Hacking the Xbox

Total Page:16

File Type:pdf, Size:1020Kb

Hacking the Xbox $24.99 ($34.99 CDN) SHELVE IN: PC HARDWARE/GENERAL HACKING THE XBOX Get Hacking the Xbox before Microsoft Does! qANQR1DBwU4DiyVm0iq7P8gQB/9IoylwNnOxHExELKfHCTyOxX1m/eKe3+bgN/kc afpcdG1BR0ZV3degJhP2ru8h58Tw/MLU+h+jMYPUOCulwRAMyhxqX+0K1fU0oNAd 1UKi0e8sju0mks0XXzEOXNpM6BO8L90/NCSUTWPBUMgR6/KtezsFJUDAIOlxVuBX IpN1x+6A3O6Tayrg0+Qp+hD3FDRSIVKoD/uiaCnxkp5wxXh3JPRU3JMHWtUcwsr2 ThN1xhandO6Tn gg0dep+hDhackingKwas iaCcekledxby3JheUoriginalwsr2 This hands-on guide to hacking was canceled by the original Hacking publisher out of fear of DMCA-related lawsuits. Following the author’s self-publication of the book (during which time he sold thousands directly), Hacking the Xbox is now brought to you by No Starch Press. Hacking the Xbox begins with a few step-by-step tutorials on the Xbox hardware modifications that teach basic hacking techniques as well as essential reverse engineering skills. It progresses into An Introduction to Reverse Engineering a discussion of the Xbox security mechanisms and other advanced hacking topics, emphasizing the important subjects of computer security and reverse engineering. The book includes numerous practical guides, such as where to get hacking gear, soldering techniques, debugging tips, and an Xbox hardware reference guide. Hacking the Xbox confronts the social and political issues facing today’s hacker, and introduces readers to the humans behind the hacks through several interviews with master hackers. It looks at the potential impact of today’s legal challenges to legitimate Andrew “bunnie” Huang reverse engineering activities, which are further examined in a chapter contributed by Lee Tien of the Electronic Frontier Foundation (EFF) about the rights and responsibilities of hackers. The book concludes with a discussion of the latest trends and vulnerabilities in secure PC platforms. BUNNIE Hurry and get Hacking the Xbox before Microsoft does! VurrRyVnZ6EetMHackingyDhi XboxxbEforeaMicrosoft BOesDPGWrkhbxfH VDsdRyVDZ6E0sMGl2Qe9/yDriFn2RJx1E1bmoaSd/+Va3UfEBOXBDPGWrkhbxfH 5+zS6m6B4sG3p+2veuIZSN3CTfHRWCbAjcmYWokhHUN+p2VOpeTit7w08cEqMjDc /du9x6CkPyxGMcL4EwVpNLf3PO6nCevVNRk18pSq64ICUgtRFqmc+JXCg+UZO2Mi ISBN 1-59327-029-1 52499> THE FINEST IN GEEK ENTERTAINMENT™ www.nostarch.com 9 781593 270292 Dear Reader, Thank you for downloading and reading this book. No Starch Press and I have decided to release this free ebook version of Hacking the Xbox in honor of Aaron Swartz. As you read this book, I hope that you’ll be reminded of how important freedom is to the hacking community and that you’ll be inclined to support the causes that Aaron believed in. I agreed to release this book for free in part because Aaron’s treatment by MIT is not unfamiliar to me. In this book, you will find the story of when I was an MIT graduate student, extracting security keys from the original Microsoft Xbox. You’ll also read about the crushing disappointment of receiving a letter from MIT legal repudiating any association with my work, effectively leaving me on my own to face Microsoft. The difference was that the faculty of my lab, the AI laboratory, were outraged by this treatment. They openly defied MIT legal and vowed to publish my work as an official “AI Lab Memo,” thereby granting me greater negotiating leverage with Microsoft. Microsoft, mindful of the potential backlash from the court of public opinion over suing a legitimate academic researcher, came to a civil understanding with me over the issue. It saddens me that America’s so-called government for the people, by the people, and of the people has less compassion and enlightenment toward their fellow man than a corporation. Having been a party to subsequent legal bullying by other entities, I am all too familiar with how ugly and gut-wrenching a high-stakes lawsuit can be. Fortunately, the stakes in my cases were not as high, nor were my adversaries as formidable as Aaron’s, or I too might have succumbed to hopelessness and fear. A few years ago, I started rebuilding my life overseas, and I find a quantum of solace in the thought that my residence abroad makes it a little more difficult for me to be served. While the US legal system strives for justice, the rules of the system create an asymmetric war that favors those with resources. By far one of the most effective methods to force a conclusion, right or wrong, against a small player is to simply bleed them of resources and the will to fight through pre-trial antics. Your entire life feels like it is under an electron microscope, with every tiny blemish magnified into a pitched battle of motions, countermotions, discovery, subpoenas, and affidavits, and each action heaping tens of thousands of dollars onto your legal bill. Your friends, co-workers, employers, and family are drawn into this circus of humiliation as witnesses. Worse, you’re counseled not to speak candidly to anyone, lest they be summoned as a witness against you. Isolated and afraid, it eventually makes more sense to roll over and settle than to take the risk of losing on a technicality versus a better-funded adversary, regardless of the justice. The US government is far and away the best-funded and fearsome enemy in the world, and copyright law has some unusually large, if not cruel, penalties associated with it. I never knew Aaron, but I feel that the magni- tude of the bullying he was subjected to is reflected in his decision to end his life. I echo Larry Lessig’s notion that the US legal system needs a sense of shame. To an outsider like me, it seems that certain prosecutors in the US government are obsessed with making a name for themselves at the expense of the individuals they pursue. Winning cases gains them the rec- ognition and credibility needed for promotions and assignments to ever higher profile cases. For them, it’s not about justice—it’s about victory and self-aggrandizement. This system of incentives contributes to the shameless bullying of indi- viduals and small entities who have the guts to stand up and do something daring. Individuals are robbed of the will and strength to fight for what they feel is right, as the mere act of prosecution can be as much a punish- ment as the verdict. As a result, I fear that the era of civil disobedience may be coming to a close. As people, as individuals, as hackers, we need to oppose this trend and continue to do what we feel deep down in our hearts is right. While Aaron’s story came to a tragic end, I hope that in this book you will find an encouraging story with a happy ending. Without the right to tinker and explore, we risk becoming enslaved by technology; and the more we exercise the right to hack, the harder it will be to take that right away. bunnie Singapore, March 2013 Hacking the Xbox An Introduction to Reverse Engineering Unlimited Edition Hacking the Xbox An Introduction to Reverse Engineering Unlimited Edition Andrew “bunnie” Huang No Starch Press, Inc. San Francisco HACKING THE XBOX. Copyright © 2003 by Xenatera LLC. Some rights reserved. This work is licensed under the Creative Commons Attri- bution-NonCommerical-ShareAlike License. To view a copy of this license, visit http://creativecommons.org/licenses/by-nc-sa/1.0/ or send a letter to Creative Commons, 559 Nathan Abbott Way, Stanford, CA 94305, USA. Publisher: William Pollock Managing Editor: Karol Jurado Design and Layout: Xenatera LLC No Starch Press and the No Starch Press logo are registered trademarks of No Starch Press, Inc. Other product and company names mentioned herein may be the trademarks of their respective owners. Rather than use a trademark symbol with every occurrence of a trademarked name, we are using the names only in an editorial fashion and to the benefit of the trademark owner, with no intention of infringement of the trademark. For information on book distributors or translations, please contact No Starch Press, Inc. directly: No Starch Press, Inc. 38 Ringold Street, San Francisco, CA 94103 USA Phone: 415-863-9900; Fax: 415-863-9950; [email protected]; http://www.nostarch.com The information in this book is distributed on an “As Is” basis, without warranty. While every precaution has been taken in the preparation of this work, neither the author nor No Starch Press, Inc. shall have any liability to any person or entity with respect to any loss or damage caused or alleged to be caused directly or indirectly by the information contained in it. ISBN 1-59327-029-1 In memory of Aaron Swartz Table of Contents Prologue - README.1ST .............................................. 1 The Video Game Console Market ............................................................................ 2 About Hackers and Hacking ...................................................................................... 4 The Politics of Hacking ........................................................................................................ 7 The People Behind the Hacks ............................................................................................ 11 Chapter 1 - Voiding the Warranty .................................15 Tools of the Trade ..................................................................................................... 15 Tools to Open Things Up.................................................................................................. 15 Tools to Attach and Remove Components .................................................................... 17 Tools to Test and Diagnose ............................................................................................... 18 Tools for Design.................................................................................................................
Recommended publications
  • Understanding Microsoft Virtualization Solutions Ebook
    MICROSOFT LICENSE TERMS MICROSOFT EBOOK These license terms are an agreement between Microsoft Corporation (or based on where you live, one of its affiliates) and you. Please read them. They apply to the licensed content named above, which includes the media on which you received it, if any. By using the licensed content, you accept these terms. If you do not accept them, do not use the licensed content. If you comply with these license terms, you have the rights below. 1. OVERVIEW. Licensed Content. The licensed content includes the eBook and associated media. License Model. The licensed content is licensed on a per user per device basis. 2. INSTALLATION AND USE RIGHTS. a. General. One user may install and use one copy of the licensed content on a single computer. b. Portable Device. You may install an additional copy of the licensed content on a portable device for the exclusive use of the primary user of the first copy of the licensed content. 3. SCOPE OF LICENSE. The licensed content is licensed, not sold. This agreement only gives you some rights to use the licensed content. Microsoft reserves all other rights. Unless applicable law gives you more rights despite this limitation, you may use the licensed content only as expressly permitted in this agreement. You agree Not to make copies of the licensed content; Not to distribute, rent, lease, lend, reproduce, transit, adapt, modify, link to, post, forward, make derivative works based upon, disseminate, publish or sublicense the licensed content or combine the licensed content with
    [Show full text]
  • Computer Game Mods, Modders, Modding, and the Mod Scene
    Computer Game Mods, Modders, Modding, and the Mod Scene Walt Scacchi Institute for Software Research and Center for Computer Games and Virtual Worlds University of California, Irvine 92697-3455 USA March 2010 Abstract Computer games have increasingly been the focus of user-led innovations in the form of game mods. This paper examines how different kinds of socio-technical affordances serve to organize the actions of the people who develop and share their game mods. The affordances examined include customization and tailoring mechanisms, software and content copyright licenses, game software infrastructure and development tools, career contingencies and organizational practices of mod teams, and social worlds intersecting the mod scene. Numerous examples will be used to ground this review and highlight how such affordances can organize, facilitate or constrain what can be done. Overall, this study helps to provide a deeper understanding of how a web of associated affordances collectively serve to govern what mods get made, how modding practices emerge and flourish, and how modders and the game industry serve each others' interests, though not always in equivocal terms. Introduction Computer game mods are a leading form of user-led innovation in game design and game play experience. But modded games are not standalone systems, as they require the user to have an originally acquired or authorized copy of the unmodded game. Thus, there are questions of not only who creates what and who owns such modified games, but also whether or how the practice of game modding is controlled or governed by external parties to ultimately exploit the efforts of game modders.
    [Show full text]
  • 2K Unveils Stellar Video Game Line
    2K Unveils Stellar Video Game Line-up for 2006 Electronic Entertainment Expo; Line-up Includes Highly- Anticipated Titles such as The Da Vinci Code(TM), Prey, Sid Meier's Civilization IV: Warlords and NBA 2K7 May 10, 2006 8:31 AM ET NEW YORK--(BUSINESS WIRE)--May 10, 2006--2K and 2K Sports, publishing labels of Take-Two Interactive Software, Inc. (NASDAQ: TTWO), today announced a strong line-up for Electronic Entertainment Expo 2006 (E3) taking place at the Los Angeles Convention Center from May 10-12, 2006. From 2K, the line-up includes titles based on blockbuster entertainment brands such as The Da Vinci Code(TM) and Family Guy and popular comic book franchises The Darkness and Ghost Rider, as well as original next generation games such as Prey and BioShock. 2K is also featuring highly-anticipated titles from Firaxis Games, including Sid Meier's Civilization IV: Warlords and Sid Meier's Railroads! as well as the Firaxis and Firefly Studios collaboration title CivCity: Rome. Other eagerly awaited titles include Stronghold Legends(TM) along with Dungeon Siege II(R): Broken World(TM) and Dungeon Siege: Throne of Agony(TM), based on the acclaimed Dungeon Siege(R) franchise. In addition, the 2K Sports line-up features the next installments from top-rated franchises such as NHL 2K7, NBA 2K7 and College Hoops 2K7. 2K Line-up Includes: BioShock BioShock is an innovative role-playing shooter from Irrational Games who was named IGN's 2005 Developer of the Year. BioShock immerses players into a war-torn underwater utopia, where mankind has abandoned their humanity in their quest for perfection.
    [Show full text]
  • On Liberty It’S Our Best Best Of
    On Liberty It’s Our Best Best of... Issue Ever A guide to the city’s top Sights Entertainment Restaurants Bars Important Health Warning About Playing Video Games Table of Contents Photosensitive Seizures A very small percentage of people may experience a seizure when exposed to certain 02 Installation visual images, including flashing lights or patterns that may appear in video games. 04 Game Controls Even people who have no history of seizures or epilepsy may have an undiagnosed condition that can cause these “photosensitive epileptic seizures” while watching 08 Letter from the Editor video games. 10 Places Best Sights These seizures may have a variety of symptoms, including lightheadedness, altered vision, eye or face twitching, jerking or shaking of arms or legs, disorientation, 12 Entertainment Best Place to Chill confusion, or momentary loss of awareness. Seizures may also cause loss of consciousness or convulsions that can lead to injury from falling down or striking 14 Restaurants Best Burger nearby objects. 16 Bars Best Brew Immediately stop playing and consult a doctor if you experience any of these 18 Feature Dating in the City symptoms. Parents should watch for or ask their children about the above symptoms—children and teenagers are more likely than adults to experience these 20 Technology Top Gadgets seizures. The risk of photosensitive epileptic seizures may be reduced by taking the following precautions: Sit farther from the screen; use a smaller screen; play in a well- 22 Credits lit room; and do not play when you are drowsy or fatigued. 32 Warranty If you or any of your relatives have a history of seizures or epilepsy, consult a doctor before playing.
    [Show full text]
  • Report to the President: MIT and the Prosecution of Aaron Swartz
    Report to the President MIT and the Prosecution of Aaron Swartz Review Panel Harold Abelson Peter A. Diamond Andrew Grosso Douglas W. Pfeiffer (support) July 26, 2013 © Copyright 2013, Massachusetts Institute of Technology This worK is licensed under a Creative Commons Attribution 3.0 Unported License. PRESIDENT REIF’S CHARGE TO HAL ABELSON | iii L. Rafael Reif, President 77 Massachusetts Avenue, Building 3-208 Cambridge, MA 02139-4307 U.S.A. Phone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
    [Show full text]
  • Locating and Extracting Digital Evidence from Hosted Virtual Desktop Infrastructures: Cloud Context
    Locating and Extracting Digital Evidence from Hosted virtual desktop Infrastructures: Cloud Context NIRBHAY JAWALE B.C.I.S (AUT University) New Zealand A thesis submitted to the graduate faculty of Design and Creative Technologies AUT University in partial fulfilment of the Requirements for the degree of Master of Forensic Information Technology School of Computing and Mathematical Sciences Auckland, New Zealand 2010 II Declaration I hereby declare that this submission is my own work and that, to the best of my knowledge and belief, it contains no material previously published or written by another person nor material which to a substantial extent has been accepted for the qualification of any other degree or diploma of a University or other institution of higher learning, except where due acknowledgement is made in the acknowledgements. ........................... Signature III Acknowledgements This thesis was conducted at the Faculty of Design and Creative Technologies in the school of Computing and Mathematical Sciences at AUT University, New Zealand. During the course of writing this thesis, I have received a valuable support from many people. Firstly, I would like to thank my family for their blessings, encouragement and believing that I could get through this study. Secondly, I am deeply thankful and honored by having Professor Ajit Narayanan as my thesis supervisor. This thesis would not have been possible without his guidance, encouragement and interest; he took to supervise my thesis topic. I very much enjoyed the critical discussions and comments on my research topic with Professor Ajit Narayanan, this thesis would not have been in the present form without his valuable contribution.
    [Show full text]
  • S Government of India Atomic Energy Commission Annual
    ' '/• B.A.R.C-1263 S "7 U as GOVERNMENT OF INDIA TOIT5J 3^TI 3TP7TT ATOMIC ENERGY COMMISSION ANNUAL PROGRESS REPORT FOR 1984 OF THEORETICAL PHYSICS DIVISION by B. P. Rastogi, S. V. G. Menon and R. P. Jain BHABHA ATOMIC RESEARCH CENTRE BOMBAY, INDIA 1985 B.A.R.C. - 1263 GOVERNMENT OF INDIA ATOMIC ENERGY COMMISSION O ffl ANNUAL PROGRESS REPORT FOR 1984 OP THEORETICAL PHYSICS DIVISION by B.P.Rastogl, S.V.G.Menon and R.P.Jain BHABHA ATOMIC RESEARCH CENTRE BOMBAY, INDIA 1985 BARC-1263 IMS Subject Category : E2100 Descriptors BARC RESEARCH PROGRAMS REACTOR KINETICS T CODES C CODES MULTIGROUP THEORY NEUTRON DIFFUSION EQUATION REACTOR SAFETY THERMONUCLEAR REACTIONS FEYNMAN PATH INTEGRALS TRANSPORT THEORY FOKKER-PLANCK EQUATION ABSTRACT This report presents a resume of the work done In the Theoretical Physics Division during the calendar year 1984. The report is divided Into two parts, namely, Nuclear Technology and Mathematical Physics. The topics covered ire described by brief summaries. A list of research publications and papers presented In symposia / workshops is also included. TABLE OF CONTENTS NUCLEAR TECHNOLOGY 1.1 Research and Development for Reactor Physics Analysis of Large 1 PHWRs 1.2 Development of a Computer Code CLUBPU for Calculating 4 Hyperflne Power Distribution In Fuel Pins of PHWR Fuel Cluster 1.3 Burnup Analysis of 28-, and 37-Rod Fuel Cluster for 500 MWe PHWR 4 1.4 Computer Code Development for Fuel Management of PHWRs 4 1.5 Adaptation of TRIVKNI and TUMULT on ND-Computer 5 1.6 Adequacy of One Bundle as Mesh In TAQUIL Code
    [Show full text]
  • 2004 February
    February 2004 Games and Entertainment Megan Morrone Today you can use the same machine to organize your finances, create a presentation for your boss, and defend the Earth from flesh-eating aliens. But let’s be honest: Even with the crazy advances in software, organizing your finances and creating a presentation for your boss are still not half as much fun as defending the Earth from flesh-eating aliens.That’s why we’ve devoted the entire month of February to the noble pursuit of games and entertainment for PCs, Macs, game consoles, and PDAs. I know what you’re thinking.You’re thinking that you can skip right over this chapter because you’re not a gamer. Gamers are all sweaty, pimpled, 16-year-old boys who lock themselves in their basements sustained only by complex carbohydrates and Mountain Dew for days on end, right? Wrong.Video games aren’t just for young boys anymore. Saying you don’t like video games is like saying you don’t like ice cream or cheese or television or fun.Are you trying to tell me that you don’t like fun? If you watch The Screen Savers,you know that each member of our little TV family has a uniquely different interest in games. Morgan loves a good frag fest, whereas Martin’s tastes tend toward the bizarre (think frogs in blenders or cow tossing.) Kevin knows how to throw a cutting-edge LAN party,while Joshua and Roger like to kick back with old-school retro game emulators. I like to download free and simple low-res games that you can play on even the dinkiest PC, whereas Patrick prefers to build and rebuild the perfect system for the ultimate gaming experience (see February 13).And leave it to Leo to discover the most unique new gaming experience for the consummate early adopter (see February 1).
    [Show full text]
  • Karaoke Mietsystem Songlist
    Karaoke Mietsystem Songlist Ein Karaokesystem der Firma Showtronic Solutions AG in Zusammenarbeit mit Karafun. Karaoke-Katalog Update vom: 13/10/2020 Singen Sie online auf www.karafun.de Gesamter Katalog TOP 50 Shallow - A Star is Born Take Me Home, Country Roads - John Denver Skandal im Sperrbezirk - Spider Murphy Gang Griechischer Wein - Udo Jürgens Verdammt, Ich Lieb' Dich - Matthias Reim Dancing Queen - ABBA Dance Monkey - Tones and I Breaking Free - High School Musical In The Ghetto - Elvis Presley Angels - Robbie Williams Hulapalu - Andreas Gabalier Someone Like You - Adele 99 Luftballons - Nena Tage wie diese - Die Toten Hosen Ring of Fire - Johnny Cash Lemon Tree - Fool's Garden Ohne Dich (schlaf' ich heut' nacht nicht ein) - You Are the Reason - Calum Scott Perfect - Ed Sheeran Münchener Freiheit Stand by Me - Ben E. King Im Wagen Vor Mir - Henry Valentino And Uschi Let It Go - Idina Menzel Can You Feel The Love Tonight - The Lion King Atemlos durch die Nacht - Helene Fischer Roller - Apache 207 Someone You Loved - Lewis Capaldi I Want It That Way - Backstreet Boys Über Sieben Brücken Musst Du Gehn - Peter Maffay Summer Of '69 - Bryan Adams Cordula grün - Die Draufgänger Tequila - The Champs ...Baby One More Time - Britney Spears All of Me - John Legend Barbie Girl - Aqua Chasing Cars - Snow Patrol My Way - Frank Sinatra Hallelujah - Alexandra Burke Aber Bitte Mit Sahne - Udo Jürgens Bohemian Rhapsody - Queen Wannabe - Spice Girls Schrei nach Liebe - Die Ärzte Can't Help Falling In Love - Elvis Presley Country Roads - Hermes House Band Westerland - Die Ärzte Warum hast du nicht nein gesagt - Roland Kaiser Ich war noch niemals in New York - Ich War Noch Marmor, Stein Und Eisen Bricht - Drafi Deutscher Zombie - The Cranberries Niemals In New York Ich wollte nie erwachsen sein (Nessajas Lied) - Don't Stop Believing - Journey EXPLICIT Kann Texte enthalten, die nicht für Kinder und Jugendliche geeignet sind.
    [Show full text]
  • Microsoft Corporation As Amicus Curiae in Support of Petitioner ————
    No. 18-956 IN THE Supreme Court of the United States ———— GOOGLE LLC, Petitioner, v. ORACLE AMERICA, INC., Respondent. ———— On Writ of Certiorari to the United States Court of Appeals for the Federal Circuit ———— BRIEF OF MICROSOFT CORPORATION AS AMICUS CURIAE IN SUPPORT OF PETITIONER ———— LISA W. BOHL JEFFREY A. LAMKEN MOLOLAMKEN LLP Counsel of Record 300 N. LaSalle St. MICHAEL G. PATTILLO, JR. Chicago, IL 60654 MOLOLAMKEN LLP (312) 450-6700 The Watergate, Suite 660 600 New Hampshire Ave., NW LEONID GRINBERG Washington, DC 20037 MOLOLAMKEN LLP (202) 556-2000 430 Park Ave. [email protected] New York, NY 10022 (212) 607-8160 Counsel for Amicus Curiae :,/621(3(635,17,1*&2,1&± ±:$6+,1*721'& TABLE OF CONTENTS Page Interest of Amicus Curiae ......................................... 1 Summary of Argument ............................................... 3 Argument ...................................................................... 6 I. Innovation in Today’s Computer Industry Depends on Collaborative Development and Seamless Interoperability—Both of Which Require Reuse of Functional Code .............................. 7 A. Innovation in the Modern Computer Industry Relies on Collaborative Development ..................... 7 B. Interoperability Is a Key Component of Technological Innovation Today ....................................... 10 C. Reuse of Functional Software Code, Including APIs, Is Critical To Promoting Collaborative Development and Interoperability ......... 12 II. Courts Have Long Applied a Flexible Fair Use Doctrine To Address Software’s Unique Nature ............................. 15 A. Software’s Collaborative and Functional Elements Distinguish It from Traditional Creative Works Subject to Copyright Protection ............. 16 B. A Flexible Fair Use Doctrine Is Essential To Promoting Collaboration and Interoperability in Modern Software Development— As Courts Have Long Recognized .......... 18 (i) ii TABLE OF CONTENTS—Continued Page C.
    [Show full text]
  • Lessons from the Sony CD DRM Episode
    Lessons from the Sony CD DRM Episode J. Alex Halderman and Edward W. Felten Center for Information Technology Policy Department of Computer Science Princeton University Abstract system called XCP that had been installed when he in- In the fall of 2005, problems discovered in two Sony- serted a Sony-BMG music CD into his computer’s CD BMG compact disc copy protection systems, XCP and drive. MediaMax, triggered a public uproar that ultimately led News of Russinovich’s discovery circulated rapidly on to class-action litigation and the recall of millions of the Internet, and further revelations soon followed, from discs. We present an in-depth analysis of these technolo- us,1 from Russinovich, and from others. It was discov- gies, including their design, implementation, and deploy- ered that the XCP rootkit makes users’ systems more ment. The systems are surprisingly complex and suffer vulnerable to attacks, that both CD DRM schemes install from a diverse array of flaws that weaken their content risky software components without obtaining informed protection and expose users to serious security and pri- consent from users, that both systems covertly transmit vacy risks. Their complexity, and their failure, makes usage information back to the vendor or the music label, them an interesting case study of digital rights manage- and that none of the protected discs include tools for unin- ment that carries valuable lessons for content companies, stalling the software. (For these reasons, both XCP and DRM vendors, policymakers, end users, and the security MediaMax seem to meet the consensus definition of spy- community. ware.) These and other findings outraged many users.
    [Show full text]
  • Copy Protection
    Content Protection / DRM Content Protection / Digital Rights Management Douglas Dixon November 2006 Manifest Technology® LLC www.manifest-tech.com 11/2006 Copyright 2005-2006 Douglas Dixon, All Rights Reserved – www.manifest-tech.com Page 1 Content Protection / DRM Content Goes Digital Analog -> Digital for Content Owners • Digital Threat – No impediment to casual copying – Perfect digital copies – Instant copies – Worldwide distribution over Internet – And now High-Def content … • Digital Promise – Can protect – Encrypt content – Associate rights – Control usage 11/2006 Copyright 2005-2006 Douglas Dixon, All Rights Reserved – www.manifest-tech.com Page 2 1 Content Protection / DRM Conflict: Open vs. Controlled Managed Content • Avoid Morality: Applications & Technology – How DRM is impacting consumer use of media – Awareness, Implications • Consumers: “Bits want to be free” – Enjoy purchased content: Any time, anywhere, anyhow – Fair Use: Academic, educational, personal • Content owners: “Protect artist copyrights” – RIAA / MPAA : Rampant piracy (physical and electronic) – BSA: Software piracy, shareware – Inhibit indiscriminate casual copying: “Speed bump” • “Copy protection” -> “Content management” (DRM) 11/2006 Copyright 2005-2006 Douglas Dixon, All Rights Reserved – www.manifest-tech.com Page 3 Content Protection / DRM Content Protection / DRM How DRM is being applied • Consumer Scenarios: Impact of DRM – Music CD Playback on PC – Archive Digital Music – Play and Record DVDs – Record and Edit Personal Content • Industry Model: Content
    [Show full text]