By using this site, you agree to our Privacy Policy and our Terms of Use. Close
Wlakiz

http://freedom-to-tinker.com/blog/jhalderm/aacs-blacklisting-oracles-and-traitor-tracing

"Blacklisting would be a PR and business disaster if it meant a lot of consumers had to throw away their fancy players as a result of a crack. That’s why AACS allows each individual player to be assigned its own unique set of device keys that can be uniquely blacklisted without adversely affecting other players."

 

http://www.freedom-to-tinker.com/blog/jhalderm/aacs-game-theory-blacklisting

Its not that hard to create 34 million keys... think of simplified example .. n%m = 0, if n is the encrypted content and m is the key, how many combination of n and m can you have that satisfy this cipher equation? Answer is infinite. Of course, in real life, encryption is done with chain-cipher-blocks which is harder to decrypt and the keys are hash generated which makes it harder to brute force.

Whether or not, Sony has done enough book keeping to keep a record of all device keys and their assoicated Ps3 is another issue, but it is definetly within the technology limit and their power to single out and blacklist specific PS3/blu-ray players.

I am not too certain what kind of information, you want. There are a lot of sites with articles regarding aacs blacklisting device keys. I found the one I just linked with google. Are you more interested in encryption information or DRM system?

 

Also, my second article about PS3 decryption is to prove to you that PS3 have their own decryption key since you previously thought that all decryption key was on the blu-ray disc opposed to being onthe system.

 

Thanks. I do understand now, its actually a feature of AACS. It was hard to imagine that they would do things like that. We probably will see the consequences in the future. The problem is still to get the compromised keys and then you can blacklist the product. But nevertheless impressive. Companies have one mayor advantage. The advantage is that they can dictate the rules of the game. And have compared to a hacker extremly big ressources. In the long term the hacker will lose the game imo. 

 

See the problem why I thought it wont work is:

 

"(Some serious crypto wizardry is required to enable a huge number of distinct device keys with surgically precise blacklisting, while keeping device memories and disc headers manageably small.)"

 

That was actually the point which made me a little suspicious, I thought they wouldnt create for every device an own key. It seems it wasnt too easy. If you have millions of corrupted devices you would also have millions of keys in the disc header but they solved it somehow it seems.