There are two ways to attack the system: one can try to defeat either the identification technology or the watermarking one.
Breaking the identification technology is rather unlikely to succeed, because digital signatures are safe unless a design error is made.
The second attempt is to remove the marks so that the detector believes that the LP is a legacy one. This is the method that we chose to attempt.