Knowledge

DeCSS

Source 📝

103:, whose home was raided in 2000 by Norwegian police. Still a teenager at the time, he was put on trial in a Norwegian court for violating Norwegian Criminal Code section 145, and faced a possible jail sentence of two years and large fines, but was acquitted of all charges in early 2003. On 5 March 2003, a Norwegian appeals court ruled that Johansen would have to be retried. The court said that arguments filed by the prosecutor and additional evidence merited another trial. On 22 December 2003, the appeals court agreed with the acquittal, and on 5 January 2004, Norway's 22: 198:
without special knowledge in programming. The program was published on the Internet for the first time 6 October 1999, after Jon Lech Johansen had tested it on the movie "The Matrix." In this, he downloaded approximately 2.5%. 200 megabytes, of the movie to the hard drive on his computer. This file is the only film fragment Jon Lech Johansen has saved on his computer.
194:
date read through the DeCSS source code and compared it with his own. Further, it appears that "the creators have taken almost verbatim - the only alteration was the removal of copyright header and a paragraph containing commentaries, and a change of the function names." The name was CSS_auth.cpp.
193:
Regarding the authentication code, the High Court takes for its basis that "the nomad" obtained this code through the electronic mailing list LiVid (Linux Video) on the Internet, and that it was created by Derek Fawcus. It appears through a LiVid posting dated 6 October 1999 that Derek Fawcus on this
187:
of a Xing DVD-player, where the keys were more or less openly accessible. Through this, information that made it possible to create the code CSS_scramble.cpp was retrieved. From chat logs dated 4 November 1999 and 25 November 1999, it appears that "the nomad" carried through the reverse engineering
182:
Through Internet Relay Chat (henceforth IRC), made contact with like-minded . 11 September 1999, he had a conversation with "mdx" about how the encryption algorithm in CSS could be found, by using a poorly secured software-based DVD-player. In a conversation 22 September, "mdx" informs that "the
197:
The High Court takes for its basis that the program Jon Lech Johansen later programmed, the graphical user interface, consisted of "the nomad's" decryption algorithm and Derek Fawcus' authentication package. The creation of a graphical user interface made the program accessible, also for users
228:
movie players. The licensing restrictions on CSS make it impossible to create an open source implementation through official channels, and closed source drivers are unavailable for some operating systems, so some users need DeCSS to watch even legally obtained movies.
257:
pages. In one case, a school removed a student's webpage that included a copy of this program, mistaking it for the original DeCSS program, and received a great deal of negative media attention. The CSS stripping program had been specifically created to bait the
144:
The CSS decryption source code used in DeCSS was mailed to Derek Fawcus before DeCSS was released. When the DeCSS source code was leaked, Fawcus noticed that DeCSS included his css-auth code in violation of the
224:
Programmers around the world created hundreds of programs equivalent to DeCSS, some merely to demonstrate the trivial ease with which the system could be bypassed, and others to add DVD support to
141:
DVD player to obtain a player key. The group that wrote DeCSS, including Johansen, came to call themselves Masters of Reverse Engineering and may have obtained information from Drink or Die.
221:, and does not use all keys; a high-end home computer in 1999 running optimized code could brute-force it within 24 hours, and modern computers can brute-force it in a few seconds or less. 249:
followed soon after, in January 2000. As a response to these threats a program also called DeCSS but with an unrelated function was developed. This program can be used to strip
183:
nomad" had found the code for CSS decryption, and that "mdx" now would send this to Jon Lech Johansen. "The nomad" allegedly found this decryption algorithm through so-called
719: 188:
process on a Xing player, which he characterized as illegal. As the case is presented for the High Court, this was not known by Jon Lech Johansen before 4 November .
125:
was leaked before the end of the month. The first release of DeCSS was preceded by a few weeks by a program called DoD DVD Speed Ripper from a group called
401: 149:. When Johansen was made aware of this, he contacted Fawcus to solve the issue and was granted a license to use the code in DeCSS under non-GPL terms. 79:
of one of the authors of DeCSS. The DVD CCA launched numerous lawsuits in the United States in an effort to stop the distribution of the software.
724: 245: 213:
When the release of the DeCSS source code made the CSS algorithm available for public scrutiny, it was soon found to be susceptible to a
544: 419: 667: 237:
The first legal threats against sites hosting DeCSS, and the beginning of the DeCSS mirroring campaign, began in early November 1999 (
491: 265:
In protest against legislation that prohibits publication of copy protection circumvention code in countries that implement the
349: 259: 461: 628: 571: 375: 655: 650: 75:(CSS) used by commercial DVD publishers. The release of DeCSS resulted in a Norwegian criminal trial and subsequent 274: 709: 316: 405: 424: 53: 647:- Information about DVD, CSS, DeCSS, LiVid, the DVD CCA and MPAA and the various lawsuits surrounding DeCSS. 129:, which didn't include source code and which apparently did not work with all DVDs. Drink or Die reportedly 644: 306: 153: 64: 682: 517: 169: 146: 110:
The program was first released on 6 October 1999 when Johansen posted an announcement of DeCSS 1.1b, a
277:), some have devised clever ways of distributing descriptions of the DeCSS algorithm, such as through 714: 165: 72: 672: 704: 250: 239: 429: 540: 266: 111: 49: 8: 620: 225: 184: 593: 214: 483: 178:, contain the following description of the process which led to the release of DeCSS: 345: 218: 114: 100: 37: 25:
A fragment of the DeCSS code, which can be used by a computer to circumvent a DVD's
402:"Derek Fawcus ending livid-dev flamewar by confirming Johansen's side of the story" 632: 625: 138: 68: 26: 281:, through various Internet protocols, on T-shirts and in dramatic readings, as 87:
DeCSS was devised by three people, two of whom remain anonymous. It was on the
451: 698: 321: 294: 278: 270: 45: 596: 567: 379: 456: 174: 164:
The DeCSS program was a collaborative project, in which Johansen wrote the
130: 290: 134: 122: 651:
EFF archive of information on the Bunner and Pavlovich DVD-CAA lawsuits
326: 126: 104: 208: 76: 88: 369: 367: 673:
The Openlaw DVD/DeCSS Forum Frequently Asked Questions (FAQ) List
118: 688: 513: 364: 96: 107:(Economic Crime Unit) decided not to pursue the case further. 311: 286: 92: 57: 373: 282: 254: 41: 40:
capable of decrypting content on a commercially produced
677: 63:
DeCSS's development was done without a license from the
21: 685:- A technical overview of the CSS decryption algorithm. 16:
Free open-source program to decode DVDs with encryption
95:
in October 1999. The one known author of the trio is
668:
Aftenposten: Prosecutors let DVD-Jon's victory stand
217:quite different from DeCSS. The encryption is only 159: 720:Digital rights management circumvention software 696: 484:"Content Scrambling System (CSS): Introduction" 420:"EFF: DVD Descrambling Code Not a Trade Secret" 202: 514:"Pigdog Journal - DeCSS Distribution Center" 246:DVD Copy Control Association, Inc. v. Bunner 67:(CCA), the organization responsible for DVD 624:, 2001, pp. 187–190, freely available 346:"Norwegian Criminal Code section 135-147" 44:video disc. Before the release of DeCSS, 20: 172:, published in the Norwegian newspaper 156:dropped the case against Jon Johansen. 60:) could not play encrypted video DVDs. 697: 541:"How to decrypt a DVD - in Haiku form" 82: 592: 506: 464:from the original on 12 December 2008 352:from the original on 10 February 2015 121:, on the livid-dev mailing list. The 725:Compact Disc and DVD copy protection 13: 613: 565: 538: 520:from the original on 7 August 2018 454:[The entire DVD verdict]. 376:"The Truth about DVD CSS cracking" 14: 736: 638: 574:from the original on 28 June 2018 547:from the original on 20 June 2005 428:. 22 January 2004. Archived from 243:). The preliminary injunction in 232: 568:"The history of the DeCSS Haiku" 494:from the original on 1 July 2024 275:Digital Millennium Copyright Act 586: 317:AACS encryption key controversy 160:Jon Lech Johansen's involvement 559: 532: 476: 444: 425:Electronic Frontier Foundation 412: 394: 338: 1: 597:"Gallery of CSS Descramblers" 374:MoRE and (4 November 1999). 332: 307:DVD Copy Control Association 203:Technology and derived works 65:DVD Copy Control Association 7: 678:42 ways to distribute DeCSS 300: 293:), and even as a so-called 168:. The transcripts from the 52:operating systems (such as 10: 741: 206: 170:Borgarting Court of Appeal 117:-only application for DVD 659:News: DVD Industry Takes 36:is one of the first free 166:graphical user interface 152:On 22 January 2004, the 691:, The DeCSS source code 73:Content Scramble System 710:Cryptanalytic software 631:22 August 2010 at the 251:Cascading Style Sheets 240:Universal v. Reimerdes 200: 30: 267:WIPO Copyright Treaty 180: 24: 460:. 22 December 2003. 295:illegal prime number 621:The Future of Ideas 594:Touretzky, David S. 408:on 2 December 2000. 185:reverse engineering 83:Origins and history 432:on 14 October 2007 215:brute-force attack 31: 618:Lawrence Lessig, 452:"Hele DVD-dommen" 382:on 29 August 2013 101:Jon Lech Johansen 38:computer programs 732: 715:Cryptography law 608: 607: 605: 603: 590: 584: 583: 581: 579: 563: 557: 556: 554: 552: 536: 530: 529: 527: 525: 510: 504: 503: 501: 499: 480: 474: 473: 471: 469: 448: 442: 441: 439: 437: 416: 410: 409: 404:. Archived from 398: 392: 391: 389: 387: 378:. Archived from 371: 362: 361: 359: 357: 342: 262:in this manner. 740: 739: 735: 734: 733: 731: 730: 729: 695: 694: 683:DeCSS Explained 641: 633:Wayback Machine 616: 614:Further reading 611: 601: 599: 591: 587: 577: 575: 564: 560: 550: 548: 537: 533: 523: 521: 512: 511: 507: 497: 495: 482: 481: 477: 467: 465: 450: 449: 445: 435: 433: 418: 417: 413: 400: 399: 395: 385: 383: 372: 365: 355: 353: 344: 343: 339: 335: 303: 235: 211: 205: 190: 189: 162: 85: 69:copy protection 27:copy protection 17: 12: 11: 5: 738: 728: 727: 722: 717: 712: 707: 693: 692: 686: 680: 675: 670: 665: 653: 648: 640: 639:External links 637: 615: 612: 610: 609: 585: 566:Schoen, Seth. 558: 539:Schoen, Seth. 531: 505: 488:www.cs.cmu.edu 475: 443: 411: 393: 363: 336: 334: 331: 330: 329: 324: 319: 314: 309: 302: 299: 234: 233:Legal response 231: 204: 201: 161: 158: 84: 81: 15: 9: 6: 4: 3: 2: 737: 726: 723: 721: 718: 716: 713: 711: 708: 706: 705:1999 software 703: 702: 700: 690: 687: 684: 681: 679: 676: 674: 671: 669: 666: 664: 662: 658: 654: 652: 649: 646: 645:DeCSS Central 643: 642: 636: 634: 630: 627: 623: 622: 598: 595: 589: 573: 569: 562: 546: 542: 535: 519: 515: 509: 493: 489: 485: 479: 463: 459: 458: 453: 447: 431: 427: 426: 421: 415: 407: 403: 397: 381: 377: 370: 368: 351: 347: 341: 337: 328: 325: 323: 322:Illegal prime 320: 318: 315: 313: 310: 308: 305: 304: 298: 296: 292: 288: 284: 280: 279:steganography 276: 272: 271:United States 269:(such as the 268: 263: 261: 256: 252: 248: 247: 242: 241: 230: 227: 222: 220: 216: 210: 199: 195: 191: 186: 179: 177: 176: 171: 167: 157: 155: 150: 148: 142: 140: 136: 132: 128: 124: 120: 116: 113: 112:closed source 108: 106: 102: 98: 94: 91:mailing list 90: 80: 78: 74: 71:—namely, the 70: 66: 61: 59: 55: 51: 47: 43: 39: 35: 28: 23: 19: 660: 656: 619: 617: 600:. Retrieved 588: 576:. Retrieved 561: 549:. Retrieved 534: 522:. Retrieved 508: 496:. Retrieved 487: 478: 466:. Retrieved 457:Verdens Gang 455: 446: 434:. Retrieved 430:the original 423: 414: 406:the original 396: 384:. Retrieved 380:the original 354:. Retrieved 340: 285:files, as a 264: 244: 238: 236: 223: 212: 196: 192: 181: 175:Verdens Gang 173: 163: 151: 143: 131:disassembled 109: 86: 62: 33: 32: 18: 602:25 February 578:25 February 468:25 February 291:DeCSS haiku 226:open source 135:object code 123:source code 99:programmer 50:open source 699:Categories 551:5 December 436:5 December 333:References 327:youtube-dl 253:tags from 207:See also: 127:DrinkOrDie 498:29 August 386:4 January 209:libdvdcss 97:Norwegian 77:acquittal 663:to Court 629:Archived 572:Archived 545:Archived 518:Archived 492:Archived 462:Archived 350:Archived 301:See also 89:Internet 689:DeCSS.c 356:31 July 154:DVD CCA 147:GNU GPL 137:of the 119:ripping 115:Windows 105:Økokrim 524:28 May 289:poem ( 219:40-bit 312:qrpff 287:haiku 93:LiViD 58:Linux 34:DeCSS 661:2600 657:2600 626:here 604:2012 580:2012 553:2005 526:2007 500:2019 470:2012 438:2005 388:2007 358:2008 283:MIDI 260:MPAA 255:HTML 139:Xing 133:the 56:and 48:and 46:free 54:BSD 42:DVD 701:: 635:. 570:. 543:. 516:. 490:. 486:. 422:. 366:^ 348:. 297:. 273:' 606:. 582:. 555:. 528:. 502:. 472:. 440:. 390:. 360:. 29:.

Index


copy protection
computer programs
DVD
free
open source
BSD
Linux
DVD Copy Control Association
copy protection
Content Scramble System
acquittal
Internet
LiViD
Norwegian
Jon Lech Johansen
Økokrim
closed source
Windows
ripping
source code
DrinkOrDie
disassembled
object code
Xing
GNU GPL
DVD CCA
graphical user interface
Borgarting Court of Appeal
Verdens Gang

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.