List: cryptography Subject: DeCSS Court Hearing Report From: Lucky Green <shamrock () cypherpunks ! to> Date: 1999-12-30 4:06:32 Today, I attended a fascinating hearing in State of California Superior Court (county of Santa Clara). The issue at bar was a request by the "DVD Copy Control Association, Inc." (DVDCCA) to issue a temporary restraining order (TRO) against various named and unnamed operators of websites and other individuals distributing copies of [De]CSS source code. DeCSS was originally published to allow for playback of DVD's on computers running the Linux operating system. The lines appear drawn rather clearly: a "Copy Control Association" vs. the Open Source community. But the hearing left the audience, and I suspect the judge, with many open questions. First, let's introduce the players (I didn't take many notes. Other may have more detailed information). o three attorneys from Weil, Gotshal, and Manges (New York City) for the DVDCCA. o one lone defendant with two attorneys provided by the EFF. o an audience of various Cypherpunks and Linux folks. The DVDCCA's attorneys arrived at the courthouse after the Cypherpunks contingent and had to make their way through a rather impressive crowd (especially given that we had less than a day notice) to file their complaint. One of the attorneys carried several boxes with copies of the complaint. The complaint was sizable. Each copy stacked up almost 3 inches. The plaintiff's attorneys were clearly surprised by the publicity their action had generated. All three attorneys were visibly nervous and apprehensive while waiting in the hallway for the courtroom to open. This is significant, because these folks are professionals. Unlike some random person who suddenly finds himself in court and might reasonably be nervous, these guys crush people for a living. Yet our presence gave them the jitters. This is perhaps not /that/ surprising, given that only a *single* defendant of the 500 alleged defendants bothered to show up in court. Chances are the plaintiff assumed that none of the defendants would appear in court. Had that happened, the plaintiff's attorneys would have present their case, requested a TRO, and absent an opposing party the TRO would have been granted. A mere formality. In and out of the court room in 15 minutes. However, what took place was far from a formality. Instead of the judge rubber-stamping the TRO, the plaintiffs found themselves faced with not only a defendant, but two attorneys for the defendant that in oral arguments framed the issue at bar in very different terms than the "evil hackers are conspiring to cause millions of dollars in damages to the movie industry by distributing software that allows for illegal copies to be created" put forward by the plaintiff. The defendant's attorneys turned a potential "open and shut" case into a First Amendment issue. Not at all what the plaintiffs had in mind. Big thanks go to the EFF for providing for a defense literally overnight. Trying to sum up the arguments made during the hearing by both sides is somewhat challenging, which is probably at least in part due to the fact that the plaintiff's complaint has no merit. Nonetheless, I will try to provide an attempt at summary below. The plaintiff concedes that reverse engineering CSS from an implementation is in principle lawful. However, they also claim that: 1. CSS was reverse engineered from Xing's DVD player. 2. Xing's player requires the user to click on a button accepting a license agreement prohibiting reverse engineering. 3. Reverse engineering could not have been performed without accepting this license agreement. All taken together, the reverse engineering was supposedly performed in violation of the license agreement to which the person performing the reverse engineering allegedly agreed. It probably will not come as a surprise to many readers of this post that the plaintiff failed to provide even a shred of evidence for even a single one of these claims, much less all of them, as would be required by the legal theory advanced by the plaintiff. Next, the plaintiff alleges that since the CSS trade secret was therefore obtained by illegal means (breach of contract) the trade secret is still afforded protection. Similarly to a trade secret that has been leaked by a person under NDA. Furthermore, the plaintiff alleges that every single webmaster that presently mirrors CSS is aware of this supposed illegal origin of the CSS source. The plaintiff conceded that once a webmaster that is unaware of the supposed illegal origin of CSS mirrors the CSS source, the plaintiff's complaint based on trade secret (as found in the Universal Commercial Code) can no longer be made. The plaintiff then requested a TRO to prevent the spread of the CSS source before such a situation occurs. The counsel for the defendant argued that source code is speech, that the theory that CSS was obtained illegally was questionable at best, and that issuing a TRO would chill the speech of not just the individuals presently mirroring CSS, but of webmasters in general. The line of argument made by the plaintiff left the audience rather puzzled. First, basing the litigation on trade secret seems sub-optimal. Not that a different legal argument would be anywhere near compelling, but it appears that an argument based on copyright would have been a better approach. In addition, the plaintiff's choice of venue is simply abysmal. Of the many jurisdictions in which they could have filed a complaint, they chose the 9th Circuit, which as ruled that source code is speech. However, the plaintiff's actions may make more sense when seen in the light of some comments made repeatedly by the plaintiff during the oral argument. The first comment was that the DVDCCA attorneys allege that since the /sole/ purpose of the DVDCCA is to license CSS, a freely downloadable CSS implementation would put the DVDCCA out of business. I would be inclined to concede this point. It is not quite clear to me why this would be a matter of concern, since the DVDCCA is a non-profit organization. (Somebody needs to obtain their financial statements, which, due to their non-profit status must be public). The second, and probably more significant, comment made repeatedly by both the plaintiff and the attorneys for the Motion Picture Association in the affidavits accompanying the complaint, is that the studios would not have agreed to releasing movies on DVD if it hadn't been for the DVD consortium's assurance that DVD technology implements an effective copy protection scheme. It appears the DVD consortium is experiencing a lot of heat from the copyright holders over DeCSS and is in dire need of a scapegoat. Since the DVD consortium's own technical incompetence in fielding a copy protection scheme that is both subject to trivial reverse engineering and cryptanalysis is not considered a desirably admission to make to the studios, the blame needs to be shifted elsewhere. Blaming Does 1-500 appears to have been the fastest excuse the DVD consortium could come up with. [Sidebar: I have just been informed that the judge denied the TRO. This is good news. But the work has just begun]. Even though the judge denied the TRO, our side needs to submit briefs to the Court by January 7th for the preliminary hearing to be held on the 14th. For this to happen we will need two things: technical expertise and money. Today, we caught the plaintiff's attorneys of guard. That won't happen again. According to an affidavit by Harvey Shapiro of Sarogy, Stein, Rosen & Shapiro for the MPAA and MPA, this firm alone has 9 attorneys working on DeCSS. And those aren't just some guys with a law degree. This law firm has been representing the MPAA for 50 years. They are the very embodiment of high-powered American corporate lawyers serving multi-billion dollar clients. I doubt such attorneys run less than $250/hour. If so, the MPAA's legal team alone costs almost $550k per month. The DVDCCA's attorneys are unlikely to be much cheaper. Neither law firm going to make the same mistake twice. I don't envy the DVDCCA/MPAA for the situation they are facing. They must win this case. Otherwise, the almost mythical reputation of invincibility in the courtroom the MPAA has enjoyed for so long will be lost. And the sharks have been waiting for a long time, indeed. Yet, the plaintiffs have a serious problem: their complaint is without merit. This probably wouldn't be the first time they won a case without merit, but I sincerely doubt it will happen this time. At least it won't if we do what needs to be done. I believe the it is crucial for us to do the following: o support the EFF and others helping to provide legal representation to the defendants with cash contributions. We need to raise several hundred of thousands of dollars to win this fight. I am putting my money where my mouth is and hereby pledge a contribution of $2000. o the named defendants and their counsel need to show up in court for the hearing on the 14th. You can't win a case if you refuse to stand up for yourself in court. Don't stick you head into the sand. If you live in the US and you name or website is mentioned in the complaint, you only have two realistic choices: show up in court or cave in to the censors. o the unnamed John Does should stay out of this unless they are willing to fight in court. The plaintiff expressed great frustration at not being able to serve legal notice to defendants only known as "csssux@some_mail_forwarder.com". Let's not make their job any easier. o coordinate our actions with those who have been down this road before. It probably would be best to contact Robin Gross <robin@eff.org>, the EFF's lead attorney for this case, if you are (or intend to) be involved in this case in any way. o FWIW, there is one small benefit of coming forward as a John Doe: the plaintiffs will serve you all the legal documents directly. They'll even automatically email them to you in MSWord format, ready for publication on a website. [Disclaimer: I am not an attorney licensed to practice law in the State of California. The preceding represents my personal opinion and should not be considered legal advice]. --Lucky Green < shamrock@cypherpunks.to> "Among the many misdeeds of British rule in India, history will look upon the Act depriving a whole nation of arms as the blackest." - Mohandas K. Gandhi, An Autobiography, pg 446 http://www.citizensofamerica.org/missing.ram
List: cryptography Subject: Re: DeCSS Court Hearing Report From: Sameer Parekh <sameer () bpm ! ai> Date: 1999-12-30 19:44:12 Let me just echo everything Lucky has said, and emphasize a few things. The EFF truly saved the day in this case. Without quick action on the part of the EFF the TRO would have been granted and the DVD CCA would have dealt a significant blow to free speech. Attorneys for the defense Robin Gross and Allonn Levy deserve our gratitude. Many thanks also to the sole defendant Andrew Bunner who decided to stand up to the DVD CCA and appear in court. I am not at all surprised that the DVD CCA attorneys did not act completely professionally. The lead attorney in fact was extremely flustered during his rebuttal, which I'm sure did not help his case. I suspect the DVD CCA didn't bring out their best and brightest for this hearing because, as has already been stated, they expected it to be an open and shut 15 minute no-defendant-present TRO hearing. Now that they have seen what opposition we can muster on two days notice, we can expect that the DVD CCA will be making sure their best people are on the case, people who will not get flustered during rebuttal, people who will not show any visible signs of unease before a hearing. This is an incredibly important case. Its outcome could set the tone for future interactions between the large copyright holders (MPAA, RIAA, etc.) and the Internet community at large. This case will determine if the large copyright holders will be able to just roll over whomever they like at their whim or if they are going to think twice before launching a baseless case such as this. The DVD CCA does not have a strong case, but they will not back down. They have too much riding on this. As Lucky has stated, their entire existence is built upon licensing the CSS technology. Since it is no longer a trade secret, they have nothing left to license. The DVD CCA has expected and continues to expect to win -- not on the merits of their case, but based upon the simple fact that they have more money than the defendants in the lawsuit. We need to prove them wrong. Just yesterday I sent a check to the EFF for $5,000. I encourage everyone who has an interest in free speech to help show the DVD CCA and its member organizations that they can not and will not be able to use their financial might to censor free speech. I will dispute Lucky's point, however, that cash contributions are the best way to support the EFF. By donating appreciated liquid securities rather than cash you get substantially increased tax benefits over donating cash. Consult your accountant. Plan to show up at the hearing January 14th. Show the judge that this is an issue that matters. Tell people about the case. Impress upon them how important this case is in the fight for free expression as more and more expression is done with source code, audio, and video technology. There was substantial support at the hearing from the Linux community, but the support from the Cypherpunk and MP3/music communities was thin to non-existent. This is not just a Linux issue. This is a free speech issue. And of course, contribute what you can to the EFF. Imagine what the Internet would be like without the EFF. Source code would not be speech in the 9th circuit. "Indecency" (an ill-defined term at best) would be illegal on the Internet. The BXA would not be rewriting the encryption regulations to support open source. Without the EFF, the Internet as we know it and the associated wealth created with this Internet would not exist. Thank you, -s > > Today, I attended a fascinating hearing in State of California Superior > Court (county of Santa Clara). The issue at bar was a request by the "DVD > Copy Control Association, Inc." (DVDCCA) to issue a temporary restraining > order (TRO) against various named and unnamed operators of websites and > other individuals distributing copies of [De]CSS source code. DeCSS was > originally published to allow for playback of DVD's on computers running the > Linux operating system. > > The lines appear drawn rather clearly: a "Copy Control Association" vs. the > Open Source community. But the hearing left the audience, and I suspect the > judge, with many open questions. > > First, let's introduce the players (I didn't take many notes. Other may have > more detailed information). > > o three attorneys from Weil, Gotshal, and Manges (New York City) for the > DVDCCA. > o one lone defendant with two attorneys provided by the EFF. > o an audience of various Cypherpunks and Linux folks. > > The DVDCCA's attorneys arrived at the courthouse after the Cypherpunks > contingent and had to make their way through a rather impressive crowd > (especially given that we had less than a day notice) to file their > complaint. One of the attorneys carried several boxes with copies of the > complaint. The complaint was sizable. Each copy stacked up almost 3 inches. > > The plaintiff's attorneys were clearly surprised by the publicity their > action had generated. All three attorneys were visibly nervous and > apprehensive while waiting in the hallway for the courtroom to open. This is > significant, because these folks are professionals. Unlike some random > person who suddenly finds himself in court and might reasonably be nervous, > these guys crush people for a living. Yet our presence gave them the > jitters. > > This is perhaps not /that/ surprising, given that only a *single* defendant > of the 500 alleged defendants bothered to show up in court. Chances are the > plaintiff assumed that none of the defendants would appear in court. Had > that happened, the plaintiff's attorneys would have present their case, > requested a TRO, and absent an opposing party the TRO would have been > granted. A mere formality. In and out of the court room in 15 minutes. > > However, what took place was far from a formality. Instead of the judge > rubber-stamping the TRO, the plaintiffs found themselves faced with not only > a defendant, but two attorneys for the defendant that in oral arguments > framed the issue at bar in very different terms than the "evil hackers are > conspiring to cause millions of dollars in damages to the movie industry by > distributing software that allows for illegal copies to be created" put > forward by the plaintiff. The defendant's attorneys turned a potential "open > and shut" case into a First Amendment issue. Not at all what the plaintiffs > had in mind. Big thanks go to the EFF for providing for a defense literally > overnight. > > Trying to sum up the arguments made during the hearing by both sides is > somewhat challenging, which is probably at least in part due to the fact > that the plaintiff's complaint has no merit. Nonetheless, I will try to > provide an attempt at summary below. > > The plaintiff concedes that reverse engineering CSS from an implementation > is in principle lawful. However, they also claim that: > > 1. CSS was reverse engineered from Xing's DVD player. > 2. Xing's player requires the user to click on a button accepting a license > agreement prohibiting reverse engineering. > 3. Reverse engineering could not have been performed without accepting this > license agreement. > > All taken together, the reverse engineering was supposedly performed in > violation of the license agreement to which the person performing the > reverse engineering allegedly agreed. It probably will not come as a > surprise to many readers of this post that the plaintiff failed to provide > even a shred of evidence for even a single one of these claims, much less > all of them, as would be required by the legal theory advanced by the > plaintiff. > > Next, the plaintiff alleges that since the CSS trade secret was therefore > obtained by illegal means (breach of contract) the trade secret is still > afforded protection. Similarly to a trade secret that has been leaked by a > person under NDA. > > Furthermore, the plaintiff alleges that every single webmaster that > presently mirrors CSS is aware of this supposed illegal origin of the CSS > source. The plaintiff conceded that once a webmaster that is unaware of the > supposed illegal origin of CSS mirrors the CSS source, the plaintiff's > complaint based on trade secret (as found in the Universal Commercial Code) > can no longer be made. The plaintiff then requested a TRO to prevent the > spread of the CSS source before such a situation occurs. > > The counsel for the defendant argued that source code is speech, that the > theory that CSS was obtained illegally was questionable at best, and that > issuing a TRO would chill the speech of not just the individuals presently > mirroring CSS, but of webmasters in general. > > The line of argument made by the plaintiff left the audience rather puzzled. > First, basing the litigation on trade secret seems sub-optimal. Not that a > different legal argument would be anywhere near compelling, but it appears > that an argument based on copyright would have been a better approach. In > addition, the plaintiff's choice of venue is simply abysmal. Of the many > jurisdictions in which they could have filed a complaint, they chose the 9th > Circuit, which as ruled that source code is speech. > > However, the plaintiff's actions may make more sense when seen in the light > of some comments made repeatedly by the plaintiff during the oral argument. > The first comment was that the DVDCCA attorneys allege that since the /sole/ > purpose of the DVDCCA is to license CSS, a freely downloadable CSS > implementation would put the DVDCCA out of business. I would be inclined to > concede this point. It is not quite clear to me why this would be a matter > of concern, since the DVDCCA is a non-profit organization. (Somebody needs > to obtain their financial statements, which, due to their non-profit status > must be public). > > The second, and probably more significant, comment made repeatedly by both > the plaintiff and the attorneys for the Motion Picture Association in the > affidavits accompanying the complaint, is that the studios would not have > agreed to releasing movies on DVD if it hadn't been for the DVD consortium's > assurance that DVD technology implements an effective copy protection > scheme. It appears the DVD consortium is experiencing a lot of heat from the > copyright holders over DeCSS and is in dire need of a scapegoat. Since the > DVD consortium's own technical incompetence in fielding a copy protection > scheme that is both subject to trivial reverse engineering and cryptanalysis > is not considered a desirably admission to make to the studios, the blame > needs to be shifted elsewhere. Blaming Does 1-500 appears to have been the > fastest excuse the DVD consortium could come up with. > > [Sidebar: I have just been informed that the judge denied the TRO. This is > good news. But the work has just begun]. > > Even though the judge denied the TRO, our side needs to submit briefs to the > Court by January 7th for the preliminary hearing to be held on the 14th. For > this to happen we will need two things: technical expertise and money. > Today, we caught the plaintiff's attorneys of guard. That won't happen > again. According to an affidavit by Harvey Shapiro of Sarogy, Stein, Rosen & > Shapiro for the MPAA and MPA, this firm alone has 9 attorneys working on > DeCSS. And those aren't just some guys with a law degree. This law firm has > been representing the MPAA for 50 years. They are the very embodiment of > high-powered American corporate lawyers serving multi-billion dollar > clients. I doubt such attorneys run less than $250/hour. If so, the MPAA's > legal team alone costs almost $550k per month. The DVDCCA's attorneys are > unlikely to be much cheaper. Neither law firm going to make the same mistake > twice. > > I don't envy the DVDCCA/MPAA for the situation they are facing. They must > win this case. Otherwise, the almost mythical reputation of invincibility in > the courtroom the MPAA has enjoyed for so long will be lost. And the sharks > have been waiting for a long time, indeed. Yet, the plaintiffs have a > serious problem: their complaint is without merit. This probably wouldn't be > the first time they won a case without merit, but I sincerely doubt it will > happen this time. At least it won't if we do what needs to be done. > > I believe the it is crucial for us to do the following: > > o support the EFF and others helping to provide legal representation to the > defendants with cash contributions. We need to raise several hundred of > thousands of dollars to win this fight. I am putting my money where my mouth > is and hereby pledge a contribution of $2000. > > o the named defendants and their counsel need to show up in court for the > hearing on the 14th. You can't win a case if you refuse to stand up for > yourself in court. Don't stick you head into the sand. If you live in the US > and you name or website is mentioned in the complaint, you only have two > realistic choices: show up in court or cave in to the censors. > > o the unnamed John Does should stay out of this unless they are willing to > fight in court. The plaintiff expressed great frustration at not being able > to serve legal notice to defendants only known as > "csssux@some_mail_forwarder.com". Let's not make their job any easier. > > o coordinate our actions with those who have been down this road before. It > probably would be best to contact Robin Gross <robin@eff.org>, the EFF's > lead attorney for this case, if you are (or intend to) be involved in this > case in any way. > > o FWIW, there is one small benefit of coming forward as a John Doe: the > plaintiffs will serve you all the legal documents directly. They'll even > automatically email them to you in MSWord format, ready for publication on a > website. > > [Disclaimer: I am not an attorney licensed to practice law in the State of > California. The preceding represents my personal opinion and should not be > considered legal advice]. > > --Lucky Green <shamrock@cypherpunks.to> > > "Among the many misdeeds of British rule in India, history will look > upon the Act depriving a whole nation of arms as the blackest." > - Mohandas K. Gandhi, An Autobiography, pg 446 > http://www.citizensofamerica.org/missing.ram > -- sameer
List: cryptography Subject: Re: DeCSS Court Hearing Report From: Andreas Bogk <andreas () andreas ! org> Date: 2000-01-02 3:37:18 Lucky Green < shamrock@cypherpunks.to> writes: > other individuals distributing copies of [De]CSS source code. DeCSS was > originally published to allow for playback of DVD's on computers running the > Linux operating system. I think it's about time to clear up some issues. DeCSS is *not* Linux software. But DeCSS would not have been possible without the Linux DVD development, and CSS playback under Linux would have been much harder without the release of the DeCSS source code. To make sense out of what I'm saying, it helps to take a look at how CSS works. The basic idea is that the DVD is encrypted, and the decryption key is stored on the disk, at a place where it isn't directly readable on an ordinary PC DVD drive. Now to play back a DVD, the decoder software or hardware runs a two-way authentication and key exchange with the drive. Now the key material is transmitted from the drive to the decoder, obfuscated with the negotiated session key. How to do this key exchange has been known to the Linux community for almost a year, after an anonymous member of the livid (LInux VIDeo) mailing list posted reverse engineered assembler code of the key exchange to the mailing list. This code does *not* come from the Xing player. The code had been analyzed and re-implemented in C by the livid members. The interesting point here is that this information is already sufficient for copying a DVD: just copy all of the sectors and the key information. The second step is the actual decryption of the DVD sectors. For that, there's a so-called player key required. The idea is that the title key (the actual key used for decryption) is encrypted with a disk key, which in turn is encrypted with 408 player keys, and all 409 encrypted disk keys are stored on the disk. The idea is that every player contains one of the 408 player keys, and if any of the keys gets published, you can just omit that slot on all future DVDs and thus limit the impact of the problem. Now one of those player keys, as well as the actual bulk cipher, were reverse engineered by two independent parties: one released a tool called SpeedRipper, the other a tool named DeCSS. Both tools used the source code developed by the Linux community. Cipher and key in DeCSS were recovered from Xing's player. The fact that Xing didn't take steps to make reverse engineering harder only made that step faster, it had *not* been crucial for the success. Now someone anonymously mailed the DeCSS source code to the livid list, where in turn the code was analyzed. After a very short time, cryptanalyzers blew a couple of deadly holes into the whole scheme, making the encryption breakable without even knowing any player key in under 20 seconds. At that phase, the DVD consortium started to get really pissed. No, not because of copyright issues; as I have shown above, copying a DVD had been possible before, and tools to capture and re-encode DVDs to MPEG1 (which makes pirating a DVD manageable, in contrast to the 4.7GB files DeCSS will give you) also existed before. The only reason that justifies the existence of the player keys in the CSS scheme is control of the DVD consortium over the licensees: they can always threaten to revoke the player key of a given licensee if that licensee doesn't play by the rules (Macrovision, Region Codes, etc.). Now that the scheme has been published and broken, it's possible for anybody (and that distinctly includes the Linux folks) to build a DVD player. *That's* what they were afraid of. Piracy has been possible before, and they didn't care. > The lines appear drawn rather clearly: a "Copy Control Association" vs. the > Open Source community. But the hearing left the audience, and I suspect the Their use of the word "Copy Control" is heavy spin-doctoring. It's about closed vs. open standards, about monopolies vs. open markets, control vs. freedom. > 1. CSS was reverse engineered from Xing's DVD player. Only parts come from the Xing player. > The line of argument made by the plaintiff left the audience rather puzzled. > First, basing the litigation on trade secret seems sub-optimal. Not that a > different legal argument would be anywhere near compelling, but it appears > that an argument based on copyright would have been a better approach. In But the party whose copyright would have been violated is Xing (plus some other unknown manufacturer), not the DVDCCA; and it wouldn't have been possible to use copyright issues to go after sites like http://crypto.gq.nu, which only contain a description of the process, not actual code. > The first comment was that the DVDCCA attorneys allege that since the /sole/ > purpose of the DVDCCA is to license CSS, a freely downloadable CSS > implementation would put the DVDCCA out of business. I would be inclined to Is it just me, or did the DVDCCA not exist when DeCSS was released? I've never heard of them, and when I tried to obtain a CSS license, the information I had was that CSS is licensed by some japanese company (which by the way didn't bother to respond to my request to license CSS for the purpose of building a Linux DVD player. Mistake.). > The second, and probably more significant, comment made repeatedly by both > the plaintiff and the attorneys for the Motion Picture Association in the > affidavits accompanying the complaint, is that the studios would not have > agreed to releasing movies on DVD if it hadn't been for the DVD consortium's > assurance that DVD technology implements an effective copy protection > scheme. It appears the DVD consortium is experiencing a lot of heat from the So in other words, the DVD Consortium lied to the movie industry, and are now trying to keep a straight face by legal moves. And they *knew* about the weaknesses. At the ISSE 1999 security conference in Berlin I've talked to the guy from Intel who designed the key management mechanism for DVD (and the Pentium III RNG btw.), and asked him if we didn't consider the 40 bit keylength a little weak. His answer was (and this was before the DeCSS release, and before public analysis) that there's a 2^16 attack on the bulk cipher, and that his part of the scheme was one of the strongest parts overall, and that the DVD Consortium knows about this. The 2^16 attack had been rediscovered later. > o coordinate our actions with those who have been down this road before. It > probably would be best to contact Robin Gross <robin@eff.org>, the EFF's > lead attorney for this case, if you are (or intend to) be involved in this > case in any way. I can't come to the US at the moment for personal reasons, but I'm available for expertise, phone conferences etc. I think I know quite a bit about CSS, and I know most of the people involved. Andreas P.S.: Interestingly enough, the following pages were not on the list of URLs in the legal documents, even though they contain lots of information about CSS and the whole story: http://www.fefe.de/dvd/ http://www.ccc.de/tvcrypt/dvd/ http://dvd.flatline.de/ All three contain a German text giving an analysis of the issues, some only relevant to Germany, but most of them for anybody, as well as copies of the relevant postings to the livid mailing list. Andreas -- "We should be willing to look at the source code we produce not as the end product of a more interesting process, but as an artifact in its own right. It should look good stuck up on the wall." -- http://www.ftech.net/~honeyg/progstone/progstone.html
List: cryptography Subject: Re: DeCSS Court Hearing Report From: Ray Hirschfeld <R.Hirschfeld () cwi ! nl> Date: 2000-01-03 20:54:49 > Date: Wed, 29 Dec 1999 20:06:32 -0800 > From: Lucky Green <shamrock@cypherpunks.to> > First, basing the litigation on trade secret seems sub-optimal. Not that a > different legal argument would be anywhere near compelling, but it appears > that an argument based on copyright would have been a better approach. I conjecture they did it this way because the prohibition against circumventing effective technological measures that was added to U.S. copyright law in October 1998 (as part of the Digital Millennium Copyright Act, which implemented the WIPO Copyright Treaty) does not take effect until October 28, 2000. Cf. Title 17, Chapter 12. The section against trafficking in devices seems like it might apply, though, and doesn't seem to be subject to the two-year delay. But reverse engineering for interoperability purposes is explicitly permitted, and making information so obtained available to others for interoperability purposes also does not constitute infringement under the new law (cf. Sec. 1201 (f) (3)). (I've just been looking at these regs as part of a separate discussion about DVD region codes.)
List: cryptography Subject: Re: DeCSS Court Hearing Report From: bram <bram () gawth ! com> Date: 2000-01-04 2:43:52 On Mon, 3 Jan 2000, Ray Hirschfeld wrote: > > Date: Wed, 29 Dec 1999 20:06:32 -0800 > > From: Lucky Green < shamrock@cypherpunks.to> > > > but it appears that an argument based on copyright would have been > > a better approach. > > I conjecture they did it this way because the prohibition against > circumventing effective technological measures that was added to > U.S. copyright law in October 1998 (as part of the Digital Millennium > Copyright Act, which implemented the WIPO Copyright Treaty) does not > take effect until October 28, 2000. Cf. Title 17, Chapter 12. The > section against trafficking in devices seems like it might apply, > though, and doesn't seem to be subject to the two-year delay. But > reverse engineering for interoperability purposes is explicitly > permitted, and making information so obtained available to others for > interoperability purposes also does not constitute infringement under > the new law (cf. Sec. 1201 (f) (3)). I'm a little confused. Are you saying that as of October it will be legal to do any amount of reverse-engineering, publishing, and writing to APIs you want without violating the original author's copyright? Does that mean that, say, Bsafe will have the rug yanked out from under it by allowing alternate non-infringing implementations? (Doesn't the RSA patent expire in October as well? That's a mighty funny coincidence ... for anyone other than RSA, anyhow.) -Bram
List: cryptography Subject: Re: DeCSS Court Hearing Report From: Ray Hirschfeld <R.Hirschfeld () cwi ! nl> Date: 2000-01-04 8:21:04 > Date: Mon, 3 Jan 2000 18:43:52 -0800 (PST) > From: bram <bram@gawth.com> > I'm a little confused. Are you saying that as of October it will be legal > to do any amount of reverse-engineering, publishing, and writing to APIs > you want without violating the original author's copyright? Does that mean > that, say, Bsafe will have the rug yanked out from under it by allowing > alternate non-infringing implementations? No, October 28, 2000 is when the act of circumventing an effective technological measure becomes a violation (with exceptions for fair use, crypto research, reverse engineering, law enforcement, etc.). Until then it is legal under the new copyright law. Circumvention for interoperability purposes is already permitted, but not as broadly as you state. Trafficking in technology (including software), the primary purpose of which is to circumvent effective technological measures, is already prohibited. I recommend that you read Section 1201 of Title 17 for details, which is available online at http://www4.law.cornell.edu/uscode/unframed/17/1201.html. I've excerpted the subsection about reverse engineering below (paragraph 3 is the one I mentioned in my previous message). Ray (f) Reverse Engineering. - (1) Notwithstanding the provisions of subsection (a)(1)(A), a person who has lawfully obtained the right to use a copy of a computer program may circumvent a technological measure that effectively controls access to a particular portion of that program for the sole purpose of identifying and analyzing those elements of the program that are necessary to achieve interoperability of an independently created computer program with other programs, and that have not previously been readily available to the person engaging in the circumvention, to the extent any such acts of identification and analysis do not constitute infringement under this title. (2) Notwithstanding the provisions of subsections (a)(2) and (b), a person may develop and employ technological means to circumvent a technological measure, or to circumvent protection afforded by a technological measure, in order to enable the identification and analysis under paragraph (1), or for the purpose of enabling interoperability of an independently created computer program with other programs, if such means are necessary to achieve such interoperability, to the extent that doing so does not constitute infringement under this title. (3) The information acquired through the acts permitted under paragraph (1), and the means permitted under paragraph (2), may be made available to others if the person referred to in paragraph (1) or (2), as the case may be, provides such information or means solely for the purpose of enabling interoperability of an independently created computer program with other programs, and to the extent that doing so does not constitute infringement under this title or violate applicable law other than this section. (4) For purposes of this subsection, the term ''interoperability'' means the ability of computer programs to exchange information, and of such programs mutually to use the information which has been exchanged.
List: cryptography Subject: Re: DeCSS Court Hearing Report From: Andreas Bogk <andreas () andreas ! org> Date: 2000-01-04 12:45:55 Sameer Parekh < sameer@bpm.ai> writes: > The DVD CCA does not have a strong case, but they will not > back down. They have too much riding on this. As Lucky has stated, > their entire existence is built upon licensing the CSS > technology. Since it is no longer a trade secret, they have nothing > left to license. The DVD CCA has expected and continues to expect to Don't forget that the DVD CCA is only a month old. When the DVD CCA became the licensee for CSS, CSS had already been published. So in my opinion the entire reason for the existence of the DVD CCA is the this very lawsuit. Andreas -- "We should be willing to look at the source code we produce not as the end product of a more interesting process, but as an artifact in its own right. It should look good stuck up on the wall." -- http://www.ftech.net/~honeyg/progstone/progstone.html
List: cryptography Subject: Re: DeCSS Court Hearing Report From: Phil Karn <karn () qualcomm ! com> Date: 2000-01-04 18:57:01 >No, October 28, 2000 is when the act of circumventing an effective >technological measure becomes a violation (with exceptions for fair But if it was an "effective technological measure", it couldn't have been circumvented. And by circumventing CSS, wasn't it shown to not be an effective technological measure?? Phil
List: cryptography Subject: Re: DeCSS Court Hearing Report From: John Gilmore <gnu () toad ! com> Date: 2000-01-04 20:19:58 > >No, October 28, 2000 is when the act of circumventing an effective > >technological measure becomes a violation (with exceptions for fair > > But if it was an "effective technological measure", it couldn't have > been circumvented. And by circumventing CSS, wasn't it shown to not be > an effective technological measure?? No, read the law. Their definition of "effective" is that it purports to protect intellectual property. Welcome to Wonderland, where words mean what *Congress* says they mean. Off with our heads! > ``(B) a technological measure `effectively controls access > to a work' if the measure, in the ordinary course of its > operation, requires the application of information, or a process > or a treatment, with the authority of the copyright owner, to > gain access to the work. John