When you purchase through links on our site, we may earn an affiliate commission. Here’s how it works.

SunnComm Claims to Defeat "Shift-Key" Hack

Thanks ceminess for bringing this to our attention via BPN.

SunnComm International, Inc., the developer of MediaMax(TM), the most widely used and accepted audio CD copy management and enhancement technology in the United States, announced today that it has achieved a major breakthrough in CD content protection technology. As part of SunnComm's ongoing commitment to raise the bar for copy management solutions, it has developed new technology that will significantly enhance the security for MediaMax protected discs while remaining 100% playable in consumer CD/ DVD players. Protection components embedded on the optical medium will now make it impossible for the user to play the disc without installing the MediaMax software. As with all MediaMax products, once installed the user will not only be able to play the disc but will have access to numerous features and bonus content not found on conventional audio CD's. The beta release containing the new technology is to be tested by a select group of international record labels by the end of Q3/04.

This leap forward in technology provides a very strong answer to some critics who believed that holding the infamous shift-key offered an acceptable work-around for MediaMax protected discs. It provides the necessary support to ensure that the CD buyer will be given the option to use the music they have purchased in a legal, responsible way while protecting the artists and content owners' rights. SunnComm's president, Peter H. Jacobs, stated, "Everyone at SunnComm believes that the best digital security technology should be ever mindful of the consumer experience. We now have the tools to build on a very effective and well-received CD security platform, making it the most widespread and strongest CD security solution available anywhere."

View: Complete Press Release

News source: SunnComm

Report a problem with article
Next Article

Mozilla User Interface Spoofing Vulnerability

Previous Article

PHP Processor 1.3

Join the conversation!

Login or Sign Up to read and post a comment.

-1 Comments - Add comment