View Single Post
Old 06-06-2011, 03:43 PM   #9
pdurrant
The Grand Mouse 高貴的老鼠
pdurrant ought to be getting tired of karma fortunes by now.pdurrant ought to be getting tired of karma fortunes by now.pdurrant ought to be getting tired of karma fortunes by now.pdurrant ought to be getting tired of karma fortunes by now.pdurrant ought to be getting tired of karma fortunes by now.pdurrant ought to be getting tired of karma fortunes by now.pdurrant ought to be getting tired of karma fortunes by now.pdurrant ought to be getting tired of karma fortunes by now.pdurrant ought to be getting tired of karma fortunes by now.pdurrant ought to be getting tired of karma fortunes by now.pdurrant ought to be getting tired of karma fortunes by now.
 
pdurrant's Avatar
 
Posts: 74,050
Karma: 315160596
Join Date: Jul 2007
Location: Norfolk, England
Device: Kindle Oasis
Amazon's DRM is currently based on an eight character PID. It sounds like it might be possible to use GPUs to brute force that in a reasonable time.

But all this discussion of brute force cracking of DRMed content is pointless. It's never needed. Anyone buying a DRMed ebook (or other media) already has access to the password — whether it's a B&N Name & number password, an Amazon PID or an Adobert Adept key.

None of the current DRM removal tools require a brute force method to find the secret key. It's already known.
pdurrant is offline   Reply With Quote