JVC Announces Technology To Prevent Software Copying 536
An anonymous reader writes: "JVC and Hudson soft Co. of Japan have created a technology that they claim to have tested on 200 CD-ROM devices that prevents users from copying software CDs. They plan to have special encryption keys hidden in software and which are pressed onto CD-ROMs and which can not be read with ordinary procedures. They claim that the location, length and number of embedded keys can vary making it more difficult to hack."
So... (Score:3, Insightful)
Misprint (Score:5, Funny)
This is actualy a system to prevent users from BUYING CDs.
Re:So... (Score:5, Informative)
Relevant spot from W98 license:
After installation of one copy of the SOFTWARE PRODUCT pursuant to this EULA, you may keep the original media on which the SOFTWARE PRODUCT was provided by Microsoft solely for backup or archival purposes. If the original media is required to use the SOFTWARE PRODUCT on the COMPUTER, you may make one copy of the SOFTWARE PRODUCT solely for backup or archival purposes. Except as expressly provided in this EULA, you may not otherwise make copies of the SOFTWARE PRODUCT or the printed materials accompanying the SOFTWARE PRODUCT.
(from http://nl.linux.org/geldterug/license.html)
Re:So... (Score:3, Insightful)
Re:So... (Score:5, Insightful)
You have that right. They also have the right to try to PREVENT you.
This is basically a race, and I WELCOME this before I welcome litigation.
Let them make schemes to keep us from copying their work. As long as we're allowed legally to reverse engineer these schemes so that we can either provider ourselves with working backups OR make the software compatible with our systems (suppose the copy protection breaks the software on my system?) then I'm not at all against them attempted to stop copies from being made. It won't do any good -- but far be it from me to try and take away a software developers right to protect their investments.
Now where I have the biggest problem is that with the DMCA it --IS-- illegal to try and circumvent this sort of scheme, and that is one law that should have never been allowed to come about.
right != ability (Score:3)
Re:So... (Score:3, Interesting)
Think about when software first became available on CD. CD copying technology was not widely available to the consumer, and was very expensive. Were your rights being violated? Of course not. Same thing with software on DVD.
People should take this into account when purchasing their software. Can I make backups of the software, to prolong its life? Yes? That's a feature and a positive for buying it. No? Perhaps you should look elsewhere.
Re:So... (Score:5, Funny)
I think reading your post caused me to violate the DMCA.
Re:Backups are a non-issue. (Score:2)
Re:Backups are a non-issue. (Score:4, Interesting)
Mr. Lincoln said it better:
The laws (being used against the people) are unfair. I want to rip my Matrix Revisited DVD to my computer so that I can test 'greenscreen compositing' using footage the DVD contains. This is for educational purposes as it directly pertains to my job as an animator. The laws that used to allow me to do this have changed. All this because the *AA is unwilling to change their business plans for fear that they'd only make a fair profit instead of an extortionary profit.
Re:Backups are a non-issue. (Score:5, Insightful)
Ghandi & King weere advocates of civil disobedance, that is of publicaly violating a law as a protest against it's unfairness. They were not scoffalaws that refused to obey laws because they saw a financal advantage in ignoring them. (Something I can't say about many of the posters to this forum)
Just curious (Score:5, Insightful)
Re:Just curious (Score:2)
It's more like the old software which requires the original floppy disk. Which uses some non standard format.
Thing is that the hardware much be capable of reading whatever this format might be. There is also the problem of how do you put what amounts to a serial number on a random part of a pressed CD, which is rather harder to do than with a recordable CD.
Shouldnt be too tough (Score:2)
10.9.8.7.6.5.4.3.2.1.....Hacked (Score:2)
I'll expect first proof of concepts compies of the Hack on source forge by morning...
Thanks...to who ever it was that just hacked it....
Doesn't seem to help (Score:4, Insightful)
Why can't I just rip an image, or at least open the cd and copy the files to my hard drive?
Why can't I patch the program after the above not to decrypt?
I seem to remember that DeCSS came about cause of these "no one will ever get our keys" security.
What about older CD drives?
Re:Doesn't seem to help (Score:2)
On no! Encryption keys! (Score:3, Funny)
*Sigh* (Score:5, Insightful)
Root Technology? (Score:2)
Wrong use of the tech (Score:4, Insightful)
For example, making backups of your software or music files. At least then you can guarantee copies of the original you own and prevent multi-generational copies of copies.
I would think both the software barons and the customer would find this win-win.
Legacy Drives (Score:2, Interesting)
"Warning: This CD does is not a standard data cd and could disrupt your hardware. Caveat Emptor"
Re:Legacy Drives (Score:2)
how long (Score:3, Interesting)
So how long will it take to come up with "unordinary prodedures".
Re:how long (Score:5, Funny)
You might have to wait all the way until tomorrow.
Re:how long (Score:2)
Information will be free (Score:2, Interesting)
Silly rabbits..
Re:Information will be free (Score:2)
Here we go again (Score:4, Interesting)
Besides, how many warez d00ds are actively swapping copied CDs, anyway? Isn't it all ISO images in these days of broadband?
Re:Here we go again (Score:4, Insightful)
Not only that you can probably quite easily find parts of the data which are readable, but which break the relevent specs in some way or other.
This sort of thing has been tried before, it's more likely that crackers will just treat such software in the same way as that which uses a hardware dongle.
From the user POV having to always have the CD in the drive is far more hassle than something which simply plugs into parallel, USB or even PCI. This is the second "CD dongle" idea posted to
Thank goodness (Score:2, Insightful)
Wait, companies don't offer that protection even if my media fails? You mean I will have to pony up another 50-300 dollars for a piece of software?
Damn damn damn, I hope it gets cracked faster than IIS on a bad day.
Is it worth all the trouble? (Score:2)
Re:Is it worth all the trouble? (Score:2)
With quite a bit of the "warez community" having software is about status. Quite likely some crackers want these kind of schemes, because when they crack something like this they get lots of kudos. Quite likely the selling price also affects the warez value.
But they probably never would have bought the program at any price.
Nice to see 90s-style hubris is still in fashion (Score:3, Funny)
What would this scenario look like if we translated it into WarCraft 3?:
"I AM THE MIGHTY THRALL! SEE THE INPENETRABLE WALL OF TURRETS THAT SURROUND MY BASE! I AM INVINCIBLE! NO-ONE WOULD DARE... HEY! STOP THAT! NOOOO!! PLEASE!! STOP!! ARRRRRGGGH!"
Read between the lines: (Score:5, Funny)
Translation: "The encryption can't be beaten by current software. Consumers will have to upgrade to the next version of their CD-copying software to beat this."
Re:Read between the lines: (Score:3, Funny)
"The Root encryption deserves to be called fifth-generation encryption. It is different from existing, so-called fourth-generation encryption, [in that] the CD carrying the encryption keys can not be located easily," said a spokesman for Vapor Soft.
-
They don't get it! (Score:2)
Meanwhile, millions of honest, law abiding people will have to deal with the bullshit problems that this will create. I use no-cd hacks for most of my games. With data storage going for close to $1 per gig, who the hell wants to insert a CD every time they want to play a game? Copy the whole CD to the hard drive and throw it in a box. Saves time and effort every time I fire up the latest version of (insert game here).
"All CD-ROM drives could read software with the encryption keys without any trouble," a JVC spokeswoman said.
Yeah, we'll see. Trust me, this time will be no different than the last eight times they've said this.
Reminds me of the 3DS Dongle (Score:5, Informative)
What happened?? 3DS was one of the fastest-cracked pieces of software I've ever seen. Instead of trying to emulate the dongle, crackers simply went through the program and removed all the calls to the dongle! 3DS was circulating around the internet in less than a week after it's official commercial release, paired with a fully-functional crack.
I expect this technology to be no different. People won't try to copy the original, they will figure out a way to get around the checking mechanism, then copy the cracked version. As the saying goes, where there is a will, there is a way.
Re:Reminds me of the 3DS Dongle (Score:2)
A better example would be the old floppy-based copy protection schemes where they'd use weird track steppings or other floppy controller timings to try and hide the data. If I recall correctly, all the copy protection schemes based on this failed as well. In fact, I seem to remember "perfect copy" programs that would copy said disks anyways. The only thing new here is that they've add cryptography. Not that it helps.
Of course, now I've gone and violated the DMCA. Hmm. Since the information is stored in a "non-standard" location, I wonder if documenting how to access that location aka documenting the hardware interface to the drive is now a DMCA violation?
Brian
Re:Reminds me of the 3DS Dongle (Score:3, Insightful)
The anti-consumer attitude that the software and hardware industry is pushing is just beyond belief.
Re:Reminds me of the 3DS Dongle (Score:5, Informative)
be afraid.
Well I know what I'm gonna do... (Score:5, Funny)
A very special technique... (Score:2)
I wonder if this special technology is security by obscurity :)) If the magic can be read by the cd-rom drive, I really don't see what would be so hard in developing a "special technique" for recording the disc while playing back data from the original to create a new record without this silly copy-protection.
prevention (Score:4, Interesting)
But, I assume, this has been thought of by JVC. Why wouldn't it work?
Re:prevention (Score:3, Insightful)
From the post:
The data _must_ be accessible, in order for any normal CD-ROM to be able to read it, but you have to use, like you said, low-level access to the device. It's not impossible, but it's more difficult. First, there's the difficulty of determining where the software looks for the information. Presumably, it's reading the disk, and sorting out that one line that it's requesting the key from is difficult. I'm not saying it's impossible. But it would probably have to be done on a CD-by-CD basis. So likely, you'd have to either develop a very sophisticated program to determine, given a copy-protected CD with its program running, which data contains the key, or crack each CD one at a time.
It's not foolproof, but it at least is a new thing. When are producers of products going to learn that they CANNOT STOP people from ripping off their product until people have the MORALS not to do it? Face it, there's no unbreakable copy protection except for a populace who refuses to copy copyrighted works!
So the producers just have to keep coming up with new measures which will be either less or more effective than past ones, and hope that the crackers will be inconvenienced enough that they'll just wait for someone else to crack it and use the other person's crack. The more difficult the protection is to crack, the fewer people will be able to crack it, and (hopefully) the fewer people will be disposed to take the TIME to crack it.
Crackers will find a way for anything, if they feel like the rewards (free (as in beer) software, the pride of having cracked something, or whatever else motivates them) compensate for the trouble of finding a crack.
Couldn't they just.. (Score:2)
Whatever (Score:2)
"The development team has already verified the compatibility of the Root encryption key system with about 200 models of CD-ROM drives on the market."
Unless those CD-ROM drives are using abnormal means to read those little 0's and 1's these statements are mutually exclusive. All one would have to do is a raw device dump and burn the resulting disk image on their favorite CD burner.
Even if this thing did work.... (Score:2)
I have an 8x DVD drive that takes about 2 years to spin up, there's no way in luserland I'm going to wait for that delay anytime during game play, or application use for that matter.
Re:Even if this thing did work.... (Score:2)
Re:Even if this thing did work.... (Score:2)
Backups (Score:4, Insightful)
Fair use is a nice thing, and it actually saves us money because we don't have to buy new copies when one gets scratched.
Technology to prevent software copying (Score:2)
Re:Technology to prevent software copying (Score:2)
Hey, encoding programs on a baseball bat, that would be a tough copy. Would likely break off my CD-ROM tray...
I guess bat-drives will start appearing now, maybe they can capitalize on confusion by releasing flying-mammal bat drives to throw evil h4x0rz off the trail.
MORE difficult? (Score:2)
Right. (Score:5, Insightful)
"more difficult" != copy protection.
The copy protection arms race has continued unabated for what, 20+ years now?
No matter what they build, it will be circumvented. If a human can design it, another human can dismantle it.
It's sad, really, watching these companies dump millions of dollars into useless protection schemes while watching their profits and stock values shrink day by day.
Look -- it's not the pirates that are hurting your businesses. They have always existed and will continue to exist.
It's your stubborn unwillingness to admit that you cannot recoup every single penny from every single installation of your software throughout the world.
Re:Right. (Score:2)
What's wrong with this thought process:
1) We can spend $600k making this new technology
2) It will, of course, be cracked
3) However, it will make it harder for the average person, who is technologically clueless, to pirate our stuff
4) Because of #3, we will sell $3M more to users who would commit casual piracy before easy-to-use cracks and tools become available
5) We bank an extra $2.4M
What's so stupid about putting in copy-protection to make piracy harder even though you can't completely eliminate it? If the costs work out the right way (obviously my own numbers are made up), why not do it?
You seem to be saying that pirates are hurting the bottom lines of content-creators less than their copy-protection budgets. I disagree. I have a feeling most businesses' people can handle a simple ROI check.
patent 5,809,545 (Score:2, Informative)
Inventors: Ozaki; Kazuhisa (Yokosuka, JP); Kayanuma; Kanji (Hadano, JP)
Assignee: Victor Company of Japan, Ltd. (Yokohama, JP)
Filed: September 12, 1995 Issued: September 15, 1998
nobody
Disabling Key Checking (Score:2, Funny)
Also, these are "special" keys. As we all know, "special" keys cannot be broken by anybody. Otherwise they wouldn't be "special".
Sorry JVC, I own a Sharpie. (Score:2)
I'm afraid a Copy-protection Lab with 50 (maybe?!) employees can't compete against 200 million people with time on their hands.
Bzzzzt! Try again. Or, don't.
Why would I buy this? (Score:3, Funny)
Them: Yes, thats right, just as good as a regular CD, but you can't read it without our special proprietary hardware/software that knows how to decrypt the special key and read the music. Its safe that way. And if they break it, we can change the key and update the players.
Me: So I can't use the equipment I know and love to listen to your music?
Them: Well, no, but our music...
Me: Hey look over there, music that doesn't make me jump through hoops. Bye.
Them: wait...
Re:Why would I buy this? (Score:2)
Pointless (Score:2)
Who's looking for encryption keys ? (Score:2)
If they tested this on CD-ROM drives already on the market, how would those know where to look for the keys in the first place ? Doesn't that imply that some sort of software needs to be installed to
a) tell my CD drive to look for encryption keys
b) tell my CD drive where to look for them
Huh ?
I don't get it (Score:2)
Copy II+, Locksmith 5.0, or Disk Muncher (Score:5, Funny)
My friend is coming over with Mario Bros., Spare Change, Pinball Contruction Set, and Archon II. I'm going to trade him Appleworks, and Leather Goddess of Phobos for those.
Oh, wait. That was twenty years ago.
Re:Copy II+, Locksmith 5.0, or Disk Muncher (Score:2)
Hello Safedisc! (Score:2)
The only possible way I could see them thwarting a raw copy is if the CD's they're pressing at the factory have extra areas that can be read by existing drives but aren't on (current) CD-R(W)s. I don't know if that's possible though. It wouldn't matter how good a burner you have; you can't burn it if there isn't a spot to burn the critical bits of data.
Of course, they'll still be able to read the original and create an image which can be run in Daemontools. That's how I run all my software anyways. Create an image from the original CD and I never have to go hunting for it again.
This won't sell (Score:2)
That completely eliminates most people's desire to buy a CD. Who wants to pay $21 for a CD which you can't take in your car or on vacation without lugging along a Windows laptop?
Given that I also use a Macintosh at home, yet another reason I won't buy this shit.
Of course the most overriding reason is I am simply sick of the RIAA and they havee lost my buisiness forever, even if they fell on their knees before me and wept and tried to get the DMCA revoked.
Stop calling it Copy Protection!!! (Score:5, Insightful)
This is not Copy Protection, because it doesn't protect your "copy" at all, and in fact they're trying to mislead you into believing that making a copy is forbidden. There is nothing at all wrong with copying a music CD. Your purchase price INCLUDES the right to make a copy.
Please begin to call this by it's proper term.. Copy Prevention .
Companies like Sony, JVC, and others who are implementing these technologies want to take back the right you've paid for at the register, to make a legal copy of the music you've bought. These companies are taking your rights away, not giving you more rights.
If you want to retain the rights to the music you've already purchased, don't support companies who support or develop technologies like this. This includes going to see movies in the theaters that are sponsored by Sony Pictures and other companies who back or support these restrictive technologies. This is not a joke. Let them realize that their "decrease in revenue" is not because of piracy, but because people are getting annoyed with this stuff, and are boycotting the company's products (not to mention this economy thing these companies seem to ignore in their marketing reports on how piracy has quintupled in the past year).
Once people start using the right terms en-masse, awareness is sure to increase along with it.
Copy Prevention , not Copy Protection . Just remember that.
the location, length and number of embedded keys (Score:3, Insightful)
If they vary on different copies of the same CD, it's trivially easy to run diff and isolate them. If they're the same across all copies of the same CD, they're a bit harder to find, but someone finding them can distribute a patch for the disk image to disables them. There should be a map to where the keys are, and if that's hidden, its address needs to be kept somewhere. Do they plan to rewrite the codes that handles this for each CD, so that its fingerprint can't be simply found and the rest unravelled?
bits != encrypted bits (Score:5, Funny)
These people assume that the busses will always be interceptable, which is not true. MS and other hardware vendores are hard at work at their secure OS which would effectively halt any attempts to read anything but encrypted bits. From what I've read, I feel the secure platform is a reality and will very easily stop cracking/hacking dead in it's tracks.
However, maybe when pirating is 100% eliminated, microsoft windows XP will cost $30 and not $300.
No, prices will go UP, not down. (Score:5, Insightful)
And this growing presumption that the consumer is the ENEMY is self-defeating. Look what happened with the price of WinXP (with its activation sca^Hheme) -- it retails for roughly double the price of previous versions. And an awful lot of people who'd bought legit copies of all versions before XP, said "if that's the way they're going to treat us, I'll just warez the damned thing and serves 'em right."
If software publishers want this to become the prevailing attitude, hey, go ahead, protect away!
Not to mention that the risk of breakage in some situations (LAN parties, technicians' use such as someone mentioned above, etc.) and the unwillingness of some publishers to provide replacement media, are now incentives to break the protection if only so you can make a legit backup.
What would REALLY work (a little better) (Score:3, Interesting)
CDs containing commercial software have a key written in a special area of the disc, which is designated "read-only." Through legislation or industry standards, it is enforced that no CD-RW available to consumers can be permitted to write to that area of a disc, but they can all read it just fine.
Ignoring the problem of legacy hardware and legal issues (who gets the privilege of owning a CD-writer that can write to the special area?), how would this scheme be cracked?
Re:What would REALLY work (a little better) (Score:3, Interesting)
Patch the code that reads the key off the CD to instead return a known valid key. As long as the user controls what software runs on his computer, any scheme like this is doomed. This control is of course what Palladium and the CBDTPA seek to eliminate.
This reminds me of when... (Score:3, Interesting)
Remember when you brought copyrighted software that had purposeful holes punched into a diskette? Those holes emulated bad sectors and if you copied that data of the disk to another disk the sectors when be reordered. The new disk didn't have any bad sectors so it just tried to save space and compact the sectors. The pirated software would read the reordered sectors and go into a nasty recursive loop.
It took about 1-2 months for hackers on BBS's and FidoNet to find ways to create programs that locked out corisponding sectors and created new security sectors on the floppies.
How long do you think it will take for the internet community to find a similar loop hole on CD's?
Cracked and completely effectiveless in... (Score:4, Funny)
Wager time. I'm betting...
One week before researchers have produced code that can completely compromise all of the copy protection.
One point five weeks before the elite technical community can get over the annoyances.
Two weeks before software pirates can make copies without skipping a beat.
Eight months of legitimate users being annoyed before the tech is pulled.
Sprinkle random DMCA arrests and intimidation.
Copy prevention is in conflict with the law (Score:3, Interesting)
Rough tanslation of Swiss copyright law, article 24/2:
"Whoever has the right to use a computer program may make backup copies thereof. This privilege cannot be revoked by contract."
Awesome, huh? So we can just blast through any copy prevention legally, I guess.
Re:security (Score:3, Informative)
Re:security (Score:2, Interesting)
What prevents legit users from modifying the software on the disc so it doesn't check for the keys anymore?
I have a floppy with an old program that contained some kind of copy protection. Even when installed on the harddisk, the program could not run without the floppy in the drive. But when the floppydrive stopped working I had to do something. Actually I didn't modify the program, instead I just modified the floppydriver to return the values expected by the program.
I don't even think this is illegal. (If I thought so I wouldn't be talking loud about it on slashdot.)
Re:security (Score:2)
That used to be the standard way to skip past some copy protections under dos. First you run TSR, then you run the program/game.The TSR would capture the BIOS request to read the floppy and return the results without reading the disk.
It is relativly easy to modify a program for the same effect. I used to do it back in the days of DOS for games I bought. (seriously, it was a fun thing to do, and trying to read black ink on a red card was more painfull, never mind looking up word 5, page 45 paragraph 2....)
These young wippersnappers around here think you need sourcecode to modify programs...
Re:security (Score:2)
This sounds very much a rehash of the same idea. Wonder if they will try to patent it, even with this obvious prior art...
But when the floppydrive stopped working I had to do something. Actually I didn't modify the program, instead I just modified the floppydriver to return the values expected by the program.
I don't even think this is illegal. (If I thought so I wouldn't be talking loud about it on slashdot.)
If this is isn't illegal expect the appropriate lobbying groups to be given revised orders.
Re:security (Score:2)
Re:security (Score:2)
Of course, they dont seem comfortable sticking to this mantra when their software doesn't work as designed or is exploitable. Hows that for irony?
Re:security (Score:5, Informative)
DVDs have a similar copy-protection scheme. The CSS decryption keys are located on sectors of the DVD that are unwritable in the DVD-R (or +R, or RAM, etc.) media formats. So, if you copy a CSSed DVD, you get an encrypted copy with no accompanying keys.
So, a hacker group would have to gerry-rig a CD burner that could write to these "unwritable" areas of the CD-R, so that keys could be copied along with the encrypted software. Very difficult thing to do.
Frankly, I'm surprised something like this hasn't been tried already.
Re:security (Score:3, Informative)
People will just use Softice to either get the key (since it will be an app key, not a unique one), or to just get the decrypted data. (and replace the decrypt routines with a load from raw file routine).
This is a classic example of people not understanding the trusted client problem, namely that you can't trust the PC as a client, ever!
Re:security, kind of like stealing a motorcycle (Score:2, Insightful)
Seems to me that it's no different than old protection methods on floppy discs, except that you've added another layer by decrypting most of the executable data with keys stored in the hidden "uncopyable" areas of the disc.
If someone wants that software bad enough to steal it, it will get stolen.
To me, it seems similar in concept to how one would steal a motorcycle. You can lock the handlebars, put an alarm on it, lock the wheels, etc. but there aren't any passive security mesaures that prevent 5-6 guys from just picking it straight up and into the back of a truck, where they can disarm it at their leasure.
Aaron
Re:security (Score:3, Informative)
JVC isn't the only company doing this.
I've got reliable sources that say that SONY is damned close on similar technology.
And the nice folks at Smarte Solutions [smartesolutions.com] have a whole suite of products coming online for just this sort of thing.
I'm not sure how easily this will be broken, truthfully. The software can be configured to all sorts of different levels, and the encryption can be linked to unique hardware identifiers and such. I'm no expert, but there are some that believe that this could be very tough.
Re:security (Score:3, Interesting)
Noting but time. The software developer can make it hard to figure our how to modify the software.
For example, back in the late 80's, Deluxe Music Contruction Set for the Mac was a pain to crack, because most of the code was encrypted, so disassemblers, even great ones like MacNosy, were not too useful. The decryption key was derived from a checksum of the code that loaded and decrypted the encrypted code segments, and since the 68k did not have hardware breakpoints, setting a breakpoint in a debugger involved writing a breakpoint instruction into memory, which changed the checksum, which borked the decryption.
The loader/decrypter also took steps to kill any debuggers that were running, so that you could not just hit the interrupt button after the program was decrypted and dump memory.
They didn't quite cover everything....there was a place you could put a breakpoint that was outside the range of memory that was checksummed, but was executed after the key had been derived, so crackers got in...but it was clear that with a bit more effort, they could have delayed cracking for a lot longer.
Remember that the software developer doesn't have to make their program uncrackable. They just have to make it so time consuming as to not be worth the effort.
Re:security (Score:3, Insightful)
Um, no. The more challenging it is, the more people will target it. The really good cracker groups get tired of generating keygens and hacking winzip for the 10,000th time, so they really savor the opportunity to go after challenging targets.
Like playing a game of chess with a good opponent that you have to work on, as opposed to a weak opponent that's boring to play...
Re:Anyone want to lay bets... (Score:2)
Re:Anyone want to lay bets... (Score:4, Funny)
Homer: No thanks, I'm out of that business.
Fat Tony(leaning in): About 6 minutes.
Re:And when have we heard this before? (Score:2)
The majority just has to find the work of the few good hackers.
In 2 years, do a Google search for "JVC CD crack" and see what Russian websites you end up on.
Re:And when have we heard this before? [OT] (Score:2)
http://www.everything2.com/index.pl?node_id=531479 [everything2.com]
(n) Originally a term from Reconstruction time (1870) to mean southern men. Now it means white bigot, from whip-cracker or slavedriver.
"Got a little problem with the redneck cracker" -- Ice Cube (The Predator).
Re:Well (Score:2)
http://www.unrarlib.org/license.html
There are alternatives for just about everything.
Same for zip.
Re:Well (Score:5, Funny)
Re:I'm confused... (Score:2)
Re:It won't be long... (Score:2)
Re:I can just use the headphone jack, duh (Score:2)
This is for software CDs, not audio CDs. ;)
Though I don't think JVC is too worried about you.
Sincerely,
teamhasnoi
Re:Another million dollar attempt at twocent hacki (Score:2)
This is the basic problem behind any of these DRM ideas. No matter if the data involved is sound, video or software.
Effectivly these people are spending money on something which fundermentally cannot work. They are probably throwing more money into this black hole than could ever be lost to "piracy". When the real answer to piracy is to price such the economies of mass producing CDs mean that it costs more to burn copies than to buy a regular copy. In the same way that people don't tend to photocopy books.
Re:noduh (Score:2)
Or even they spend millions and it's cracked in week. Security is not a function of the amount of money spent. Especially with DRM which is the software equivalent of trying to make pi equal 3.