next up previous
Next: The HackSDMI challenge Up: A brief overview of Previous: The gatekeeper

How to attack this system?

There are two ways to attack the system: one can try to defeat either the identification technology or the watermarking one.

Breaking the identification technology is rather unlikely to succeed, because digital signatures are safe unless a design error is made.

The second attempt is to remove the marks so that the detector believes that the LP is a legacy one. This is the method that we chose to attempt.



Julien Stern 2001-01-05