103:, whose home was raided in 2000 by Norwegian police. Still a teenager at the time, he was put on trial in a Norwegian court for violating Norwegian Criminal Code section 145, and faced a possible jail sentence of two years and large fines, but was acquitted of all charges in early 2003. On 5 March 2003, a Norwegian appeals court ruled that Johansen would have to be retried. The court said that arguments filed by the prosecutor and additional evidence merited another trial. On 22 December 2003, the appeals court agreed with the acquittal, and on 5 January 2004, Norway's
22:
198:
without special knowledge in programming. The program was published on the
Internet for the first time 6 October 1999, after Jon Lech Johansen had tested it on the movie "The Matrix." In this, he downloaded approximately 2.5%. 200 megabytes, of the movie to the hard drive on his computer. This file is the only film fragment Jon Lech Johansen has saved on his computer.
194:
date read through the DeCSS source code and compared it with his own. Further, it appears that "the creators have taken almost verbatim - the only alteration was the removal of copyright header and a paragraph containing commentaries, and a change of the function names." The name was CSS_auth.cpp.
193:
Regarding the authentication code, the High Court takes for its basis that "the nomad" obtained this code through the electronic mailing list LiVid (Linux Video) on the
Internet, and that it was created by Derek Fawcus. It appears through a LiVid posting dated 6 October 1999 that Derek Fawcus on this
187:
of a Xing DVD-player, where the keys were more or less openly accessible. Through this, information that made it possible to create the code CSS_scramble.cpp was retrieved. From chat logs dated 4 November 1999 and 25 November 1999, it appears that "the nomad" carried through the reverse engineering
182:
Through
Internet Relay Chat (henceforth IRC), made contact with like-minded . 11 September 1999, he had a conversation with "mdx" about how the encryption algorithm in CSS could be found, by using a poorly secured software-based DVD-player. In a conversation 22 September, "mdx" informs that "the
197:
The High Court takes for its basis that the program Jon Lech
Johansen later programmed, the graphical user interface, consisted of "the nomad's" decryption algorithm and Derek Fawcus' authentication package. The creation of a graphical user interface made the program accessible, also for users
228:
movie players. The licensing restrictions on CSS make it impossible to create an open source implementation through official channels, and closed source drivers are unavailable for some operating systems, so some users need DeCSS to watch even legally obtained movies.
257:
pages. In one case, a school removed a student's webpage that included a copy of this program, mistaking it for the original DeCSS program, and received a great deal of negative media attention. The CSS stripping program had been specifically created to bait the
144:
The CSS decryption source code used in DeCSS was mailed to Derek Fawcus before DeCSS was released. When the DeCSS source code was leaked, Fawcus noticed that DeCSS included his css-auth code in violation of the
224:
Programmers around the world created hundreds of programs equivalent to DeCSS, some merely to demonstrate the trivial ease with which the system could be bypassed, and others to add DVD support to
141:
DVD player to obtain a player key. The group that wrote DeCSS, including
Johansen, came to call themselves Masters of Reverse Engineering and may have obtained information from Drink or Die.
221:, and does not use all keys; a high-end home computer in 1999 running optimized code could brute-force it within 24 hours, and modern computers can brute-force it in a few seconds or less.
249:
followed soon after, in
January 2000. As a response to these threats a program also called DeCSS but with an unrelated function was developed. This program can be used to strip
183:
nomad" had found the code for CSS decryption, and that "mdx" now would send this to Jon Lech
Johansen. "The nomad" allegedly found this decryption algorithm through so-called
719:
188:
process on a Xing player, which he characterized as illegal. As the case is presented for the High Court, this was not known by Jon Lech
Johansen before 4 November .
125:
was leaked before the end of the month. The first release of DeCSS was preceded by a few weeks by a program called DoD DVD Speed Ripper from a group called
401:
149:. When Johansen was made aware of this, he contacted Fawcus to solve the issue and was granted a license to use the code in DeCSS under non-GPL terms.
79:
of one of the authors of DeCSS. The DVD CCA launched numerous lawsuits in the United States in an effort to stop the distribution of the software.
724:
245:
213:
When the release of the DeCSS source code made the CSS algorithm available for public scrutiny, it was soon found to be susceptible to a
544:
419:
667:
237:
The first legal threats against sites hosting DeCSS, and the beginning of the DeCSS mirroring campaign, began in early
November 1999 (
491:
265:
In protest against legislation that prohibits publication of copy protection circumvention code in countries that implement the
349:
259:
461:
628:
571:
375:
655:
650:
75:(CSS) used by commercial DVD publishers. The release of DeCSS resulted in a Norwegian criminal trial and subsequent
274:
709:
316:
405:
424:
53:
647:- Information about DVD, CSS, DeCSS, LiVid, the DVD CCA and MPAA and the various lawsuits surrounding DeCSS.
129:, which didn't include source code and which apparently did not work with all DVDs. Drink or Die reportedly
644:
306:
153:
64:
682:
517:
169:
146:
110:
The program was first released on 6 October 1999 when
Johansen posted an announcement of DeCSS 1.1b, a
277:), some have devised clever ways of distributing descriptions of the DeCSS algorithm, such as through
714:
165:
72:
672:
704:
250:
239:
429:
540:
266:
111:
49:
8:
620:
225:
184:
593:
214:
483:
178:, contain the following description of the process which led to the release of DeCSS:
345:
218:
114:
100:
37:
25:
A fragment of the DeCSS code, which can be used by a computer to circumvent a DVD's
402:"Derek Fawcus ending livid-dev flamewar by confirming Johansen's side of the story"
632:
625:
138:
68:
26:
281:, through various Internet protocols, on T-shirts and in dramatic readings, as
87:
DeCSS was devised by three people, two of whom remain anonymous. It was on the
451:
698:
321:
294:
278:
270:
45:
596:
567:
379:
456:
174:
164:
The DeCSS program was a collaborative project, in which Johansen wrote the
130:
290:
134:
122:
651:
EFF archive of information on the Bunner and Pavlovich DVD-CAA lawsuits
326:
126:
104:
208:
76:
88:
369:
367:
673:
The Openlaw DVD/DeCSS Forum Frequently Asked Questions (FAQ) List
118:
688:
513:
364:
96:
107:(Economic Crime Unit) decided not to pursue the case further.
311:
286:
92:
57:
373:
282:
254:
41:
40:
capable of decrypting content on a commercially produced
677:
63:
DeCSS's development was done without a license from the
21:
685:- A technical overview of the CSS decryption algorithm.
16:
Free open-source program to decode DVDs with encryption
95:
in October 1999. The one known author of the trio is
668:
Aftenposten: Prosecutors let DVD-Jon's victory stand
217:quite different from DeCSS. The encryption is only
159:
720:Digital rights management circumvention software
696:
484:"Content Scrambling System (CSS): Introduction"
420:"EFF: DVD Descrambling Code Not a Trade Secret"
202:
514:"Pigdog Journal - DeCSS Distribution Center"
246:DVD Copy Control Association, Inc. v. Bunner
67:(CCA), the organization responsible for DVD
624:, 2001, pp. 187–190, freely available
346:"Norwegian Criminal Code section 135-147"
44:video disc. Before the release of DeCSS,
20:
172:, published in the Norwegian newspaper
156:dropped the case against Jon Johansen.
60:) could not play encrypted video DVDs.
697:
541:"How to decrypt a DVD - in Haiku form"
82:
592:
506:
464:from the original on 12 December 2008
352:from the original on 10 February 2015
121:, on the livid-dev mailing list. The
725:Compact Disc and DVD copy protection
13:
613:
565:
538:
520:from the original on 7 August 2018
454:[The entire DVD verdict].
376:"The Truth about DVD CSS cracking"
14:
736:
638:
574:from the original on 28 June 2018
547:from the original on 20 June 2005
428:. 22 January 2004. Archived from
243:). The preliminary injunction in
232:
568:"The history of the DeCSS Haiku"
494:from the original on 1 July 2024
275:Digital Millennium Copyright Act
586:
317:AACS encryption key controversy
160:Jon Lech Johansen's involvement
559:
532:
476:
444:
425:Electronic Frontier Foundation
412:
394:
338:
1:
597:"Gallery of CSS Descramblers"
374:MoRE and (4 November 1999).
332:
307:DVD Copy Control Association
203:Technology and derived works
65:DVD Copy Control Association
7:
678:42 ways to distribute DeCSS
300:
293:), and even as a so-called
168:. The transcripts from the
52:operating systems (such as
10:
741:
206:
170:Borgarting Court of Appeal
117:-only application for DVD
659:News: DVD Industry Takes
36:is one of the first free
166:graphical user interface
152:On 22 January 2004, the
691:, The DeCSS source code
73:Content Scramble System
710:Cryptanalytic software
631:22 August 2010 at the
251:Cascading Style Sheets
240:Universal v. Reimerdes
200:
30:
267:WIPO Copyright Treaty
180:
24:
460:. 22 December 2003.
295:illegal prime number
621:The Future of Ideas
594:Touretzky, David S.
408:on 2 December 2000.
185:reverse engineering
83:Origins and history
432:on 14 October 2007
215:brute-force attack
31:
618:Lawrence Lessig,
452:"Hele DVD-dommen"
382:on 29 August 2013
101:Jon Lech Johansen
38:computer programs
732:
715:Cryptography law
608:
607:
605:
603:
590:
584:
583:
581:
579:
563:
557:
556:
554:
552:
536:
530:
529:
527:
525:
510:
504:
503:
501:
499:
480:
474:
473:
471:
469:
448:
442:
441:
439:
437:
416:
410:
409:
404:. Archived from
398:
392:
391:
389:
387:
378:. Archived from
371:
362:
361:
359:
357:
342:
262:in this manner.
740:
739:
735:
734:
733:
731:
730:
729:
695:
694:
683:DeCSS Explained
641:
633:Wayback Machine
616:
614:Further reading
611:
601:
599:
591:
587:
577:
575:
564:
560:
550:
548:
537:
533:
523:
521:
512:
511:
507:
497:
495:
482:
481:
477:
467:
465:
450:
449:
445:
435:
433:
418:
417:
413:
400:
399:
395:
385:
383:
372:
365:
355:
353:
344:
343:
339:
335:
303:
235:
211:
205:
190:
189:
162:
85:
69:copy protection
27:copy protection
17:
12:
11:
5:
738:
728:
727:
722:
717:
712:
707:
693:
692:
686:
680:
675:
670:
665:
653:
648:
640:
639:External links
637:
615:
612:
610:
609:
585:
566:Schoen, Seth.
558:
539:Schoen, Seth.
531:
505:
488:www.cs.cmu.edu
475:
443:
411:
393:
363:
336:
334:
331:
330:
329:
324:
319:
314:
309:
302:
299:
234:
233:Legal response
231:
204:
201:
161:
158:
84:
81:
15:
9:
6:
4:
3:
2:
737:
726:
723:
721:
718:
716:
713:
711:
708:
706:
705:1999 software
703:
702:
700:
690:
687:
684:
681:
679:
676:
674:
671:
669:
666:
664:
662:
658:
654:
652:
649:
646:
645:DeCSS Central
643:
642:
636:
634:
630:
627:
623:
622:
598:
595:
589:
573:
569:
562:
546:
542:
535:
519:
515:
509:
493:
489:
485:
479:
463:
459:
458:
453:
447:
431:
427:
426:
421:
415:
407:
403:
397:
381:
377:
370:
368:
351:
347:
341:
337:
328:
325:
323:
322:Illegal prime
320:
318:
315:
313:
310:
308:
305:
304:
298:
296:
292:
288:
284:
280:
279:steganography
276:
272:
271:United States
269:(such as the
268:
263:
261:
256:
252:
248:
247:
242:
241:
230:
227:
222:
220:
216:
210:
199:
195:
191:
186:
179:
177:
176:
171:
167:
157:
155:
150:
148:
142:
140:
136:
132:
128:
124:
120:
116:
113:
112:closed source
108:
106:
102:
98:
94:
91:mailing list
90:
80:
78:
74:
71:—namely, the
70:
66:
61:
59:
55:
51:
47:
43:
39:
35:
28:
23:
19:
660:
656:
619:
617:
600:. Retrieved
588:
576:. Retrieved
561:
549:. Retrieved
534:
522:. Retrieved
508:
496:. Retrieved
487:
478:
466:. Retrieved
457:Verdens Gang
455:
446:
434:. Retrieved
430:the original
423:
414:
406:the original
396:
384:. Retrieved
380:the original
354:. Retrieved
340:
285:files, as a
264:
244:
238:
236:
223:
212:
196:
192:
181:
175:Verdens Gang
173:
163:
151:
143:
131:disassembled
109:
86:
62:
33:
32:
18:
602:25 February
578:25 February
468:25 February
291:DeCSS haiku
226:open source
135:object code
123:source code
99:programmer
50:open source
699:Categories
551:5 December
436:5 December
333:References
327:youtube-dl
253:tags from
207:See also:
127:DrinkOrDie
498:29 August
386:4 January
209:libdvdcss
97:Norwegian
77:acquittal
663:to Court
629:Archived
572:Archived
545:Archived
518:Archived
492:Archived
462:Archived
350:Archived
301:See also
89:Internet
689:DeCSS.c
356:31 July
154:DVD CCA
147:GNU GPL
137:of the
119:ripping
115:Windows
105:Økokrim
524:28 May
289:poem (
219:40-bit
312:qrpff
287:haiku
93:LiViD
58:Linux
34:DeCSS
661:2600
657:2600
626:here
604:2012
580:2012
553:2005
526:2007
500:2019
470:2012
438:2005
388:2007
358:2008
283:MIDI
260:MPAA
255:HTML
139:Xing
133:the
56:and
48:and
46:free
54:BSD
42:DVD
701::
635:.
570:.
543:.
516:.
490:.
486:.
422:.
366:^
348:.
297:.
273:'
606:.
582:.
555:.
528:.
502:.
472:.
440:.
390:.
360:.
29:.
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.