Hacker Newsnew | past | comments | ask | show | jobs | submitlogin
Breaking Grooveshark's encryption (lgms.nl)
99 points by lucgommans on May 15, 2015 | hide | past | favorite | 33 comments


This almost feels like legal cover more than anything else. At least they "tried" to protect the music files from easy duplication & piracy. I wonder if circumvention of XOR is illegal under the DMCA. It feels just about effective as renaming the file extension from .mp3 to .shh


IANAL, but the DMCA does not make any distinction between strong encryption and mild obfuscation. They're both "technological measure that effectively controls access to a work"

I'm not sure the DMCA provides any "proof" that they're going after privacy. But it does afford them legal tools to go after people who publish Grooveshark decryptor scripts.


I think the word "effective" might be interpreted to exclude ineffective measures like this one.


I don't think it ever has been. Look at CSS.

court ruled that the DMCA statute does not require the access control or copy control technology to be strong as long as it prevents unauthorized access and/or copying under ordinary course of operation and with the authority of the copyright owner


I don't think so. Pretty sure it's "effective" as in "has the effect of" not in the sense of "does its job well"


Exactly, it's like a Home Depot lock, sure you can smash it, you can easily pick it, but it's effectively a lock.


That's subjective.

Any strong technique, once broken, is not effective anymore: is it then legal to use such technique, due its ineffectiveness?


Also IANAL but from what I know the law has not been interpreted to use (in my opinion) a reasonable definition of the word effective. The law requires 2 things here for a covered protection to be "effective":

  #1 That the protection on the copy is "sufficient" to protect the rights of a copyright holder of the original work, and

  #2 That the copyright owner is satisfied with the protection provided by the copied work.
To me at least, this seems insane. You can theoretically claim DCMA based relief for anything forever by taking its bitstream format and flipping every bit once. That coupled with the knowledge of the copyright owner will be enough to be covered under this reading of "effective".

The linked court decision states on page 28:

98. To prevail on a DMCA claim for violation of the copy-control provision, plaintiff must show that CSS “effectively protects a right of a copyright owner under” the DMCA. 17 U.S.C. § 1201(b)(1). Under that section, a technological measure “effectively protects a right of a copyright owner . . . if the measure, in the ordinary course of its operation, prevents, restricts, or otherwise limits the exercise of a right of a copyright owner under this title.” 17 U.S.C. § 1201(b)(2)(B). For the reasons articulated above, the court finds that CSS technology is an effective technological measure to prevent copying of copyrighted DVD content by the average consumer. That CSS technology has been hacked does not disturb this conclusion.

The RealNetworks case where this was decided is linked below. The case basically went "There is this program that uses freely available code that technically breaks your DCMA approved protection method, CSS, but because CSS still works to protect rights due to the breadth of it's implementation, it is not sufficiently broken by your program or the freely available knowledge you used to make it, and the Court finds for the Plaintiff." (my interpretation from reading page 56)

See: https://www.eff.org/files/filenode/RealDVD/real_v_dvd-cca_pi...

Pages #28 and #56


There was an argument for this, but it was in the EU not the US. http://www.turre.com/finnish-court-rules-css-protection-used... No idea how that ended up going in courts or later legislation.


Their content seems to be pirated (or user uploaded - hell, even company uploaded if the reports are true) in the first place. I think that's the bigger problem with the service.


tl;dr they xor'd the files with 37 (ASCII '%')


the post was more complicated to read than the encryption they used


A few years ago, there was an article posted to Hacker News about some site that sold DRMed anime shutting down and how people who bought anime from the site would no longer have access to the things they bought. As it turned out, the special Flash-based anime viewer they provided just did a per-byte XOR with 0x42 on PNG files.


Slightly off topic:

Why is this site more readable without the stylesheet?


This "coding scheme" seems to be "unkillable" (don't know, if the wording is correct, the spell checker does not like it).

I thought, after Microsoft made a bad name about itself by using this in its "Access" product ten years ago or so (they "encrypted" passwords this way), some people should have been warned. May be it is was just to long ago ...

Within seven years or so (of operating), somebody could have come up with a different algorithm ...


Well, there are tons of different DRM algorithms, but none of them are backed by secure cryptography since you cannot logically restrict people from "saving" but not from "viewing". There's no mathematical backing to the idea. This is probably why Grooveshark didn't bother using a complex algorithm... they already know that DRM is fragile and will be broken by someone who's determined enough. So the performance cost of a real encryption scheme just isn't worth it.

As for storing passwords with something like that: that's terrible. We have great hashing / salting algorithms, and tools like bcrypt make them very easy to use. Of course, in this case you're not letting anyone (including yourself) _view_ the password (you're just checking for correctness against a known hash), so the solution is very different and is theoretically secure (unlike DRM).


> Well, there are tons of different DRM algorithms, but none of them are backed by secure cryptography since you cannot logically restrict people from "saving" but not from "viewing"

Actually you can, but this requires smart viewer. You sending encrypted data into viewer where data is decrypted. Secret keys storing inside viewer and retrieving them is hard task. Of course that requires DRM-enabled display, participating video card, drivers, etc.


Can you explain further how the key is used in the mapping? Maybe with a doodle? Thanks & well done btw

-- mixing the file with a single byte (0x25, or ASCII 37, or a percent sign)


Cryptography rule #1: Don't make your own.

I guess that AES (or some other standardized cipher) was too overkill, insufficient, or mainstream for them?


It's clear they didn't really care whether you got to the files or not; I think they were just covering their legal asses. (Didn't matter in the long run, it would seem).


I had a Tidal trial and was trying to see how encrypted their lossless music was. It uses some Chrome NaCL executable to decrypt, then play the music. In any other browsers, you cannot play HiFi music since they do not support NaCL.

That seemed like a good solution to DRM encryption.

At the end of the day though, people can just record the input on their sound card if they really wanted...


So, a whole article just to explain it's a single-character XOR encryption. Smooth.


No, that was the answer.

The article was about how he got there.


He definitely tried too hard.


All problems are hard until solved.

I rather enjoyed the article; his analysis and things he tried ahead of finding the solution were interesting to follow.


Author here. Can confirm: you're right.

But I did learn a lot and will surely try this first in the future.

Should I have written on top that, if you're into crypto, you may want to skip to the summary?


A tl;dr is always nice!


Well there is already a summary at the bottom, but I guess I should refer to it at the top. Thanks :)


I enjoyed the article, it was well written


"...after quite literally being sued to hell."

http://theoatmeal.com/comics/literally


They weren't sued "anywhere": sued to hell just means they were sued out of existence -- and that is, literally, true. Or that's how I, as a non-native speaker, see it, and why I thought it was correct.


If they were literally sued to hell, that means that hell is a real place, and they are now actually in that place.


Cute, but the comic is wrong. Check any dictionary less than 50 years old.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: