DRM 'will be cracked' says iTunes hacker

Nothing is geek-proof


According to the Australian researcher who cracked the authentication used by Apple's iTunes software, current-generation Digital Rights Management (DRM) will never work.

David Hammerton, a 20-year-old Arts-Science student, reverse-engineered iTunes' authentication measures last week, allowing non-iTunes clients to connect to Apple's servers. It was the second time he had managed to crack the authentication, however this time it took him just eight hours to break the brand-new iTunes 4.5, which had been patched against his previous research.

"The first time it took me a week to do it," said Hammerton, known online as "Crazney". "The second time I knew what to look for, so it only took me eight hours,"

The authentication algorithm built by Apple relied heavily on the use of MD5 checksums. It was the checksum code itself that Apple changed to lock out Hammerton's earlier crack. The engineers changed the MD5 routine to what he jokingly calls "iMD5", and Hammerton modified his first crack to compensate.

Apple declined to comment on the hack.

By using the software libraries he's developed, it is possible for programmers to create applications capable of downloading and saving music stored on iTunes servers. However, that functionality has been deliberately left out of the program Hammerton built around his libraries, which is designed to act as a player only. "It doesn't allow people to pirate music," Hammerton said. "It's five lines of code but it's not something I wanted to do."

While iTunes authentication isn't a DRM measure as such, Hammerton believes technology is becoming too restrictive, which is why he chose to break what he sees as an anti-competitive restriction on the use of the iTunes software. "Linux is my primary desktop operating system and I wanted to be able to play my music on my desktop, and I just don't like being locked out of stuff," he said.

"A Pretty Poor Job"

Not that he's too worried about being locked out. Hammerton says the current generation of DRM and "anti-interoperability" measures will never beat geeks with too much time on their hands.

Even some in the online music business agree. "My personal view is that it's inevitable that all forms of DRM... will be cracked," says Domenic Carosa, chief executive of the online music venture Destra Corporation. Nevertheless, "DRM is imperative, particularly when it comes to record companies. They need to feel secure in selling their music legally and digitally. They do that because of DRM," Carosa said.

But Hammerton's work, and efforts like it, aren't the end of the world for the record companies, Carosa argues. Because those with major objections to DRM due to interoperability concerns are essentially a fringe group, damage to the broader market through piracy is unlikely.

"I would say that if I look forward five years we're going to have the exact situation we have now. We'll have the high-tech types wanting to be able to use their music in every way shape or form. They'll want to transfer their music to devices that don't have DRM," he said. "I don't think average consumers really care about it. I don't think they ever will."

As yet, Apple hasn't yet contacted or legally threatened Hammerton. Even if it did, he believes the stand he's making is one of principle, and he claims he would persevere even if he knew his actions were illegal.

Hammerton says he is confident he'll be able to stay ahead of Apple's authentication measures if its engineers stay on the same path. "In terms of what they're doing at the moment... obfuscating the code, it's a pretty poor job. I wouldn't give much credit to the guys who've done it."

Copyright © 2004, 0

Related stories

Apple DMCA sends iTunes DRM decryptor offshore
New workaround for Apple DRM
EU probes music licensing
Blank media levies: record once, pay thrice
Russian 'legal' music site offers songs for 5c
Europe demands open-to-all DRM tech
Labels seek end to 99c music per song download


Other stories you might like

  • Battlefield 2042: Please don't be the death knell of the franchise, please don't be the death knell of the franchise

    Another terrible launch, but DICE is already working on improvements

    The RPG Greetings, traveller, and welcome back to The Register Plays Games, our monthly gaming column. Since the last edition on New World, we hit level cap and the "endgame". Around this time, item duping exploits became rife and every attempt Amazon Games made to fix it just broke something else. The post-level 60 "watermark" system for gear drops is also infuriating and tedious, but not something we were able to address in the column. So bear these things in mind if you were ever tempted. On that note, it's time to look at another newly released shit show – Battlefield 2042.

    I wanted to love Battlefield 2042, I really did. After the bum note of the first-person shooter (FPS) franchise's return to Second World War theatres with Battlefield V (2018), I stupidly assumed the next entry from EA-owned Swedish developer DICE would be a return to form. I was wrong.

    The multiplayer military FPS market is dominated by two forces: Activision's Call of Duty (COD) series and EA's Battlefield. Fans of each franchise are loyal to the point of zealotry with little crossover between player bases. Here's where I stand: COD jumped the shark with Modern Warfare 2 in 2009. It's flip-flopped from WW2 to present-day combat and back again, tried sci-fi, and even the Battle Royale trend with the free-to-play Call of Duty: Warzone (2020), which has been thoroughly ruined by hackers and developer inaction.

    Continue reading
  • American diplomats' iPhones reportedly compromised by NSO Group intrusion software

    Reuters claims nine State Department employees outside the US had their devices hacked

    The Apple iPhones of at least nine US State Department officials were compromised by an unidentified entity using NSO Group's Pegasus spyware, according to a report published Friday by Reuters.

    NSO Group in an email to The Register said it has blocked an unnamed customers' access to its system upon receiving an inquiry about the incident but has yet to confirm whether its software was involved.

    "Once the inquiry was received, and before any investigation under our compliance policy, we have decided to immediately terminate relevant customers’ access to the system, due to the severity of the allegations," an NSO spokesperson told The Register in an email. "To this point, we haven’t received any information nor the phone numbers, nor any indication that NSO’s tools were used in this case."

    Continue reading
  • Utility biz Delta-Montrose Electric Association loses billing capability and two decades of records after cyber attack

    All together now - R, A, N, S, O...

    A US utility company based in Colorado was hit by a ransomware attack in November that wiped out two decades' worth of records and knocked out billing systems that won't be restored until next week at the earliest.

    The attack was detailed by the Delta-Montrose Electric Association (DMEA) in a post on its website explaining that current customers won't be penalised for being unable to pay their bills because of the incident.

    "We are a victim of a malicious cyber security attack. In the middle of an investigation, that is as far as I’m willing to go," DMEA chief exec Alyssa Clemsen Roberts told a public board meeting, as reported by a local paper.

    Continue reading

Biting the hand that feeds IT © 1998–2021