09 F9 11 02 9D 74 E3 5B D8 41 56 C5 63 56 88 C0

2007Copypasta / protest meme / numberclassic

Also known as: The HD-DVD Key · 09-F9 · The AACS Processing Key · The Illegal Number

09 F9 11 02 9D 74 E3 5B D8 41 56 C5 63 56 88 C0 is a 2007 AACS encryption key that sparked the Digg Revolt, becoming the defining example of the Streisand Effect through copypasta.

09 F9 11 02 9D 74 E3 5B D8 41 56 C5 63 56 88 C0 is a hexadecimal string representing the AACS processing key used to decrypt HD-DVD and Blu-ray discs, discovered by a hacker known as arnezami in February 2007. When the entertainment industry tried to scrub the number from the internet through cease-and-desist letters in May 2007, it triggered one of the largest acts of digital civil disobedience in early internet history, most famously the Digg Revolt, where users flooded the site's front page with the forbidden number3. The incident became a defining case study in the Streisand Effect and digital rights activism, spawning creative works from flags to songs built entirely around 16 bytes.

TL;DR

09 F9 11 02 9D 74 E3 5B D8 41 56 C5 63 56 88 C0 is a hexadecimal string representing the AACS processing key used to decrypt HD-DVD and Blu-ray discs, discovered by a hacker known as arnezami in February 2007.

Overview

The string 09 F9 11 02 9D 74 E3 5B D8 41 56 C5 63 56 88 C0 is a 128-bit AACS (Advanced Access Content System) processing key. In practical terms, this single cryptographic key could unlock the copy protection on every HD-DVD disc in existence and, because HD-DVD and Blu-ray shared the same AACS encryption system, Blu-ray discs as well6. The meme isn't really about the key's technical function. It's about what happened when powerful corporations tried to make a number illegal to say out loud on the internet.

The string became a protest symbol, plastered across blogs, forums, T-shirts, songs, flags, and poems. Users found every creative vector imaginable to publish 16 bytes of data in formats that made legal enforcement absurd3.

In February 2007, a hacker using the handle arnezami posted on the Doom9 multimedia forum with a thread titled "Processing Key, Media Key and Volume ID found!!!" The discovery was methodical: HD-DVD playback software had to load the decryption key into RAM to play discs, so arnezami identified the relevant memory region, dumped it to disk, and read the hexadecimal string right out of the memory dump6. The key appeared in sample code shared on the forum as a simple C array: `{0x09,0xF9,0x11,0x02,0x9D,0x74,0xE3,0x5B,0xD8,0x41,0x56,0xC5,0x63,0x56,0x88,0xC0}`1.

Arnezami noted that the processing key worked on the very first c-value out of 512 available, remarking that "someone at the mastering facility was very lazy"1. Another forum member, evdberg, built a working program implementing the technique and confirmed it functioned perfectly1. The discovery built on existing knowledge. Arnezami stated he started the thread "knowing AnyDVD had already done it," referring to the commercial software AnyDVD HD by SlySoft, though the exact method AnyDVD used was still debated1.

Origin & Background

Platform
Doom9 Forum (discovery), Digg (viral protest)
Key People
arnezami, Rudd-O, Kevin Rose
Date
2007
Year
2007

In February 2007, a hacker using the handle arnezami posted on the Doom9 multimedia forum with a thread titled "Processing Key, Media Key and Volume ID found!!!" The discovery was methodical: HD-DVD playback software had to load the decryption key into RAM to play discs, so arnezami identified the relevant memory region, dumped it to disk, and read the hexadecimal string right out of the memory dump. The key appeared in sample code shared on the forum as a simple C array: `{0x09,0xF9,0x11,0x02,0x9D,0x74,0xE3,0x5B,0xD8,0x41,0x56,0xC5,0x63,0x56,0x88,0xC0}`.

Arnezami noted that the processing key worked on the very first c-value out of 512 available, remarking that "someone at the mastering facility was very lazy". Another forum member, evdberg, built a working program implementing the technique and confirmed it functioned perfectly. The discovery built on existing knowledge. Arnezami stated he started the thread "knowing AnyDVD had already done it," referring to the commercial software AnyDVD HD by SlySoft, though the exact method AnyDVD used was still debated.

How It Spread

The key stayed within niche technical forums for about two months. Then on April 30, 2007, a blogger known as "Rudd-O" published the encryption key and explicitly asked readers to share it as widely as possible. The post hit Digg, a social news aggregator where users voted stories to the front page. About 15,000 Digg users upvoted articles about the key, driving it to the site's most visible real estate.

On May 1, 2007, the Advanced Access Content System Licensing Administrator (AACS LA) sent cease-and-desist letters to Digg and multiple other sites. The letters claimed that publishing the number constituted offering "a technology, product, service, device, component, or part thereof" designed to circumvent copy protection under the DMCA. Digg CEO Jay Adelson announced the site would comply and began removing stories containing the key.

This backfired spectacularly. The Digg community flooded the site with the number. Every story on the front page became about 09-F9. Users embedded it in comments, headlines, and images. As Jeremy Goldman noted in his book *Going Social*, "In trying to make the cracked issue go away, the AACS's letter (and Digg's response) succeeded only in making the story bigger".

Hours later, Digg co-founder Kevin Rose posted a message reversing course: "After seeing hundreds of stories and reading thousands of comments, you've made it clear... you'd rather see Digg go down fighting than bow to a bigger company. Effective immediately, we won't delete stories or comments containing the code, and we will deal with whatever the consequences might be".

The AACS LA also targeted individual bloggers. Rudd-O later reported that Google AdSense suspended his account ten months after the controversy, citing the page where he'd published the key. He protested that "no one can't claim copyright in a number" and called the delayed enforcement "hypocritical" given that Google had "sold thousands of dollars of ads in that very page" during the original traffic surge.

How to Use This Meme

The 09-F9 meme typically functions as a symbol of internet resistance rather than a standard template format. Common uses include:

- Protest symbol: Posting the full hex string in response to corporate censorship or DMCA overreach - Cultural reference: Dropping "09 F9" as shorthand for the Streisand Effect or failed attempts to suppress information online - Creative encoding: Embedding the number in unexpected formats (colors, music, poetry, images) as a form of protest art - Forum signature or flair: Using the number or the Free Speech Flag as a profile element signaling support for digital freedom

The meme is less about remixing a template and more about the act of repeating forbidden information in defiance of authority.

Cultural Impact

The 09-F9 incident was one of the internet's first large-scale demonstrations that censoring digital information by legal threat could backfire catastrophically. The Digg Revolt specifically showed that user communities could overpower platform moderation when sufficiently motivated.

The Free Speech Flag entered popular culture as a recognized protest symbol. Marcotte's design was studied in academic contexts, with Penn State's Antonio Ceraso analyzing it as evidence of "communal ethos" formation online. The flag raised genuine legal questions about whether encoding a cryptographic key as colors could constitute a circumvention device under the DMCA.

The AACS LA's cease-and-desist campaign, preserved in the Chilling Effects database, became a reference point for digital rights organizations discussing the overreach of the DMCA's anti-circumvention provisions. The irony that publishing a number could be construed as distributing a "technology, product, service, device, component, or part thereof" was not lost on legal commentators.

The incident also foreshadowed ongoing tensions between platform operators and their user bases. Kevin Rose's reversal on Digg set an early precedent for tech companies choosing community trust over legal compliance, a dynamic that would repeat across social media for decades to come.

Full History

The AACS encryption system was supposed to be the entertainment industry's silver bullet against high-definition piracy. Developed jointly by Disney, Intel, Microsoft, Panasonic, Warner Bros., IBM, Toshiba, and Sony, AACS controlled access to both HD-DVD and Blu-ray content. It was the successor to the CSS encryption used on standard DVDs, which had been cracked years earlier by the DeCSS tool. The industry was determined not to repeat that failure.

The crack started in technical obscurity. The Doom9 forum was a well-known hangout for multimedia hackers and reverse engineers. When arnezami posted the processing key in February 2007, the thread included detailed technical discussion about how AACS worked at the cryptographic level, including how the processing key was used with AES encryption to derive media keys, which in turn derived volume unique keys. The code samples shared in the thread showed the complete decryption chain, from processing key to media key to volume unique key.

Not everyone on the forum was thrilled. One poster accused arnezami of "playing his cards too soon," arguing that publicizing the processing key would cause software players to hide their keys more aggressively. Arnezami pushed back, saying the key had already been compromised before his thread started and urging the community to "concentrate now on doing something constructive".

The AACS LA's legal response was swift once the key reached mainstream visibility. Their cease-and-desist letters, filed with Chilling Effects (now Lumen), specifically targeted bloggers who had posted the key, accusing them of violating the anti-circumvention provisions of the DMCA, 17 U.S.C. §1201. The letters named specific blog URLs including ones on Blogspot platforms, showing how widely the key had scattered across even small personal sites.

The Digg Revolt of May 1, 2007 became the defining moment. Kevin Rose's capitulation post is often cited as one of the earliest examples of a tech company siding with its users against corporate legal pressure. But the rebellion extended far beyond Digg. The number appeared on hundreds of sites, embedded in every format users could imagine.

On the same day as the Digg Revolt, writer John Marcotte of the website Badmouth created the Free Speech Flag. He mapped the hexadecimal key directly into the flag's color values: #09F911, #029D74, #E35BD8, #4156C5, and #635688, with "C0" appended to the bottom right corner to imply "Crime Zero". Marcotte wrote: "We want to start a movement. A movement to reclaim personal liberties and decorporatize the laws of our nation". He released the flag into the public domain.

The creative responses kept coming. Musician Keith Burgun composed "Oh Nine, Eff Nine," a song whose only lyrics were the numbers of the key. "I thought it was a source of comedy that they were trying so futilely to quell the spread of this number," Burgun said. "The ironic thing is, because they tried to quiet it down it's the most famous number on the Internet". Users wore the code on T-shirts, wove it into poems, and integrated it into hip hop lyrics.

The legal and academic world took notice. Matthew Rimmer of Australian National University commented that the creative responses weren't "necessarily designed to stay within the bounds of the law" but rather to "show that the law is absurd or ridiculous and should be abolished". Antonio Ceraso of Penn State placed the movement within a framework he called "the formation of a communal ethos... the 09 F9 tribe," and posed the pointed question: "Would five striped colors arranged into a flag constitute an anti-circumvention device under the DMCA?". Jeff Thompson of the Stevens Institute of Technology took Marcotte's visual encoding concept further by creating a sound file that translated the processing key into audible tones.

The aftermath played out over months and years. Google's response to the controversy was inconsistent. While the key spread freely across Google's search results during the peak of the revolt, Rudd-O's AdSense account was suspended ten months later, a move he called "simply unbelievable" given Google's own profit from the page's traffic. The AACS LA eventually revoked the compromised key and issued new ones, but the damage to the encryption system's credibility was done.

The incident predated and helped define the concept of the Streisand Effect for a generation of internet users. As Urban Dictionary users put it with characteristic bluntness, the key was "geek for 'F U, MPAA and AACS'".

Fun Facts

The processing key worked on the very first c-value out of 512 possibilities, which arnezami attributed to laziness at the mastering facility

AACS was designed by a consortium including Disney, Intel, Microsoft, Sony, Toshiba, and Warner Bros., yet was broken by one person reading a RAM dump

Rudd-O's Google AdSense account was suspended ten months after the controversy, despite Google having profited from ad revenue on the page during its peak traffic

Because HD-DVD and Blu-ray used the same AACS encryption, cracking HD-DVD effectively cracked Blu-ray too, even though HD-DVD lost the format war

The Digg Revolt happened and was resolved in a single day, May 1, 2007

Derivatives & Variations

Free Speech Flag:

John Marcotte's five-stripe flag encoding the hex key as color values, released into the public domain on May 1, 2007[3]

"Oh Nine, Eff Nine" song:

Keith Burgun's YouTube composition using the numbers as lyrics[3]

Sound file translation:

Jeff Thompson's audible tone representation of the processing key[3]

T-shirts and merchandise:

Users printed the hex string on clothing as wearable protest[3]

Poetry and hip-hop integrations:

The code was woven into verse and rap lyrics across multiple platforms[3]

The "09 F9 tribe":

Academic Antonio Ceraso's framework describing the communal identity that formed around sharing the key[3]

Frequently Asked Questions

09 F9 11 02 9D 74 E3 5B D8 41 56 C5 63 56 88 C0

2007Copypasta / protest meme / numberclassic

Also known as: The HD-DVD Key · 09-F9 · The AACS Processing Key · The Illegal Number

09 F9 11 02 9D 74 E3 5B D8 41 56 C5 63 56 88 C0 is a 2007 AACS encryption key that sparked the Digg Revolt, becoming the defining example of the Streisand Effect through copypasta.

09 F9 11 02 9D 74 E3 5B D8 41 56 C5 63 56 88 C0 is a hexadecimal string representing the AACS processing key used to decrypt HD-DVD and Blu-ray discs, discovered by a hacker known as arnezami in February 2007. When the entertainment industry tried to scrub the number from the internet through cease-and-desist letters in May 2007, it triggered one of the largest acts of digital civil disobedience in early internet history, most famously the Digg Revolt, where users flooded the site's front page with the forbidden number. The incident became a defining case study in the Streisand Effect and digital rights activism, spawning creative works from flags to songs built entirely around 16 bytes.

TL;DR

09 F9 11 02 9D 74 E3 5B D8 41 56 C5 63 56 88 C0 is a hexadecimal string representing the AACS processing key used to decrypt HD-DVD and Blu-ray discs, discovered by a hacker known as arnezami in February 2007.

Overview

The string 09 F9 11 02 9D 74 E3 5B D8 41 56 C5 63 56 88 C0 is a 128-bit AACS (Advanced Access Content System) processing key. In practical terms, this single cryptographic key could unlock the copy protection on every HD-DVD disc in existence and, because HD-DVD and Blu-ray shared the same AACS encryption system, Blu-ray discs as well. The meme isn't really about the key's technical function. It's about what happened when powerful corporations tried to make a number illegal to say out loud on the internet.

The string became a protest symbol, plastered across blogs, forums, T-shirts, songs, flags, and poems. Users found every creative vector imaginable to publish 16 bytes of data in formats that made legal enforcement absurd.

In February 2007, a hacker using the handle arnezami posted on the Doom9 multimedia forum with a thread titled "Processing Key, Media Key and Volume ID found!!!" The discovery was methodical: HD-DVD playback software had to load the decryption key into RAM to play discs, so arnezami identified the relevant memory region, dumped it to disk, and read the hexadecimal string right out of the memory dump. The key appeared in sample code shared on the forum as a simple C array: `{0x09,0xF9,0x11,0x02,0x9D,0x74,0xE3,0x5B,0xD8,0x41,0x56,0xC5,0x63,0x56,0x88,0xC0}`.

Arnezami noted that the processing key worked on the very first c-value out of 512 available, remarking that "someone at the mastering facility was very lazy". Another forum member, evdberg, built a working program implementing the technique and confirmed it functioned perfectly. The discovery built on existing knowledge. Arnezami stated he started the thread "knowing AnyDVD had already done it," referring to the commercial software AnyDVD HD by SlySoft, though the exact method AnyDVD used was still debated.

Origin & Background

Platform
Doom9 Forum (discovery), Digg (viral protest)
Key People
arnezami, Rudd-O, Kevin Rose
Date
2007
Year
2007

In February 2007, a hacker using the handle arnezami posted on the Doom9 multimedia forum with a thread titled "Processing Key, Media Key and Volume ID found!!!" The discovery was methodical: HD-DVD playback software had to load the decryption key into RAM to play discs, so arnezami identified the relevant memory region, dumped it to disk, and read the hexadecimal string right out of the memory dump. The key appeared in sample code shared on the forum as a simple C array: `{0x09,0xF9,0x11,0x02,0x9D,0x74,0xE3,0x5B,0xD8,0x41,0x56,0xC5,0x63,0x56,0x88,0xC0}`.

Arnezami noted that the processing key worked on the very first c-value out of 512 available, remarking that "someone at the mastering facility was very lazy". Another forum member, evdberg, built a working program implementing the technique and confirmed it functioned perfectly. The discovery built on existing knowledge. Arnezami stated he started the thread "knowing AnyDVD had already done it," referring to the commercial software AnyDVD HD by SlySoft, though the exact method AnyDVD used was still debated.

How It Spread

The key stayed within niche technical forums for about two months. Then on April 30, 2007, a blogger known as "Rudd-O" published the encryption key and explicitly asked readers to share it as widely as possible. The post hit Digg, a social news aggregator where users voted stories to the front page. About 15,000 Digg users upvoted articles about the key, driving it to the site's most visible real estate.

On May 1, 2007, the Advanced Access Content System Licensing Administrator (AACS LA) sent cease-and-desist letters to Digg and multiple other sites. The letters claimed that publishing the number constituted offering "a technology, product, service, device, component, or part thereof" designed to circumvent copy protection under the DMCA. Digg CEO Jay Adelson announced the site would comply and began removing stories containing the key.

This backfired spectacularly. The Digg community flooded the site with the number. Every story on the front page became about 09-F9. Users embedded it in comments, headlines, and images. As Jeremy Goldman noted in his book *Going Social*, "In trying to make the cracked issue go away, the AACS's letter (and Digg's response) succeeded only in making the story bigger".

Hours later, Digg co-founder Kevin Rose posted a message reversing course: "After seeing hundreds of stories and reading thousands of comments, you've made it clear... you'd rather see Digg go down fighting than bow to a bigger company. Effective immediately, we won't delete stories or comments containing the code, and we will deal with whatever the consequences might be".

The AACS LA also targeted individual bloggers. Rudd-O later reported that Google AdSense suspended his account ten months after the controversy, citing the page where he'd published the key. He protested that "no one can't claim copyright in a number" and called the delayed enforcement "hypocritical" given that Google had "sold thousands of dollars of ads in that very page" during the original traffic surge.

How to Use This Meme

The 09-F9 meme typically functions as a symbol of internet resistance rather than a standard template format. Common uses include:

- Protest symbol: Posting the full hex string in response to corporate censorship or DMCA overreach - Cultural reference: Dropping "09 F9" as shorthand for the Streisand Effect or failed attempts to suppress information online - Creative encoding: Embedding the number in unexpected formats (colors, music, poetry, images) as a form of protest art - Forum signature or flair: Using the number or the Free Speech Flag as a profile element signaling support for digital freedom

The meme is less about remixing a template and more about the act of repeating forbidden information in defiance of authority.

Cultural Impact

The 09-F9 incident was one of the internet's first large-scale demonstrations that censoring digital information by legal threat could backfire catastrophically. The Digg Revolt specifically showed that user communities could overpower platform moderation when sufficiently motivated.

The Free Speech Flag entered popular culture as a recognized protest symbol. Marcotte's design was studied in academic contexts, with Penn State's Antonio Ceraso analyzing it as evidence of "communal ethos" formation online. The flag raised genuine legal questions about whether encoding a cryptographic key as colors could constitute a circumvention device under the DMCA.

The AACS LA's cease-and-desist campaign, preserved in the Chilling Effects database, became a reference point for digital rights organizations discussing the overreach of the DMCA's anti-circumvention provisions. The irony that publishing a number could be construed as distributing a "technology, product, service, device, component, or part thereof" was not lost on legal commentators.

The incident also foreshadowed ongoing tensions between platform operators and their user bases. Kevin Rose's reversal on Digg set an early precedent for tech companies choosing community trust over legal compliance, a dynamic that would repeat across social media for decades to come.

Full History

The AACS encryption system was supposed to be the entertainment industry's silver bullet against high-definition piracy. Developed jointly by Disney, Intel, Microsoft, Panasonic, Warner Bros., IBM, Toshiba, and Sony, AACS controlled access to both HD-DVD and Blu-ray content. It was the successor to the CSS encryption used on standard DVDs, which had been cracked years earlier by the DeCSS tool. The industry was determined not to repeat that failure.

The crack started in technical obscurity. The Doom9 forum was a well-known hangout for multimedia hackers and reverse engineers. When arnezami posted the processing key in February 2007, the thread included detailed technical discussion about how AACS worked at the cryptographic level, including how the processing key was used with AES encryption to derive media keys, which in turn derived volume unique keys. The code samples shared in the thread showed the complete decryption chain, from processing key to media key to volume unique key.

Not everyone on the forum was thrilled. One poster accused arnezami of "playing his cards too soon," arguing that publicizing the processing key would cause software players to hide their keys more aggressively. Arnezami pushed back, saying the key had already been compromised before his thread started and urging the community to "concentrate now on doing something constructive".

The AACS LA's legal response was swift once the key reached mainstream visibility. Their cease-and-desist letters, filed with Chilling Effects (now Lumen), specifically targeted bloggers who had posted the key, accusing them of violating the anti-circumvention provisions of the DMCA, 17 U.S.C. §1201. The letters named specific blog URLs including ones on Blogspot platforms, showing how widely the key had scattered across even small personal sites.

The Digg Revolt of May 1, 2007 became the defining moment. Kevin Rose's capitulation post is often cited as one of the earliest examples of a tech company siding with its users against corporate legal pressure. But the rebellion extended far beyond Digg. The number appeared on hundreds of sites, embedded in every format users could imagine.

On the same day as the Digg Revolt, writer John Marcotte of the website Badmouth created the Free Speech Flag. He mapped the hexadecimal key directly into the flag's color values: #09F911, #029D74, #E35BD8, #4156C5, and #635688, with "C0" appended to the bottom right corner to imply "Crime Zero". Marcotte wrote: "We want to start a movement. A movement to reclaim personal liberties and decorporatize the laws of our nation". He released the flag into the public domain.

The creative responses kept coming. Musician Keith Burgun composed "Oh Nine, Eff Nine," a song whose only lyrics were the numbers of the key. "I thought it was a source of comedy that they were trying so futilely to quell the spread of this number," Burgun said. "The ironic thing is, because they tried to quiet it down it's the most famous number on the Internet". Users wore the code on T-shirts, wove it into poems, and integrated it into hip hop lyrics.

The legal and academic world took notice. Matthew Rimmer of Australian National University commented that the creative responses weren't "necessarily designed to stay within the bounds of the law" but rather to "show that the law is absurd or ridiculous and should be abolished". Antonio Ceraso of Penn State placed the movement within a framework he called "the formation of a communal ethos... the 09 F9 tribe," and posed the pointed question: "Would five striped colors arranged into a flag constitute an anti-circumvention device under the DMCA?". Jeff Thompson of the Stevens Institute of Technology took Marcotte's visual encoding concept further by creating a sound file that translated the processing key into audible tones.

The aftermath played out over months and years. Google's response to the controversy was inconsistent. While the key spread freely across Google's search results during the peak of the revolt, Rudd-O's AdSense account was suspended ten months later, a move he called "simply unbelievable" given Google's own profit from the page's traffic. The AACS LA eventually revoked the compromised key and issued new ones, but the damage to the encryption system's credibility was done.

The incident predated and helped define the concept of the Streisand Effect for a generation of internet users. As Urban Dictionary users put it with characteristic bluntness, the key was "geek for 'F U, MPAA and AACS'".

Fun Facts

The processing key worked on the very first c-value out of 512 possibilities, which arnezami attributed to laziness at the mastering facility

AACS was designed by a consortium including Disney, Intel, Microsoft, Sony, Toshiba, and Warner Bros., yet was broken by one person reading a RAM dump

Rudd-O's Google AdSense account was suspended ten months after the controversy, despite Google having profited from ad revenue on the page during its peak traffic

Because HD-DVD and Blu-ray used the same AACS encryption, cracking HD-DVD effectively cracked Blu-ray too, even though HD-DVD lost the format war

The Digg Revolt happened and was resolved in a single day, May 1, 2007

Derivatives & Variations

Free Speech Flag:

John Marcotte's five-stripe flag encoding the hex key as color values, released into the public domain on May 1, 2007[3]

"Oh Nine, Eff Nine" song:

Keith Burgun's YouTube composition using the numbers as lyrics[3]

Sound file translation:

Jeff Thompson's audible tone representation of the processing key[3]

T-shirts and merchandise:

Users printed the hex string on clothing as wearable protest[3]

Poetry and hip-hop integrations:

The code was woven into verse and rap lyrics across multiple platforms[3]

The "09 F9 tribe":

Academic Antonio Ceraso's framework describing the communal identity that formed around sharing the key[3]

Frequently Asked Questions