{"id":164,"date":"2008-02-25T02:16:48","date_gmt":"2008-02-25T10:16:48","guid":{"rendered":"http:\/\/cubist.cs.washington.edu\/Security\/2008\/02\/25\/dvd-jons-doubletwist\/"},"modified":"2008-02-25T17:32:35","modified_gmt":"2008-02-26T01:32:35","slug":"dvd-jons-doubletwist","status":"publish","type":"post","link":"https:\/\/secblog.cs.washington.edu\/Security\/2008\/02\/25\/dvd-jons-doubletwist\/","title":{"rendered":"DVD Jon&#8217;s DoubleTwist"},"content":{"rendered":"<p>Jon Johansen (known for his work in defeating CSS in DVDs) has recently released an application known as DoubleTwist. DoubleTwist is designed to defeat Apple&#8217;s FairPlay DRM by playing the track&#8217;s in fast forward and capturing the analog signal as it leaves the sound card. In addition to stripping the DRM from songs, it allows users, through a Facebook application, to share songs with their friends.<\/p>\n<p><!--more--> Circumventing FairPlay in this manner arose due to the &#8220;Analog hole&#8221; that exists for most media in existence today. The bottom line is that for human senses to perceive the media in question, it has to be in an analog format with no protection at some point in the playback.  Since there is no reasonable way to prevent this kind of attack on DRM, it seems it would be more beneficial to be able to detect if the attack had been performed and pursue the individual in question. If the media carried a watermarking code that was durable enough to withstand copying and most removal attacks while still identifying the source user, most people would be unwilling to share their media lest they be sued for copyright infringement.<\/p>\n<p>Copyright law has been another issue that&#8217;s been complicating the use of DRM. In particular the idea of fair use is rather murky when it comes to implementation in DRM. In the US, it&#8217;s generally considered fair use to make back-up copies of media that you own however there is little to prevent people from passing on their backup copies to other people.<\/p>\n<p>Apple&#8217;s long term response to this development will be to update their DRM scheme to prevent fast-forwarding of media to slow the copying of music protected by FairPlay. In the interim however they will likely try to find some legal recourse against the authors of DoubleTwist and possibly Facebook for allowing the application to be used. My hope is that Apple will do neither of these things and instead abandons DRM in favor of watermarking.<\/p>\n<p>Source<br \/>\nhttp:\/\/www.telegraph.co.uk\/connected\/main.jhtml?xml=\/connected\/2008\/02\/21\/dlhack121.xml<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Jon Johansen (known for his work in defeating CSS in DVDs) has recently released an application known as DoubleTwist. DoubleTwist is designed to defeat Apple&#8217;s FairPlay DRM by playing the track&#8217;s in fast forward and capturing the analog signal as &hellip; <a href=\"https:\/\/secblog.cs.washington.edu\/Security\/2008\/02\/25\/dvd-jons-doubletwist\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":17,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[],"class_list":["post-164","post","type-post","status-publish","format-standard","hentry","category-current-events"],"_links":{"self":[{"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/posts\/164","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/users\/17"}],"replies":[{"embeddable":true,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/comments?post=164"}],"version-history":[{"count":0,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/posts\/164\/revisions"}],"wp:attachment":[{"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/media?parent=164"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/categories?post=164"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/tags?post=164"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}