|
Posted by JoeBloe on 01/05/07 01:58
On Thu, 04 Jan 2007 17:56:41 -0000, Tim Smith
<reply_in_group@mouse-potato.com> Gave us:
>On 2007-01-04, JoeBloe <joebloe@thebarattheendoftheuniverse.org> wrote:
>>>This depends on what you mean by "broke". In particular, do you
>>>consider a successful brute force attack a break? With its mere 40-bit
>>>key length, and weak algorithms, CSS falls fairly quickly to a brute
>>>force attack, in about 2^25 steps.
>>
>>
>> Show me where a person wrote an app that took a DVD drive and
>> extrapolated a brute force key to use to decode the stream coming off
>> the drive.
>>
>> CITE, you retarded mother fucker! Math doesn't mean jack shit if
>> the logistics to actually implement it are too costly for the fucktard
>> pirate brute twit to utilize.
>
>The code is in libdvdcss.
You are a goddamned RETARD! The code in that library was RELEASED,
NOT CRACKED, you stupid fuckatrd.
> Set the DVDCSS_METHOD environment variable to
>"disc" and libdvdcss will brute-force the disc key.
Nope. It uses one of the four INCLUDED keys it has.
I don't need Linux application enabling seminars from a total dweeb
fucktard that doesn't even know that actual history.
> Set that variable
>to "title" it will use an attack on the title key.
You'r a goddamned idiot.
>Brute force attacks that require about 2^25 steps aren't too costly.
>About 5 years ago, it required a fairly high-end PC, because it took
>about 64 MB of RAM, but that's trivial now. Timewise, it took about
>a day back then, and is much quicker now.
You're a dope... a big dope.
>> Show me where it was ever done. DeCSS MPEG-2 DVD datagram encryption
>
>It's done in basically every player that uses libdvdcss.
Nope. The css part of that library... They got keys from XINE.
That is how they leaked. Review the history.
> BTW, if you
>want to pretend you know something about this subject,
Fuck you. I worked at General Instrument, the heart of MPEG-2, and
data stream encryption. I watched all this shit you pirate fucktards
have done march by.
> you should start
>getting the name of the system right.
Fuck you. I quoted what was written by the poster I responded to.
Fuck off.
> It's "CSS", not "DeCSS". DeCSS
>was/is software to break CSS.
You're an idiot. It isn't broken, it is keyed, and everyone HAS the
key. No fucking brute force about it.
>> was fine until the keys were released. Even though said keys have been
>> released, I never5 saw any subsequent reports of any jerk having
>> actually cracked it. I don't care how long the fucking string is,
>> dipshit.
>
>It's not surprising that you don't care about the effective key length,
>since you apparently know nothing about cryptography.
Right. I make products that allow a certain group of folks to
communicate and pass data without anyone else in the world able to
listen EVER, and you think I am in the dark. You're a bigger idiot
than I thought.
I am at the top, dipshit.
Right now, the F-35 is on my plate, being prepared to make the world
safer.
[Back to original message]
|