

r-tracing/ If the attackers physically have every single disc they want to crack, then they can keep the device keys secret. You're right, I was misunderstanding this effect. I would say that is an insanely high ROI. They'd need to ship a copy of every blu-ray ever made to a cracked player to extract the VUKs!Ī bad investment? A single person can find the VUK needed to allow 6 billion people to make a copy of their media. That seems like a big capital investment though. r-tracing/ If the attackers physically have every single disc they want to crack, then you can keep the device keys secret. The only perfect defense would be to blacklist every single player currently in existence, which would be a bit much even for the Bluray consortium. Past public breaks were patched only because they were public as IT security knows, for every public vulnerability there's always at least one that only the criminals and three-letter agencies have. So if they were using vulnerable hardware, they must have had a steady supply of breaks for new hardware, or some way to obfuscate which kind of device they were using.Ī VUK is a VUK, there's no way to every figure out which device the hack came from without a leak of some kind. After blacklisting, new blu-rays won't play on that model of player any more (or any device that used that device key). The AACS system has the ability to blacklist particular device keys. The only expensive part is sourcing new discs. I was under the impression that DVDFab and Slysoft both had hacked hardware that revealed the keys and neither used the other exclusively. The community that knows more about this is quite pessimistic. And as they did it so well, noone else bothered to do it. They really were the only ones to do this for last 10+ years. It enabled me to easily rip my entire bluray library.ĮDIT: Oh and you can get a free beta key on the forum.Thing is, MakeMKV uses also anydvd as a base for encryption.
