This article is within the scope of WikiProject Professional sound production, a collaborative effort to improve the coverage of sound recording and reproduction on Wikipedia. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.Professional sound productionWikipedia:WikiProject Professional sound productionTemplate:WikiProject Professional sound productionProfessional sound production articles
This article is part of WikiProject Electronics, an attempt to provide a standard approach to writing articles about electronics on Wikipedia. If you would like to participate, you can choose to edit the article attached to this page, or visit the project page, where you can join the project and see a list of open tasks. Leave messages at the project talk pageElectronicsWikipedia:WikiProject ElectronicsTemplate:WikiProject Electronicselectronic articles
The contents of the BD-Live page were merged into Blu-ray. For the contribution history and old versions of the redirected page, please see its history; for the discussion at that location, see its talk page.
The contents of the Mini Blu-ray Disc page were merged into Blu-ray. For the contribution history and old versions of the redirected page, please see its history; for the discussion at that location, see its talk page.
The subject of this article is controversial and content may be in dispute. When updating the article, be bold, but not reckless. Feel free to try to improve the article, but don't take it personally if your changes are reversed; instead, come here to the talk page to discuss them. Content must be written from a neutral point of view. Include citations when adding content and consider tagging or removing unsourced information.
If infrared has a wavelength of 650 nm and violet has 405 (60% shorter) then how would that permit 21 more gigabytes to fit? Shouldn't the number be 7.5? What am I miscalculating?--Spectatorbot13 (talk) 13:57, 11 April 2009 (UTC)[reply]
"The first known attack relied on the trusted client problem. In addition, decryption keys have been extracted from a weakly protected player (WinDVD)". Please explain what an attack relying on the "trusted client problem" is, and what's the difference is between that and extracting keys from a PC software (WinDVD). Unless somebody can add more info I suggest we change this. Has any attack relied on something else than extracting single device keys from software or hardware players?
-- LM, 6 June 2009.