×
Encryption

Why Sony Cannot Stop PS3 Pirates 378

Sam writes "A former Ubisoft exec believes that Sony will not be able to combat piracy on the PlayStation 3, which was recently hacked. Martin Walfisz, former CEO of Ubisoft subsidiary Ubisoft Massive, was a key player in developing Ubisoft's new DRM technologies. Since playing pirated games doesn't require a modchip, his argument is that Sony won't be able to easily detect hacked consoles. Sony's only possible solution is to revise the PS3 hardware itself, which would be a very costly process. Changing the hardware could possibly work for new console sales, though there would be the problem of backwards compatibility with the already-released games. Furthermore, current users would still be able to run pirated copies on current hardware." An anonymous reader adds commentary from PS3 hacker Mathieu Hervais about Sony's legal posturing.
Sony

Sony Files Lawsuit Against PS3 Hacker GeoHot 508

Kayot writes "George Hotz, or, as he is known on the internet, GeoHot, has been served court papers. Shorty after Team fail0verflow discovered faults in the PS3's TPMs, Geohot and others figured out how to extract the long sought after holy grail encryption keys. Apparently Sony is not pleased and is very keen on defending their poorly defended system with the US legal system. The basis is that GeoHot released programs that allow the signing of homebrew which can be used to make PSN-like games out of normal PS3 games. However GeoHot has never supported any form of piracy and in fact has taken a constant stance against it."
Books

Book Piracy — Less DRM, More Data 304

macslocum writes "Ambiguity surrounds the real impact of digital book piracy, notes Brian O'Leary in an interview with O'Reilly Radar, but all would be better served if more data was shared and less effort was exerted on futile DRM. 'The publishing industry should be working as hard as we can to develop new and innovative business models that meet the needs of readers. And what those look like could be community-driven. I think of Baen Books, for example, which doesn't put any DRM restrictions on its content but is one of the least pirated book publishers. As to sales, Paulo Coelho is a good example. He mines the piracy data to see if there's a burgeoning interest for his books in a particular country or market. If so, he either works to get his book out in print or translate it in that market.'"
Intel

Sandy Bridge Motherboards Dissected, Compared 143

crookedvulture writes "As we've learned, Intel's Sandy Bridge CPUs are pretty impressive. If you're going to build yourself a system with one, you'll need a new motherboard with an 1155-pin socket. The Tech Report has an in-depth look at four such boards based on Intel's P67 Express chipset. Although the boards offer identical application performance, there are notable differences between their power consumption and the speed of onboard peripherals like USB 3.0 and Serial ATA ports. Some implement the new UEFI BIOS framework while others do not, and the quality of those implementations varies quite a bit. Recommended reading for anyone thinking about rolling their own desktop with one of Intel's latest CPUs."
Media

Apple Pulls VLC Media Player From AppStore 754

An anonymous reader writes "Apple has removed VLC media player from the App Store, putting an end to the controversy on the license (in)compatibilities. Indeed, the iTunes page for VLC media player stopped working. VLC developer Rémi Denis-Courmont notes that he is 'not going to pity the owners of iDevices, and not even the MobileVLC developers who doubtless wasted a lot of their time. This end should not have come to a surprise to anyone.'"
Intel

Intel Insider DRM Risks Monopoly Investigations 217

Blacklaw writes "Intel's Sandy Bridge line of processors is impressing the tech community with its power, but a sneaky little feature designed to appease Hollywood has some concerned about Intel's intentions: Intel Insider. If a major video streaming service, such as Lovefilm or the US-based Hulu, were to implement Intel Insider technology on their movie streams — as a way of convincing Hollywood to release films sooner and in high definition without worrying about piracy — it would mean that only those who use Intel's very latest Sandy Bridge CPUs would be able to stream movies. Not only would those using older Intel chips that don't support the technology be cut off from the service, but those on systems featuring CPUs from rival manufacturers such as AMD and low-power specialist VIA would also be excluded." In a blog post about this new feature, Intel denies that it is DRM.
Intel

Intel Sandy Bridge Desktop and Mobile CPUs 116

Vigile writes "The new Intel Sandy Bridge architecture is being launched at CES this week but the reviews and benchmarks are out today. PC Perspective took a look at both the desktop and mobile variants, the former of which turns out to be quite an impressive processor for both highly threaded and single threaded applications. With some tweaks to the execution unit, a new Turbo Boost mode that increases clock speeds dynamically and a vastly improved integrated graphics implementation, the Core i7-2600K improves in every aspect. Also interestingly, the most expensive desktop part will start at $317, putting the screws to AMD yet again. On the mobile side of things, PC Perspective tested the quad-core Core i7-2820QM and the benchmark results are equally impressive; especially when looking at the gaming performance using integrated graphics. Sandy Bridge will no doubt put quite a dent in the discrete notebook graphics market for NVIDIA and AMD."
Cellphones

Windows Phone 7 Marketplace Hack Demonstrated 89

broggyr writes "Seems it didn't take long to hack the Windows Phone 7 marketplace. Quoting WPCentral: 'For developers, the weakness in Microsoft's DRM for Windows Phone 7 applications has been well known for quite some time, and there have been calls for Microsoft to address these concerns ... Since then, a "white hat" developer has provided WPCentral with a proof-of-concept program that can successfully pull any application from the Marketplace, remove the security and deploy to an unlocked Windows Phone with literally a push of a button. Alternatively, you could just save the cracked XAP file to your hard drive. Neither the app nor the methodology is public, and it will NOT be released ... It is important to note that this was all done within six hours by one developer.'"
Bug

Problems With Truncation On the Common Application 135

jaroslav writes "A combination of rigid caps on space and poor documentation of the space limits is adding stress on students applying for college using the Common Application, the New York Times reports. The story explains that the application lists word limits for questions, but actually enforces space limits. As a result, an answer with wide characters, such as 'w' or 'm,' may run over space even without reaching the stated word limit. It is not explained why an electronic submission must have such strictly enforced limits."
Open Source

Netflix Touts Open Source, Ignores Linux 481

Julie188 writes "If Netflix loves open source, where's the Linux client? Last week's post from Netflix on its use of open source has gotten a lot of coverage from the tech press. Too bad nobody's called the video giant out on its hypocrisy: They benefit greatly from open source, but really don't care to let their customers do the same."
Businesses

Humble Bundle 2 Is Live 217

Dayofswords writes "The first Humble Bundle was a monster success, with over 100,000 people donating over $1 million in total to support the Electronic Frontier Foundation, Child's Play, and of course the developers behind the games. The second bundle is now live (bundle site), containing five great games: Braid, Cortex Command, Machinarium, Osmos, and Revenge of the Titans. Each game is DRM-free, the games work on Windows, Mac OS X, and Linux, and you pay what you want and decide where your money goes."
Businesses

Single-Player Game Model 'Finished,' Says EA Exec 439

Frank Gibeau, label president for EA Games, recently spoke with Develop about the publisher's long term development strategy. Gibeau thinks developing major games without multiplayer modes is a passing fad: "...it’s not only about multiplayer, it’s about being connected. I firmly believe that the way the products we have are going, they need to be connected online. ... I volunteer you to speak to EA’s studio heads; they’ll tell you the same thing. They’re very comfortable moving the discussion towards how we make connected gameplay – be it co-operative or multiplayer or online services – as opposed to fire-and-forget, packaged goods only, single-player, 25-hours-and you’re out. I think that model is finished. Online is where the innovation and the action [are] at."
Intel

Goodbye, VGA 356

jones_supa writes "Leading PC companies have expressed their will to finally start kicking out legacy display interfaces. Intel plans to end support of LVDS in 2013 and VGA in 2015 in its PC client processors and chipsets. While the large installed base of existing VGA monitors and projectors will likely keep VGA on PC back panels beyond 2015, PC and display panel makers are in strong support of this transition. The DisplayPort connector interface provides backwards and forwards compatibility by supporting VGA and DVI output via certified adapters, while also providing new capabilities such as single connector multi-monitor support."
It's funny.  Laugh.

Vuvuzelas Blare On Pirated Copies of Music Game 320

An anonymous reader sends this quote from Wired: "A novel anti-piracy measure baked into the Nintendo DS version of Michael Jackson: The Experience makes copied versions of the game unplayable and taunts gamers with the blaring sound of vuvuzelas. Many games have installed switches that detect pirated copies and act accordingly, like ending the user's game after 20 minutes. Ubisoft has come under fire multiple times for what players have seen as highly restrictive anti-piracy measures that annoy legitimate users as much or more so than pirates. But some more-mischievous developers have used tricks similar to the vuvuzela fanfare to mess with pirates. Batman: Arkham Asylum lets unauthorized users play through the game as if it were a normal copy, with a single exception: Batman's cape-glide ability doesn't work, rendering the game impossible to finish — although you might bash your head against it trying to make what are now impossible jumps. If you pirate Command & Conquer: Red Alert 2, brace yourself for an explosion, as your entire base will detonate within 30 seconds of loading the game."
Books

Google eBookstore Launched 88

angrytuna writes "The New York Times is running an article this morning about the launch of the Google ebook store. Independent bookstores such as Powell's, based in Portland, OR, have partnered with Google in this, selling the format directly in addition to their other ebook offerings. The ebooks appear to rely on Adobe Digital Editions for DRM; instructions are provided to transfer from the 'cloud' to a handheld device. iOS and Android have a dedicated app for accessing the store, and will download for offline immediately; other clients like the Nook and Sony eReader seem to be relying on the ADE platform to manage the transfer for offline reading." NPR tried it out on a few different devices and posted their experience.
Security

With Better Sharing of Intel Comes Danger 287

Hugh Pickens writes "Ellen Nakashima writes in the Washington Post that after the intelligence community came under heavy criticism after 9/11 for having failed to share data, officials sought to make it easier for various agencies to share sensitive information giving intelligence analysts wider access to government secrets but WikiLeaks has proved that there's a downside to better information-sharing. To prevent further breaches, the Pentagon has ordered that a feature that allows material to be copied onto thumb drives or other removable devices be disabled on its classified computer systems and will limit the number of classified systems from which material can be transferred to unclassified systems, as well as require that two people be involved in moving data from classified to unclassified systems. The bottom line is that recent leaks 'have blown a hole' in the framework by which governments guard their secrets. According to British journalist Simon Jenkins 'words on paper can be made secure, electronic archives not.'"
PC Games (Games)

Witcher 2 Torrents Could Net You a Fine 724

An anonymous reader writes with this quote from Eurogamer: "Gamers who download upcoming PC exclusive The Witcher 2 illegally could receive a letter demanding they pay a fine or face legal action. If gamers refuse to pay the fine, which will be more than the cost of the game, they could end up in court, developer CD Projekt told Eurogamer. 'Of course we're not happy when people are pirating our games, so we are signing with legal firms and torrent sneaking companies,' CD Projekt co-founder Marcin Iwiski said. 'In quite a few big countries, when people are downloading it illegally they can expect a letter from a legal firm saying, "Hey, you downloaded it illegally and right now you have to pay a fine." We are totally fair, but if you decide you will not buy it legally there is a chance you'll get a letter. We are talking about it right now.' Interestingly, The Witcher 2 will be released free of digital rights management – but only through the CD Projekt-owned digital download shop GOG.com. That means owners will be able to install it as many times as they like on any number of computers – and it will not requite an internet connection to run."
Government

Proposed Final ACTA Text Published 148

ciaran_o_riordan writes "The US Trade Representative has published a text which, subject only to a last legal review, is proposed to be the final text of ACTA. The differences between this text and last month's, from the Tokyo round, are mostly cosmetic but there's an important positive change giving signatories the option of excluding patents from section 2. As for software patents, most harm has been avoided. If signatories make use of the section 2 exclusion option, there might be no harm at all. Lobbying for this will be important. Meanwhile, the many problems regarding Digital Restrictions Management, and the extra powers given to businesses to obtain personal and identifying information about accused copyright infringers "in the Digital Environment" are still there (mostly section 5). Earlier texts were much worse. The improvements in recent months are surely due to public outcry, leaving us indebted to the anonymous friends who scanned and leaked the various secret versions and the activists who made text versions and spread them across the Internet. There's a chance we can still influence the text in this legal review phase, but the bigger task ahead will be working on the national implementations. It's not yet clear what procedure the US will require for its own ratification."

Slashdot Top Deals