{"id":3716,"date":"2007-01-03T22:48:46","date_gmt":"2007-01-04T02:48:46","guid":{"rendered":"http:\/\/blogs.law.harvard.edu\/cmusings\/2007\/01\/03\/backuphddvd-explained-by-author\/"},"modified":"2007-01-03T22:48:46","modified_gmt":"2007-01-04T02:48:46","slug":"backuphddvd-explained-by-author","status":"publish","type":"post","link":"https:\/\/archive.blogs.harvard.edu\/cmusings\/2007\/01\/03\/backuphddvd-explained-by-author\/","title":{"rendered":"BackupHDDVD Explained by Author"},"content":{"rendered":"<p>Follow the Engadget story <a href=\"http:\/\/www.engadget.com\/2007\/01\/03\/what-exactly-does-backuphddvd-do-oh-and-version-1-0-is-release\/\">here<\/a>. Here&#8217;s the key section:<\/p>\n<blockquote><p>&#8220;Affirmation 4: BackupHDDVD is nothing, only one person out of a million have the technical skills to extract keys.<\/p>\n<p>My comment: BackupHDDVD is a proof of concept.<\/p>\n<p>Picture this:<br \/>\nFew skilled persons can do massive volume key extraction, and send the keys to a central server on the internet. Then, they create an easy to use decryption program, with a nice GUI that do online key recovery. That way, my father and your father can backup movies.<br \/>\nOr they can send the keydb.cfg file on P2P networks (BitTorrent, E-Mule, etc..)<br \/>\nSee the problem now?<\/p>\n<p>&#8230;<\/p>\n<p>The attack I describe in &#8220;Affirmation 4&#8243;, is not here yet, but it&#8217;s coming.&#8221;<\/p><\/blockquote>\n<p>In other words, <a href=\"http:\/\/crypto.stanford.edu\/DRM2002\/darknet5.doc\">darknet<\/a>, here we come.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Follow the Engadget story here. Here&#8217;s the key section: &#8220;Affirmation 4: BackupHDDVD is nothing, only one person out of a million have the technical skills to extract keys. My comment: BackupHDDVD is a proof of concept. Picture this: Few skilled persons can do massive volume key extraction, and send the keys to a central server [&hellip;]<\/p>\n","protected":false},"author":72,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-3716","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/archive.blogs.harvard.edu\/cmusings\/wp-json\/wp\/v2\/posts\/3716","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/archive.blogs.harvard.edu\/cmusings\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/archive.blogs.harvard.edu\/cmusings\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/cmusings\/wp-json\/wp\/v2\/users\/72"}],"replies":[{"embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/cmusings\/wp-json\/wp\/v2\/comments?post=3716"}],"version-history":[{"count":0,"href":"https:\/\/archive.blogs.harvard.edu\/cmusings\/wp-json\/wp\/v2\/posts\/3716\/revisions"}],"wp:attachment":[{"href":"https:\/\/archive.blogs.harvard.edu\/cmusings\/wp-json\/wp\/v2\/media?parent=3716"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/cmusings\/wp-json\/wp\/v2\/categories?post=3716"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/cmusings\/wp-json\/wp\/v2\/tags?post=3716"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}