Actually, that's not exactly accurate -- the key is dynamic, I.E. different for every disk. So we need to be lucky once per disk. Basically, most hackers look at it as not worth the effort to reverse engineer, and find a way to get at the data-stream from a legitimate SACD or universal player after it's decrypted, at which point it needs to be captured (or fed to a "DAC") in real-time. We call it "laserdropping".