Banana (talk | contribs)
Added archive URLs for 1 citation(s) using CRWCitationBot
Banana (talk | contribs)
Removed 1 duplicate url-status parameter(s) from 1 citation(s) using CRWCitationBot
Line 35: Line 35:


From 1996, DVDs began to feature the "Content Scramble System" (CSS), an encryption based DRM. CSS was successfully circumvented as early as 1999, less than five years after its introduction, partly due to the limited length of the 40-bit encryption key, which was used to comply with US government export regulations of the time.<ref>{{Cite web |last=Stevenson |first=Frank Andrew |date=27 Oct 1999 |title=[Livid-dev] Successfull attack on CSS algorithm |url=https://www.cs.cmu.edu/~dst/DeCSS/FrankStevenson/mail1.txt |url-status=live |archive-url=https://web.archive.org/web/20260114031245/https://www.cs.cmu.edu/~dst/DeCSS/FrankStevenson/mail1.txt |archive-date=2026-01-14 |access-date=2026-02-06 |website=Carnegie Mellon University School of Computer Science}}</ref><ref>{{Cite web |last=Stevenson |first=Frank A. |date=8 November 1999 |title=Cryptanalysis of Contents Scrambling System |url=http://www.dvd-copy.com/news/cryptanalysis_of_contents_scrambling_system.htm |url-status=dead |archive-url=https://web.archive.org/web/20000302000206/http://www.dvd-copy.com/news/cryptanalysis_of_contents_scrambling_system.htm |archive-date=2000-03-02 |access-date=2026-02-06 |website=DVD-Copy}}</ref> Following this, DVDs as well as HD-DVDs and Blu-Rays would implement other types of DRM, one of them being the "Advanced Access Content System".<ref>{{Cite web |title=Advanced Access Content System (AACS) |url=https://www.aacsla.com/specifications/specs091/AACS_Spec_Common_0.91.pdf |url-status=dead |archive-url=https://web.archive.org/web/20070302130221/http://www.aacsla.com/specifications/specs091/AACS_Spec_Common_0.91.pdf |archive-date=2 Mar 2007 |access-date=20 Apr 2025}}
From 1996, DVDs began to feature the "Content Scramble System" (CSS), an encryption based DRM. CSS was successfully circumvented as early as 1999, less than five years after its introduction, partly due to the limited length of the 40-bit encryption key, which was used to comply with US government export regulations of the time.<ref>{{Cite web |last=Stevenson |first=Frank Andrew |date=27 Oct 1999 |title=[Livid-dev] Successfull attack on CSS algorithm |url=https://www.cs.cmu.edu/~dst/DeCSS/FrankStevenson/mail1.txt |url-status=live |archive-url=https://web.archive.org/web/20260114031245/https://www.cs.cmu.edu/~dst/DeCSS/FrankStevenson/mail1.txt |archive-date=2026-01-14 |access-date=2026-02-06 |website=Carnegie Mellon University School of Computer Science}}</ref><ref>{{Cite web |last=Stevenson |first=Frank A. |date=8 November 1999 |title=Cryptanalysis of Contents Scrambling System |url=http://www.dvd-copy.com/news/cryptanalysis_of_contents_scrambling_system.htm |url-status=dead |archive-url=https://web.archive.org/web/20000302000206/http://www.dvd-copy.com/news/cryptanalysis_of_contents_scrambling_system.htm |archive-date=2000-03-02 |access-date=2026-02-06 |website=DVD-Copy}}</ref> Following this, DVDs as well as HD-DVDs and Blu-Rays would implement other types of DRM, one of them being the "Advanced Access Content System".<ref>{{Cite web |title=Advanced Access Content System (AACS) |url=https://www.aacsla.com/specifications/specs091/AACS_Spec_Common_0.91.pdf |url-status=dead |archive-url=https://web.archive.org/web/20070302130221/http://www.aacsla.com/specifications/specs091/AACS_Spec_Common_0.91.pdf |archive-date=2 Mar 2007 |access-date=20 Apr 2025}}
</ref> When the first AACS processing key was similarly extracted, the AACS Licensing Administrator began issuing cease-and-desist letters to websites where the key was posted.<ref>{{Cite web |date=17 Apr 2007 |title=AACS licensor complains of posted key |url=https://lumendatabase.org/notices/21725 |url-status=live |archive-url=https://web.archive.org/web/20251207212919/https://lumendatabase.org/notices/21725 |archive-date=2025-12-07 |access-date=20 Apr 2025 |website=Lumen}}</ref> Another form of Blu-Ray DRM, [[Cinavia]], uses a form of audio watermarking that makes certain releases unplayable in devices that are not equipped to recognize it, a notable example being Sony's Playstation 3.<ref>{{Cite web |last=Ganesh |first=T. S. |date=21 Mar 2012 |title=Cinavia DRM: How I Learned to Stop Worrying and Love Blu-ray’s Self-Destruction |url=https://www.anandtech.com/show/5693/cinavia-drm-how-i-learned-to-stop-worrying-and-love-blurays-selfdestruction/2 |url-status=live |access-date=20 Apr 2025 |website=AnandTech |url-status=live |archive-url=http://web.archive.org/web/20250708174835/https://www.anandtech.com/show/5693/cinavia-drm-how-i-learned-to-stop-worrying-and-love-blurays-selfdestruction/2 |archive-date=8 Jul 2025}}</ref>  
</ref> When the first AACS processing key was similarly extracted, the AACS Licensing Administrator began issuing cease-and-desist letters to websites where the key was posted.<ref>{{Cite web |date=17 Apr 2007 |title=AACS licensor complains of posted key |url=https://lumendatabase.org/notices/21725 |url-status=live |archive-url=https://web.archive.org/web/20251207212919/https://lumendatabase.org/notices/21725 |archive-date=2025-12-07 |access-date=20 Apr 2025 |website=Lumen}}</ref> Another form of Blu-Ray DRM, [[Cinavia]], uses a form of audio watermarking that makes certain releases unplayable in devices that are not equipped to recognize it, a notable example being Sony's Playstation 3.<ref>{{Cite web |last=Ganesh |first=T. S. |date=21 Mar 2012 |title=Cinavia DRM: How I Learned to Stop Worrying and Love Blu-ray’s Self-Destruction |url=https://www.anandtech.com/show/5693/cinavia-drm-how-i-learned-to-stop-worrying-and-love-blurays-selfdestruction/2 |url-status=live |access-date=20 Apr 2025 |website=AnandTech |archive-url=http://web.archive.org/web/20250708174835/https://www.anandtech.com/show/5693/cinavia-drm-how-i-learned-to-stop-worrying-and-love-blurays-selfdestruction/2 |archive-date=8 Jul 2025}}</ref>  


In the attempt of preventing video ripping via a capture card, modern displays, optical disc players, and computers use the [[wikipedia:High-bandwidth_Digital_Content_Protection|High-Definition Content Protection]] system to encrypt display signals.<ref>{{Cite web |title=About DCP |url=https://www.digital-cp.com/about_dcp |url-status=live |archive-url=https://web.archive.org/web/20260104104231/https://www.digital-cp.com/about_dcp |archive-date=2026-01-04 |access-date=20 Apr 2025 |website=Digital CP}}</ref> For example, [[Netflix stream-quality controversy|Netflix will refuse]] to stream content at the full resolution advertised for the plan if the user is not streaming through an HDCP compliant video card and display.
In the attempt of preventing video ripping via a capture card, modern displays, optical disc players, and computers use the [[wikipedia:High-bandwidth_Digital_Content_Protection|High-Definition Content Protection]] system to encrypt display signals.<ref>{{Cite web |title=About DCP |url=https://www.digital-cp.com/about_dcp |url-status=live |archive-url=https://web.archive.org/web/20260104104231/https://www.digital-cp.com/about_dcp |archive-date=2026-01-04 |access-date=20 Apr 2025 |website=Digital CP}}</ref> For example, [[Netflix stream-quality controversy|Netflix will refuse]] to stream content at the full resolution advertised for the plan if the user is not streaming through an HDCP compliant video card and display.