbump to DVD players that have no dedicated player key. -- 88.112.2.159 07:30, 7 September 2006 (UTC)[reply]

Lossless digital image copying of DVDs without [decryption]

While this is obviously physically possible and is arguably common knowledge, does anyone have a reference to back up this statement? The mostly commonly available consumer or 'prosumer' devices license their CSS use. I am having trouble finding a manufacturer that makes professional DVD duplication devices that specifies functioning in this way. Anyone? --Anonymous 71.218.2.160 03:40, 1 March 2007 (UTC)[reply]

I think Philips made or used to make one, once.
This is a very easy task with any kind of data recovery application. ddrescue is a good example which I have used before under Linux. You simply copy the disk bitwise to an image file. This is very useful for recovering data from damaged disks including crashed hard disks. 87.115.43.228 (talk) —Preceding undated comment added 21:14, 30 October 2009 (UTC).[reply]

Citation

The CSS stripping program had been specifically created to bait the MPAA in this manner.[citation needed]

The citation is in reference 9, which is the site of the original author and explicitly states the intent just as described. --213.191.86.14 08:09, 25 May 2007 (UTC)[reply]

What was he charged with?

The paragraph on the Norwegin trial needs to mention what exactly he was charged with. I moved the mention of the Norwegian criminal code to the first sentence, but this could be wrong since I can't tell from the article whether the appeals court ordered a re-trial of the original or new charges. Can someone one knows more about the case please clear this up...kind of an essential fact for the article. Padraic 15:10, 22 July 2007 (UTC)[reply]

It's two years later, and yes it needs a lot of expansion. Comet Tuttle (talk) 21:26, 8 December 2009 (UTC)[reply]

Time taken

a high-end home computer in 1999 running optimized code could brute-force it within 24 hours, and modern computers can now brute-force it in a few seconds or less

This claim seems incomplete or at least strange. First what's a modern computer? Second if we take a few seconds to mean 10 seconds, this implies a 8640x improvement in speed. Even an 6 core Core i7 is not going to be close to 8640x faster then a 1999 high end computer (say a Pentium 3 550mhz) in general terms. It's possible it would be that much faster in certain areas, particularly if it's using the GPU if that's possible for the function, or perhaps the code is just much improved but in any case, this claim needs sourcing. Nil Einne (talk) 10:35, 23 July 2011 (UTC)[reply]

In addition to computers becoming faster, and supporting advanced vectorisation, key scanning algorithms have also improved dramatically. I'd probably expect a 30-50x increase in performance of the same algorithm on my new Intel i7-2700k vs. my old AMD Duron 1GHz. Given the advances in the brute-forcing algorithms too, an 8640x improvement is more than reasonable. I never tried to bruteforce DVDs on my old Duron PC [I still used VHS tapes back then], but my i7 will munch the anti-backup protection on a DVD in under a minute. 90.194.203.28 (talk) 19:21, 28 January 2013 (UTC)[reply]

Hello fellow Wik.ipedia.Prons,

I have just modified one external link on DeCSS. Please take a moment to review my edit. If you have any questions, or need the bot to ignore the links, or the page altogether, please visit this simple FaQ for additional information. I made the following changes:

When you have finished reviewing my changes, you may follow the instructions on the template below to fix any issues with the URLs.

checkY An editor has reviewed this edit and fixed any errors that were found.

  • If you have discovered URLs which were erroneously considered dead by the bot, you can report them with this tool.
  • If you found an error with any archives or the URLs themselves, you can fix them with this tool.

Cheers.—InternetArchiveBot (Report bug) 23:29, 6 September 2017 (UTC)[reply]

Hello fellow Wik.ipedia.Prons,

I have just modified one external link on DeCSS. Please take a moment to review my edit. If you have any questions, or need the bot to ignore the links, or the page altogether, please visit this simple FaQ for additional information. I made the following changes:

When you have finished reviewing my changes, you may follow the instructions on the template below to fix any issues with the URLs.

checkY An editor has reviewed this edit and fixed any errors that were found.

  • If you have discovered URLs which were erroneously considered dead by the bot, you can report them with this tool.
  • If you found an error with any archives or the URLs themselves, you can fix them with this tool.

Cheers.—InternetArchiveBot (Report bug) 00:47, 3 December 2017 (UTC)[reply]

Technical aspects and historical aspects

I remember this back in ~2000 or so. Now +21 years have passed. I think a historic evaluation is missing on these events, but also, it would be nice if the main article could add a subsection how DeCSS worked. We have a bit of technical stuff, but no real explanation. It does not need to be a highly technical one, just a rough summary how DeCSS actually works. 2A02:8388:1604:F600:3AD5:47FF:FE18:CC7F (talk) 21:39, 26 May 2021 (UTC)[reply]

See what we do next...

OR

By submitting your email or phone number, you're giving mschf permission to send you email and/or recurring marketing texts. Data rates may apply. Text stop to cancel, help for help.

Success: You're subscribed now !