Talk:Windows Media DRM

From Wikipedia, the free encyclopedia
Jump to: navigation, search
WikiProject Microsoft Windows / Computing  (Rated B-class, Mid-importance)
WikiProject icon This article is within the scope of WikiProject Microsoft Windows, a collaborative effort to improve the coverage of Microsoft Windows on Wikipedia. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.
B-Class article B  This article has been rated as B-Class on the project's quality scale.
 Mid  This article has been rated as Mid-importance on the project's importance scale.
Taskforce icon
This article is supported by WikiProject Computing (marked as Low-importance).
 

The intro needs rewording. I'll do it later if no one beats me to it. Wsf 16:53, 12 February 2006 (UTC)


Gaah! FairUse4WM is linked to from here, which in turn redirects to back here! Somebody stop this madness

Removal[edit]

Does the "Removal" section need to be corrected according to the end of the "How it works" section?

I'd understand if there are any password-cracking techniques for static (infinite session time) file content. But the only WMDRM usage I know is related to encrypting a video stream where a key exchange is required. This would make WMDRM difficult to crack, no less than SSL and HTTPS. ilgiz 03:38, 27 September 2006 (UTC)

Even the FairUse4WM's author's words are confusing. He claims that

On a theoretical level, they have to send the decryption keys outside of their control, and their only defense is through obfuscation.

[1]

I don't understand why the following scheme could be vulnerable:

  • the client software generates a public and a secret key and
  • sends out only the public key to the WMDRM server for encrypting the stream.

In this case, the stream couldn't be deciphered by an interceptor.

If the FairUse4WM's idea is about defeating the authentication stage rather than deciphering a stream sent to a valid user, there is a challenge-response technique that makes the simulation attacks difficult.

Perhaps, the crack is targeting the on-disk keystore with the WMDRM user ID? Indeed, it would only be possible to obfuscate the on-disk information. ilgiz 04:14, 27 September 2006 (UTC)

All it lets you do its take content you can play and make it so others can play it. At one level no different then playing it and looping the sound/video back into a sound video in and capturing it. Of course it does it quickly, easily and as a perfect copy of the version you had (minus the drm part of course).

FairUse4WM current status ?[edit]

Does the latest version of FairUse4WM work with the latest DRM from MS ?

--Xerces8 09:20, 2 May 2007 (UTC)

Dangers of DRM[edit]

I read in a magazine that virus and malware authors have been abusing the DRM in WMA/V. They put fake files on p2p networks that are protected and make the user go to a site (WMP pops up a box containing the url telling the user that they have to go there for the key/codec) that downloads a virus or other malware automatically. Im pretty sure its the DRM but if not ignore this. Should this be mentioned?

  • It's not DRM. It's a very misguided feature of windows media that allows pop-ups. You can do it in files with no DRM. 155.198.65.237 (talk) 12:08, 11 September 2008 (UTC)

DRM Removal directions[edit]

this article appears to be giving lots of directions on how to remove DRM. step by step directions would be more helpful, but i think any directions should be removed.69.155.143.147 (talk) 18:56, 14 December 2007 (UTC)

Robotboy2008 07:11, 17 September 2007 (UTC)

I removed them - if people want that sort of thing, they can link to it, I don't see how it has a place in wikipedia, simply saying it is possible and is done should be enough Moopet (talk) 18:40, 10 January 2008 (UTC)

Freeme2 and DRMDBG[edit]

Should maybe add info on these 2 programs. Works with 11.0.6000.7000 Samanello (talk) 15:08, 2 March 2008 (UTC)