Wookie groomer torrent
Very few actual Germans are going to write Mueslix if they can't use an Umlaut, because it looks dumb. If anything this strongly suggests he is a European, and shows how ignorant that poster on hdnowonlinefanboys.
Yet he releases a so-called "tool" like this, and publicises it in a big way, knowing full well the damage that it could cause the format. It's equally possible that he happens to have an HD-DVD drive because it's the cheapest way of getting a next generation HD-Drive for your computer right now. I'm not going to bother tearing down the other points on that HDnow site, suffice it to say that whole article is a farce.
Please stop posting links to it, first of all it makes you look dumb, secondly it distracts from the issue at hand CSS was broken by a 16 year old Norwegian kid. When the operating system or any other process tries to access this memory the data there magically dissapears, and then re-appears when WinDVD needs it.
Pretty cool, eh? The data is moved around by a bunch of DRM gremlins, who live inside of your computer. Magic Memory? Sounds pretty lame, not cool. These posts simply perpetuate the discussion which is way off topic, which I have warned about many times before.
It is clear my warnings have not been heeded. Doom9 is not a chatline. Strikes issued. Off post remarks will be struck in future. You know the ones when you attempt to delete them or go into the folder where you virus scan say they are they move to a different folder.. If this is true then its going to be a very hard climb up the mountain. Although I'm curious if anyone has been playing a movie and did a memory dump at the same time while still playing the movie? Does it keep playing? And how to does the program know where the transfer went?
It would have to keep track of it somehow.. Cyberlink's argument that it "could not possibly" come from WinDVD is a red herring, because Muslix never stated he got the values from memory. Yeah thats the kinda stuff blutach is talking about.. Well running through all the src I don't see where anything is set to that but it might be in a some part of the decryption that inside of the java stuff Finally i can post, I'm not really into file hashes e.
Same thing is done with MD5 hashed passwords on websites This is the Title key Database file. It holds the decryption keys for the movies. Since title keys are now allowed, here is one that is supposed to be for "The Hulk" HD-DVD: EC5FD It isn't necessarily for the feature, it could be for some of the other things like the menu etc. Please remind Cyberlink to stop impersonating InterVideo the makers of WinDVD , and also remind them that they are the makers of PowerDVD instead :D He also stated that he found a key in memory: "I was very surprise to realize that the title key is there, in memory!
Read the AACS spec first. Doesn't look like a title key to me :sly:. Yes, you're right it is a directory key. I haven't read the spec but I just thought I'd help. The biggest bottleneck in the player vulnerability discovery process is that we are searching for two unknowns. The first is the title key, and the second is the location in memory, registers, files, etc. The logical option would be to eliminate as many unknowns as possible.
The authoring software will make the required fileset, but may not provide ISO creation functionality. Most importantly, we now know the title key - in both its encrypted and unencrypted forms, since we authored the files.
At this point, the player software can be tested on the files, either by direct playback PowerDVD or by emulation. With either the Microsoft or Sonic emulator installed, the ISO file can be mounted and read by software players which cannot play raw filesets. It now becomes a trivial task to search memory and other places for the keys. It also becomes easy to find if and where in the player code vulnerabilities exist; since we know what the original keys are, we can simply search for them.
I'm doing that right now.. I'll report my results if any.. Yes, good idea, I'll try it too. Please remind Cyberlink to stop impersonating InterVideo the makers of WinDVD , and also remind them that they are the makers of PowerDVD instead :D Which version of vulnerable player software these companies produce doesn't really matter to me.
He also stated that he found a key in memory: "I was very surprise to realize that the title key is there, in memory! If I recall correctly. Secondly I take Cyberlink's statement with a very large grain of salt, obviously their software plays HD-DVDs, so the Title key must be stored somewhere in unecrypted form, at least for a short while.
If it's stored somewhere, then it can be read from this location. Perhaps Cyberlink discovered some new programming method, which allowes them to access data which does not exist, but this would be the first I've heard of it. However that still means the key does exist in memory - contradictory to Cyberlinks statement which seems to suggest they have discovered a form of CS black magic.
Because at some point the key would need to be reconstituted so it can be used for decryption. Afterall, you can divide something up, but you still have to remember what all the parts together are at some point. Even better, using the method in my previous post, multiple copies of the exact same content can be authored, with the only difference being the title key. Then each can be played in turn, and dumps of the suspected key storage areas made memory, registers, files, etc. Comparing the dumps, the differences between them will point to the location s where key information is stored.
This process will significantly increase the ease, speed and reliability of software player vulnerability testing, while decreasing its costs and implementation complexity.
Furthermore, by running a player capable of non-emulated direct file playback within a debugger environment, the process may be automated.
First, a set of small test filesets authored from the same content is created, with the only difference being title key. Next, these sets are segregated each in its own folder at a known location on hard drive. Next, the player application, provided it is capable of commandline specification of source fileset for playback, is fed the parameters on its virtual commandline within the debugger environment. After a preset time period determined by the tested initialization time, the debugger does a total or partial memory or register dump to a file, and terminates the running debug environment.
Next, the debugger either exits as specified or is terminated by scheduled task, using third party software if necessary.
The next scheduled task restarts the debugger with different commandline parameters, which are passed into the player's commandline within the new debug environment. When the sequence has run to completion, a binary compare utility can be launched interactively or via commandline or scheduled task with parameters specifying the debugger's memory dump files. The binary compare utility will produce a difference file or files which highlight differences between the test runs, which can be examined by the user to rapidly narrow and finally discover key locations.
Finally, even if the authoring software does not provide the end user with either or both the encrypted or unencrypted title key, and even if the player software encrypts or scrambles the title key in memory, this method will at least pinpoint the location s used by the player software to store the key data.
Knowing the location s used and also knowing the player's scrambling algorithm if any , it will be possible to, for a given player, write a software which runs concurrently and, provided the operating system does not enforce protected memory space, snoop the values for any real disc which the software player plays.
Finally, the scrambling can be undone to provide the plaintext title key, which can be provided to secondary decryption software, such as BackupHDDVD.
This is the best way to do it which I can see. I can't work out how to use Scenarist and I don't know what settings to use with x to get a compliant video.
That's possible. The title keys also change between titles of the same disc. I proposed the same idea earlier in this thread and it could still be useful, if combined with other techniques, but a lot of other stuff besides the keys changes too. I suggest that sensitive or perhaps even speculatiive brainstorming, that might be considered off-topic here, be conducted offline in an anonymous forum.
It is simply a public site where users may speak freely with a high degree of anonymity. It is available to anyone who installs I2P software. New I2P users: Let's keep it that way! Like good encryption, good decryption will not die by being exposed for all the world to see. In this case, the hardware standard is already set in stone, with thousands of players and lots of discs already sold, so that's not going to change.
As far as player software, that will always change, but it will be reverse-engineered too, using the same or better methods. Fundamentally, there is no way to keep the system closed as long as PC playback is a possibility. The possibilities mentioned in my last two posts have no doubt already been thought of or are soon to be seen by player developers.
The ideas are general, and apply to a wide range of possible cases; more like a sample guide for security auditing. Perhaps most importantly, there is nothing player developers can do but issue an ever-growing stream of updates and new versions with ever more convoluted protection schemes, that will all be reverse engineered.
The only real threat to this kind of attack is a protective operating system, like Vista. But like russian dolls, cracks will be found and made at all layers, so even that will not stand long. As for personal risk, I won't post anything here that is illegal in my country, or against forum rules, so I have nothing to fear. I hope this is the case for all posters, because all that needs to be accomplished can be done right here without any problems from either local policies or enforcement agencies, if users think carefully before posting.
Well--in the U. Other coutries have vairous "exported" versions if it. As far as I can tell, this has not been resolved through either legislative or judicial process.
Not everyone wants to risk becoming case law. I can't test it because it's obviously UDF2. I can't find UDF 2. It's only 4.
Not sure what the other one is for. It's the first time I've used Scenarist so it probably is wrong By the way id anyone's interested I just made a blank x video with AVISynth and encoded it with Mainconcept h Daemon 4. Played with windvd 8. Edit: extracting files with isobuster 2, plays same way. No aacs proteccion in that iso. Remains in memory?? Returning to the topic at hand - which in this case is the BackupHDDVD application - I'd like to extend my congratulations to Muslix64, who not only chose a username corresponding with my favorite cereal, but also made good effort to build an application which may help the cause of fair use.
Just by building an application which may or may not decrypt HD-DVDs, and dropping hints and clues in his posts and release notes, his ideas are now making lots of people think about how to make applications which can do the same or better. Perhaps the YouTube video itself was the best inspiration; even if it was an utter fraud it provided and still provides a glimmer of the light at the end of the tunnel for fair use in the twenty-first century. The hardest step to take is always the first one, but as soon as someone does, many more are both informed and inspired to follow.
Of course, often that first step is over a cliff or into a deep quicksand, but that doesn't really matter. What matters is that such an event changes many people's thought patterns from "we are victims" to "we can change this".
The holdup is almost always a lack of will and faith in capability, not in intelligence per se. Borbus: excellent work! I've downloaded the file but don't yet have the player to test with. Also it is late at night right now; I will write more tomorrow. I'd hoped that Scenarist might come with the driver, since it should also include the emulator.
Borbus: can you confirm if anywhere in the package, is located the emulator? I will install a UDF 2. But I set it up to use encryption, and the AACS files are there which aren't if you don't turn on encryption edit: at least I think they are, they're in the output directory, are they in the ISO?
Any idea what I might have done wrong? I found that link. It's good reading, old though. It doesn't seem to have worked at all. I don't know what's wrong Borbus: Excellent work! I had only hoped that this step would be fairly feasible; you've proven this supposition correct. However, it would be good if you can generate one more sample ISO, this time with two items different: 1.
It should have a few frames of visible content, so we can see that the player is actually working. You must select none, or disabled, rather than the current constrained. The reason why Susana had no problem playing the file is because the title key was generated from a portion of the available keyspace assigned to Scenarist's application license.
The disc key was undoubtedly also added but not displayed; it is only required when the player supports and requires disc authentication, which daemon tools and isobuster do not, of course. Because of that, any player with a licensed unrevoked decryption key will be able to play the files in his ISO. Now, getting those files off a real HD-DVD disc requires the player to authenticate the disc, or vice-versa.
That step should be automatic, ie. AACS is not written when burning discs. Unless there is some software that can burn or mount PlantDirect images Yes, everything below goes grey. Ok, here's the PlantDirect image. Same as before, windvd plays mounted. Posters have been warned enough. Keep to the topic please! Strike issued. Regards Well--in the U. It's the reason you can backup your DVD.
Should you wish to discuss this further, a separate thread would be more appropriate. The video file in movie stream is a H encoded by MainConcept 2. Damn it was a nice idea. Back to square one. Quote from sonopress. The AACS Licensing Authority provides the replicator with keys and a Content Certificate that allows the blocking of content to be copied from the playback device or even put settings to the output of a player that allows the downscaling of HD signals at the analogue output in order to prevent copying of the analogue signal.
If the "the information in AACS folder is good". IE, you have encrypted title key and other info in there Are you saying that you have everything but the encrypted video? Why not just encrypt it with your title key? There may be other requirements though Alright, for those who are interested.
Nothing is loaded into memory when PowerDVD is running. It is only when you press the play button. AACS D A simple patch would allow the code to remain in memory if you know what you are looking for. This should get you started And remember to stop the HeapFree command when you are tracing to stop it from hiding it's tracks.
AACS wonder what this file has and then D You add them together you get the key? The code does exist in memory. Regardless if it's in the drive or the computer it must reside in the memory before it gets to the processor. Nothing magical about that. Just joined and pretty much tells how to get the keys but without telling all of it. Sounds like Muslix, and using a second screen name will lessen the chance of getting traced and sued.
I think Muslix is from Germany, where the cereal is from and a land where Commodore 64 was a hackers first toy. Good morning all! I see there's been much activity since yesterday There is no need to bring the keyed but unencrypted files to a licensed HD-DVD replicator to get them encrypted They established the standard, so it should surprise nobody that they also make a product called Blazer: Blazer is an application designed to encrypt a DDP V3.
The cost is probably high, I didn't ask, but will do so later today and report my findings. It runs on any hardware ie. I don't think it matters who Bystander is. He seems like a knowledgable person and it looks as if he would be an asset to this community. You shouldn't question the identities of people. If they want you to know who they are then they would tell you. Yes it is speculation and you should use your own judgement and delete it yourself if you think it is out of line.
Please, it shouldn't matter who one or the other is. What they post is important. There were actually other files with the PlantDirect image, they might be important if anyone manages to get hold of Blazer or an equivalent. Note how small it all is when RARed, I suppose it's the blank revocation files. DAT is the same as before. I was going to make a short video with more than just a blank screen and maybe audio too, but, this sounds really stupid, I couldn't think of a way to encode just a few seconds of video with MainConcept Any idea how to make a short animated clip with AVISynth?
Here are all AES function calls: ; It was CBC mode, most likely content decryption, Title key?? ECB stuff ; This one looks interesting! Chapter 3. CBC decrypt with xoring Simple solution: use Colorbars width,height and ShowFrameNumber. Colorbars makes 1hr of video by default. How can I change that to something shorter? Why won't some posters read what we type and read the rules? Ok, here's another image with Colorbars and a Framecount instead of nothing. Analogue output is now allowed instead of constrained.
Now there's probably not much else to play around with until someone can get hold of Blazer of figure out how to encrypt the video. Since I don't have an HDDVD player it makes it impossible for me to change any of the source that muslix provides and guarantee it works, and as such I will simply make a wrapping gui for the backup classes.
If he continues to put up future releases it should be easy to plug in the new version into the gui. I'll be posting it soon for those who want an interface rather than command line.
Borbus: Thank you! I haven't yet receive a reply from Eclipse. The Title Key must be available in the clear during the entire playback process, as it is needed to decrypt each chunk of data as it is read.
Keeping the Title Key scrambled using the player software's algorithm or encrypted from disc would place a heavy burden on the CPU during playback, as it would have to be repeatedly decrypted to be used for chunk decryption, throughout playback.
Considering that most machines are only just able to decode p content alone, it seems unlikely that software authors would cripple their product's performance using such a method. I believe they have, in fact, done so and the title keys may not remain in the clear for long. The player behavior I've seen is consistent with the code snippets Bystander posted. The player accesses the encrypted title keys in memory every few hundred milliseconds or so.
I've also seen it clear heap memory. You go through all the trouble of uploading something in the first place and all you get are request for this version or that version There's a shit pot full of tutorials on the internet to convert any format to another! Originally posted by: muffin If I'm going to re-encode something, it's going to be from the highest quality source I can get, not something that already had it's quality trashed.
Originally posted by: Karyudo Originally posted by: muffin If I'm going to re-encode something, it's going to be from the highest quality source I can get, not something that already had it's quality trashed. Originally posted by: ripa I think Muffin's point was that the h version should be encoded from the master whatever format Wookie Groomer has it in instead.
Why would anyone go through the hassle of doing another bluray set???? I just did that all that work!! Sith has been finished for a while but is on hold for a few more days till I can confirm a few things with it. Yes, I need the original un-altered original Sky broadcasting versions to use the english parts from. I lost mine in a tragic mishap of being stupid and not thinking ahead.
I am shooting for BD25's of Sith and Clones so a small handful of you should be happy about that. I have too many things planned for Phantom Menace to not use BD That one will be a bitch to finish so it's coming last. The first one to repost these for me gets mentioned on the credits page of the bluray disks they are on to be immortalized forever! The DTS track is toast. I would have to start from scratch and strip all the audio assets from several different sources and remix it again just to make up for those few minutes missing from that shit failed BD burn and then in turn could result in a different sync issues or some other new problem.
I don't have the original project files anymore so working the project wil be difficult and tedious. My work here is finished. What's out there is the last of the pojects I'll be sharing but I'm confident the final 3 are fine. For what small flaws they may have they are still far and away the best of what's currently available and unlike anything that's available.
Clone Wars Droids Ewoks. Administrators' noticeboard IRC Discord. Tutorials Editing sandbox Things to do Status article nominations Featured article nominations Good article nominations Comprehensive article nominations. Explore Wikis Community Central. Register Don't have an account? Edit source History Talk 0. Do you like this video? Play Sound. It's not wise to upset a Wookiee. Wookiees are known to do that. I suggest a new strategy, Artoo.
Let the Wookiee win. Covered in fur. Good relations with the Wookiees, I have. Rare you are to the Jedi. Proud, your people must be. The Mighty Chewbacca in the Forest of Fear! Disney Infinity 3.
0コメント