(Replying to PARENT post)

Maybe there's a scheme here to prevent good DRM by flooding the market with highly inflated impressive-sounding claims attached to laughable security. The Old Media crowd won't be able to solve the Design Paradox (http://www.paulgraham.com/gh.html) well enough to tell who's lying, good designs won't be able to charge more than laughable competition, and the DRM field will slowly die.
πŸ‘€EliezerπŸ•‘13yπŸ”Ό0πŸ—¨οΈ0

(Replying to PARENT post)

From http://leapingbrain.com/:

"Video content is protected with our BrainTrustβ„’ DRM, and is unplayable except by a legitimate owner. All aspects of the platform feature a near-ridiculous level of security."

Near-ridiculous security seems about right.

πŸ‘€mturmonπŸ•‘13yπŸ”Ό0πŸ—¨οΈ0

(Replying to PARENT post)

You cannot simultaneously crow "hurr, DRM is broken!" and act all smug about this discovery. Perhaps the original developer, like you, understood this, and did the absolute bare minimum necessary to fulfil commercial obligations, all the while making it easier for people like himself (i.e. you) to get what they want, and making a few bucks from the old and dying media industry all at the same time.

Given the evidence (complex integration with a non-standard set of open source libs, complex industry area in general), I'd say it's almost certainly an insult to imagine the developer could not have made your life harder if he'd chosen to.

Please, if anything commend the dear fellow, and shame on whoever considered a momentary glimpse of Google Plus limelight worth making this guy's Tuesday morning and ongoing professional reputation much harder earned than it otherwise might have been.

"No good deed goes unpunished"

πŸ‘€hosay123πŸ•‘13yπŸ”Ό0πŸ—¨οΈ0

(Replying to PARENT post)

I am awed by the chutzpah of whoever is behind Leaping Brain, selling snake oil to clueless media people.

This is why I'll never be rich: I am utterly unable to sell crappy non-solutions to people with more money than knowledge.

πŸ‘€toygπŸ•‘13yπŸ”Ό0πŸ—¨οΈ0

(Replying to PARENT post)

I would like to propose that DRM is not intended to be uncrackable. It's easy to convince yourself that DRM is flawed, because fundamentally it is a flawed tool. Companies know this, they're not stupid. However, DRM is actually not a technical tool to prevent piracy. Rather, DRM is a legal tool to provide stronger legal arguments that theft has occurred.

I'm not saying this is right, necessarily, but I think companies know full well that their DRM scheme will be broken, so it's not really worth investing in an "uncrackable" and costly solution. Instead, the role that DRM play is purely legal -- when the company does decide to go after someone for piracy, the DRM scheme, no matter how simple, provides them with the ability to say that the accused person "broke a lock," rather than simply walking in through an unlocked door. "Entering" vs. "breaking and entering." It's nothing but legal leverage, and effective at that role even if it's not a very strong lock.

Of course, to have this argument hold, a company would never be able to admit that they purposefully implemented weak security -- this would be akin to admitting that their door was unlocked afterall, and would weaken their legal argument. Therefore, there remains a niche in the market for solutions that look secure even if they fundamentally aren't. It's all about lip service.

πŸ‘€radarsat1πŸ•‘13yπŸ”Ό0πŸ—¨οΈ0

(Replying to PARENT post)

I did a lot of reverse engineering back in the day - you'd be surprised how many "virtually uncrackable" DRM protections used by companies like Adobe (at the time - Macromedia) that were just stupid XORs of magic strings.

Ahh..the good old days of SoftICE and w32disassm.

Oh man, the worst was the md5 of some salt + whatever you put in.

If you ever want to see some gems of misuse of cryptography for DRM management, let me know - email's in my profile.

Some examples: Using RSA 1024 bit keys, with exponent of 3...

πŸ‘€mahmoudimusπŸ•‘13yπŸ”Ό0πŸ—¨οΈ0

(Replying to PARENT post)

This could very well be a simple bug where it's supopsed to XOR with some really random string generated on the server, but some replacement of a template string isn't happening which is why it XORs with RANDOM_STRING.

Of course this is only marginally better and should really have been caught, but there's a huge difference between saying that XORing 12 bytes with RANDOM_STRING is kick-ass DRM and actually having a kick-ass DRM infrastructure that then doesn't work right because of a bug.

If this was any really random looking string, I would be more inclined to assume that this was intentional. By the string being this token, I would guess it's a bug somewhere.

Remember. If RANDOM_STRING was truly random, unique per file and account and only transmitted from the server before playing, then this would be as good an encryption as any.

πŸ‘€pilifπŸ•‘13yπŸ”Ό0πŸ—¨οΈ0

(Replying to PARENT post)

This is apparently why the DMCA anti-circumvention provisions only apply to bypassing "effective copy protection" systems.

Of course, if a copy protection system was "effective" it wouldn't need a law prohibiting its circumvention. Conversely, if a copy protection system is circumventable, it's not effective.

πŸ‘€marshrayπŸ•‘13yπŸ”Ό0πŸ—¨οΈ0

(Replying to PARENT post)

This is roughly the level of programming I expect from DRM software. After all, the content needs to be in unencrypted format at some point to view it.[1] Therefore there are two kinds of programmers working on DRM, idiots and liars. One kind does not understand the futility of their efforts, the other kind wagers that there superiors do not understand the futility of their efforts.

[1] Assuming a general computation device, not a dedicated hardware player.

πŸ‘€ykπŸ•‘13yπŸ”Ό0πŸ—¨οΈ0

(Replying to PARENT post)

Someone want to explain why this is less secure than other DRM methods?
πŸ‘€asdfaoeuπŸ•‘13yπŸ”Ό0πŸ—¨οΈ0

(Replying to PARENT post)

The business goal behind most of these "protection" methods is to make unauthorized (unpaid) copying/sharing inconvenient. That's it. There are no commercially feasible methods to protect video or audio content against "a determined hacker", but that's not what these barriers are for. You can make fun of these laughable encryption methods all you want, but they serve their purpose by providing the desired purchase to piracy ratio.

The problem is marketing folks getting carried away when describing these "technology solutions" to the content owner, because that's what they (as well as VCs) want to hear.

Disclaimer: cofounded a video CDN+DRM provider more than a decade ago, developed many content protection methods over the years.

πŸ‘€photorizedπŸ•‘13yπŸ”Ό0πŸ—¨οΈ0

(Replying to PARENT post)

How do we know this wasn't a non-english speaking subcontractor that took the spec too literally?
πŸ‘€joezydecoπŸ•‘13yπŸ”Ό0πŸ—¨οΈ0

(Replying to PARENT post)

Judging by the headline, it sounded like they tried to implement a one-time pad, but had only heard of them by rough description.
πŸ‘€ataggartπŸ•‘13yπŸ”Ό0πŸ—¨οΈ0

(Replying to PARENT post)

Ha, so the key really was "RANDOM_STRING", in the literal sense...was that just the programmer giving up, or was that pseudocode that was missed during shipping?
πŸ‘€dansoπŸ•‘13yπŸ”Ό0πŸ—¨οΈ0

(Replying to PARENT post)

Can someone explain how he got a hold of the decrypted .mov files that he compared the encrypted ones with? It's not very clear to me from the post, and I'm not familiar with Leaping Brain.

Either way.. wow... XOR encryption with just such a short repeating string! I bet it wouldn't be too hard to decrypt it even without the original file, since the file signature alone would probably be longer than the string. DISCLAIMER: I'm just speculating, I don't know the .mov specs.

πŸ‘€pav3lπŸ•‘13yπŸ”Ό0πŸ—¨οΈ0

(Replying to PARENT post)

facepalm Come on, people!

First rule of weak DRM, you do not talk when you find weak DRM.

Second rule of weak DRM, you DO NOT talk when you find weak DRM.

Third rule of weak DRM, upload to pastebin, then walk away.

πŸ‘€anonymousπŸ•‘13yπŸ”Ό0πŸ—¨οΈ0

(Replying to PARENT post)

"All aspects of the platform feature a near-ridiculous level of security."

Well... They weren't lying...

πŸ‘€shocksπŸ•‘13yπŸ”Ό0πŸ—¨οΈ0

(Replying to PARENT post)

To be fair, when I read the title I thought that if the string is truly random then it's actually a very good technique. This is the core operating principle behind the one-time pad which is provably secure.

Now that I read the article twice, I literally got a panic attack when I realized that it wasn't a random string that they were xor'ing their data with, but a string called "RANDOM_STRING". Although it sounds bad, one must realize that this is not security by obscurity since the key has been leaked, and nobody guarantees encryption against a leaked key.

πŸ‘€sigkillπŸ•‘13yπŸ”Ό0πŸ—¨οΈ0

(Replying to PARENT post)

Anyone who has taken Computer Security 101 would know that security through obscurity is not the smartest thing to do. Calling it "near-ridiculous level of security." is downright blasphemy.
πŸ‘€i0exceptionπŸ•‘13yπŸ”Ό0πŸ—¨οΈ0

(Replying to PARENT post)

You know what's absolutely terrifying? This guy could conceivably go to jail for this. Looks like he has kids, presumably a wife... hoping it goes well for him.
πŸ‘€jcromartieπŸ•‘13yπŸ”Ό0πŸ—¨οΈ0

(Replying to PARENT post)

There's two software engineers and a product architect listed on the about page - http://leapingbrain.com/about/

It might be a good idea to remove their names, to protect their reputation. ;-)

πŸ‘€damian2000πŸ•‘13yπŸ”Ό0πŸ—¨οΈ0

(Replying to PARENT post)

Tomorrow on HN: "Legislation passed to embed DRM chips into people's heads, which automatically shut down visual input if un-authorized content is detected playing in their vicinity. Three strikes policy before permanent blindness."
πŸ‘€samuellevyπŸ•‘13yπŸ”Ό0πŸ—¨οΈ0

(Replying to PARENT post)

"It turned out the actual player, launched from their compiled app, was a Python wrapper around some VLC libraries"

Isn't VLC licensed under the GPL? Or at least was until very recently? http://www.jbkempf.com/blog/post/2012/How-to-properly-relice...

Is/was Leaping Brain violating the license?

EDIT: the wrapper script is apparently released under the GPL too: http://news.ycombinator.com/item?id=4834834

πŸ‘€tlrobinsonπŸ•‘13yπŸ”Ό0πŸ—¨οΈ0

(Replying to PARENT post)

Breaking repeated XOR with a string is a variant of the Vignere cipher or the Vernam cipher, depending on how you think of it. Either way, breaking it is a freshman cryptography exercise.
πŸ‘€stcredzeroπŸ•‘13yπŸ”Ό0πŸ—¨οΈ0

(Replying to PARENT post)

Could someone (OP?) provide more of the steps that might have gone (went) into discovering it was an XOR operation and the original string? Seems like an impressive intuitive leap to me!
πŸ‘€iandanforthπŸ•‘13yπŸ”Ό0πŸ—¨οΈ0

(Replying to PARENT post)

From their website:

Fort Knox-level security.

Video content is protected with our BrainTrustβ„’ DRM, and is unplayable except by a legitimate owner. All aspects of the platform feature a near-ridiculous level of security.

πŸ‘€ballfrogπŸ•‘13yπŸ”Ό0πŸ—¨οΈ0

(Replying to PARENT post)

Back in the 1990s, the revolutionary organization Sendero Luminoso was naive enough to believe in WordPerfect's encryption. This was a grave mistake, for that encryption (for 4.2 and 5.1 at least) was a simple XOR of the password against the text--and in 5.1 you had 10 or so bytes of known text to compare against in the header. The decryption of the files was not the only thing that worked against Sendero Luminoso, but it must have hurt them.
πŸ‘€cafardπŸ•‘13yπŸ”Ό0πŸ—¨οΈ0

(Replying to PARENT post)

...I find it extremely funny when people use the word "virtually" to mean "practically" or "nearly" or "almost" and they turn out to be wrong but are excused by the fact that they added the magic word "virtually" :) ...and conversely, if someone uses the word when talking to me, I label everything the person says afterwards as 99% weasel words...
πŸ‘€nnqπŸ•‘13yπŸ”Ό0πŸ—¨οΈ0

(Replying to PARENT post)

I find it curious that (after 242) there are no comments here ranting about ir/responsible disclosure. Is this simply indicative of the readership's unanimous hatred of all things DRM - or is there perhaps a threshold of ineptitude beyond which we feel ethically free to fully disclose vulnerabilities?
πŸ‘€etsimmπŸ•‘13yπŸ”Ό0πŸ—¨οΈ0

(Replying to PARENT post)

Hm, anybody remember Dmitry Slyarov? http://en.wikipedia.org/wiki/Dmitry_Sklyarov

As far as I recall the Adobe PDF encryption was also just some XOR with a simple passphrase. Got him into serious trouble.

And WTH is 'virtually uncrackable'?

πŸ‘€SyssiphusπŸ•‘13yπŸ”Ό0πŸ—¨οΈ0

(Replying to PARENT post)

This should be lauded just as much for being a solid little piece of citizen, even activist, journalism. The specific issues about DRM are important, but I think the greater willingness to really look into things and publish the results should be encouraged.
πŸ‘€javajoshπŸ•‘13yπŸ”Ό0πŸ—¨οΈ0

(Replying to PARENT post)

This is what they call this a 1024 bit Vernam Cypher in the movie "Swordfish".
πŸ‘€px43πŸ•‘13yπŸ”Ό0πŸ—¨οΈ0

(Replying to PARENT post)

The CEO of Leaping Brain (or someone pretending to be him) has now joined the Google Plus thread, implying that the "DRM" was intended as satire...
πŸ‘€asherlangtonπŸ•‘13yπŸ”Ό0πŸ—¨οΈ0

(Replying to PARENT post)

XOR isn't insecure per se. What I'd like to know is how this "random string" is created in the first place
πŸ‘€seanhandleyπŸ•‘13yπŸ”Ό0πŸ—¨οΈ0

(Replying to PARENT post)

The obligatory xkcd: http://xkcd.com/221/
πŸ‘€loup-vaillantπŸ•‘13yπŸ”Ό0πŸ—¨οΈ0

(Replying to PARENT post)

Question: Can anybody name a DRM scheme that hasn't been cracked?
πŸ‘€jiggy2011πŸ•‘13yπŸ”Ό0πŸ—¨οΈ0