![]() ![]() The blogger wrote that a new version of Kindle for PC doesn't appear to interfere with Unswindle. The files are then unencrypted Mobipocket files - which are similar to HTML files - which then can be converted to other e-book formats or PDF (Portable Document Format) files using other tools, such as Calibre, I love cabbages said. "It then hands all of the actual hard work of actual decryption to darkreverser's MobideDRM". ![]() What Unswindle does is grab that unique key for every book using Windows debugging APIs (application programming interfaces), I love cabbages said. "Everything else is the same though - MobideDRM works, you just need to figure out a different key for each book instead of a single key for every book," I love cabbages wrote. Instead of using a single device encryption key for Kindle books, each book is now encrypted with a different key. Used in combination with Igorsk's tool, the two programs have allowed people to remove DRM from Kindle books.īut Amazon changed the encryption scheme when it released the Kindle for PC program, a free application that allows people to read Kindle titles on their PCs. Then, another hacker named "darkreverser" wrote MobideDRM, which could remove the DRM from Mobipocket files. That enabled people to buy Mobipocket books from other vendors and read them on their Kindles. Igorsk developed a tool that generated a "PID," or a unique device-specific encryption key, used for Kindle e-books that enabled Mobipocket books with DRM to be read, "I love cabbages" said. ![]() The Mobipocket format is still relatively popular.Ī hacker named "igorsk" discovered that books in the Mobipocket format with DRM could still be read on the Kindle. "Laws such as the DMCA turn those restrictions into injustice by making their circumvention illegal."Īmazon's proprietary ".azw" format is derived from a format called Mobipocket, which came from a French company of the same name that Amazon purchased, "I love cabbages" said in the e-mail exchange. "Primarily, I view DRM as an unnecessary restriction on legitimate freedoms, such as fair use of copyrighted material," the hacker said in an e-mail exchange. ![]()
0 Comments
Leave a Reply. |