HD-DVD and Blu-Ray Protections Fully Broken 682
gEvil (beta) writes "According to an article at BoingBoing, the processing keys for the AACS encryption scheme used by both HD-DVD and Blu-Ray video discs have been extracted, and a crack has been released. What this means is that there is now a method to extract the copy-protected content of any HD-DVD or Blu-Ray disc out there. This is different from Muslix64's previous crack, which only extracted the volume key for each disc. This new method bypasses this step and allows anyone to extract the data without first requiring the volume key."
Nice. (Score:5, Funny)
Re:Nice. (Score:5, Funny)
Re:Nice. (Score:5, Insightful)
(Seriously, I see this far too often on Slashdot. It annoys me. A lot.)
Re:Nice. (Score:5, Funny)
Because they have a very strong sense of empathy?
I mean, they are suing grandmas and invalids, how can they not?
Re:Nice. (Score:5, Funny)
Re:Nice. (Score:5, Funny)
Re:Nice. (Score:5, Funny)
Re:Nice. (Score:5, Funny)
That's an Imperial assload; it's only used in Britain. It's equal to 1.24 U.S. assloads.
Re:Nice. (Score:5, Funny)
Re:Nice. (Score:5, Funny)
Re:Nice. (Score:5, Funny)
*ducks* hehehe
Re:Nice. (Score:4, Funny)
Re:Nice. (Score:5, Funny)
Re:Nice. (Score:5, Informative)
Re:Nice. (Score:4, Funny)
Latency is horrible though, for more reasons than I care to imagine.
OK, time to switch now! (Score:5, Insightful)
DVD-JON (Score:5, Funny)
Re:DVD-JON (Score:5, Funny)
What?
Re:DVD-JON (Score:5, Funny)
drm (Score:5, Funny)
Re:drm (Score:5, Funny)
Re:drm (Score:4, Funny)
Oh no! Not Howard the Duck again!!! For the love of God!!NO!!!
props to Muslix64 and hackers everywhere (Score:5, Insightful)
Vista Help Forum [vistahelpforum.com]
Re:props to Muslix64 and hackers everywhere (Score:5, Insightful)
It has always been easier to destroy/crack something than to create it in the first place.
It is not a great undertaking to break a DRM scheme. It is not comparable to cracking strong encryption (which takes lots of horse power). The basic concept of DRM is fundamentally flawed and therefore open to attack.
DRM by its nature is both widely available and has to function on a user's local device or PC. The wide availability (unlike an encrypted message with a unique key) means the attacker has easy access both the algorithm and protected content. This mathematically greatly reduces uniqueness. One only has to setup the correct environment and observe how it functions with a legal copy. And since the DRM scheme is most likely non-unique on a copy by copy basis the affect instantly cascades. Unlike getting a randomly encrypted file you have access to the algorithm (the software) and you have access to the keys.
The big issue in DRM is how to obfuscate your algorithm and how to keep people from getting access to the stream in the clear. Both of these tasks are next to impossible to carry out effectively.
So anyone, even the very same "small group of unpaid media hackers" in question, would have to spend a large amount of effort trying to come up with better and better obfuscation schemes. While cracking the DRM will take far less resources, focus, or time.
Cracking DRM is more akin to white box QA or reverse engineering.
All that said I'm secretly glad someone stepped up and did this
I'm willing to bet 5 years from now we will see far less DRM in use and those still using it won't be selling as much music or as many movies as those not using it.
Re:props to Muslix64 and hackers everywhere (Score:5, Insightful)
Not true at all... (Score:5, Funny)
We should just let them handle music distribution... "Put the song title from box 34 into this box, but only on a leap year that ends in an odd number...."
Re:props to Muslix64 and hackers everywhere (Score:4, Interesting)
Re:props to Muslix64 and hackers everywhere (Score:5, Informative)
That said, they have got a player key now, so all disks published to date can be decoded.
Each player has its own player key, and each disk accepts any player key in its list (the player key is used to decode the volume key which decodes the film).
With this player key, they can decode any HD-DVD which has been printed already. However, as the key has now been compromised, future disks will not accept that player key. The software will have its player key updated, but the software will be tightened in an attempt to remove this loophole.
Take a look at the archives of http://www.freedom-to-tinker.com/ [freedom-to-tinker.com] for a detailed discussion.
Re:props to Muslix64 and hackers everywhere (Score:5, Interesting)
Re:props to Muslix64 and hackers everywhere (Score:4, Interesting)
The contract for software players could require that players work just like Firefox... when a new version is found, they automatically and silently download it, and when the player is started the next time, they offer to seamlessly install it for the user. From what I've heard, this may be built in to all/most software players, making it relatively painless to force-upgrade software players at least.
(which would mean that hardware keys are actually more valuable to extract, so maybe that's the hacker community's next step?)
Re:props to Muslix64 and hackers everywhere (Score:4, Interesting)
I wouldn't be suprised if this has already happend at least once or twice.
Re:props to Muslix64 and hackers everywhere (Score:5, Funny)
Presumably there's a decent number of blameless consumers already using that player. What's the commercial impact of pissing them off?
It's HD-DVD/Blu-Ray we're talking about. I bet both of the consumers will be really pissed.
Rich.
Re:props to Muslix64 and hackers everywhere (Score:5, Informative)
Re:props to Muslix64 and hackers everywhere (Score:5, Funny)
Man, you people better hope I don't get this one on metamod (which I suppose now I've tossed out the window, but oh well).
This is the same head-in-the-sand crap we've been hearing for months now. "It will be ROCK SOLID! No way will anyone ever break it! This is the absolute best, most secure copy protection ever! We fin...wait, what? It's broken already? DAMN!"
It's dead. You lost. As we all have been telling you for months now. "All is not lost, we'll change the key!" Yes. You will. And in less time than it took you to change the key, and at far lesser expense...we'll get that one too.
Face it. We're coming to your house. If you take the numbers off, we'll just go to the house with no numbers. If you take the numbers off from the neighbor's house, we'll just come to the house next to the house with no numbers.
You. Lost.
Re:props to Muslix64 and hackers everywhere (Score:4, Insightful)
I think this is a fundamental problem that the people backing DRM forget. They're massively outnumbered, and it's just a matter of making it not worth the rest of the human population's time to break their stuff. So far, not gone so well for them...
Re:props to Muslix64 and hackers everywhere (Score:5, Funny)
Open your eyes and see the truth, man! 9/11 was executed by the International Male Models' Union working in conjunction with Major League Baseball. It's so obvious you probably overlooked it at first, but dig deeper. It checks out.
All DRM implementations will be broken. (Score:5, Insightful)
In effect, DRM is security through obscurity.
How much longer will we have to put up with this crap before the media companies realise this and stop inconveniencing their customers and wasting our money and time as well as their own?
Re:All DRM implementations will be broken. (Score:5, Informative)
Re:All DRM implementations will be broken. (Score:5, Insightful)
Forget all that jibber-jabber about whether they have a right to protect their "copyrights", or even if you have any rights to copy: they clearly cannot be trusted with your secrecy and your privacy.
Re:All DRM implementations will be broken. (Score:5, Insightful)
Re:All DRM implementations will be broken. (Score:5, Funny)
Re:All DRM implementations will be broken. (Score:5, Funny)
Re:All DRM implementations will be broken. (Score:4, Informative)
Of course the devil is in the details. It's fully possible to build an insecure system around a secure TPM chip, and no doubt that's going to be done, too.
Then again, TPM isn't bad, on it's own. It really depends on who owns the TPM. As long as I own it, it just might be good. The moment someone else owns it, then I merely pretend to own my system that has it, and that's bad. Some time ago, I picked the (M) stuff for the kernel build on my Thinkpad, and have been building them ever since. I've never used them yet, but if SOMEBODY is going to be controlling that chip, I want it to be ME.
Re:All DRM implementations will be broken. (Score:5, Interesting)
Unless you change the laws of physics it is completely impossible to build a secure TPM chip. TPM is an inconvenience, nothing more, just like DRM. DRM, no matter how implemented, involves supplying the same person with:
a) the ciphertext
b) the plaintext
c) the decryption key
All of those things must be present on the user's system for DRM to work. TPM etc are merely means to try to make it hard for the user to access the key, and they never work. One way of thinking about it is: a TPM chip "hides" certain details inside a little bit of plastic. It is security through obscurity and nothing more, and so long as the chip emits any EM radiation the internal details will ultimately be inferable, although it is doubtful that going so far as reading internal bits via EM fields will be required.
But if it is, we can all take comfort in the fact that Maxwell's equations aren't just a good idea: they're the law.
Re:All DRM implementations will be broken. (Score:4, Insightful)
I don't doubt that with a complete lab and some really good hackers, a even well-designed TPM setup can eventually be compromised.
But I'd also assert that a well-designed TPM setup is WAY beyond the resources of DVD John, the AACS crackers, and maybe even the distributed.net efforts.
By the way, by that last token, all security is by obscurity, because you're always hiding the key, and ultimately that's a key part of what the TPM does.
A few quick searches on TPM can strip away most of the arrogance on both sides, the "anything will fall" side as well as the "unbreakable" side. I can't substantiate it here and now, but I suspect that TPM can be good enough to defeat any software-only attack, and would really require significant hardware resources to compromise.
But the key point in here is a general lack of confidence in the ??AA's ability to do good encryption/DRM. At the moment, they just don't have the mindset for it.
Re:All DRM implementations will be broken. (Score:5, Insightful)
Perhaps TPM is going to be one of the best things to ever happen to our community...
Re:All DRM implementations will be broken. (Score:4, Informative)
"...trying to get content without paying for it?" (Score:5, Insightful)
Re:"...trying to get content without paying for it (Score:4, Funny)
Me too, every one.
Usually in spindles of 100.
Re:All DRM implementations will be broken. (Score:4, Insightful)
Well then *fuck* the common man. If you're too stupid to be free, that's not my problem.
I guess only the smart people get to be rebels. The rest will just be rabble.
Re:All DRM implementations will be broken. (Score:5, Funny)
Or things could go in the opposite direction. Just wait 'till they hear about one-time pads!
Of course, that would mean that no one could watch their stuff, period, but hey - at least no one could pirate it either!
Re:All DRM implementations will be broken. (Score:5, Funny)
For as long as... (Score:5, Funny)
security through obscurity (Score:3, Insightful)
Re:All DRM implementations will be broken. (Score:5, Informative)
Re:All DRM implementations will be broken. (Score:4, Insightful)
Security through obscurity is where the attacker has everything they need to get at the data but they just have a few hoops to jump through. Proper security is where the attacker has no chance because they are missing something (like a secret key)
DRM gives the attacker the key (because the attacker is the owner of the media and they need the key to play it) but makes some attempt to hide it. All these attacks on DRM do not break the cipher or find a weakness in the crypto algorythm. All they do is find the key (it's in there somewhere) and use it to decrypt the content.
Horseshoe racket (Score:4, Insightful)
Exactly.
Re:Horseshoe racket (Score:5, Insightful)
I disagree (Score:5, Insightful)
I'm not saying that this isn't a nice event, but we have further work to do.
Re:I disagree (Score:5, Interesting)
The same method used to acquire this key can be used to acquire future keys. All it takes is one determined hacker willing to rifle through his memory addresses for the key.
I do not see a terribly effective fix for this - your key has to exist somewhere, and even in a CPU register it is still in memory more often than not.
The end of software players? (Score:5, Interesting)
Ummm, how about no more new keys for software players. As long as there are software players it seems obvious that it will be possible to reverse engineer what they are doing to shake out the keys. But if the industry decides that SW players are too weak, they simply revoke keys for them and don't issue new ones. The end of software players and the end of the risk.
Nope, it's really cracked (Score:5, Insightful)
In theory yes, but how easy do you believe it is to update all those specialized video players, all offline?
Don't forget: the people who buy those already had to put up with paying premium for a HDTV, expensive players, and also make sure the TV, cable and player play together through HDMI.
If you start demanding they are hooked non-stop to Internet so they can receive the daily patches, it may just be the thing crossing the line of tolerance.
Also: the hard part is retrieving keys from pure hardware. The new keys come as firmware updates over the network.. it's even easier to update those HD-DVD/BlueRay rippers. After all, you have even the keys they encrypted the patches with: you have the player, don't you.
All in all, the "super morphing update" ability of AACS seems more like a way for the AACS developers to claim "the war it's not over", when it effectively is over.
Companies will refuse to use the new keys for their disks, since they will be incompatible with plenty of the players out there, the AACS creators will whine a bit about how "they could fix it but they don't wanna, not our fault", and this is where it'll end.
Re:Nope, it's really cracked (Score:4, Informative)
You don't need the hardware to be networked in order to do key revokation - all the current discs continue to work just fine, but future discs will be encoded so they cannot be decoded with this key (this is the basis of AACS key revokation).
This is definately not "fully broken" - fully broken is when I can use the crack indefinately *without* having to get a new player and extract a key from it every so often. i.e. it involves finding a flaw in the algorithm that allows you to decode the disc without needing to extract any data from a legitimate player to do so.
Too funny... (Score:5, Insightful)
As soon as you can see or hear it, it is then possible to duplicate it. No amount of copy protection will ever be able to prevent that short of preventing consumers from accessing the material altogether.
Learn to trust your consumers a little and focus on adding value to the material, and then people will buy your content. It might also help to provide some flexibility in the content licensing model, maybe giving people the option to upgrade DVD discs to HD-DVD for the same content may encourage them to continue buying media.
Can this be fixed? (Score:5, Interesting)
Re:Yes, someone walk us through this. (Score:5, Insightful)
Poking around Doom9 thread [doom9.org], the processing key for all current HD-DVD discs was found.
Looking over some example source code [doom9.org], the processing key is used with the encrypted C value to build the media key, which can then build the volume key, which can then decrypt the disc.
The MPAA can revoke the processing key, but quoting from the forum:
Some of you are missing the true meaning of this compromise. If they revoke this processing key, we just take a player compatible with a new processing key, put in one of the titles that's already cracked, and go around in memory looking for the known key. We find it, insert a new title, look in the same place and we have a new processing key.
Essentially, it becomes a known-plaintext attack.
MOD PARENT Up! (Score:5, Informative)
Essentially, what he is saying is this: while the crack is temporary, the method of attack is unassailable under the current model.
That's whats important here. If keys get revoked, its a trivial matter to go get them again. The hard work has been done. Now all you have to do is follow procedures and -voila- you can crack AACS too.
Despite other comments on this board, AACS IS cracked.
Re:MOD PARENT Up! (Score:5, Insightful)
Doom9's Forum (Score:5, Informative)
Later posts seem to confirm that it works for both BR and HD-DVD
industry's response? (Score:5, Interesting)
Comment removed (Score:5, Insightful)
Now we get to see... (Score:4, Interesting)
Should be interesting...
Re:Now we get to see... (Score:5, Interesting)
Revoking keys would have a huge negative impact on the adoption of HD-DVD and Blue-Ray. Look at the backlash from the Sony rootkit -- that was something a lot of consumers were/are unaware of. It's harder to be unaware of the fact that your $900 dvd player no longer works, or your $2000 HDTV doesn't work. The inevitable lawsuits aren't worth it.
Re:Now we get to see... (Score:5, Interesting)
All your CRAP are belong to us (Score:4, Insightful)
Hollywood gets ONE move in the game: "Protecting" the content.
The rest of the world gets as many moves as it wants to get around the ConsumerRightsArentPermitted.
So Hollywood does everything it can to make itself hated by its customers and still expects to WIN this game?
Released Too Early (Score:5, Insightful)
Re:Released Too Early (Score:5, Insightful)
The premise that all consumers are criminals is criminal in and of itself. Bear with me here. It defies logic and law to (analogy time) remove guns from citizens to prevent them from shooting people. It defies logic and good business sense to make
Besides this, governments should not be propping up business models that are antiquated and broken. Desktop publishing put typesetters out of work, did the governments do anything? Trains put buggy makers out of work, did the governments do anything? That is only naming a couple of examples, but the governments seem hell bent on protecting certain industries. I can only conclude that those same governments are being well paid by those industries, for that is the only logical motivation for such infringements on citizen's liberties and rights.
Now that AACS is cracked, time to follow the money and figure out who is getting paid and expose them as broadly as the DRM keys are exposed.
Open Season? (Score:4, Funny)
Of all the movies to pirate, why'd Zonk have to choose that one?!?
The inherent problem... (Score:5, Insightful)
Until vastly different technology is available 20 or 30 years down the road, all that DRM is going to amount to doing is preventing the 'average joe' from copying en-mass. They just have to make it difficult enough for the casual user to be deterred from copying the content. Look at the copy protection scheme on the iPod - it's basically useless, but it prevents grandma from copying bulk amounts on content. It's like how photocopiers are not a danger to printed media, as it's just 'too' difficult to walk up to a copier and copy things on mass. The industry just has to make it hard enough to deter joe user.
The real problem for the recording industry comes in when now people are getting more and more saavy at copying content, and it's becoming more and more common place, and digital media sharing is now common place and digital media is now common place in the living room now. 10 years ago MP3's were just making there way on the scene and basically only very saavy users knew what an MP3 was, let alone what to do with it. What happens when 10 years from now mobile HD video players are just as common as MP3 players, and your average iPod video has a half a TB of flash storage? Copying (High-Def) DVD's at that point will be common place like MP3's are relatively common place now.
The Funny Thing (Score:4, Insightful)
In response (Score:5, Funny)
New DRM protection methods are now in the works which were cracked last week.
Not Really Broken (Score:5, Informative)
One key thing to take away from this is that the authors of the software made it really easy to pull the device keys out of memory for two reasons
Even that approach isn't hack-proof, but it is a lot harder to dump the cpu registers under such conditions than it is to trace memory accesses.
Re: (Score:3, Insightful)
Re:Not Really Broken (Score:5, Interesting)
Good thing Intel put in those nice debugging registers that let you dump the contents of SSE registers at arbitrary intervals (e.g. after every SSE operation by the debugged process).
Re:Not Really Broken (Score:4, Insightful)
And the solution the Doom9 guys will use to defeat this?
Don't upgrade to the new PowerDVD.
The cat's out of the bag. You can't put it back in now. The new key will be discovered even more easily than the old key, so there's no point even bothering with a key revocation.
Your solution may make some future DRM scheme for a new media format a little more secure, but it's effectively over for AACS.
Re:Not Really Broken (Score:5, Informative)
You've clearly never worked with a good hardware-assisted debugger. And virtualization makes this scenario possible without debugger hardware support.
Even more, no matter what, the key has to make its way from the device to the CPU register. On every modern machine that transaction goes through memory. Which means that brute-force tracing from the device to the registers should be able to find it. Not necessarily easily, but quite doable.
DRM is dead. Let's bury it.
Re:Not Really Broken (Score:5, Informative)
Under most versions of unix, only one debugger can attach to a process at a time. So an easy trick to prevent being debugged is to make the program attach to itself, thus locking out other debuggers. Some unices don't let a process attach to itself, but for those it may be possible to fork a child and have each process mutually debug the other. I'm not an NT programmer, but I would bet something along those lines works the same there too.
Don't get me wrong, nothing is fool-proof (and I said so in my first post) the best these guys can do is make it difficult. So far, the windvd/powerdvd guys just wiped the device key from memory after use which is about the bare minimum - they could have done lots more without too much effort.
joke is on us (Score:5, Insightful)
why laugh at them when you can steal their money?
we need a committee of slashdot readers to compile a list of buzzwords and concerns of the RIAA/ MPAA, and then sell them some technovoodoo that doesn't protect them in any way whatsoever (nothing can, obviously), but continues the RIAA's/ MPAA's illusion that drm can or ever will work
give them their false security blanket, steal their money outright, and then continue to rip them off and drive into extinction the antiquated notion of corporate media distribution channel ownership
they need us, we don't need them. make that point explicit by bleeding them dry via all possible avenues
win win! idiots
look at book publishers... (Score:5, Insightful)
I think the recording and motion picture industries need to look at why, and follow that lead. Instead of millions in copy protection R&D, why not spend millions to improve the product? Make the product something people liked owning. (Notice how libophiles obsess over the actual tangible book?).
The one really viable way to control it would be to mandate that all players have an internet connection and it verify the purchaser has rights to the media before playing it. Of course if people have good high speed connections to the internet there's no reason to buy the physical media, which they recording and motion picture industries simply can't abide with.
Re:look at book publishers... (Score:4, Informative)
The authors involved agree that this helps get their names out and generates demand for paper copies and paid-for e-copies of their work. The reduced overhead of e-publishing compared to paper publishing more than covers any "piracy", I guess. The "Baen's Universe" e-magazine pays the authors better rates than the current paper magazines (Asimov's, Analog, etc) do. (Don't know about the book payment side. I hope to find out first hand at some point
Re:look at book publishers... (Score:4, Interesting)
Making analog copies (of a book) is time consuming and impractical.
Making digital copies of a book - like a PDF - is easy and is done all the time. Nobody buy e-books, you just download it for free. Because one person paid for it and decided (conciously or not) to eliminate the profit from any future purchases by making it available to everyone for free.
The problem with digital copies is there will always be someone that is hell-bent on destroying the ability of the original publisher to derive profit from future sales. Happens with software, happens with music and it will be happening more with movies.
Here we go again... (Score:5, Interesting)
And because of that, when I put my iPod shuffle through the wash I was able to replace it with a good AAC-playing MP3 phone and flip the bird to Steve Jobs. Same thing with these...I want my media in formats I can move around and use to my liking.
I'm not going to pay for the same content twice, ever. And if I can't get my content in a cracked DRM or DRM-free format, I'll just pirate it. That'll show 'em.
Success! (Score:5, Funny)
DRM still helps the DVD consortium (Score:4, Interesting)
Books (Score:4, Insightful)
arms race (Score:5, Interesting)
First, making the volume information secure, and file content, was pretty pointless because if you had strong security on it, it would be too slow to do anything useful. For the data, you could wait longer, but at the end of the day, all of it was moot because once either catalog or data is decrypted... its there. So, you decrypt on the fly, or use adaptive methods that attempt to hide information, it all leads to...
The Cost of protection geometrically increases to the linear Time to break it.
And in the end, all the protection does is buy you a little bit of time, because for every couple of guys thinking up the next best protection scheme, once it hits the world, you have 100+* the resources trying to break it.
In the end, the best protection we came up with was something everyone hates... a hardware key that imlpemented the decryption, and sell that key with the media. Economically not viable to copy, but still does nothing once unprotected.
No different than us web developers (Score:5, Insightful)
I can't help but see this as a parent who is all too restrictive with thier child, leading the child into endless rebelion that would have been avoided if moderation was used instead of a billy club.
Print 'em up! (Score:5, Funny)
09 F9 11 02 9D 74 E3 5B D8 41 56 C5 63 56 88 C0...
Available for just $19.95
You know, you have to laugh. (Score:5, Insightful)
Basic concept: Encrypt a disk with a key that only the player has. If the player key is compromised, all disks are cracked.
"fix" #1: Encrypt the disk content a random key, encrypt that disk thousands of times with a library of pre-generated keys. Assign each player a key, quit putting that key on the disk when it's found to be compromised. Of course, you now have to re-encrypt thousands of keys for every title released, leading to possible exposure of the master database.
"fix the fix": Randomly create a single "production key", encrypt it with every player key, and give the 'blob' to every HD-DVD production facility. Now exposure is limited to one key that can be changed without exposing the master keylist.
Except someone was terminally lazy, and only did it ONCE. So EVERYONE USES THE SAME PRODUCTION KEY. Way to go! If you gave each studio their own, then compromises would be limited to a single studio's works (that were produced before the key was changed).
Worse, you introduce an attack vector to your management that effectively hides it's origin. Any hardware or software player could be compromised, or you could have an inside leak of the key. As long as the exploiter doesn't say "I got this key from Sony's HD-501 player" you have no idea how they aquired it. Basically, they completely and utterly shat on the key-revocation scheme, with no possible solution.
Whoops.
Dear MPAA: Please contact me before starting your next hairbrained content protection scheme. You can pay me millions rather then billions and I'll give you one that's not so embarassingly horrible. I'm no cryptogropher, but goddamn, it's not like you hired any security people for anything you've done yet anyway.
Re:Economics 101 (was: Cue Nelson) (Score:5, Insightful)
Why won't I buy the $200.00 HDDVD player from MicroSoft?
Well, I've said it before, and it bears repeatin'...
I'll buy new content when those ASS-WIPES in Hollyweird stop putting advertisements in front of the movies on DVDs! GODDAMN, I'm SICK of wading through bullshit ads for movies that stopped playing in theatres years ago when I watch an old DVD.
Pull out your Matrix DVD or your 2001: A Space Odyssey DVD and insert it into your DVD player or PS2. What happens? THE MOVIE starts to play, doesn't it?
Now try that with any DVD you bought in the last three or four years. Pisses you off, doesn't it? Yeah, me too.
They can KISS MY ASS! Even though I'm not buying their HD disks I'm still laughing my ass off at this and looking forward to more penetrations of their security. (Hey, this is Slashdot. We gotta' have pron! Just not HD Pron. Pimples and hairs where they shouldn't be. YEECH!)