Fact-checked by Grok 2 weeks ago

DeCSS

DeCSS is a that decrypts video content from commercially produced DVDs encrypted with the (CSS), a 40-bit developed to limit unauthorized access and copying. CSS employs linear feedback shift registers to scramble in 2048-byte sectors, with player-specific keys and disc keys derived from a master set, but its short key length—constrained by U.S. export regulations—rendered it vulnerable to and brute-force attacks. Developed by self-taught programmer in 1999 at age 15, DeCSS originated from efforts to enable DVD playback on systems lacking licensed CSS decoders, achieved by analyzing the unencrypted keys in a commercial Windows player like XingDVD. Released openly in October 1999, the program provided source that implemented the full CSS authentication and decryption process, allowing extraction of raw video streams for and purposes. The publication of DeCSS triggered extensive litigation by the DVD Copy Control and film studios, primarily under the U.S. Digital Millennium Copyright Act's clauses, which prohibit tools enabling access to protected works even absent . U.S. courts issued injunctions against its , affirming that functional constitutes publishable circumvention irrespective of speech protections, while Johansen's prosecutions for ended in acquittals, as licensed players did not violate access laws. These cases illuminated conflicts between technological mandates, consumer , and rights, influencing global policy on digital locks and spawning derivative tools for subsequent protections like AACS.

Background and Context

Content Scramble System (CSS)

The is a symmetric-key employed to encrypt video and audio data on commercial discs, serving as a basic mechanism for and . Developed under the auspices of the and licensed through the DVD Copy Control Association (DVD CCA), CSS was introduced in 1996 to restrict playback to authorized, licensed DVD players while enabling enforcement of regional coding schemes that limit disc compatibility by geographic market. The system scrambles streams using simple XOR operations with derived keystreams, prioritizing implementation simplicity and compliance with export regulations over robust security. At its core, CSS layers multiple 40-bit (5-byte) keys to control decryption: up to 409 unique keys, one per licensed player model; a single key per DVD, stored encrypted by each possible player key in a lead-in sector; and per-title keys for individual video segments. During playback, a licensed 's embedded decrypts the disc key, which in turn unlocks the title keys to generate the XOR keystream for unscrambling the content sectors. This hierarchical structure ties decryption to proprietary hardware, preventing bit-for-bit copying to unlicensed media or systems without the full set. CSS's 40-bit , constrained by 1990s U.S. export controls on , rendered it susceptible to exhaustive brute-force attacks achievable on contemporary , with search spaces of approximately 1 possibilities traversable in feasible timeframes using off-the-shelf processors. Rather than employing proven resistant to known attacks, the system depended on algorithmic obscurity and licensing restrictions for protection, lacking features like key rotation or resistance to side-channel . These design choices aligned with its intent as a lightweight deterrent against casual duplication, not a barrier to determined .

Need for DVD Playback on Non-Proprietary Systems

The DVD-Video format emerged commercially in the United States in spring 1997, building on the compact disc's principles but optimized for higher-capacity video playback, with most titles employing the (CSS) encryption developed in 1996 to scramble audiovisual data and restrict unauthorized access or reproduction. CSS utilized a 40-bit length alongside proprietary algorithms and master keys, necessitating decryption via licensed hardware or software decoders for functional playback. Without such licensed components, DVDs remained inaccessible on systems lacking approved CSS implementations, as the encryption rendered raw disc data unreadable by standard optical drives. The DVD Copy Control Association (DVD CCA), established to oversee CSS licensing, granted access exclusively to manufacturers agreeing to its terms, which included royalties, compliance audits, and restrictions on key disclosure or reverse-engineering, thereby enforcing proprietary control over . This framework systematically excluded non-proprietary platforms, particularly open-source operating systems like —which saw rapid adoption in the late 1990s among developers and hobbyists—since the DVD CCA refused to license CSS to open-source projects or entities unwilling to incorporate region coding, , or other mandated features deemed antithetical to user autonomy. Consequently, Linux users, despite purchasing DVDs, encountered total incompatibility, as no compliant software decoders existed for their environment, amplifying barriers to exercising ownership rights such as private viewing on preferred . This exclusion fueled demand among developers for technical means to achieve legitimate , including playback for personal use, archival backups of owned media, and investigative into disc structures, without reliance on vendor-locked ecosystems dominated by Windows or licensed set-top players. Early initiatives to engineer DVD-compatible software for faltered due to the opacity of CSS keys—comprising 400 sector-specific master keys treated as trade secrets—and the absence of licensed reference implementations, rendering brute-force or independent derivation infeasible within practical constraints and underscoring how gating, rather than inherent format complexity, impeded cross-platform access. Such limitations stifled in software playback markets, prioritizing content owners' control over consumer and developer freedoms in handling legally acquired media.

Development and Release

Reverse-Engineering Process

The reverse-engineering of the began with the analysis of commercially available licensed software, notably the Xing Technologies for Windows, which was publicly downloadable in 1999. Engineers examined the executable binary file of this software using basic reverse-engineering tools such as hex editors and disassemblers, revealing that the player keys—essential 40-bit (5-byte) values required for CSS and decryption—were stored in without . This discovery bypassed the need for brute-force attacks on the keys themselves, as the software's inadvertently exposed them during routine file inspection, highlighting CSS's reliance on rather than cryptographic strength. Further disassembly of the Xing player code uncovered the core CSS decryption algorithm, which employs a straightforward key derivation function to generate sector keys from the disc key and applies XOR-based scrambling to video data. Debuggers and static analysis tools traced the authentication handshake between the player and disc, where the player key decrypts the disc key stored on the DVD, enabling playback. This process demonstrated CSS's architectural weaknesses: its 40-bit key length offered minimal resistance to exhaustive search if keys were not directly extractable, but the plaintext storage in licensed binaries rendered such measures unnecessary, allowing reconstruction of the full decryption routine from a single player's implementation. These efforts were collaborative, involving programmers in online communities focused on open-source DVD playback, such as groups affiliated with the , who shared disassembly findings and insights via logs and forums in October and November 1999. This methodical, empirical approach—grounded in direct examination of executable code rather than speculation—underscored the system's vulnerability to standard practices applied to proprietary but accessible software, independent of any purported leaks. The resulting understanding informed the development of standalone decryption tools by enabling replication of the key extraction and unscrambling steps without access to DVD Copy Control Association (DVD CCA) licensing.

Jon Lech Johansen's Role and Initial Distribution

Jon Lech Johansen, a 15-year-old self-taught Norwegian programmer, developed and released the initial version of DeCSS in response to the absence of functional open-source DVD playback software for operating systems. On October 6, 1999, he posted DeCSS 1.1b, a closed-source Windows , to the LiViD-dev , a dedicated to open-source video decoding projects. Johansen's stated motivation was purely practical: enabling users to view legally purchased DVDs on computers, which lacked proprietary playback drivers available for Windows and Macintosh systems at the time. The source code for DeCSS leaked on the same day as Johansen's announcement, prompting immediate community efforts to port it to and other platforms. This openness contrasted with prior proprietary decryption attempts and encouraged collaborative improvements, as Johansen published the code without seeking commercial gain or restricting redistribution. DeCSS quickly proliferated beyond the LiViD list, appearing on newsgroups such as alt.hackers.mtu and various websites, where it was downloaded and adapted by developers worldwide within days. Johansen's actions marked an early instance of individual driving open-source circumvention of access controls, prioritizing over proprietary restrictions. The distribution emphasized source availability to foster broader , reflecting Johansen's background in programming since age 12 and his focus on solving technical barriers for non-proprietary software ecosystems.

Technical Mechanism

Core Algorithm and Key Extraction

DeCSS implements the reverse-engineered (CSS) decryption process, which relies on leaked player keys—unique 5-byte (40-bit) values assigned to licensed DVD players—to access the disc key stored in a hidden sector of the DVD. The disc key table contains 409 entries, each comprising an encrypted version of the 5-byte disc key and its , encrypted under a corresponding player key. To extract the disc key, DeCSS selects a hardcoded leaked player key and performs a over the 409 table entries, generating a keystream via the CSS for each attempt and XORing it with the encrypted data to yield a candidate disc key. Verification occurs by using the candidate disc key to decrypt the accompanying encrypted entry (also via keystream XOR); success is confirmed if the result matches a cryptographic of the candidate disc key itself. This process requires approximately 409 decryption attempts, each involving the weak CSS cipher, rendering it computationally trivial on 1999-era hardware. The CSS stream cipher, central to key extraction and descrambling, operates as follows: It seeds two linear shift s (LFSRs)—a 17-bit odd and a 25-bit even —derived from the 40-bit through bitwise manipulations and lookups (e.g., tables CSStab2 and CSStab3). The s advance irregularly based on polynomials, producing output bits that are summed modulo 256, passed through an 8-bit for non-linearity, and XORed with the target data bytes. For disc decryption, this keystream is generated over 6 bytes ( plus parity). The cipher's structure limits effective security to roughly 16-25 bits despite the nominal 40-bit length, as LFSR output can be attacked in 2^16 operations for 6 bytes of known or via reversal of the disc in 2^25 operations (about 18 seconds on a 450 MHz ). Once the disc key is obtained, title keys (one per video title set, also 5 bytes with even/odd flags) are decrypted analogously: The disc key serves as input to the same (a variant using complemented tables like CSStab5), generating a keystream to XOR against the encrypted title key stored on the disc. Verified title keys are then XORed with 5 bytes from each sector's unscrambled header (offsets 80-84) to derive a per-sector key. This sector key seeds the to generate a 2048-byte keystream, which XOR-decrypts the scrambled video , revealing the stream. Authentication steps mimicking licensed players are embedded, ensuring compatibility, while optimizations like precomputed tables enable real-time performance on consumer CPUs. The availability of DeCSS source code and binary distributions allows independent verification of these operations, with implementations often including the full CSS tables (e.g., 256-entry S-boxes and permutation arrays) hardcoded for transparency. Pseudocode for key derivation simplifies to:
function decrypt_key(encrypted_key, key_input):
    # Key preprocessing: permute and substitute bytes using CSStab0-4
    processed_key = permute(key_input, CSStab0)
    for i in 0 to 4:
        processed_key[i] = sbox(processed_key[i])
    # Seed LFSRs (17-bit odd, 25-bit even) from processed_key
    odd_lfsr = init_odd(processed_key[0:3])
    even_lfsr = init_even(processed_key[2:5])
    keystream = []
    for _ in 0 to len(encrypted_key):
        bit = (odd_lfsr_output() + even_lfsr_output()) % 256
        keystream_byte = sbox(bit)
        keystream.append(keystream_byte)
        advance_lfsrs()  # Irregular feedback
    return XOR(encrypted_key, keystream)
This raw descrambling mirrors the verified CSS mechanism, exposing its reliance on export-weakened cryptography.

Implementation and Derived Software

DeCSS consists of C source code implementing the CSS decryption , which, when compiled, functions as a command-line to descramble encrypted sectors on discs and extract files for playback on non-proprietary systems lacking licensed decrypters. The original implementation, released by on October 6, 1999, targeted compatibility by enabling direct access to DVD content without reliance on Windows-specific drivers. Derived from DeCSS, the library emerged from the project around 2001 as a portable of CSS key extraction and decryption, simplifying integration into multimedia applications via a minimal of four to five calls. This library underpins DVD playback in open-source players such as —developed by —and , allowing licensed decryption during streaming without exposing raw keys or requiring disc-specific authentication from drives. supports multiple platforms, including GNU/Linux, and later, and macOS, but inherits DeCSS's legal exposure under laws due to its emulation of proprietary decryption processes. DeCSS and address only the standard 40-bit CSS employed on for standard-definition content, failing to decrypt high-definition media protected by successor systems such as AACS on HD DVD and Blu-ray discs. These tools do not accommodate proprietary enhancements or structural obfuscations beyond core CSS, such as certain region-specific or fault-tolerant variants, limiting their scope to legacy DVD formats rather than serving as general-purpose crackers.

Prosecution in Norway

In January 2000, the Norwegian National Authority for Investigation and Prosecution of Economic and Environmental Crime (Økokrim) raided the home of 15-year-old Jon Lech Johansen in Oslo, seizing computers and other equipment related to his development of DeCSS, a program to decrypt the Content Scramble System (CSS) on DVDs. The raid was prompted by complaints from the DVD Copy Control Association (DVD CCA), representing DVD manufacturers, alleging that Johansen's actions violated Norway's Criminal Code section 145, which prohibits unauthorized access to data protected by access control measures. Prosecutors charged Johansen specifically with "data break-in," framing the reverse-engineering of CSS—derived from a legally purchased DVD—as illegal intrusion into protected information, despite the absence of any proven financial gain, distribution for profit, or use of DeCSS to facilitate copyright infringement such as unauthorized copying or piracy. Johansen's first trial in Oslo City Court concluded on January 7, 2003, with a unanimous acquittal, as the court determined that decrypting CSS on a DVD lawfully owned by the user did not constitute unauthorized access under section 145, since Johansen had legitimate possession of the disc and sought only to enable playback on his Linux-based computer. Økokrim appealed the ruling, leading to a retrial in the Borgarting Court of Appeal, which on December 22, 2003, again acquitted Johansen in a unanimous decision, affirming that the act of circumventing CSS through reverse-engineering did not breach data protection laws when performed on purchased media for personal interoperability purposes, and noting the lack of evidence linking DeCSS to illegal activities. Although Johansen faced initial fines for minor procedural violations during earlier investigations, the final appellate outcome imposed no criminal penalties, establishing a precedent under Norwegian law that individual reverse-engineering of proprietary encryption on owned content falls outside "break-in" prohibitions. The prosecutions highlighted tensions between Norway's domestic data access statutes—enacted to safeguard computer systems—and obligations under international agreements like the , which Johansen's defenders argued did not criminalize mere circumvention for non-infringing uses, though Norwegian courts prioritized national interpretations over extraterritorial pressures from foreign entities such as the DVD CCA. This outcome underscored risks to individual programmers engaging in research, as Økokrim's aggressive enforcement, including repeated home searches and equipment seizures without infringement evidence, demonstrated how economic crime units could apply privacy-oriented laws to absent clear illegal intent or harm.

United States Federal Cases

In January 2000, the U.S. District Court for the Southern District of issued a preliminary in Universal City Studios, Inc. v. Reimerdes, barring defendants including Roman Reimerdes and others from posting or distributing DeCSS, a program that circumvents the (CSS) encryption on DVDs, under Section 1201(a)(2) of the (DMCA), which prohibits trafficking in technologies designed to circumvent access controls protecting copyrighted works. Following a , the court entered a permanent on August 17, 2000, holding that DeCSS violates the DMCA's anti-trafficking provisions because it effectively circumvents CSS, a technological measure controlling access to copyrighted motion pictures, regardless of whether the defendant's intent was to enable or . The district court rejected defenses based on and for , reasoning that the DMCA regulates the distribution of circumvention tools as conduct, not protected expression, and imposes without requiring proof of actual . The case extended to Eric Corley, publisher of 2600 Magazine, after his website (2600.com) posted DeCSS source code and links to it following the preliminary injunction, prompting plaintiffs to seek enforcement against him. The district court expanded the injunction to prohibit Corley from posting DeCSS or knowingly linking to sites containing it, finding that such linking facilitated trafficking in violation of the DMCA. On November 28, 2001, the U.S. Court of Appeals for the Second Circuit affirmed the permanent injunction in Universal City Studios, Inc. v. Corley, 273 F.3d 429, upholding the district court's interpretation that DeCSS qualifies as a circumvention device under the DMCA, as it targets CSS's access-control function rather than mere copying controls. The appellate court rejected First Amendment challenges, classifying DeCSS as functional code akin to a lockpick—regulable as conduct under the DMCA's anti-trafficking rules—rather than pure speech deserving full protection, and applied to affirm the law's narrow tailoring toward preventing unauthorized access without unduly burdening legitimate speech. It further dismissed and exemptions, clarifying that Section 1201(f) permits only by manufacturers for compatible products, not public dissemination of circumvention tools, and that the DMCA's prohibitions apply irrespective of the distributor's intent or the end-user's purpose. The rulings prompted widespread enforcement through DMCA takedown notices, resulting in the removal of DeCSS code from numerous websites and online repositories, as service providers complied to avoid liability under Section 512. No significant subsequent federal challenges overturned these precedents specific to DeCSS distribution.

Trade Secret Litigation

The DVD Copy Control Association (DVD CCA) filed a lawsuit on December 27, 1999, in the Superior Court of California, County of Santa Clara, against Andrew Bunner and other website operators, claiming misappropriation of trade secrets under the California Uniform Trade Secrets Act. The suit centered on the defendants' online posting of DeCSS source code, which DVD CCA asserted incorporated proprietary elements of the Content Scramble System (CSS) obtained through unauthorized reverse engineering of licensed DVD player software. Specifically, the reverse engineering violated nondisclosure agreements in the software licenses, imposing an implied duty of confidentiality that rendered the acquisition "improper" under state trade secret law, distinct from federal DMCA claims focused on technological circumvention. The trial court granted DVD CCA's motion for a preliminary in January 2000, enjoining the defendants from posting, disclosing, or distributing DeCSS or linking to sites hosting it, on grounds that CSS qualified as a and its exposure via DeCSS threatened irreparable harm to DVD CCA members' competitive interests. The California Court of Appeal initially reversed the in 2001, prioritizing First Amendment protections for DeCSS as expressive code, but the overturned that decision on August 25, 2003, holding that preliminary injunctions against disclosure do not inherently burden speech when the secrets were acquired improperly and remain confidential to non-parties. On remand, the Court of Appeal upheld the misappropriation framework but noted evidentiary challenges in proving secrecy persistence after widespread DeCSS dissemination; DVD CCA ultimately secured permanent injunctions against Bunner and similar defendants, though it later dismissed some claims amid ongoing federal parallel actions. These state-level proceedings exemplified rights holders' multifaceted approach, leveraging contract-based confidentiality breaches in licensed code to target non-licensed disseminators, thereby supplementing DMCA enforcement with remedies tailored to secrecy preservation rather than .

Broader Impacts and Debates

Effects on Content Industry and

The publication of DeCSS in November 1999 enabled the widespread extraction of unencrypted video streams from CSS-protected DVDs, facilitating the creation of digital copies suitable for and . This development correlated with the emergence of tools like DVD2AVI and subsequent software, which proliferated online and lowered barriers to unauthorized duplication compared to pre-digital methods such as VCR recording. DeCSS's availability contributed to heightened DVD piracy in the early 2000s, as ripped files became staples on nascent networks like those using encoding for reduced file sizes. The of America (MPAA) reported global industry losses from all forms of movie at $3–3.5 billion annually by 2003, with digital circumvention tools like DeCSS cited in litigation as exacerbating internet-based infringement over physical disc counterfeiting. By 2005, MPAA estimates escalated to $6.1 billion in U.S. losses from online movie alone, amid a documented rise in available digital rips post-1999. The compromise of CSS diminished its role as a reliable deterrent, as DeCSS's open-source nature allowed rapid reverse-engineering and variant implementations, rendering licensed player authentication ineffective for copy control. In response, the DVD Copy Control Association and stakeholders accelerated development of successor systems; the (AACS), employing stronger like AES-128, was finalized for high-definition optical media and licensed from 2005 onward to mitigate similar vulnerabilities exposed by CSS cracking. Although DeCSS supported verifiable owner-side uses such as format migration or archival backups—activities argued as in some jurisdictions—empirical indicators from industry monitoring showed predominant application to infringement, with federal courts affirming that its dissemination undermined CSS's core function in preventing unauthorized and eroding protections for creators. Post-release spikes in DeCSS-linked postings and ripped content availability underscored this shift, prompting sustained legal and technological countermeasures despite debates over attribution of total losses.

Free Speech Arguments and First Amendment Claims

In Universal City Studios, Inc. v. Reimerdes, defendants including members of the hacker group 2600 Magazine argued that the dissemination of DeCSS qualified as protected speech under the First Amendment, asserting that computer code inherently conveys ideas and instructions in a manner akin to publishing manuals for lockpicking devices or safe-cracking tools. They maintained that the code's publication expressed technical knowledge about DVD , enabling public discourse on without directly facilitating infringement, and that any against its posting constituted on expression. The (), representing defendants in related litigation, contended that the Digital Millennium Copyright Act's (DMCA) provisions, as applied to DeCSS, suppressed legitimate scientific inquiry, software interoperability research, and open-source development by criminalizing the sharing of functional code that revealed proprietary flaws. In the trade secret case DVD Copy Control Ass'n v. Bunner, defendants similarly invoked First Amendment protections, arguing that posting DeCSS online—reverse-engineered independently—served public interest in exposing encryption vulnerabilities and promoting competition, not mere secrecy misappropriation. Advocates framed Jon Lech Johansen's DeCSS creation and distribution as emblematic of individual programmers' rights against industry efforts to monopolize playback technologies, likening DMCA enforcement to censorship of technical speech essential for innovation. Courts in both Reimerdes and Bunner acknowledged code's expressive qualities but prioritized its functional capacity to decrypt protected content, upholding restrictions under without finding outright First Amendment violations. Nonetheless, ongoing academic discourse highlights code's hybrid status—simultaneously literal expression and executable mechanism—citing demonstrations such as Touretzky's 1999 DeCSS gallery, which rendered the algorithm in non-functional forms like , , and to underscore its communicative potential beyond utility. Scholars argue this duality demands nuanced First Amendment analysis, warning that overbroad circumvention bans could stifle vital to fields like cybersecurity and antitrust scrutiny of digital locks.

Intellectual Property Protections and Criticisms of Circumvention

The release of DeCSS enabled the systematic circumvention of the Content Scrambling (CSS) encryption on commercial DVDs, undermining the contractual licensing models that content owners employ to control access and distribution. By decrypting protected audiovisual works, DeCSS facilitated the extraction of high-quality digital files suitable for unauthorized reproduction and dissemination, often exceeding boundaries and resulting in lost royalties for creators and studios. The (DMCA) of 1998, particularly Section 1201, functions as an essential legal bulwark against such digital theft, prohibiting tools like DeCSS to maintain the viability of licensed distribution in environments where digital copies are indistinguishable from originals and infinitely replicable without degradation. Critics of DeCSS's development and dissemination, including content industry representatives, contend that and associated posters elevated unilateral access rights above consent-based agreements, sidelining evidence of the tool's routine exploitation for rather than limited interoperability. Johansen maintained that DeCSS was intended solely for DVD playback on non-Windows systems like , yet its deployment promptly supported widespread ripping of discs into uncompressed formats, enabling mass sharing on early platforms and contributing to documented industry losses exceeding $3 billion annually from illegal video copying by the early 2000s. Courts in cases such as Universal City Studios, Inc. v. Reimerdes affirmed that DeCSS lacked substantial noninfringing utility, exposing copyrighted works to pervasive infringement risks that contractual safeguards alone could not mitigate. Defenses of stringent anti-circumvention enforcement emphasize causal linkages between robust protections and sustained investment in , positing that lax barriers to tools like DeCSS foster free-riding behaviors that diminish expected returns and deter production of high-value works. Empirical economic substantiates that stronger IP regimes correlate with elevated , , and creative investments, as they incentivize risk-taking in by securing temporary exclusive against unauthorized exploitation. This perspective prioritizes adherence to rule-of-law frameworks over selective challenges to established protections, countering claims that circumvention harms are negligible by highlighting verifiable declines in content security and the resultant economic disincentives for creators.

References

  1. [1]
    CSS Demystified
    CSS is a relatively simple encryption technology: essentially, each disc is encrypted with a 40-bit key that is generated for each movie.
  2. [2]
    Content Scrambling System (CSS): Introduction
    DeCSS, which is open source, allows Linux-based systems to access the content of DVDs by emulating a licensed player and performing the authentication and ...
  3. [3]
    A look at content scrambling in DVDs - UCSD Math
    In late October 1999, he released on the Internet, a software program called DeCSS that could actually decrypt the contents of DVDs. Johansen acknowledges ...
  4. [4]
    Analysis of DVD ContentsScrambling System
    CSS was designed with a 40 bit keylength to comply with US government export regulation, and as such it easily compromised through brute force attacks ...
  5. [5]
    Why the DVD Hack Was a Cinch - WIRED
    Nov 2, 1999 · To descramble the video and audio, a 5-byte (40-bit) key is needed. ... So even if all future DVD movies remove the Xing key, DeCSS has a plethora ...
  6. [6]
    The CSS Decryption Algorithm - CMU School of Computer Science
    Nov 14, 2000 · In this paper I describe, in plain English, the algorithm for decrypting DVDs that have been encrypted using CSS, the Content Scrambling System.
  7. [7]
    [PDF] DVD COPY CONTROL ASSOCIATION V. BUNNER
    In an effort to stop the dissemination of DeCSS and the many similar programs that followed, the DVD-CCA and the major motion picture stu- dios filed suit ...<|separator|>
  8. [8]
    Teen Acquitted of Hollywood Piracy Charges | PBS News
    Jan 8, 2003 · Johansen's DeCSS program works to remove the copyright protection technology, called Content Scrambling System, from DVD videodiscs, enabling ...
  9. [9]
    5 DeCSS: Origins and the Bunner Case - MIT Press Direct
    The CSS technological protection measure uses a series of keys to encode the video content on DVDs and establishes the technologi- cal system that enforces the ...
  10. [10]
    CSS (Content Scramble System) | Symmetric Cipher | Crypto-IT
    Based on the secret 40-bit long key, two linear feedback shift registers - LFSR, LFSR-17 (17-bit length) and LFSR-25 (25-bit length) and one more additional bit ...
  11. [11]
    DVD Encryption Technology | CSS Algorithm & Regional Protection ...
    Technical Specifications ; Encryption Algorithm, 40-bit CSS Stream Cipher, Content scrambling ; Key Length, 40 bits (5 bytes), Title key encryption.
  12. [12]
    [PDF] Cryptography – The Rise and Fall of DVD Encryption
    Dec 19, 2007 · The CSS cipher is a 40-bit key length symmetric stream cipher, which uses two CSS-variant LFSRs, one 25-bit and one 17-bit, to provide a pseudo-.
  13. [13]
    Developing an Hedonic Regression Model For DVD Players In the ...
    DVD (Digital Versatile Disk) players were introduced into the US market in the spring of 1997. Monthly sales of DVD players have been rapidly increasing, with ...Missing: commercial | Show results with:commercial
  14. [14]
    Content Scramble System (CSS) - DVD CCA
    A CSS License is required to use CSS technology, and to receive and/or use and/or distribute CSS enabled DVD product characterized as Schedule 1 and/or 2 ...Missing: development | Show results with:development
  15. [15]
    The Case Against the DMCA | Linux Journal
    Apr 11, 2002 · After the DVD-CCA refused to license CSS to the open-source project ... This is a violation of the DMCA, since they did not license CSS from the ...
  16. [16]
    Norway Indicts Teen Who Published Code Liberating DVDs
    The MPAA CSS licensing entity, named DVD-CCA, refuses to license CSS to ... open source project collaborating on the Web to build interoperable software tools.
  17. [17]
    [PDF] Motion to Dismiss
    Sep 28, 2000 · The DVD CCA refuses to license CSS without requiring these consumer unfriendly features. The GNU/Linux platform is an open source operating ...
  18. [18]
    Hacking the System - Stanford Computer Science
    It was developed by Linus Torvalds at the University of Helsinki (now Transmedia in California) and first released in October 1985. Linux is based on the open ...
  19. [19]
    For iTunes hacker, the freedom of the open code - CNET
    Shortly after DeCSS was released on the Web in 1999, the Norwegian police raided his home. Johansen was charged with violating a Norwegian law that prohibits ...
  20. [20]
    DVD Jon faces summer retrial - The Register
    Mar 3, 2003 · The case began three years ago when Johansen, then aged only 15, helped develop DeCSS to get around the copy protection measures on DVDs ...
  21. [21]
    So now that the HDCP key is loose, what does it all mean? - ZDNET
    Sep 20, 2010 · On October 6, 1999, the collective dreams of the movie industry were dashed when a Norwegian teenager named Jon Lech Johansen ... DeCSS, a ...
  22. [22]
    Malicious Life Podcast: DeCSS - Hackers vs. Hollywood - Cybereason
    Drink or Die, or DoD, for short, was founded in 1993 by a hacker living in Moscow. By 1995 DoD was a global piracy enterprise, with branches in the U.S., Europe ...
  23. [23]
    Hacker 'DVD Jon' Goes on Trial - WIRED
    Dec 8, 2002 · Johansen, now 19 and known in Norway as "DVD Jon," became a rallying point for hackers, some of whom even marched in his support when witnessed ...
  24. [24]
    With DeCSS behind him, "DVD Jon" turns his attention to Apple's ...
    Oct 23, 2006 · Robert Levine of Fortune reports:When he was 15, [Jon Lech] Johansen got frustrated when his DVDs didn't work the way he wanted them to.
  25. [25]
    Net Information About The Jon Johansen (“DVD Jon”) Case - EFN
    May 18, 2004 · The autumn of 1999 Jon Lech Johansen (“DVD Jon ... The program that made this possible was called “DeCSS” and released on the Internet.
  26. [26]
    [PDF] dCryptology
    The Disk-Key. This key is used to encrypt the title key, and is itself decrypted by using the playerkey. A table of the disk key encrypted under all the 409 ...
  27. [27]
    Interview with the Hacker - IGN
    Feb 2, 2000 · The point of DeCSS, Johansen says, is to create DVD support for the Linux operating system, so that the growing community of Linux users can ...<|separator|>
  28. [28]
    libdvdcss - VideoLAN - VLC Media Player
    Missing: history integration MPlayer
  29. [29]
    libdvdread, libdvdnav and libdvdcss releases - Jean-Baptiste Kempf
    libdvdread and libdvdnav started with the Ogle DVD player, in 1999. Ogle split libdvdread from their player and released versions 0.8.0, 0.9.0, and 0.9.1 in ...
  30. [30]
    RestrictedFormats/PlayingDVDs - Community Help Wiki
    Dec 29, 2018 · By installing the libdvdcss2 package you can play encrypted DVDs with: Kaffeine, the Kubuntu video player. MPlayer · xine · VLC media player.Missing: integration | Show results with:integration
  31. [31]
    [PDF] An Overview of the Advanced Access Content System (AACS)
    AACS is the successor to the Content Scramble System (CSS) [2] used to protect the content on. DVDs, and the Content Protection for Recordable/Pre-Recorded ...<|separator|>
  32. [32]
    [PDF] CRYPTOGRAPHY 2006 THE RISE AND FALL OF DVD ENCRYPTION
    Dec 15, 2006 · The fact that it is possible to find the disc key in 225 and hence decrypt the entire DVD, shows that the CSS cryptosystem is completely broken.
  33. [33]
    DVD hacker Johansen indicted in Norway - The Register
    Jan 10, 2002 · Norwegian prosecutors have indicted Jon Johansen for his role in creating the DeCSS program that unlocked a DVD copy protection system and ...Missing: raid | Show results with:raid
  34. [34]
    Norwegian Teen Acquitted in DVD Film Cracking Case | Law.com
    The prosecution charged Johansen with data break-in, rather than copyright infringement. Although the decision is legally binding only in Norway, it "will be ...
  35. [35]
    DVD Hacker Hero Acquitted Again - CBS News
    Dec 9, 2002 · Prosecutors had appealed Jon Lech Johansen's January acquittal of charges he violated Norway's data break-in laws with his DeCSS program.
  36. [36]
  37. [37]
    DVD Jon gets retrial date - The Register
    Apr 2, 2003 · On this basis, Johansen (affectionately known as 'DVD Jon') was cleared of piracy and distribution of the DeCSS DVD code-breaking program.
  38. [38]
    Intellectual property rights vs. public access rights: ethical aspects of ...
    Apr 9, 2005 · Two Norwegian court rulings in 2003 unanimously ruled that the program did not amount to a breach of Norwegian law, and he was fully acquitted.
  39. [39]
    DVD security cracker wins appeal in Norway - Pinsent Masons
    Jan 5, 2004 · Now 20, Johansen was acquitted last January of violating a Norwegian data security law prohibiting the unauthorised compromising of computer ...Missing: 2002 | Show results with:2002
  40. [40]
    Universal City Studios, Inc. v. Reimerdes | H2O - Open Casebooks
    In this case, defendants concededly offered and provided and, absent a court order, would continue to offer and provide DeCSS to the public by making it ...
  41. [41]
    Universal City Studios, Inc. v. Reimerdes, 111 F. Supp. 2d 294 (2000)
    Universal Studios sued a hacker for distributing DeCSS, a code to bypass DVD encryption. The court issued a permanent injunction against the hacker.
  42. [42]
    UNIVERSAL CITY STUDIOS, INC. v. REIMERDES
    They contend that plaintiffs' posting of DeCSS violates Section 1201(a)(2) of the statute, which prohibits unauthorized offering of products that circumvent ...
  43. [43]
    Universal City Studios, Inc. v. Corley, 273 F.3d 429 (2d Cir. 2001)
    This case involves the DMCA, encryption, and the program DeCSS. The court enjoined Corley from posting DeCSS, raising First Amendment issues.
  44. [44]
    MPAA v. 2600 - Court of Appeals Second Circuit Decision
    The injunction primarily bars the Appellants from posting DeCSS on their web site and from knowingly linking their web site to any other web site on which ...
  45. [45]
    Court Rejects Review of 2600 Magazine Digital Copyright Case
    ... injunction against the Web publisher. Major Hollywood movie studios obtained an injunction in 2000, barring 2600 Magazine from publishing or linking to ...
  46. [46]
    [PDF] Universal City Studios, Inc. v. Reimerdes - NSUWorks
    This decision centered on the creation, posting, and linking of DeCSS a computer code used to circumvent CSS, the copyright protection device, inherent in ...
  47. [47]
    DVD COPY CONTROL ASSOCIATION INC v. BUNNER (2004)
    DVD CCA filed the instant complaint for injunctive relief on December 27, 1999, alleging that Bunner and the other defendants had misappropriated trade secrets ...Missing: litigation | Show results with:litigation
  48. [48]
    DVD Copy Control v. Bunner - Mon, 08/25/2003
    In this case, a Web site operator posted trade secrets owned by another on his Internet Web site despite knowing or having reason to know that the secrets were ...Missing: details | Show results with:details
  49. [49]
    [REVIEW GRANTED] DVD Copy Control Assn. v. Bunner (2001)
    Nov 1, 2001 · CSS is primarily composed of algorithms and 400 "master keys." Every CSS-encrypted DVD contains all 400 master keys, one of which is the trade ...Missing: CCA | Show results with:CCA
  50. [50]
    DVD Copy Control v. Bunner - California Case Law
    Aug 25, 2003 · DVD Copy Control v. Bunner, Supreme Court of California 2003. ... Filed 8/25/03 IN THE SUPREME COURT OF CALIFORNIA DVD COPY CONTROL ASSOCIATION, ...
  51. [51]
    Global film industry losing up to $3.5bn from piracy - Screen Daily
    Jun 5, 2003 · The global film industry is currently losing $3bn-$3.5bn per year to illegal piracy operations, according to a new report The Impact Of ...
  52. [52]
    [PDF] The Growing Threat of Internet Piracy in the Movie Industry:
    In 2005, the MPAA claimed that worldwide losses to movie piracy amounted to about. $18.2 billion, with $6.1 billion of that missing revenue accounted for by ...Missing: global | Show results with:global
  53. [53]
    MPAA v. 2600 - Plaintiffs' Post-Trial Brief - cs.princeton.edu
    The DMCA addresses the problem of the instantaneous, widespread proliferation of infringing copies made possible through the Internet, and expressly authorizes ...
  54. [54]
    DVDCCA v Bunner and DVDCCA v Pavlovich
    The DVD-CCA claimed that defendants misappropriated trade secrets when they published DeCSS. This case follows two main paths, Bunner and Pavlovich, both of ...Missing: details | Show results with:details
  55. [55]
    Free Speech Rights for Programmers
    When a decryption program called DeCSS began to propagate on the Net, the studios filed lawsuits to suppress it. They claimed the program was an illegal ...
  56. [56]
    Unintended Consequences: Fifteen Years under the DMCA
    Section 1201 has been used by a number of copyright owners to stifle free speech and legitimate scientific research. The lawsuit against 2600 magazine, threats ...
  57. [57]
    A Great Debate: Is Computer Code Protected Speech?
    Nov 30, 2001 · David Touretzky's slides from "A Great Debate: Is Computer Code Protected Speech?", November 30, 2001, Carnegie Mellon University.
  58. [58]
    [PDF] de-coding free speech: a first amendment theory for the digital age
    For more than two decades, courts have embraced the rule that computer code is “speech” within the meaning of the First Amendment. While this.
  59. [59]
    DVD Industry Wins in Digital Copying Case | PBS News
    Aug 26, 2003 · The Motion Picture Association of America (MPAA) contends that movie studios lose more than $3 billion in annual sales to the illegal copying of ...
  60. [60]
    Why IP Rights Protection Matters for Growth | St. Louis Fed
    Sep 12, 2019 · Intellectual property rights protection is key to promoting international technology transfer, which is important for economic growth, ...
  61. [61]
    [PDF] UNIVERSAL CITY STUDIOS, INC. v. ERIC CORLEY 273 F.3d 429 ...
    The Court observed that DeCSS was harming the Plaintiffs, not only because they were now exposed to the possibility of piracy and therefore were obliged to ...