Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


DRM Hack Flap Sparks Digg 'Riot'

Effort to take down hack postings results in crippling rebellion at social networking site

You can't put the toothpaste back in the tube. And, apparently, you can't un-publish a hack once it's out on the Net.

That's the lesson learned by one maker of digital rights management technology -- and, unintentionally, the operators of Digg -- over the last day and a half, following a "virtual riot" that brought the popular social networking and news site to its knees yesterday.

The problem all started back in February, when code breakers found the decryption key that allows next-generation HD-DVD and Blu-ray to be viewed without a license. Since then, users have been passing the 128-bit integer around the Web, posting it on sites such as Digg, Google, and Slashdot.

But earlier this week, the Advanced Access Content System Licensing Administrator LLC (AACSLA) -- the maker of the copy control technology -- began to insist that Websites take down those postings, citing its rights of ownership under the Digital Millennium Copyright Act. Many site operators, including Digg, complied, citing their policies to obey laws about the sharing of intellectual property.

Users rebelled. In an unprecedented demonstration of protest, users around the Web began posting the decryption key back on every Website they could find. But Digg, which allows users to post as frequently as they like, buckled under the strain of thousands of users resubmitting the code over and over again.

Despite efforts by Digg administrators to control the submissions, users papered the site with submissions about the decryption key, using the site's ability to "elevate" stories to the home page as a weapon. By midnight last night, the entire Digg home page was covered with postings about the code.

Digg finally gave in. Founder Kevin Rose posted a message saying that the site would no longer try to prevent users from publishing the code. "We had to make a call, and in our desire to avoid a scenario where Digg would be interrupted or shut down, we decided to comply and remove the stories with the code," he wrote.

"But now, after seeing hundreds of stories and reading thousands of comments, you've made it clear. You'd rather see Digg go down fighting than bow down to a bigger company. We hear you, and effective immediately. we won't delete stories or comments containing the code and will deal with whatever the consequences might be. If we lose, then what the hell, at least we died trying."

So far, the AACSLA has not published any statements about the controversy, or its intention to seek enforcement of the Digital Millennium Copyright Act. In past weeks, it has said that the publication of the decryption key "has no adverse effect" on its ability to protect copyrights, and that customers can get an update of the decryption key online.

— Tim Wilson, Site Editor, Dark Reading

Tim Wilson is Editor in Chief and co-founder of Dark Reading.com, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one ... View Full Bio

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 11/19/2020
New Proposed DNS Security Features Released
Kelly Jackson Higgins, Executive Editor at Dark Reading,  11/19/2020
How to Identify Cobalt Strike on Your Network
Zohar Buber, Security Analyst,  11/18/2020
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: A GONG is as good as a cyber attack.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-11-23
A flaw was found in the Cephx authentication protocol in versions before 15.2.6 and before 14.2.14, where it does not verify Ceph clients correctly and is then vulnerable to replay attacks in Nautilus. This flaw allows an attacker with access to the Ceph cluster network to authenticate with the Ceph...
PUBLISHED: 2020-11-23
A flaw was found in rhacm versions before 2.0.5 and before 2.1.0. Two internal service APIs were incorrectly provisioned using a test certificate from the source repository. This would result in all installations using the same certificates. If an attacker could observe network traffic internal to a...
PUBLISHED: 2020-11-23
A flaw was found in the psql interactive terminal of PostgreSQL in versions before 13.1, before 12.5, before 11.10, before 10.15, before 9.6.20 and before 9.5.24. If an interactive psql session uses \gset when querying a compromised server, the attacker can execute arbitrary code as the operating sy...
PUBLISHED: 2020-11-23
TYPO3 is an open source PHP based web content management system. In TYPO3 from version 10.4.0, and before version 10.4.10, RSS widgets are susceptible to XML external entity processing. This vulnerability is reasonable, but is theoretical - it was not possible to actually reproduce the vulnerability...
PUBLISHED: 2020-11-23
prive/formulaires/configurer_preferences.php in SPIP before 3.2.8 does not properly validate the couleur, display, display_navigation, display_outils, imessage, and spip_ecran parameters.