Talk:Windows Media DRM

From Wikipedia, the free encyclopedia

The intro needs rewording. I'll do it later if no one beats me to it. Wsf 16:53, 12 February 2006 (UTC)


Gaah! FairUse4WM is linked to from here, which in turn redirects to back here! Somebody stop this madness

[edit] Removal

Does the "Removal" section need to be corrected according to the end of the "How it works" section?

I'd understand if there are any password-cracking techniques for static (infinite session time) file content. But the only WMDRM usage I know is related to encrypting a video stream where a key exchange is required. This would make WMDRM difficult to crack, no less than SSL and HTTPS. ilgiz 03:38, 27 September 2006 (UTC)

Even the FairUse4WM's author's words are confusing. He claims that

On a theoretical level, they have to send the decryption keys outside of their control, and their only defense is through obfuscation.

[1]

I don't understand why the following scheme could be vulnerable:

  • the client software generates a public and a secret key and
  • sends out only the public key to the WMDRM server for encrypting the stream.

In this case, the stream couldn't be deciphered by an interceptor.

If the FairUse4WM's idea is about defeating the authentication stage rather than deciphering a stream sent to a valid user, there is a challenge-response technique that makes the simulation attacks difficult.

Perhaps, the crack is targeting the on-disk keystore with the WMDRM user ID? Indeed, it would only be possible to obfuscate the on-disk information. ilgiz 04:14, 27 September 2006 (UTC)

All it lets you do its take content you can play and make it so others can play it. At one level no different then playing it and looping the sound/video back into a sound video in and capturing it. Of course it does it quickly, easily and as a perfect copy of the version you had (minus the drm part of course).