Bypassing Watermark Implementations