IP: from Intel RE: IBM&Intel push copy protection into ordinary disk drives

2000-12-26 Thread Lenny Foner

In reply to your message below, I have three questions:

(a) Can you point to existing documentation, such as working-group
notes, draft proposals, etc, which clearly state that this proposal
is -not- intended for hard-drive manufacturers?  Preferred sources
would be URL's to web pages which were online -before- the Register's
story---otherwise, the suspicion among many will be that Intel (and
others) are backpedalling after extremely negative public reaction.

(b) It seems peculiar that this is aimed at CF in the first place.
The dominant consumer devices using CF are digital still-picture
cameras, which cannot be a copyright concern to the major commercial
content producers.  And while it is conceivable that their concern is
audio downloads into MP3-playing devices, encrypting the storage -on-
the device is only meaningful if (1) CF cards are sold with prerecorded 
content---a dubious business proposition at best---or (2) the entire
path from web through computer to CF card programming is similarly
protected, which lands us squarely in the problem is accomplishing
this in (so far) unsecured hardware---and again it starts looking like
this is the start of a process to make the hard disks themselves
secured, along with software on the machine which is protected by the
anticircumvention language of the DMCA.  [Or (3) special-purpose
devices which do nothing but connect to a web site---how?---and load
the CF with content, which is another dubious business proposition.]
[Note carefully that I am -not- asking, "What have -consumers- asked
for?", because it is vanishingly unlikely that so-called consumers
-ever- ask for -any- form of content protection, which invariably
makes their lives more difficult and asserts the implicit assumption
that all paying customers are in reality thieves.]

(c) Because of (a) and especially (b), it still looks like this
proposal is the nose under the tent towards exactly what the Register
article complained about---securing hard disks themselves.  What
assurances can you give that this will -never- happen?  Are there
citations to printed and/or online sources which explain this position?

I await your clarification of these issues.  Thank you for your time.

Date: Tue, 26 Dec 2000 06:35:10 -0500
From: Dave Farber <[EMAIL PROTECTED]>

>From: "Gelsinger, Patrick P" <[EMAIL PROTECTED]>
>To: [EMAIL PROTECTED]
>
>Dave -
>
>As a regular reader of your IP reader, I would apprecaite you diseminating a
>correction to your mailing on Dec 22.
>
>Content protection technology misinformation generates negative web-press
>coverage:
>
>An article on The Register website "Stealth plan puts copy protection into
>every hard drive" contains false information that the 4C's (Intel, IBM, MEI,
>Toshiba) Content Protection for Recordable Media (CPRM) is to be applied to
>all PC hard drives.  It is misinterpreting a specification for use of CPRM
>with the Compact Flash media format (which supports either semiconductor
>flash memory or IBM microdrives) probably because Compact Flash uses the
>same command protocol interface as standard PC harddrives.  The technology
>is neither intended nor licensed for use with PC harddrives and is optional
>even for the supported media types (flash memory and microdrives). John
>Gilmore, a noted privacy and consumer advocate, has picked up the article
>and further propagated the erroneous information and mentioned Intel
>"IBM&Intel push copy protection into ordinary disk drives".  I have alerted
>public relations at Intel and are disseminating accurate information within
>Intel and among our industry contacts.
>
> Pat.

For archives see: http://www.interesting-people.org/




fyi: IP: from Intel RE: IBM&Intel push copy protection into ordinary

2000-12-26 Thread Jeff . Hodges

--- Forwarded Message

Date: Tue, 26 Dec 2000 06:35:10 -0500
To: [EMAIL PROTECTED]
From: Dave Farber <[EMAIL PROTECTED]>
Subject: IP: from Intel RE: IBM&Intel push copy protection into ordinary
  disk drives


>From: "Gelsinger, Patrick P" <[EMAIL PROTECTED]>
>To: [EMAIL PROTECTED]
>
>Dave -
>
>As a regular reader of your IP reader, I would apprecaite you diseminating a
>correction to your mailing on Dec 22.
>
>Content protection technology misinformation generates negative web-press
>coverage:
>
>An article on The Register website "Stealth plan puts copy protection into
>every hard drive" contains false information that the 4C's (Intel, IBM, MEI,
>Toshiba) Content Protection for Recordable Media (CPRM) is to be applied to
>all PC hard drives.  It is misinterpreting a specification for use of CPRM
>with the Compact Flash media format (which supports either semiconductor
>flash memory or IBM microdrives) probably because Compact Flash uses the
>same command protocol interface as standard PC harddrives.  The technology
>is neither intended nor licensed for use with PC harddrives and is optional
>even for the supported media types (flash memory and microdrives). John
>Gilmore, a noted privacy and consumer advocate, has picked up the article
>and further propagated the erroneous information and mentioned Intel
>"IBM&Intel push copy protection into ordinary disk drives".  I have alerted
>public relations at Intel and are disseminating accurate information within
>Intel and among our industry contacts.
>
> Pat.



For archives see: http://www.interesting-people.org/

--- End of Forwarded Message







Re: copy protection

2000-12-26 Thread Jaap-Henk Hoepman

On Mon, 25 Dec 2000 01:23:41 +0100 [EMAIL PROTECTED] writes:
> [...]
>  
> > So -if-, by some happenstance, commercial vendors somehow manage to
> > convince themselves and their customers that this is somehow a better
> > world, and their customers fail to vote with their feet (perhaps
> 
> Don't kid yourself. No one is that kind of stupid. If they indeed 
> are, then it's not worth fighting for, anyway. Looks clearly win/win 
> to me.

Actually, the CPSA (Content Protection System Architecture) introduces a nice 
twist (as in `twist your arm'):

   `Encryption is a way of scrambling digital content so that it is
   unusable (not recognizable) unless it is first descrambled
   (decrypted). To get the necessary intellectual property to be able
   to decrypt the content, a license is required. That license contract
   specifies requirements to manage the content according to its CMI
   [Content Management Information].'

In other words, if all DVD content is encrypted, all DVD players will have to
be compliant... We may see more compliant players than we like.

Jaap-Henk
 
-- 
Jaap-Henk Hoepman | Come sail your ships around me
Dept. of Computer Science | And burn these bridges down
University of Twente  |   Nick Cave - "Ship Song"
Email: [EMAIL PROTECTED] === WWW: www.cs.utwente.nl/~hoepman
Phone: +31 53 4893795 === Secr: +31 53 4893770 === Fax: +31 53 4894590
PGP ID: 0xF52E26DD  Fingerprint: 1AED DDEB C7F1 DBB3  0556 4732 4217 ABEF




Re: copy protection

2000-12-25 Thread Ray Dillinger



On Mon, 25 Dec 2000, Jay Holovacs wrote:


>I expect the approach will make the software refuse to install on
>noncompliant disks. They already have extensive equipment requirements,
>adding compliant disks to the list (especially when virtually all machines
>are shipping with them) is trivial.

I figure they'll probably lobby congress for a "copyright tax" to be 
levied on all noncompliant drives, creating a price differential where 
the copy-protected drives are cheaper.  Such taxes are already in place 
in many countries.

Bear






Re: copy protection

2000-12-25 Thread Ray Dillinger



On Mon, 25 Dec 2000, Jay Holovacs wrote:

>At 01:23 AM 12/25/2000 +0100, [EMAIL PROTECTED] wrote:
>>Don't tell me I can't find a crypto-free mass storage 
>>vendor. 
>
>I expect the approach will make the software refuse to install on
>noncompliant disks. They already have extensive equipment requirements,
>adding compliant disks to the list (especially when virtually all machines
>are shipping with them) is trivial.

I had to laugh when I read this, because all the software I use is 
opensource. I just can't see a future where open source software 
refuses to install on anything.  But then I thought about it -- The 
simple fact that opensource users won't have a problem means that 
opensource users won't revolt. It's the commercialware users that 
will have a problem -- but if the transition is handled fairly 
smoothly (ie, the drives are out about two years before software 
that requires them starts appearing) they won't revolt until it's 
too late.

One thing that the music distributors are going to have to deal 
with sooner or later is a simple principle of economics; merchandise 
with zero marginal cost tends eventually toward zero marginal profit.

Bear






Re: copy protection

2000-12-25 Thread Jay Holovacs

At 01:23 AM 12/25/2000 +0100, [EMAIL PROTECTED] wrote:
>Don't tell me I can't find a crypto-free mass storage 
>vendor. 

I expect the approach will make the software refuse to install on
noncompliant disks. They already have extensive equipment requirements,
adding compliant disks to the list (especially when virtually all machines
are shipping with them) is trivial.

The only protection from this is user revolt. Hopefully it will occur.

jay






Re: copy protection

2000-12-24 Thread Eugene . Leitl

Lenny Foner wrote:
 
> But the world is -different- now.
> 
> The DMCA exists, and its anticircumvention language will be used as
> a bludgeon to sue and perhaps even lock up people who do anything to
> bypass the crypto in the disk.  Thus, a purely technical solution

This assumes I own the disk. Why should I be so stupid as to pay
for my own bondage tools, not even being kinky? As long as there are 
alternatives? Don't tell me I can't find a crypto-free mass storage 
vendor. Especially, since they have to pay *royalties* for putting it 
in. IBM does make fine drives, I'll be sad to buy Maxtor's. My heart
is bleeding, honestly. Can't say anything about Intel, never bought 
their silicon. Toshiba, either. The fourth one in the quartumvirate 
I forgot, so it can't be all that important. Dust in the wind.

> can't be deployed in any way that really helps a large number of
> people---it can't be put into Linux, for example, if the CSS cases

Why? Anything The Man can do about Freenet, or MojoNation? Especially,
if the successors of it are indistinguishable from an SSL browser
session? No one can pull the plug on the Net now, and we're faster
than the countermeasures.

> are won by the DVDCCA, and no commercial vendor will risk it, either.

The worse for the commercial vendors. I can get my Debian off the
net just fine, thanks.

> Remember also that in the case of DeCSS, the original creator wasn't
> even in a region that is subject to US law!  At least, in theory...

Right, in theory. Unenforcible laws are not worth the dead tree they're 
printed on. In fact, any unenforcible laws make immature me violate 
them as frequently as possible, just because I can, and not supposed to, 
and no one can do anything about it. Kinda makes one look stupid for
concocting the law in the first place.
 
> So -if-, by some happenstance, commercial vendors somehow manage to
> convince themselves and their customers that this is somehow a better
> world, and their customers fail to vote with their feet (perhaps

Don't kid yourself. No one is that kind of stupid. If they indeed 
are, then it's not worth fighting for, anyway. Looks clearly win/win 
to me.

> because they are given no choice? there aren't -that- many hard disk
> vendors these days), technical workarounds will be litigation targets.

The more pressing the need for open hardware, and putting the means
of production on people's desks. Less than a decade to wait, I'm 
betting.

-- 
__
 icbmto:N 48 10'07'' E 011 33'53''http://www.lrz.de/~ui22204 
ED 90 04 33 EB 74 E4 A9 53 7F CF F5 86 E7 62 9B 57 F9 CF D3




Re: copy protection

2000-12-24 Thread Sampo A Syreeni

On Sun, 24 Dec 2000, Lenny Foner wrote:

>The DMCA exists, and its anticircumvention language will be used as
>a bludgeon to sue and perhaps even lock up people who do anything to
>bypass the crypto in the disk.

Which simply means: "hack all that you want, but don't get caught". Which
is why we have anonymous remailers, the various projects aiming to provide
eternity service and the like.

Besides, you will have a hard time showing that DMCA applies at all. Unlike
with DVD's, the medium and the content are not linked in any way. It is
difficult to see how content owners could have anything to do with
protection measures which aren't their own.

Sampo Syreeni <[EMAIL PROTECTED]>, aka decoy, student/math/Helsinki university





Re: copy protection

2000-12-24 Thread Sampo A Syreeni

On 24 Dec 2000, Paul Crowley wrote:

>"Trivial" is overstating it, I think.  I've seen dongle-based license
>code designed such that if you tried modifying the code to skip the
>dongle check, the program's pointer arithmetic would go screwy and it
>would crash in horrible ways.

That is one of many, many ways to make code difficult to crack. Few ordinary
coders would believe the kind of pipe dreams some people can come up with
when they really want nobody to mess with their code - for instance,
actually emulating the microprocessor with a totally malformed statemachine
and running the code on top of that. Or letting some asynch parallel
process (like DMA) rewrite the code and rely on timing gimmicks to give the
right version just as the program counter crosses the modified code (so that
to debug, you would need to have a debugger which virtualizes everything
perfectly - a rarity; dedicated people roll their own as they go,
naturally). Anything. Compared to measures of that sort, what you're
describing indeed sounds rather tame.

In fact, you would not believe the kind of morality boost that sort of
thing gives to a hacker, with hacker taken in the original sense of the
word. I've seen people go on for 48 hours straight pounding the stuff
simply because it reads like a challenge and then discard the puzzle after
it's solved. There are plenty of capable coders around, and more in line
should copy protection once again become a widespread nuisance. So I'm
pretty much sure all software short of provably secure will end up being
circumvented. The rest will be patched, with patches distributed online.
Tamper proof hardware is the only solution and as everybody knows, it's not
exactly fool-proof either.

Sampo Syreeni <[EMAIL PROTECTED]>, aka decoy, student/math/Helsinki university





copy protection

2000-12-24 Thread Lenny Foner

Date: 24 Dec 2000 02:26:35 -0500
From: "Perry E. Metzger" <[EMAIL PROTECTED]>

[ . . . ]

Getting around the license stuff will always be trivial, however, in
spite of the pipe dreams of fools. If the software can be read by the
user's computer, it can be copied. If it can be copied, automated
tools will be developed to permit it.

Fake "cryptography", hardware "keys", hardware modifications and all
the other garbage people try are at best ways to slow down duplication
and to annoy legitimate users. None of it works in the end. The sick
thing is, all of it has been tried before, over and over, and yet new
companies constantly appear promising new holy grails for the copy
protection crowd.

But the world is -different- now.

The DMCA exists, and its anticircumvention language will be used as
a bludgeon to sue and perhaps even lock up people who do anything to
bypass the crypto in the disk.  Thus, a purely technical solution
can't be deployed in any way that really helps a large number of
people---it can't be put into Linux, for example, if the CSS cases
are won by the DVDCCA, and no commercial vendor will risk it, either.
Remember also that in the case of DeCSS, the original creator wasn't
even in a region that is subject to US law!  At least, in theory...

So -if-, by some happenstance, commercial vendors somehow manage to
convince themselves and their customers that this is somehow a better
world, and their customers fail to vote with their feet (perhaps
because they are given no choice? there aren't -that- many hard disk
vendors these days), technical workarounds will be litigation targets.




Re: copy protection

2000-12-24 Thread David Honig

At 02:26 AM 12/24/00 -0500, Perry E. Metzger wrote:
>Getting around the license stuff will always be trivial, however, in
>spite of the pipe dreams of fools. If the software can be read by the
>user's computer, it can be copied. If it can be copied, automated
>tools will be developed to permit it.
>
>Fake "cryptography", hardware "keys", hardware modifications and all
>the other garbage people try are at best ways to slow down duplication
>and to annoy legitimate users. None of it works in the end. The sick
>thing is, all of it has been tried before, over and over, and yet new
>companies constantly appear promising new holy grails for the copy
>protection crowd.

I disagree that it is pointless, although I agree that copy/run protection
can always be subverted, because at some place the content is cleartext
in order to be used.

All locks are subvertable, but they're still useful e.g., on cars ---
to deter amateur (trivial) theft and to correct mistaken identities (two
identical cars near each other in a parking lot).

For esoteric software @ $100,000 per seat, and users with reasonable
assets, bypassable security is a practical reminder of the liability should
you get caught.

Of course, for say 3rd world companies who don't have that kind of
cash, and aren't worried about copyright law, reverse engineering 
could be worth it -esp. since you're not spending a $100,000/yr engineer
on reverse engineering it.

And I'll argue that even if a perfectly cracked version of esoteric software
(some $100K/seat _Synopsys_ tool, say) were freely circulated, it would
not be used by the folks who pay for it now.  _Photoshop_, yes, but that
would be pop software; and graphic arts shops still license it.

But for say consumer products -music, videos, pop software- the game
is over.  As a senior engineer at a massive Japanese entertainment 
company acknowledged to me, "they have logic analyzers in Hong Kong."

dh



 






  








Re: copy protection

2000-12-24 Thread Perry E. Metzger


Paul Crowley <[EMAIL PROTECTED]> writes:
> "Trivial" is overstating it, I think.  I've seen dongle-based license
> code designed such that if you tried modifying the code to skip the
> dongle check, the program's pointer arithmetic would go screwy and it
> would crash in horrible ways.  It was a damn clever design, which I
> can't say much about here except that it depended on a fairly detailed 
> understanding of the innards of several parts of a large and complex
> program, and so making the appropriate fix would be a sizeable job for 
> a very skilled and patient hacker; for example, it did not depend on 
> branches that were only taken when the dongle was absent.
> 
> Of course, it could be cracked, but it wouldn't have been trivial.

I find that very hard to believe. At some point, you can (at worst)
simulate the returns of the routine that examines the dongle.

Even assuming they've done something really clever, though, once
cracked, it is cracked for all time. Building a tool to get around the
"clever copy protection" in an automatic way for programs using said
"clever copy protection" then becomes feasible, indeed, inevitable.

Almost all copy protection schemes are, in the end, snake oil. You
cannot prevent people from eventually cracking around them.

Manufacturers spend huge amounts of time fretting over finding ways to
annoy their customers, when (IMHO) lost revenue due to piracy is not
significantly reduced by copy protection. Their legitimate customers,
however, are often significantly hurt by the schemes.

Ah well. Another good argument for the open source model.


Perry
--
Perry E. Metzger[EMAIL PROTECTED]
--
Quality NetBSD CDs, Support & Service. http://www.wasabisystems.com/




Re: copy protection

2000-12-24 Thread Paul Crowley

"Perry E. Metzger" <[EMAIL PROTECTED]> writes:
> Getting around the license stuff will always be trivial, however, in
> spite of the pipe dreams of fools. If the software can be read by the
> user's computer, it can be copied. If it can be copied, automated
> tools will be developed to permit it.

"Trivial" is overstating it, I think.  I've seen dongle-based license
code designed such that if you tried modifying the code to skip the
dongle check, the program's pointer arithmetic would go screwy and it
would crash in horrible ways.  It was a damn clever design, which I
can't say much about here except that it depended on a fairly detailed 
understanding of the innards of several parts of a large and complex
program, and so making the appropriate fix would be a sizeable job for 
a very skilled and patient hacker; for example, it did not depend on 
branches that were only taken when the dongle was absent.

Of course, it could be cracked, but it wouldn't have been trivial.
-- 
  __
\/ o\ [EMAIL PROTECTED]
/\__/ http://www.cluefactory.org.uk/paul/




Re: IBM&Intel push copy protection into ordinary disk drives

2000-12-24 Thread R. A. Hettinga


--- begin forwarded text


Date: Sat, 23 Dec 2000 22:42:35 -0800
From: Somebody
To: "R. A. Hettinga" <[EMAIL PROTECTED]>
Subject: Re: IBM&Intel push copy protection into ordinary disk drives

> --- begin forwarded text
> >Subject: Re: IBM&Intel push copy protection into ordinary disk drives
> >To: [EMAIL PROTECTED]
> >From: [EMAIL PROTECTED]
> >> This hard drive thing sounds a lot more like 4C than TCPA though.
> >
> >The hard drive thing is apparently 4C, but seems like it'd fit in "nicely"
> >(for someone's definition of nicely) with a TCPA-based system.

Don't forget Intel and IBM are charter members of both these scuzzy
outfits.  And somebody please tell me what good an encrypted hard
drive is gonna be when the key material has to pass through an untrusted
PC running a see-through OS such as Windows?  If one is actually
trying to save the data _from_ the PC operator not _for_ him/her, one
needs a TCPA-like hardening.  At least Intel and IBM must realize this.

--- end forwarded text


-- 
-
R. A. Hettinga 
The Internet Bearer Underwriting Corporation <http://www.ibuc.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




copy protection

2000-12-23 Thread Perry E. Metzger


David Honig <[EMAIL PROTECTED]> writes:
> Just a historical anecdote.  Back in the old days, software
> could be linked to the unique ID on Sun motherboards.  To move
> software to a new machine, you called and maybe faxed something
> signed (with a pen) to the effect that you weren't ripping them off.
> 
> This was before the software-based floating licenses became 
> popular.

At a large firm I worked at, we wrote a kernel mod for SunOS that lied
to the executables about what the system ID was. We did not steal
licenses, mind you -- we did this because we would often have systems
crash in the middle of the night and need to move the executables to
another system, and the folks at the software company would not be in
their office to give us license keys until morning.

Getting around the license stuff will always be trivial, however, in
spite of the pipe dreams of fools. If the software can be read by the
user's computer, it can be copied. If it can be copied, automated
tools will be developed to permit it.

Fake "cryptography", hardware "keys", hardware modifications and all
the other garbage people try are at best ways to slow down duplication
and to annoy legitimate users. None of it works in the end. The sick
thing is, all of it has been tried before, over and over, and yet new
companies constantly appear promising new holy grails for the copy
protection crowd.

Perry




Re: IBM&Intel push copy protection into ordinary disk drives

2000-12-22 Thread Jeff . Hodges

[EMAIL PROTECTED] said:
> If they wern't involved in TCPA before

Well actually, that excerpt of Intertrust's S1 was a listing of potential 
competitors in their discussion of risks.

> they are now- they just announced
> a deal with Wave Systems, who is a founder of TCPA.
> 
> http://biz.yahoo.com/bw/001219/ma_wave_sy.htm

Hm, Yahoo sez that aritcle has expired, but there's this press release on the 
Wave.com site..

  http://www.wave.com/news/press_archive/001219rightschip.htm


> This hard drive thing sounds a lot more like 4C than TCPA though.

The hard drive thing is apparently 4C, but seems like it'd fit in "nicely" 
(for someone's definition of nicely) with a TCPA-based system.


JeffH






Re: IBM&Intel push copy protection into ordinary disk drives

2000-12-22 Thread Eric Murray

On Fri, Dec 22, 2000 at 10:42:15AM -0800, [EMAIL PROTECTED] wrote:
> It's also innaresting to note that there's these hints in InterTrust's S-1/A 
> filed way back in 1999-09-28 (note especially the second two)..
> 
>   . providers of secure digital distribution technology like AT&T, IBM,
> Microsoft, Liquid Audio, Preview Systems, and Xerox;
> 
>   . providers of hardware-based content metering and copy protection systems,
> including Sony, Wave Systems, and the 4C Entity, comprised of IBM, Intel,
> Matsushita, and Toshiba; and
> 
>   . operating system manufacturers, including Microsoft or Sun Microsystems,
> that may develop or license digital rights management solutions for
> inclusion in their operating systems.
> 
> http://www.sec.gov/Archives/edgar/data/1089717/0001012870-99-003407.txt
> 
> I wonder whether (read: suspect) the last one is referring to the Trusted 
> Computing Platform Alliance (http://www.trustedpc.org/).



If they wern't involved in TCPA before, they are now- they just announced
a deal with Wave Systems, who is a founder of TCPA.

http://biz.yahoo.com/bw/001219/ma_wave_sy.htm

This hard drive thing sounds a lot more like 4C than TCPA though.


-- 
  Eric Murray   Consulting Security Architect SecureDesign LLC
  http://www.securedesignllc.comPGP keyid:E03F65E5




Re: About Gilmore's letter on IBM&Intel push copy protection into ordinary disk drives

2000-12-22 Thread Alan Olsen

On Fri, 22 Dec 2000 [EMAIL PROTECTED] wrote:

> I agree. I lived through the "physical" floppy disk copy-protection wars of 
> the early 80's (wherein such copy-protection technologies fell out of popular 
> usage) and am extremely skeptical about whether the market will accept this 
> stuff for all the reasons you cite.

An interesting observation about the physical floppy protection methods of
the 80s...  Some vendows were quite willing to use protection methods that
would eventually destroy the hardware.  (One involved bouncing the heads
off the back-end of the drive in an odd fashion. It would eventually
destroy the alignment on the drive or the drive itself.)

I worry about this sort of thing because the copy protection police have
shown by their past actions that they are not concerned by any unintended
consiquences of their actions.  As long as it "protects" their little
feifdom, they could care less about any of the other effects.  (Like
damaged hardware, being unable to use the product with other similar
products, etc.)  Very shortsighted attitude.  Blinded by greed and
teritorial games.

[EMAIL PROTECTED] | Note to AOL users: for a quick shortcut to reply
Alan Olsen| to my mail, just hit the ctrl, alt and del keys.
"In the future, everything will have its 15 minutes of blame."





Re: IBM&Intel push copy protection into ordinary disk drives

2000-12-22 Thread Jeff . Hodges

It's also innaresting to note that there's these hints in InterTrust's S-1/A 
filed way back in 1999-09-28 (note especially the second two)..

  . providers of secure digital distribution technology like AT&T, IBM,
Microsoft, Liquid Audio, Preview Systems, and Xerox;

  . providers of hardware-based content metering and copy protection systems,
including Sony, Wave Systems, and the 4C Entity, comprised of IBM, Intel,
Matsushita, and Toshiba; and

  . operating system manufacturers, including Microsoft or Sun Microsystems,
that may develop or license digital rights management solutions for
inclusion in their operating systems.

http://www.sec.gov/Archives/edgar/data/1089717/0001012870-99-003407.txt

I wonder whether (read: suspect) the last one is referring to the Trusted 
Computing Platform Alliance (http://www.trustedpc.org/).

JeffH






Re: About Gilmore's letter on IBM&Intel push copy protection into ordinary disk drives

2000-12-22 Thread Jeff . Hodges

I agree. I lived through the "physical" floppy disk copy-protection wars of 
the early 80's (wherein such copy-protection technologies fell out of popular 
usage) and am extremely skeptical about whether the market will accept this 
stuff for all the reasons you cite.

JeffH






Re: IBM&Intel push copy protection into ordinary disk drives

2000-12-22 Thread Antonomasia


> The Register has broken a story of the latest tragedy of copyright
> mania in the computer industry.  Intel and IBM have invented and are
> pushing a change to the standard spec for PC hard drives that would
> make each one enforce "copy protection" on the data stored on the hard
> drive.  You wouldn't be able to copy data from your own hard drive to
> another drive, or back it up, without permission

I suppose the limitations of these would have to be stated when offered
for sale to keep within (to quote from another web page)

   [n]ational (and international) consumer law, especially that of
   the UK and that promulgated by the EC
   The Trades Descriptions Act (in the UK)
   The general concept of "fitness for purpose"


--
##
# Antonomasia   [EMAIL PROTECTED]  #
# See http://www.notatla.demon.co.uk/#
##




Re: IBM&Intel push copy protection into ordinary disk drives

2000-12-22 Thread Jeff . Hodges

I didn't notice any relevant links in the Register article. A little pokin' 
with a search engine yielded..

Welcome to 4C Entity
http://www.dvdcca.org/4centity/


For further (and possibly related) entertainment, see also..

Trusted Computing Platform Alliance
http://www.trustedpc.org/

Reading their stuff and listening to their session talk at RSA 2000 had me 
wondering whether they were trying to keep user "secure" in the face of 
possibly tainted/malicious computers+software, or computers+software(+content) 
secure from (both legitimate and malicious) users.


JeffH






IBM&Intel push copy protection into ordinary disk drives

2000-12-21 Thread John Gilmore

The Register has broken a story of the latest tragedy of copyright
mania in the computer industry.  Intel and IBM have invented and are
pushing a change to the standard spec for PC hard drives that would
make each one enforce "copy protection" on the data stored on the hard
drive.  You wouldn't be able to copy data from your own hard drive to
another drive, or back it up, without permission from some third
party.  Every drive would have a unique ID and unique keys, and would
encrypt the data it stores -- not to protect YOU, the drive's owner,
but to protect unnamed third parties AGAINST you.

The same guy who leads the DVD Copy Control Association is heading the
organization that licenses this new technology -- John Hoy.  He's a
front-man for the movie and record companies, and a leading figure in
the California DVD lawsuit.  These people are lunatics, who would
destroy the future of free expression and technological development,
so they could sit in easy chairs at the top of the smoking ruins and
light their cigars off 'em.

The folks at Intel and IBM who are letting themselves be led by the
nose are even crazier.  They've piled fortunes on fortunes by building
machines that are better and better at copying and communicating
WHATEVER collections of raw bits their customers desire to copy.  Now
for some completely unfathomable reason, they're actively destroying
that working business model.  Instead they're building in circuitry
that gives third parties enforceable veto power over which bits their
customers can send where.  (This disk drive stuff is just the tip of
the iceberg; they're doing the same thing with LCD monitors, flash
memory, digital cable interfaces, BIOSes, and the OS.  Next week we'll
probably hear of some new industry-wide copy protection spec, perhaps
for network interface cards or DRAMs.)  I don't know whether the movie
moguls are holding compromising photos of Intel and IBM executives
over their heads, or whether they have simply lost their minds.  The
only way they can succeed in imposing this on the buyers in the
computer market is if those buyers have no honest vendors to turn to.
Or if those buyers honestly don't know what they are being sold.

So spread the word.  No copy protection should exist ANYWHERE in
generic computer hardware!  It's up to the BUYER to determine what to
use their product for.  It's not up to the vendors of generic
hardware, and certainly not up to a record company that's shadily
influencing those vendors in back-room meetings.  Demand a policy
declaration from your vendor that they will build only open hardware,
not covertly controlled hardware.  Use your purchasing dollars to
enforce that policy.

Our business should go to the honest vendors, who'll sell you a drive
and an OS and a motherboard and a CPU and a monitor that YOU, the
buyer, can determine what is a valid use of.  Don't send your money
to Intel or IBM or Sony.  Give your money to the vendors who'll sell
you a product that YOU control.

    John

  http://www.theregister.co.uk/content/2/15620.html

  Stealth plan puts copy protection into every hard drive

Hastening a rapid demise for the free copying of digital media, the next 
generation of hard disks is likely to come with copyright protection 
countermeasures built in.

Technical committees of NCTIS, the ANSI-blessed standards body, have been 
discussing the incorporation of content protection currently used for 
removable media into industry-standard ATA drives, using proprietary 
technology originating from the 4C Entity. They're the people who brought 
you CSS2: IBM, Toshiba Intel and Matsushita.

The scheme envisaged brands each drive with a unique identifier at 
manufacturing time.

The proposals are already at an advanced stage: three drafts have already 
been discussed for incorporating CPRM (Content Protection for Recordable 
Media) into the ATA specification by the NCTIS T.13 committee. The 
committee next meets in February. If, as expected, the CPRM extensions 
become part of the ATA specification, copyright protection will be in every 
industry-standard hard disk by next summer, according to IBM.

However, what's likely to create a firestorm of industry protest is that 
the proposed mechanism introduces problems to moving data between compliant 
and non-compliant hard drives. Modifications to existing backup programs, 
imaging software, RAID arrays and logical volume managers will be required 
to cope with the new drives, The Register has discovered.

The ramifications are enormous. Although the benefit to producers is great 
- - bringing the holy grail of secure content one step closer - the costs to 
consumers will be significant. For example, corporate IT departments will 
be unable to mix compliant and non-compliant ATA drives as they try to 
enforce uniform back up policies, we've discovered. Restoring perso

Re: Copy protection proposed for digital displays

2000-02-24 Thread David Honig

At 03:56 PM 2/23/00 -0600, Rick Smith wrote:
>Now, on the other hand, they could do smartcard sorts of things like the
>satellite TV folks. That ups the ante, since you have to build in a
>smartcard reader and do smartcard-based key management. I'll bet that none
>of those costs are in their business model yet. 

*Ding*  

The "open" set top boxes will have an FCC-required,
*separable* access control device (aka POD 
or glorified sim/smartcard) which can be controlled by the
head-end (ie, the cable co).  The head-end can en/disable various services
by talking to a POD, which does *PK ops* and both decrypts the stuff coming
over the cable (if you've paid) and then re-encrypts content inside your
box (if its copy protected).  The box will have a unique ID, too, just like
your ethernet
card.  

The FCC-requirement that the POD be physically detachable will probably be
found to be an attack point, but the Fed requires it.

Fair-use excerpts :-) from the opencable.org site's public docs:

1. Introduction
This copy protection specification defines the means to protect high value
content on the interface
between the Point of Deployment (POD) Removable Security Module and the
OpenCable Host
device (Host). ...
Content, which is delivered with copying permitted, e.g., free access
off-air broadcast content, is not
copy protected and the means described in this specification do not apply
to it. Such content may be
encrypted from headend to POD but will be delivered in the clear on the POD
Host Interface.
Conversly only ‘copying permitted’ content will be delivered in the clear
(unencrypted) from
headend to POD and so will be output in the clear from the POD to Host with
CCI=00.
The objective of copy protection is to secure protected content against
unauthorized 1 access
throughout the entire delivery chain from source to display. Program
providers have deployed
means to secure content from source to the cable headend and cable systems
have similarly
deployed secure systems from headend to home. Cable set-tops use copy
protection technology to
protect content on the analog and digital outputs to consumer displays.
With the introduction of the POD Module, cable security will terminate in
the POD. A means is
needed to prevent unauthorized access on the POD«Host interface. This
document specifies such a
means. Basically, the POD Module shall decrypt services under control of
the headend and shall re-encrypt
content for the purpose of copy protection across the interface between the
POD Module
and Host device.2

b) The POD«Host interface is protected using:
i) Integer field, 1024 bit Diffie-Hellman key exchange with DFAST
intellectual property
incorporated into the key exchange process.3
ii) Encryption of protected MPEG data across the interface, using DES
encryption.
iii) Authentication of Copy Control Information (CCI) during transmission
from POD to
Host. The POD will receive the CCI through an authenticated CA System
message, and
transfer it to the Host using a specified authentication protocol.
c) Copy Protection on Host device outputs. The digital Host device will
support Macrovision
copy protection on standard-definition analog outputs 4 and will use “5C”
DTLA copy
protection on digital 1394 outputs (per SCTE Standard DVS-194) when these
outputs are
present. Digital Host devices with other outputs will be granted a license
to implement
OpenCable POD Module Interface Technology only if they can satisfactorily
protect copy
protected material.
d) [Informative 5 ] Revocation of selected services. The cable operator’s
Conditional Access
System (CAS) will maintain a list of validated Host devices. When a Host is
determined to
be fraudulent the CAS will selectively deny the appropriate encrypted
services to the
POD/Host. The denial of service may apply to all protected content or to
specific content as
determined by the CAS. For example, if properly enabled, the CAS may
perform the
following:
i) Cut off service to a single channel, such as “HBO”. This could be done
through an EMM,
which would selectively deny service based on a Content Provider’s concerns
about copy
protection.
ii) Cut off service on a program-by-program basis. This might be done
through an ECM,
which would prevent descrambling based on a flag. It addresses the Content
Provider’s
concern about a particular program being sent to a fraudulent or
non-validated Host.
iii) When a Host cannot be validated, e.g., it is lacking a valid
certificate, the CA System
will deny all copy protected services to the POD/Host.
e) [Informative] Service restoration. The CAS will have the ability to
deliver either a
targeted or a broadcast message that authorizes the restoration of services
to a POD that is
mated to a Host previously identified as fraudulent but then cleared of
revalidated.










  







Re: Copy protection proposed for digital displays

2000-02-23 Thread William Allen Simpson

Hmmm, I didn't see any:

"Xing, you'd better do a pretty good job of securing your keys, as if 
your systems are compromised you'll wear the financial consequences."

What I saw was keys compromised, sue the folks that tell anyone about 
it


Ian Farquhar wrote:
> Look at it this way:
> 
> "Sony, you'd better do a pretty good job of securing your keys, as if
> your systems are compromised you'll wear the financial consequences."
> 
> There is already precident for Sony (and many others) signing up to
> a very similar scheme: DVD's CSS.  

[EMAIL PROTECTED]
Key fingerprint =  17 40 5E 67 15 6F 31 26  DD 0D B9 9B 6A 15 2C 32




Re: Copy protection proposed for digital displays

2000-02-23 Thread Steven M. Bellovin

In message <[EMAIL PROTECTED]>, Ian Farquhar writes:
> > 5. Sony spends millions on recalls, PR damage control, etc.
> 
> Look at it this way:
> 
> "Sony, you'd better do a pretty good job of securing your keys, as if
> your systems are compromised you'll wear the financial consequences."

It's worth mentioning that many current business models seem to favor 
subscription-based services, rather than simple static content or hardware.  
Consider Tivo's VCR replacement, which requires a phone connection to update 
its viewing guide, etc. -- a feature you pay ~$10/month for.  Or look at the 
late, (unlamented?) DIVX variant on DVD.

The cost of hardware is going asymptotically to zero, and ordinary content is 
relatively easy to copy.  Everyone knows that -- and smart companies are trying
to make their money some other way.

--Steve Bellovin





Re: Copy protection proposed for digital displays

2000-02-23 Thread Ian Farquhar

> 5. Sony spends millions on recalls, PR damage control, etc.

Look at it this way:

"Sony, you'd better do a pretty good job of securing your keys, as if
your systems are compromised you'll wear the financial consequences."

There is already precident for Sony (and many others) signing up to
a very similar scheme: DVD's CSS.  It was only the fact that the crypto was
so utterly broken that allowed recovery of all disc keys, and thus
the threat of key revocation was rendered moot.  That's the only reason
it didn't happen.

One also has to remember that the specific case of Sony is atypical,
in that it is both a hardware vendor and a content provider.  Perhaps
looking at an example like Philips, Panasonic or Toshiba would be more
instructive, as they've not got significant investment in content
provision that I am aware of.

--
Ian Farquhar
Senior Systems Engineer
Sun Microsystems Australia Pty Ltd
Level 5, 33 Berry St
North Sydney, NSW, 2060
Australia

Email: [EMAIL PROTECTED]
Phone: +61 2 9466 9465
Mobile: +61 409 601 028




Re: Copy protection proposed for digital displays

2000-02-23 Thread Rick Smith

At 05:43 PM 02/21/2000 -0800, Eugene Leitl wrote:

>HDCP uses a 56-bit key, with individual keys distributed to the
>various vendors. A violated key could be tracked down and revoked over
>a satellite broadcast network, for example.

This design does not consider potential end user reactions. Consider the
following:

1. I buy an expensive Sony display.

2. Some evil hacker reverse engineers the Sony key and publishes it.

3. The "satellite broadcast network" revokes Sony's key.

4. My expensive display stops working.

5. Sony spends millions on recalls, PR damage control, etc.

In other words, nobody is going to revoke keys since that would revoke
legitimate access by law-abiding couch potatoes and other customers. The
networks and studios make billions of dollars by making minimal demands of
billions of people in exchange for undemanding entertainment. This strategy
puts the burden on those end users who essentially finance the system
already. Sounds like a losing concept to me, but I'm not surprised someone
has proposed it.

Now, on the other hand, they could do smartcard sorts of things like the
satellite TV folks. That ups the ante, since you have to build in a
smartcard reader and do smartcard-based key management. I'll bet that none
of those costs are in their business model yet. 


Rick.
[EMAIL PROTECTED]




Re: Copy protection proposed for digital displays

2000-02-23 Thread David Honig

At 05:46 PM 2/23/00 +1100, Ian Farquhar wrote:
>Of course, there are also ways manufacturers could try to counter 
>this.  Constructing tamper-resistant cases for monitors is one
>way.  Indeed, I'll suggest to everyone here that tamper
>resistant enclosures (everything from "mousetraps" to FIPS-140
>style boxes) are going to become much more common in consumer
>electronics.

When the decryption unit is in the same package as
the video DACs, the game will be much much harder.
Its not been done yet, but it will.


>Ultimately, this will come down to being a tradeoff between
>investment and return.  Who's Intel targeting?  I'd suggest

Well, directly they're targeting folks like 
http://www.opencable.com/public_docs.html
who are the actual purchasers of chips in mass
quantities.

>they're targeting casual copiers and underfunded bootleg
>operators.  Against them, this may be viable.  Against even a
>moderately well funded piracy operation, forget it.

"They have logic analyzers in hong kong"








  







Re: Copy protection proposed for digital displays

2000-02-23 Thread John Kelsey

-BEGIN PGP SIGNED MESSAGE-

At 05:59 PM 2/22/00 +1100, Ian Farquhar wrote:

[much deleted, discussing a new Intel gadget for preventing
pirating of video streams]

>I am also forced to note that this won't stop physical
>duplication, eg. by photographing the screen.  Anyone
>familiar with real-world piracy will know that many (if not
>most) bootleg video tapes and Video-CD's of recently
>released movies are produced by video taping a screen.  This
>won't affect that, and the market for those piracies seems
>insensitive to the quality loss.

I am curious:  Are there better techniques for getting
high-quality images out, rather than just videotaping a
screen?  If I am given a sealed box with a CRT, is there
some technique I can do to get a better copy of what's being
sent to the screen?  It seems like it should be possible to
read small parts of the screen very closely, perhaps
detecting the power of the electron beam that's painting the
image on each position and color.  It's reaonable to do this
over only a small area of the screen at a time.  Imagine an
8'' x 10'' screen displaying a rented movie or other
``copy-proof'' video stream.  That's 80 square inches, so if
we could only scan in one square inch at a time, we'd just
have to play the movie 80 times.  We might take multiple
samples from each square inch and do some kind of averaging
to smooth out quantization errors, noise in the system, etc.

I think all copy-protection runs into a wall when it gets to
human-perceptible output, at least in dealing with
determined pirates.  Though the Intel scheme probably does a
good job of preventing cheap, casual copying of video
streams, which is presumably their purpose for doing the
design in the first place.

>   Ian.
>Disclaimer: personal opinion only.

(Me, too.)

- --John Kelsey, kelsey (at) counterpane (dot) com
PGP: 5D91 6F57 2646 83F9 6D7F 9C87 886D 88AF

-BEGIN PGP SIGNATURE-
Version: PGPfreeware 6.5.1 Int. for non-commercial use
<http://www.pgpinternational.com>
Comment: foo

iQCVAwUBOLMPukHx57Ag8goBAQFz4gP/f5N/y9BoKbho2biUz77IpfsIXrvxZF2e
xMeuZ9H5Hv79JTdgcHJUUqwNMfW2dreX5v2WWI7a8+F8hwauYNBliNCp08wjL/uO
YyqeNf3oopGvwTQVEj76MbiiddMooa5lPMvjs4BwQ6kfrW3cP/xT0RIfnA9tVYVm
54P09pr6Gko=
=c80/
-END PGP SIGNATURE-



Re: Copy protection proposed for digital displays

2000-02-23 Thread Ian Farquhar

> I am curious:  Are there better techniques for getting
> high-quality images out, rather than just videotaping a
> screen?  If I am given a sealed box with a CRT, is there
> some technique I can do to get a better copy of what's being
> sent to the screen?  It seems like it should be possible to
> read small parts of the screen very closely, perhaps
> detecting the power of the electron beam that's painting the
> image on each position and color.  It's reaonable to do this
> over only a small area of the screen at a time.  Imagine an
> 8'' x 10'' screen displaying a rented movie or other
> ``copy-proof'' video stream.  That's 80 square inches, so if
> we could only scan in one square inch at a time, we'd just
> have to play the movie 80 times.  We might take multiple
> samples from each square inch and do some kind of averaging
> to smooth out quantization errors, noise in the system, etc.

There are easier vectors of attack than that.

One idea which springs to mind would be to hook into the
row and column addressing on the LCD panel itself, or (more
likely) in the output stages of the LCD driver hardware.
If it's a normal CRT monitor then pulling the signals out
is even easier.

Everything I've seen on this proposal - which isn't that much
I will admit - tends to imply that the encryption is basically
done in the digital link between the source and screen.
It's hard to see how anything more than trivial encryption could
be done between the drivers and the actual display.
If you were able to pull that data, it is feasable that you
could reconstruct a recordable image.

Of course, there are also ways manufacturers could try to counter 
this.  Constructing tamper-resistant cases for monitors is one
way.  Indeed, I'll suggest to everyone here that tamper
resistant enclosures (everything from "mousetraps" to FIPS-140
style boxes) are going to become much more common in consumer
electronics.

One aside I will make is that tamper resistant enclosures
aren't only useful for this purpose.  As many people will
be aware, many manufacturers of consumer goods would dearly
like consumers to only have their equipment serviced
at "registered" centres.  In many, if not most legal
juristictions, such limitations on trade are illegal, so
companies are forced to use scare tactics to convince
consumers of the "dangers" of third party servicing.
Implementing tamper resistance to limit consumer choice would
be legally dubious, but if you implemented it because of
an IP protection requirement (as mandated in an industry
"standard"), then it would be much harder to prosecute.
The manufacturer could say "sorry, your honor, but to
implement standard ABCX20YX, I am forced by the licensing
standards body forced us to use a tamperproof enclosure.  The 
effect on the servicing arrangements are unfortunate, but it's out
of my control.  I am sorry, but the licensing organisation
is based in ,
you'll have to take the matter up with them (good luck, sucker!)".

Needless to say, I am not for a moment suggesting such
a conspiracy theory.  Not for a moment :)  Ahem.
Nor would I ever suggest a correlation between the
latest DeCSS fiasco and "puppet legal juristictions".
No, not at all.  Ahem

Ultimately, this will come down to being a tradeoff between
investment and return.  Who's Intel targeting?  I'd suggest
they're targeting casual copiers and underfunded bootleg
operators.  Against them, this may be viable.  Against even a
moderately well funded piracy operation, forget it.

I am reminded of an anecdote told to me by a friend in
the arcade game industry.  He said that their main enemies were
little backyard operations in Asia, who could clone an arcade
game (not a trivial piece of computing hardware) in weeks.
I asked him if implementing functions in ASICs would help, and
he told me that they'd recovered bootleg games where the copiers
had actually designed a daughterboard to implement the ASIC!
That is a significant engineering investment, I suggested.  He
agreed, but said that once they sell more than 500 units worldwide,
the bootleggers would start to produce copies.  Apparently
there was a significant amount of black market money, and
underutilised reverse engineering talent involved.

Nintendo's "CIC" chips would be another case in point.  Both
inband and out of band attacks were quickly found against
the original version of them.

> I think all copy-protection runs into a wall when it gets to
> human-perceptible output, at least in dealing with
> determined pirates.  Though the Intel scheme probably does a
> good job of preventing cheap, casual copying of video
> streams, which is presumably their purpose for doing the
> design in the first place.

No, not all.  The

Re: Copy protection proposed for digital displays

2000-02-22 Thread Ian Farquhar

This is going to be fascinating.  It has CSS written all over it.
I wonder if they'll learn the lesson of CSS and do decent crypto,
rather than resist the temptation to do yet another half-baked
LFSR?  If they release the cipher, I certainly look forward to
reviewing the design.

I am also forced to note that this won't stop physical duplication,
eg. by photographing the screen.  Anyone familiar with real-world
piracy will know that many (if not most) bootleg video tapes and
Video-CD's of recently released movies are produced by video taping
a screen.  This won't affect that, and the market for those
piracies seems insensitive to the quality loss.

Ian.

Disclaimer: personal opinion only.

> From: Eugene Leitl <[EMAIL PROTECTED]>
> MIME-Version: 1.0
> Content-Transfer-Encoding: 7bit
> Date: Mon, 21 Feb 2000 17:43:14 -0800 (PST)
> To: <[EMAIL PROTECTED]>
> Subject: Copy protection proposed for digital displays
> 
> 
> http://www.eetimes.com/story/OEG2217S0039
> 
> Copy protection proposed for digital displays
> 
> By David Lammers
> EE Times
> (02/17/00, 7:02 p.m. EST) 
> 
> PALM SPRINGS, Calif.-At the Intel Developer Forum here, Intel
> Corp. unveiled a copy protection scheme that will add a layer of
> encryption between the system and the digital display.
> 
> The High-bandwidth Digital Copy Protection (HDCP) approach encrypts
> each pixel as it moves from a personal computer or set-top box to
> digital displays, such as digital flat panels and high-definition
> televisions.
> 
> HDCP is an Intel-developed specification that will complement the work
> developed with the Digital Display Working Group (DDWG), said Mark
> Waring, an Intel technology initiatives manager who is the DDWG
> secretary.
> 
> While the Digital Transmission Content Protection approach provides
> encryption for digital content as it moves over a 1394 interface, the
> HDCP is complementary.
> 
> "HDCP encrypts the final link, from the device to the display, that
> has been the missing link" in the various copy protection schemes
> developed thus far, said Waring, who earlier worked as a display
> engineer at Sharp Corp.
> 
> Intel will release a draft version of the license agreement by Monday,
> Feb. 21, at the Digital Content Protection web site. Also, individuals
> can go to the site to request a copy of the specification.
> 
> At IDF's product demo pavilion, Silicon Image, Inc. (Sunnyvale,
> Calif.)  demonstrated what it said was the first implementation of
> HDCP on its digital video interface (DVI) silicon. Transmitter and
> receiver silicon performed the HDCP authentication, encryption, and
> decryption functions, while supporting the DVI digital transmission
> rate of 5 G-bits/sec between the host and display.
> 
> HDCP uses a 56-bit key, with individual keys distributed to the
> various vendors. A violated key could be tracked down and revoked over
> a satellite broadcast network, for example. Waring said he expects the
> major silicon vendors to have HDCP-compliant silicon ready by the
> July-August time frame.
> 

--
Ian Farquhar
Senior Systems Engineer
Sun Microsystems Australia Pty Ltd
Level 5, 33 Berry St
North Sydney, NSW, 2060
Australia

Email: [EMAIL PROTECTED]
Phone: +61 2 9466 9465
Mobile: +61 409 601 028




Copy protection proposed for digital displays

2000-02-21 Thread Eugene Leitl


http://www.eetimes.com/story/OEG2217S0039

Copy protection proposed for digital displays

By David Lammers
EE Times
(02/17/00, 7:02 p.m. EST) 

PALM SPRINGS, Calif.-At the Intel Developer Forum here, Intel
Corp. unveiled a copy protection scheme that will add a layer of
encryption between the system and the digital display.

The High-bandwidth Digital Copy Protection (HDCP) approach encrypts
each pixel as it moves from a personal computer or set-top box to
digital displays, such as digital flat panels and high-definition
televisions.

HDCP is an Intel-developed specification that will complement the work
developed with the Digital Display Working Group (DDWG), said Mark
Waring, an Intel technology initiatives manager who is the DDWG
secretary.

While the Digital Transmission Content Protection approach provides
encryption for digital content as it moves over a 1394 interface, the
HDCP is complementary.

"HDCP encrypts the final link, from the device to the display, that
has been the missing link" in the various copy protection schemes
developed thus far, said Waring, who earlier worked as a display
engineer at Sharp Corp.

Intel will release a draft version of the license agreement by Monday,
Feb. 21, at the Digital Content Protection web site. Also, individuals
can go to the site to request a copy of the specification.

At IDF's product demo pavilion, Silicon Image, Inc. (Sunnyvale,
Calif.)  demonstrated what it said was the first implementation of
HDCP on its digital video interface (DVI) silicon. Transmitter and
receiver silicon performed the HDCP authentication, encryption, and
decryption functions, while supporting the DVI digital transmission
rate of 5 G-bits/sec between the host and display.

HDCP uses a 56-bit key, with individual keys distributed to the
various vendors. A violated key could be tracked down and revoked over
a satellite broadcast network, for example. Waring said he expects the
major silicon vendors to have HDCP-compliant silicon ready by the
July-August time frame.