Announcement

Collapse
No announcement yet.

DCMA, TI, Calculators, and more [Jennifer Granick] Sep. 25, 2009

Collapse
This topic is closed.
X
X
 
  • Filter
  • Time
  • Show
Clear All
new posts

  • DCMA, TI, Calculators, and more [Jennifer Granick] Sep. 25, 2009

    Hey, TI, Leave Those Kids Alone (URL1)

    Originally posted by URL1
    ... Texas Instruments has set the lawyers loose on them, invoking the Digital Millennium Copyright Act (DMCA).
    ...
    Researchers used distributed computing to perform a brute-force cryptanalysis of the public keys embedded in each model of calculator to derive the corresponding private keys.
    ...
    With the key, calculator owners can install their own homebrew operating system that unlocks new functionality in the hardware.
    ...
    The law, however, is not on TI's side. Courts have repeatedly rejected attempts to use the DMCA to control owners’ use of embedded software in the devices they buy.
    ...
    (more, chopped)
    Again, we see attempts used to make the DMCA into a stick to whack the inquisitive and discourage examination and reverse engineering. Is it possible that we have created laws that deny ourselves the opportunity to understand how things work?

    Patents and Copyrights exist to permit legalized monopoly over a work or idea for a specific duration of time. Arguments for adding laws to enforce the legitimacy of monopolies have been proposed to allow the person or business that created the work to be compensated for their work, and this was later altered to permit the surviving heirs to extend Copyright and monopoly to get compensated for the work of someone they are related to by marriage, adoption, or genetics.

    Copyright has provided us with legal exceptions for, "fair use," to permit us to copy content. Patents allow for monopoly for a relatively short time compared to present copyright law with extensions.

    Attempts to use the DMCA to legally challenge people's attempts to examine hidden content (successful or not) can be harmful to consumers. Is a product harmful? Does the product do anything it is not supposed to do or expected to do? Is the product harmful? Without the opportunity to explore products to see how they are made we, as consumers, are expected to comply with the Oh-So-Bad security model of, "trusting the client." Do businesses really have a great track record with producing secure products that are truly free of defects and bugs?

    No, and no, and no, and no... and on and on.

    When people or businesses attempt to use the DMCA to punish people's attempts to understand a product, they can attempt to hide their own defects and deny consumers opportunity to make informed decisions using sources beyond the client (producer) that is expecting them to trust the client (producer.)

    Some may say, 'the DMCA 1201(f) "Reverse Engineering"' (url2) allows for reverse engineering of products that were legally obtained for the purpose of providing interoperability with unrelated software and the device. However, the people that have been served with Cease and Desist orders are penalized through fines payed for legal representation.

    What does this say? This says the same kinds of legal abuse, where individuals are fined through being forced to hire legal representation can also appear under other sections of DMCA 1201 like section (g) on "Encryption Research" and punish people for even getting a story about it on the news.

    Originally posted by url2
    1201(g)(3)(A) (one factor for exemption) "whether the information derived from the encryption research was disseminated, and if so, whether it was disseminated in a manner reasonably calculated to advance the state of knowledge or development of encryption technology, versus whether it was disseminated in a manner that facilitates infringement under this title or a violation of applicable law other than this section, including a violation of privacy or breach of security"
    Some would say that posting to a security mailing list frequented by both law abiding citizens and computer criminals would not satisfy the above option for exemption. They might say only dissemination to a group totally free of people that might use it illegally would be acceptable. Do criminals pay attention to the news?

    The case doesn't even need to be successfully won by the businesses looking to protect their assets. The act of forcing people to pay "fine" through legal representation in court is a sufficient cost to help discourage attempts at investigation.

    How much does DMCA harm security? What do you think? Are there any ways that security is improved when there exist legal threats to discourage examination of products? Is there any legal measure beyond lawsuit that could immediately and automatically penalize businesses or individuals that try to use legal proceedings to "fine" people through being forced to hire legal representatives?

    (Also on Slashdot on September 21, 2009.)
    Last edited by TheCotMan; September 28, 2009, 23:19.

  • #2
    Re: DCMA, TI, Calculators, and more [Jennifer Granick] Sep. 25, 2009

    Originally posted by TheCotMan View Post
    How much does DMCA harm security?
    This question can be answered in many ways from many perspectives, much like how the cases involving the DMCA are open for interpretation by a judge. My own opinion would be very much. There is always the risk of legal action from the companies using the DMCA to protect their assets, be it for profits/trade secrets, or the proverbial ass covering/security through obscurity. Their reasoning really means little in a courtroom, as they are not the ones on trial if you will. It's up to the researcher/defendant to prove that their actions are not infringing on what the plaintiff "owns". This is where it can become hinky when it comes to litigation happy corporations who take the "don't use it for anything we don't tell you to, or we'll sue your ass" approach.

    With the calculator example, I can't at all see how this would impact TI's profits, other than their sales being boosted. The potential to load a homebrew OS, and take more advantage of the hardware only increases marketability, while their trade secrets, and proprietary designs are still legally protected.

    Implying or projecting the threat of lawsuit for tinkering, researching, reverse engineering, etc. really does limit the amount of people willing to do it, and thus limits not only the real security of a product, but the overall advancement of the technology. When something is broken, but not publicly known to be broken, that's when the real security threats evolve, we've all seen it in virtually every aspect of technology.

    Originally posted by TheCotMan View Post
    Are there any ways that security is improved when there exist legal threats to discourage examination of products?
    Absolutely not, security through obscurity has proven time and time again to be a bad idea. When the security measures of a product are researched by those wishing to improve them, technology advances. When the security measures of a product are researched by those wishing to exploit them, damage is done to the consumer, and the producer. The former of these examples is the more likely to go public.

    Originally posted by TheCotMan View Post
    Is there any legal measure beyond lawsuit that could immediately and automatically penalize businesses or individuals that try to use legal proceedings to "fine" people through being forced to hire legal representatives?
    Unfortunately not through any examples I've been able to find. The only feasible way to avoid said "fines" would be anonymous research and dissemination. And that in it's own right is a big risk to a company. If someone fears legal action for their research, they are less likely to bring their findings to said company before various public outlets. Currently that I'm aware of, there is no other repercussion for these companies. They simply don't risk much from filing these kinds of suits. If they lose, there is little to nothing at stake in the big picture.
    "You have cubed asscheeks?"... "Do you not?"

    Comment


    • #3
      Re: DCMA, TI, Calculators, and more [Jennifer Granick] Sep. 25, 2009

      Perhaps a result of this kind of legal abuse of the DMCA will push R&D of products purchased by consumers into an underground, or outside of the US. Researchers with good intentions and a desire to learn about systems will continue to learn about systems. Instead of publishing their work and research, they will instead trust their research with peers in private groups. Specialists will work in private to refine their results, and any number of P2P networks will allow for anonymity of distribution of exploits, and gpg could provide signatures for authors and still retain anonymity.

      Does this sound familiar? It should. Consider the piracy and copy-protection "cracker" groups that defeated various kinds of copy protection during the 1980's. They kept their secrets within their groups and did not offer trust to outsiders. Anonymity wasn't as strong as the technology and BBS were obscure, but the systems of defense were somewhat effective in its time.

      But 30 years later, discouraging analysis of products has even greater risk. Now, we have even more of our world dependent upon increasingly more complicated systems, and these systems take advantage of layers of abstraction as components by relying on other systems which can rely on other systems. As systems that include firmware, code, or procedures protected with legal threats and "fines" imposed against researchers are integrated into increasingly more complex systems, the larger system will be increasingly burdened with, "unknown," problems -- at least unknown to the public.

      Of course there is a difference between the 1980's with copy protection cracking groups and the world today:
      * governments are encouraging employees to discover weaknesses in systems used by, "the enemy."
      * groups of people have created organizations that have hierarchical structures similar to mafia groups, and deal in scams, or spam on the Internet
      * and there are still independent researchers that don't work for either but find learning about systems enjoyable.

      What do you (the reader, any reader) know about the complexity of probability when taken, not as an individual event, but as a combination of events? Assume you have several 10-sided dice. Each one refers to a component, subsystem, bit of software, firmware, or service. If each of these has a 1 in 10 chance of having a defect, then what happens when they are all joined and end up working together? It isn't still just a 1 in 10 chance for the whole system to be broken, or exploited. There is a 1 in 10 chance for each part, and if we don't roll a 1 for the first subsystem then we can always roll again for the next subsystem.

      One way to consider this is to look at what the chances for an event to not happen with each try and then subtract that from an absolute certainty. So, 1.00-(1.00-0.10) is .10 or 1 in 10 that you would roll a 1. But if you didn't roll a 1 the first time, might you roll a 1 the next time? 1.00-((1.00-0.10)^2) = 0.19 or nearly 1 in 5. With 10 systems, 1.00-((1.00-0.10)^10) = .6513215599... and with something like a power station with many systems and some system running operating systems with their own applications, the scale of complexity could exceed hundreds or thousands. At 100 such systems, .9999734387, which is like 99.99% likely, and at 1000, .9999999999999999999999999999999999999999999998252 128748277348..... (of course, my math is a bit rusty, so i hope I did this correctly.)

      In the end, it would seem that legal abuse with the DMCA will continue to make reverse engineering and cryptanalysis into "dark arts" and force these researchers to find ways to retain anonymity while continuing their research. Systems will be exposed to unknown weaknesses and the people that understand the weaknesses will be afraid to step forward to reveal the problems to they can be fixed. Meanwhile, members computer criminal groups or foreign intelligence will learn about weaknesses. The only groups that won't know about the risks will be the defenders, the manufacturers and the consumers.

      Anyone care to comment? Is the DMCA and its legal abuse going to harm full disclosure and push related research underground?

      Comment


      • #4
        Re: DCMA, TI, Calculators, and more [Jennifer Granick] Sep. 25, 2009

        Originally posted by TheCotMan View Post
        Perhaps a result of this kind of legal abuse of the DMCA will push R&D of products purchased by consumers into an underground, or outside of the US. Researchers with good intentions and a desire to learn about systems will continue to learn about systems. Instead of publishing their work and research, they will instead trust their research with peers in private groups. Specialists will work in private to refine their results, and any number of P2P networks will allow for anonymity of distribution of exploits, and gpg could provide signatures for authors and still retain anonymity.

        Does this sound familiar? It should. Consider the piracy and copy-protection "cracker" groups that defeated various kinds of copy protection during the 1980's. They kept their secrets within their groups and did not offer trust to outsiders. Anonymity wasn't as strong as the technology and BBS were obscure, but the systems of defense were somewhat effective in its time.

        But 30 years later, discouraging analysis of products has even greater risk. Now, we have even more of our world dependent upon increasingly more complicated systems, and these systems take advantage of layers of abstraction as components by relying on other systems which can rely on other systems. As systems that include firmware, code, or procedures protected with legal threats and "fines" imposed against researchers are integrated into increasingly more complex systems, the larger system will be increasingly burdened with, "unknown," problems -- at least unknown to the public.

        Of course there is a difference between the 1980's with copy protection cracking groups and the world today:
        * governments are encouraging employees to discover weaknesses in systems used by, "the enemy."
        * groups of people have created organizations that have hierarchical structures similar to mafia groups, and deal in scams, or spam on the Internet
        * and there are still independent researchers that don't work for either but find learning about systems enjoyable.

        What do you (the reader, any reader) know about the complexity of probability when taken, not as an individual event, but as a combination of events? Assume you have several 10-sided dice. Each one refers to a component, subsystem, bit of software, firmware, or service. If each of these has a 1 in 10 chance of having a defect, then what happens when they are all joined and end up working together? It isn't still just a 1 in 10 chance for the whole system to be broken, or exploited. There is a 1 in 10 chance for each part, and if we don't roll a 1 for the first subsystem then we can always roll again for the next subsystem.

        One way to consider this is to look at what the chances for an event to not happen with each try and then subtract that from an absolute certainty. So, 1.00-(1.00-0.10) is .10 or 1 in 10 that you would roll a 1. But if you didn't roll a 1 the first time, might you roll a 1 the next time? 1.00-((1.00-0.10)^2) = 0.19 or nearly 1 in 5. With 10 systems, 1.00-((1.00-0.10)^10) = .6513215599... and with something like a power station with many systems and some system running operating systems with their own applications, the scale of complexity could exceed hundreds or thousands. At 100 such systems, .9999734387, which is like 99.99% likely, and at 1000, .9999999999999999999999999999999999999999999998252 128748277348..... (of course, my math is a bit rusty, so i hope I did this correctly.)

        In the end, it would seem that legal abuse with the DMCA will continue to make reverse engineering and cryptanalysis into "dark arts" and force these researchers to find ways to retain anonymity while continuing their research. Systems will be exposed to unknown weaknesses and the people that understand the weaknesses will be afraid to step forward to reveal the problems to they can be fixed. Meanwhile, members computer criminal groups or foreign intelligence will learn about weaknesses. The only groups that won't know about the risks will be the defenders, the manufacturers and the consumers.

        Anyone care to comment? Is the DMCA and its legal abuse going to harm full disclosure and push related research underground?
        Yes. And because by your definition I am a "dark arts" researcher, I have nothing else to state. Thank you for a well thought out commentary.

        Regards,

        valkyrie
        __________________________________________________ _
        sapere aude

        Comment


        • #5
          Re: DCMA, TI, Calculators, and more [Jennifer Granick] Sep. 25, 2009

          Just some 2 cents worth...

          A number of things that TI (and possibly others) are missing is that when "tinkerers" get a hold of something and enhance an item, word gets around and they most likely wind up selling more of that item. I think I have ruined more things than I successfully modified over the past 35 years. TV's, radio's, telephones, computers (trs80, sinclair z80 etc). A lot of times I went out and bought a second one (after a while, if i could afford it, 2 right off the bat). Some develop a cult following, the WRT54GL comes to mind. I remember Popular Mechanics making the Z80 a popular mod product. No one complained, either they ignored it as inconsequential or they smiled knowing more were being sold.

          The problem stems from business majors who have no idea what the true technological potential of their product is. All they see is $$$ and what they perceive that they could be losing. Take a look at how companies treat IT now a days. They don't see the technology as the asset, they see the perceived usefullness (their definition) in terms of the money they are losing or costing them (same effect). It seems that the more business types (read MBA's & lawyers) try to control something, the more that it is evident that they have no idea of the true potential the technology or technologists that they employ. Hence the limited view.

          They think they are protecting their intellectual property when all they are doing is to alienating a group of people who have become experts by their tinkering. And we all know about word of mouth. My mother may not know a thing about anything technical, but she does ask me what I recommend.

          Let's put it this way: if a product withstands my abuse and still works, wow!

          thx0027
          Insanity: Doing the same thing over and over, expecting different results ... except Microsoft software.

          Comment


          • #6
            Re: DCMA, TI, Calculators, and more [Jennifer Granick] Sep. 25, 2009

            best example of that these days... the Android platform for mobile handset devices. because it's wide open and people can just develop whatever they wish, loads of features that the community wants become perfected and rolled into the latest version of the system during official releases.

            my rooted Magic phone had multi-touch, for example, long before most T-Mobile customers. however, it had occasional weirdness... then it got better a week later. now, with the latest update to Android, all customers are officially getting multi-touch display capability.

            compare the loads of apps that Android does really well with sister applications on the iPhone that don't quite work properly... i really fail to see how anyone doesn't grasp the huge groundswell of support and new ideas that openness feeds.

            yes, you get occasional customers figuring out how to tether their phone as an access point (with is really fucking useful, i have to say) or routing data around in order to get basically unlimited everything for $5 per month... but that's the exception, no the rule.

            for every one person doing that, i'd bet you have 100 people who are thrilled with the "new" things their phone keeps supporting... all because of tinkerers posting on forums and coming up with new ideas.
            "I'll admit I had an OiNK account and frequented it quite often… What made OiNK a great place was that it was like the world's greatest record store… iTunes kind of feels like Sam Goody to me. I don't feel cool when I go there. I'm tired of seeing John Mayer's face pop up. I feel like I'm being hustled when I visit there, and I don't think their product is that great. DRM, low bit rate, etc... OiNK it existed because it filled a void of what people want."
            - Trent Reznor

            Comment


            • #7
              Re: DCMA, TI, Calculators, and more [Jennifer Granick] Sep. 25, 2009

              And it seems that Microsoft has cut off, last I heard the number could be 1 million XBox users who mod'ed their XBoxes. MS says they are using pirated software. First thing that came to mind is that they were playing backups copied from the originals. Ya sure, there are probably quite a few "pirated" games, but MS just cut them off permanently. They have to buy a new unit if they want to play online. OUCH!.
              http://www.telegraph.co.uk/technolog...Xbox-Live.html

              If the 1 million units can be believed then that would mean $299 per unit that would have to be "re-purchased". In my mind at least half will go Sony's way. That means that Sony may get a $150,000,000.00 boost.
              Insanity: Doing the same thing over and over, expecting different results ... except Microsoft software.

              Comment


              • #8
                Re: DCMA, TI, Calculators, and more [Jennifer Granick] Sep. 25, 2009

                Originally posted by thx0027 View Post
                And it seems that Microsoft has cut off, last I heard the number could be 1 million XBox users who mod'ed their XBoxes. MS says they are using pirated software. First thing that came to mind is that they were playing backups copied from the originals. Ya sure, there are probably quite a few "pirated" games, but MS just cut them off permanently. They have to buy a new unit if they want to play online. OUCH!.
                http://www.telegraph.co.uk/technolog...Xbox-Live.html

                If the 1 million units can be believed then that would mean $299 per unit that would have to be "re-purchased". In my mind at least half will go Sony's way. That means that Sony may get a $150,000,000.00 boost.
                MS owns the network and can do any damn thing they want with it. It's their choice. Don't like it, don't buy an Xbox.
                A third party security audit is the IT equivalent of a colonoscopy. It's long, intrusive, very uncomfortable, and when it's done, you'll have seen things you really didn't want to see, and you'll never forget that you've had one.

                Comment

                Working...
                X