|
Posted by JoeBloe on 01/04/07 12:25
On Wed, 03 Jan 2007 18:33:28 -0800, Tim Smith
<reply_in_group@mouse-potato.com> Gave us:
>In article <7oiop2lu5jbk925j83893vbjho8uia65dh@4ax.com>,
> JoeBloe <joebloe@thebarattheendoftheuniverse.org> wrote:
>> DeCSS did NOT get disemboweled, you retarded twit, the keys got
>> incorporated into a software product unencrypted, which means it was
>> "let out". No person EVER broke it. Get your facts straight,
>> fucktard.
>
>This depends on what you mean by "broke". In particular, do you
>consider a successful brute force attack a break? With its mere 40-bit
>key length, and weak algorithms, CSS falls fairly quickly to a brute
>force attack, in about 2^25 steps.
Show me where a person wrote an app that took a DVD drive and
extrapolated a brute force key to use to decode the stream coming off
the drive.
CITE, you retarded mother fucker! Math doesn't mean jack shit if
the logistics to actually implement it are too costly for the fucktard
pirate brute twit to utilize.
Show me where it was ever done. DeCSS MPEG-2 DVD datagram encryption
was fine until the keys were released. Even though said keys have been
released, I never5 saw any subsequent reports of any jerk having
actually cracked it. I don't care how long the fucking string is,
dipshit.
You'd have to wait for a long time before the video popped up on a
shit iteration "brute force attack" when it does find the key right
away, and it likely never would find one quickly. That's not crack,
that's whack.
Navigation:
[Reply to this message]
|