View Single Post
Old 06-01-2016, 02:12 AM   #637
DuckieTigger
Wizard
DuckieTigger ought to be getting tired of karma fortunes by now.DuckieTigger ought to be getting tired of karma fortunes by now.DuckieTigger ought to be getting tired of karma fortunes by now.DuckieTigger ought to be getting tired of karma fortunes by now.DuckieTigger ought to be getting tired of karma fortunes by now.DuckieTigger ought to be getting tired of karma fortunes by now.DuckieTigger ought to be getting tired of karma fortunes by now.DuckieTigger ought to be getting tired of karma fortunes by now.DuckieTigger ought to be getting tired of karma fortunes by now.DuckieTigger ought to be getting tired of karma fortunes by now.DuckieTigger ought to be getting tired of karma fortunes by now.
 
DuckieTigger's Avatar
 
Posts: 4,764
Karma: 246906703
Join Date: Dec 2011
Location: USA
Device: Oasis 3, Oasis 2, PW3, PW1, KT
Quote:
Originally Posted by ApK View Post
To be needlessly pedantic, reverse engineering in any context means examining the finished product and figuring out how it works. Reverse engineering was used to find out how the key was employed, then that knowledge was used to apply the key in other ways.
That is what happened. The algorithm on how to use the key was NOT public knowledge. Unless you are saying that Alf and friends stole the source code from Amazon, then it leaves only reverse engeneering of the finished product to turn it into plain Python.


Quote:
Cracking the DRM by making use of the available key, or cracking DRM by cracking the underlying crypto, and thereby not needing to have the key already available.
In this case you cannot have your pie and eat it too. You are calling both methods cracking, when one is inherently different than the other. Why don't you want to call it REMOVE the DRM from the ebook in both cases? One method required a key and the other required cracking (of underlying crypto).
DuckieTigger is offline