The latest attack vector bypasses the encryption performed by the Device Keys—the same keys that were revoked by the WinDVD update—and the so-called "Host Private Key," which as yet has not been found. This was accomplished by de-soldering the HD DVD drive's firmware chip, reading its contents, and then patching it. Once that was done, the firmware was soldered back onto the drive.Well done!
"They cannot revoke this hack," said forum member arnezami, who has been at the center of much of the AACS cracking recently. "No matter how many Private Host Keys they revoke we will still be able to get Volume IDs using patched xbox 360 HD DVD drives."
A site devoted to discussing techniques that promote quality and ethical practices in software development.
Friday, May 4, 2007
In the cat-and-mouse game of defeating the HD DVD protection reminiscence of the cold war, nice to see some application of thinking outside the square approach:
- ► 2013 (13)
- ► 2012 (23)
- ► 2011 (23)
- ► 2010 (60)
- ► 2009 (60)
- ► 2008 (25)
- The world without Visual SourceSafe
- RANU - Microsoft's advice
- Grep the tab - driving me mad
- If you need to conceal the e-mail address from spa...
- Agile Software Development
- First look at MOKA5 - not impress
- Using NUnit without installation
- Ungreyed the OK button in Firefox's download dialo...
- IE7 Uptake stagnant - that's obvious.
- Full mark for thinking outside the box (or rather ...
- Microsoft's UAC & Sudo
- All about a GUID
- "Why Software sucks... and what you can do about i...
- ▼ May (13)