News
 

Bookmark and Share

(1) 

After a hacker managed to find a way to crack advanced access content system (AACS), it was just a matter of time for creators of special utilities to produce a program that would remove advanced copyright protection technologies allowing end-users to backup, replicate, watch high definition movies without restrictions and avoid other limitations.

The new AnyDVD HD software, which is available today for $79 from SlySoft, automatically removes copyright protection technologies from any HD DVD inserted into the drive, allowing to watch movies over digital display connection, without high-bandwidth digital content protection (HDCP) compliant graphics card and display, or backup their titles with an appropriate tool. AnyDVD HD also removes parental restrictions and allows to “remaster” a movie using a set of XML scripts.

On the one hand, the AnyDVD HD software allows owners of HD DVD movies to do with their legally purchased discs whatever they want, e.g., to watch them using devices that do not support HDCP, thus, removing necessity to acquire new displays, TV-sets, graphics cards and so on. On the other hand, the AnyDVD HD software allows pirates to replicate HD DVD movies in commercial purposes.

“Officially, the film industry and the AACS consortium is, of course, not very happy about this development. However, behind closed doors, they are likely pleased to have learned from past experiences with the CD and DVD that the users are now finally able to make unlimited use of this new medium HD DVD, i.e to enjoy his ‘fair-use rights’. It is expected that a real ‘boom’ will occur with HD-DVDs,” a statement by SlySoft reads.

Meanwhile, AACS licensing agent has issued a statement where it says that it the “attack” will not impact copyright protection technology.

“AACS has confirmed that an additional key (called a ‘processing key’) has been published on public websites without authorization. This is a variation of the previously reported attack (a compromise of a specific implementation) on one or more players sold by AACS licensees. Although a different key was extracted, this represents no adverse impact on the ability of the AACS ecosystem to address the attack. All technical and legal measures applicable to the previously reported attack will be applicable against this attack as well,” the statement reads.

Discussion

Comments currently: 1
Discussion started: 04/25/08 01:51:16 PM
Latest comment: 04/25/08 01:51:16 PM

Add your Comment




Related news

Latest News

Tuesday, July 15, 2014

6:11 am | Apple Teams Up with IBM to Make iPhone and iPad Ultimate Tools for Businesses and Enterprises. IBM to Sell Business-Optimized iPhone and iPad Devices

Monday, July 14, 2014

6:01 am | IBM to Invest $3 Billion In Research of Next-Gen Chips, Process Technologies. IBM to Fund Development of 7nm and Below Process Technologies, Help to Create Post-Silicon Future

5:58 am | Intel Postpones Launch of High-End “Broadwell-K” Processors to July – September, 2015. High-End Core i “Broadwell” Processors Scheduled to Arrive in Q3 2015

5:50 am | Intel Delays Introduction of Core M “Broadwell” Processors Further. Low-Power Broadwell Chips Due in Late 2014

Wednesday, July 9, 2014

4:04 pm | Intel Readies New Quark “Dublin Bay” Microprocessors. Intel’s “Dublin Bay” Chips Due in 2015