| http://www.w3.org/ns/prov#value | - While the 'architects of AACS learned from the mistakes of CSS and built into the system several different types of keys and the ability to change keys whenever attacks were successful,' the motivation of the hacking public is not to be underestimated.
|