Logo

Ep 16: Eijah

en-us

May 01, 2018

TLDR: In 2007, a hacker named Eijah got fed up with DRM preventing him from playing paid-for content and decided to fight back by finding a way to circumvent the AACS.

1Ask AI
  • From Boredom to Hacking - Eijah’s JourneySmall incidents and dissatisfaction can lead to new paths. Finding a positive outlet for such emotions is crucial.

    Eijah's dissatisfaction with his boring job led him to tinker with electronics and coding projects as a hobby. His purchase of an Xbox HD DVD Drive and subsequent punishment by the software for watching legally purchased content ignited his anger. This experience pushed him towards hacking and joining a secret group of hackers. Eijah's story highlights how small incidents can push individuals to take daring steps towards a whole new world. It also emphasizes how mundane tasks at work can lead to dissatisfaction and fuel a need for change. Seeking an outlet for such dissatisfaction can result in positive or negative outcomes depending on the choices made.

  • Prioritizing Customer Satisfaction over Fear of PiracyCompanies should focus on building trust and loyalty by treating customers with respect and providing quality products, rather than implementing frustrating technologies to prevent piracy and risking angering intelligent hackers.

    Companies should prioritize the satisfaction of their customers by providing them with what they paid for and treating them with respect. Implementing technologies like Digital Rights Management to prevent piracy can often lead to frustrating customers, making them resort to illegal means to access content. The fear of losing money due to piracy should not make companies compromise on the quality of their products and trample upon the rights of their consumers. Pissing off small groups of smart and intelligent hackers can do far more damage than piracy. Companies should strive to make their products reliable and user-friendly while focusing on building a good customer relationship to gain their trust and loyalty.

  • The Struggle of a Hacker: Navigating the Dark Without Any Light.Hacking requires persistence, determination, and confidence to navigate through incorrect assumptions and the absence of test data. Success may come after long hours of effort, just like Eijah's journey.

    Hacking is a tentative process involving long hours of effort, research, and analysis of encrypted data. It requires a strong faith in one's own abilities, even in the face of incorrect assumptions. In the absence of test data, hackers must make numerous assumptions and navigate through the dark without any light to guide them, making an incorrect assumption and getting steered in a totally different direction. However, for those who persist and stick to their intuition, success may come after a long time of effort, determination and confidence. Eijah's journey, from analyzing whitepapers, writing code, dealing with memory shortcomings, to finally uncovering the key, is a testament to the struggle that hacker's face.

  • The Power of Community in Overcoming Digital Rights Management Limitations.Eijah's bravery in releasing the decryption key for Blu-ray movies highlights the importance of community support in standing up against restrictions on digital rights.

    Eijah discovered the key to decrypt Blu-ray movies and make a copy, but was unsure if it was correct. Despite panic and fear of legal consequences, he posted the key on a hacker forum, and it was confirmed by the community. This was the first decryption key made public for HD DVD and Blu-ray discs, groundbreaking information for the hacker community. Releasing something online requires certainty and credibility, as hundreds of people will test it and judge your work. Eijah's decision shows the power of community and the importance of standing up against the limitations of digital rights management. In the end, he overcame his fear and frustration to take a stand, knowing he was risking everything.

  • The Impact of Breaking DRM and the Ripple Effect in the Hacking SceneBreaking DRM can have a positive impact on consumerism and privacy, leading to collaboration among hackers to improve their skills. The release of a key triggered a ripple effect that pressured companies to make necessary changes to their protocols.

    After Eijah released the key, he was approached by a secret group of hackers and invited into their private group. He realized the bad impact of DRM on consumerism, privacy and everyone without hacking skills felt obligated to do something about it. He collaborated with other hackers to break DRM and get better at it. Hacking scene value not releasing information companies like Sony can think their protocol is unbroken and not change anything. The key triggered a ripple effect that went through the pirating community. The AACS had a plan in case a key was leaked. They changed the algorithm making the key useless on new Blu-ray movies that were made after that.

  • The Power of Secrecy in HackingBreaking a system is one thing, but keeping it quiet is key. Declaring war on a group of motivated hackers is futile and lawyers can't compare to their strength. Hacking can open up new career paths.

    Breaking a system is powerful but keeping that break quiet is even more powerful. Trying to take down websites that posted compromised keys is futile as these keys can be hidden in so many different ways. Attempting to declare war on an infinite army of smart people who are motivated by a greater cause is not wise. It is humorous to think that lawyers and legal armies have any sort of strength and influence compared to an army of hackers and passionate internet users. This experience of breaking the encryption and releasing it opened up new opportunities for the hacker, who went on to quit his job in security and pursue a career in game programming.

  • The Cost of Profitability Over Consumer Protection in Corporate CultureConsumers have the power to demand change and eliminate piracy by making conscious decisions every day. Secure and anonymous file sharing options like Demon Saw and Promether provide solutions for those operating in insecure networks.

    The speaker's experience with Rockstar and their transition into entrepreneurship through projects like Demon Saw and Promether reveals that corporations prioritize profitability over consumer protection. They want to maintain the profitability of their protocols and specifications, regardless of their vulnerabilities, and are willing to sweep security breaches under the rug. The speaker argues that if corporations treated consumers with respect by providing good content at fair prices, piracy could be eliminated. The power lies in the hands of consumers to demand change by making conscious decisions every day. The speaker's current projects, Demon Saw and Promether, provide secure and anonymous file sharing and communication options for those operating in insecure networks.

Was this summary helpful?

Recent Episodes

Ep 19: Operation Aurora

Ep 19: Operation Aurora

Darknet Diaries

In 2009, a sophisticated hackers attacked Google's network, compromising numerous systems and attempting to access data they shouldn't have. Google detected this activity but it was more complex than anything they'd seen before.

August 01, 2018

Ep 18: Jackpot

Ep 18: Jackpot

Darknet Diaries

A man addicted to gambling finds a glitch in a video poker machine that lets him win excessive amounts of money. The details of his situation remain unclear.

July 01, 2018

Ep 17: Finn

Ep 17: Finn

Darknet Diaries

Max, a 14-year-old kid, hacks someone's Twitter account and is left with more than he bargained for. The situation escalates as Max gets drawn into the world of his target's online activities.

June 03, 2018

Ep 15: Ill Tills

Ep 15: Ill Tills

Darknet Diaries

A major retailer's point of sales machines were hacked and found to contain malware after a digital forensics investigation. The responders were able to identify the malware and stop its spread, although it is unclear how much customer data was ultimately leaked.

April 01, 2018

Related Episodes

62: Cam

62: Cam

Darknet Diaries

Cam's story is a cautionary tale and inspirational at the same time. He caused half a million dollars in damages with his 'attacks', driven by frustration with the injustices he saw in the world.

March 31, 2020

News Update - The Return of Miss Madison

News Update - The Return of Miss Madison

Hacked

Jordan and Scott discuss what happens when old leaked passwords claw their way back from the grave. Learn more about your ad choices. Visit podcastchoices.com/adchoices

April 21, 2020

Ep 33: RockYou

Ep 33: RockYou

Darknet Diaries

In 2009 a hacker broke into a website with millions of users and downloaded their entire user database. The incident changed how we view account security even today,

March 05, 2019

108: Marq

108: Marq

Darknet Diaries

This is the story of Marq (twitter.com/dev_null321). Which involves passwords, the dark web, and police. Sponsors Support for this podcast comes from Cybereason. Cybereason reverses the attacker’s advantage and puts the power back in the defender’s hands. End cyber attacks. From endpoints to everywhere. Learn more at Cybereason.com/darknet. Support for this show comes from Linode. Linode supplies you with virtual servers. Visit linode.com/darknet and get a special offer. View all active sponsors. Sources Court records and news articles were used to fact check this episode. However Marq requested that links to his full name not be made available. https://techcrunch.com/2019/12/19/ring-doorbell-passwords-exposed/ https://www.wired.com/2010/03/hacker-bricks-cars/ Learn more about your ad choices. Visit podcastchoices.com/adchoices

January 11, 2022

AI

Ask this episodeAI Anything

Darknet Diaries

Hi! You're chatting with Darknet Diaries AI.

I can answer your questions from this episode and play episode clips relevant to your question.

You can ask a direct question or get started with below questions -

Sign In to save message history