Originally posted by thx0027
View Post
Announcement
Collapse
No announcement yet.
DCMA, TI, Calculators, and more [Jennifer Granick] Sep. 25, 2009
Collapse
This topic is closed.
X
X
-
Re: DCMA, TI, Calculators, and more [Jennifer Granick] Sep. 25, 2009
-
Re: DCMA, TI, Calculators, and more [Jennifer Granick] Sep. 25, 2009
And it seems that Microsoft has cut off, last I heard the number could be 1 million XBox users who mod'ed their XBoxes. MS says they are using pirated software. First thing that came to mind is that they were playing backups copied from the originals. Ya sure, there are probably quite a few "pirated" games, but MS just cut them off permanently. They have to buy a new unit if they want to play online. OUCH!.
http://www.telegraph.co.uk/technolog...Xbox-Live.html
If the 1 million units can be believed then that would mean $299 per unit that would have to be "re-purchased". In my mind at least half will go Sony's way. That means that Sony may get a $150,000,000.00 boost.
Leave a comment:
-
Re: DCMA, TI, Calculators, and more [Jennifer Granick] Sep. 25, 2009
best example of that these days... the Android platform for mobile handset devices. because it's wide open and people can just develop whatever they wish, loads of features that the community wants become perfected and rolled into the latest version of the system during official releases.
my rooted Magic phone had multi-touch, for example, long before most T-Mobile customers. however, it had occasional weirdness... then it got better a week later. now, with the latest update to Android, all customers are officially getting multi-touch display capability.
compare the loads of apps that Android does really well with sister applications on the iPhone that don't quite work properly... i really fail to see how anyone doesn't grasp the huge groundswell of support and new ideas that openness feeds.
yes, you get occasional customers figuring out how to tether their phone as an access point (with is really fucking useful, i have to say) or routing data around in order to get basically unlimited everything for $5 per month... but that's the exception, no the rule.
for every one person doing that, i'd bet you have 100 people who are thrilled with the "new" things their phone keeps supporting... all because of tinkerers posting on forums and coming up with new ideas.
Leave a comment:
-
Re: DCMA, TI, Calculators, and more [Jennifer Granick] Sep. 25, 2009
Just some 2 cents worth...
A number of things that TI (and possibly others) are missing is that when "tinkerers" get a hold of something and enhance an item, word gets around and they most likely wind up selling more of that item. I think I have ruined more things than I successfully modified over the past 35 years. TV's, radio's, telephones, computers (trs80, sinclair z80 etc). A lot of times I went out and bought a second one (after a while, if i could afford it, 2 right off the bat). Some develop a cult following, the WRT54GL comes to mind. I remember Popular Mechanics making the Z80 a popular mod product. No one complained, either they ignored it as inconsequential or they smiled knowing more were being sold.
The problem stems from business majors who have no idea what the true technological potential of their product is. All they see is $$$ and what they perceive that they could be losing. Take a look at how companies treat IT now a days. They don't see the technology as the asset, they see the perceived usefullness (their definition) in terms of the money they are losing or costing them (same effect). It seems that the more business types (read MBA's & lawyers) try to control something, the more that it is evident that they have no idea of the true potential the technology or technologists that they employ. Hence the limited view.
They think they are protecting their intellectual property when all they are doing is to alienating a group of people who have become experts by their tinkering. And we all know about word of mouth. My mother may not know a thing about anything technical, but she does ask me what I recommend.
Let's put it this way: if a product withstands my abuse and still works, wow!
thx0027
Leave a comment:
-
Re: DCMA, TI, Calculators, and more [Jennifer Granick] Sep. 25, 2009
Originally posted by TheCotMan View PostPerhaps a result of this kind of legal abuse of the DMCA will push R&D of products purchased by consumers into an underground, or outside of the US. Researchers with good intentions and a desire to learn about systems will continue to learn about systems. Instead of publishing their work and research, they will instead trust their research with peers in private groups. Specialists will work in private to refine their results, and any number of P2P networks will allow for anonymity of distribution of exploits, and gpg could provide signatures for authors and still retain anonymity.
Does this sound familiar? It should. Consider the piracy and copy-protection "cracker" groups that defeated various kinds of copy protection during the 1980's. They kept their secrets within their groups and did not offer trust to outsiders. Anonymity wasn't as strong as the technology and BBS were obscure, but the systems of defense were somewhat effective in its time.
But 30 years later, discouraging analysis of products has even greater risk. Now, we have even more of our world dependent upon increasingly more complicated systems, and these systems take advantage of layers of abstraction as components by relying on other systems which can rely on other systems. As systems that include firmware, code, or procedures protected with legal threats and "fines" imposed against researchers are integrated into increasingly more complex systems, the larger system will be increasingly burdened with, "unknown," problems -- at least unknown to the public.
Of course there is a difference between the 1980's with copy protection cracking groups and the world today:
* governments are encouraging employees to discover weaknesses in systems used by, "the enemy."
* groups of people have created organizations that have hierarchical structures similar to mafia groups, and deal in scams, or spam on the Internet
* and there are still independent researchers that don't work for either but find learning about systems enjoyable.
What do you (the reader, any reader) know about the complexity of probability when taken, not as an individual event, but as a combination of events? Assume you have several 10-sided dice. Each one refers to a component, subsystem, bit of software, firmware, or service. If each of these has a 1 in 10 chance of having a defect, then what happens when they are all joined and end up working together? It isn't still just a 1 in 10 chance for the whole system to be broken, or exploited. There is a 1 in 10 chance for each part, and if we don't roll a 1 for the first subsystem then we can always roll again for the next subsystem.
One way to consider this is to look at what the chances for an event to not happen with each try and then subtract that from an absolute certainty. So, 1.00-(1.00-0.10) is .10 or 1 in 10 that you would roll a 1. But if you didn't roll a 1 the first time, might you roll a 1 the next time? 1.00-((1.00-0.10)^2) = 0.19 or nearly 1 in 5. With 10 systems, 1.00-((1.00-0.10)^10) = .6513215599... and with something like a power station with many systems and some system running operating systems with their own applications, the scale of complexity could exceed hundreds or thousands. At 100 such systems, .9999734387, which is like 99.99% likely, and at 1000, .9999999999999999999999999999999999999999999998252 128748277348..... (of course, my math is a bit rusty, so i hope I did this correctly.)
In the end, it would seem that legal abuse with the DMCA will continue to make reverse engineering and cryptanalysis into "dark arts" and force these researchers to find ways to retain anonymity while continuing their research. Systems will be exposed to unknown weaknesses and the people that understand the weaknesses will be afraid to step forward to reveal the problems to they can be fixed. Meanwhile, members computer criminal groups or foreign intelligence will learn about weaknesses. The only groups that won't know about the risks will be the defenders, the manufacturers and the consumers.
Anyone care to comment? Is the DMCA and its legal abuse going to harm full disclosure and push related research underground?
Regards,
valkyrie
__________________________________________________ _
sapere aude
Leave a comment:
-
Re: DCMA, TI, Calculators, and more [Jennifer Granick] Sep. 25, 2009
Perhaps a result of this kind of legal abuse of the DMCA will push R&D of products purchased by consumers into an underground, or outside of the US. Researchers with good intentions and a desire to learn about systems will continue to learn about systems. Instead of publishing their work and research, they will instead trust their research with peers in private groups. Specialists will work in private to refine their results, and any number of P2P networks will allow for anonymity of distribution of exploits, and gpg could provide signatures for authors and still retain anonymity.
Does this sound familiar? It should. Consider the piracy and copy-protection "cracker" groups that defeated various kinds of copy protection during the 1980's. They kept their secrets within their groups and did not offer trust to outsiders. Anonymity wasn't as strong as the technology and BBS were obscure, but the systems of defense were somewhat effective in its time.
But 30 years later, discouraging analysis of products has even greater risk. Now, we have even more of our world dependent upon increasingly more complicated systems, and these systems take advantage of layers of abstraction as components by relying on other systems which can rely on other systems. As systems that include firmware, code, or procedures protected with legal threats and "fines" imposed against researchers are integrated into increasingly more complex systems, the larger system will be increasingly burdened with, "unknown," problems -- at least unknown to the public.
Of course there is a difference between the 1980's with copy protection cracking groups and the world today:
* governments are encouraging employees to discover weaknesses in systems used by, "the enemy."
* groups of people have created organizations that have hierarchical structures similar to mafia groups, and deal in scams, or spam on the Internet
* and there are still independent researchers that don't work for either but find learning about systems enjoyable.
What do you (the reader, any reader) know about the complexity of probability when taken, not as an individual event, but as a combination of events? Assume you have several 10-sided dice. Each one refers to a component, subsystem, bit of software, firmware, or service. If each of these has a 1 in 10 chance of having a defect, then what happens when they are all joined and end up working together? It isn't still just a 1 in 10 chance for the whole system to be broken, or exploited. There is a 1 in 10 chance for each part, and if we don't roll a 1 for the first subsystem then we can always roll again for the next subsystem.
One way to consider this is to look at what the chances for an event to not happen with each try and then subtract that from an absolute certainty. So, 1.00-(1.00-0.10) is .10 or 1 in 10 that you would roll a 1. But if you didn't roll a 1 the first time, might you roll a 1 the next time? 1.00-((1.00-0.10)^2) = 0.19 or nearly 1 in 5. With 10 systems, 1.00-((1.00-0.10)^10) = .6513215599... and with something like a power station with many systems and some system running operating systems with their own applications, the scale of complexity could exceed hundreds or thousands. At 100 such systems, .9999734387, which is like 99.99% likely, and at 1000, .9999999999999999999999999999999999999999999998252 128748277348..... (of course, my math is a bit rusty, so i hope I did this correctly.)
In the end, it would seem that legal abuse with the DMCA will continue to make reverse engineering and cryptanalysis into "dark arts" and force these researchers to find ways to retain anonymity while continuing their research. Systems will be exposed to unknown weaknesses and the people that understand the weaknesses will be afraid to step forward to reveal the problems to they can be fixed. Meanwhile, members computer criminal groups or foreign intelligence will learn about weaknesses. The only groups that won't know about the risks will be the defenders, the manufacturers and the consumers.
Anyone care to comment? Is the DMCA and its legal abuse going to harm full disclosure and push related research underground?
Leave a comment:
-
Re: DCMA, TI, Calculators, and more [Jennifer Granick] Sep. 25, 2009
Originally posted by TheCotMan View PostHow much does DMCA harm security?
With the calculator example, I can't at all see how this would impact TI's profits, other than their sales being boosted. The potential to load a homebrew OS, and take more advantage of the hardware only increases marketability, while their trade secrets, and proprietary designs are still legally protected.
Implying or projecting the threat of lawsuit for tinkering, researching, reverse engineering, etc. really does limit the amount of people willing to do it, and thus limits not only the real security of a product, but the overall advancement of the technology. When something is broken, but not publicly known to be broken, that's when the real security threats evolve, we've all seen it in virtually every aspect of technology.
Originally posted by TheCotMan View PostAre there any ways that security is improved when there exist legal threats to discourage examination of products?
Originally posted by TheCotMan View PostIs there any legal measure beyond lawsuit that could immediately and automatically penalize businesses or individuals that try to use legal proceedings to "fine" people through being forced to hire legal representatives?
Leave a comment:
-
DCMA, TI, Calculators, and more [Jennifer Granick] Sep. 25, 2009
Hey, TI, Leave Those Kids Alone (URL1)
Originally posted by URL1... Texas Instruments has set the lawyers loose on them, invoking the Digital Millennium Copyright Act (DMCA).
...
Researchers used distributed computing to perform a brute-force cryptanalysis of the public keys embedded in each model of calculator to derive the corresponding private keys.
...
With the key, calculator owners can install their own homebrew operating system that unlocks new functionality in the hardware.
...
The law, however, is not on TI's side. Courts have repeatedly rejected attempts to use the DMCA to control owners’ use of embedded software in the devices they buy.
...
(more, chopped)
Patents and Copyrights exist to permit legalized monopoly over a work or idea for a specific duration of time. Arguments for adding laws to enforce the legitimacy of monopolies have been proposed to allow the person or business that created the work to be compensated for their work, and this was later altered to permit the surviving heirs to extend Copyright and monopoly to get compensated for the work of someone they are related to by marriage, adoption, or genetics.
Copyright has provided us with legal exceptions for, "fair use," to permit us to copy content. Patents allow for monopoly for a relatively short time compared to present copyright law with extensions.
Attempts to use the DMCA to legally challenge people's attempts to examine hidden content (successful or not) can be harmful to consumers. Is a product harmful? Does the product do anything it is not supposed to do or expected to do? Is the product harmful? Without the opportunity to explore products to see how they are made we, as consumers, are expected to comply with the Oh-So-Bad security model of, "trusting the client." Do businesses really have a great track record with producing secure products that are truly free of defects and bugs?
No, and no, and no, and no... and on and on.
When people or businesses attempt to use the DMCA to punish people's attempts to understand a product, they can attempt to hide their own defects and deny consumers opportunity to make informed decisions using sources beyond the client (producer) that is expecting them to trust the client (producer.)
Some may say, 'the DMCA 1201(f) "Reverse Engineering"' (url2) allows for reverse engineering of products that were legally obtained for the purpose of providing interoperability with unrelated software and the device. However, the people that have been served with Cease and Desist orders are penalized through fines payed for legal representation.
What does this say? This says the same kinds of legal abuse, where individuals are fined through being forced to hire legal representation can also appear under other sections of DMCA 1201 like section (g) on "Encryption Research" and punish people for even getting a story about it on the news.
Originally posted by url21201(g)(3)(A) (one factor for exemption) "whether the information derived from the encryption research was disseminated, and if so, whether it was disseminated in a manner reasonably calculated to advance the state of knowledge or development of encryption technology, versus whether it was disseminated in a manner that facilitates infringement under this title or a violation of applicable law other than this section, including a violation of privacy or breach of security"
The case doesn't even need to be successfully won by the businesses looking to protect their assets. The act of forcing people to pay "fine" through legal representation in court is a sufficient cost to help discourage attempts at investigation.
How much does DMCA harm security? What do you think? Are there any ways that security is improved when there exist legal threats to discourage examination of products? Is there any legal measure beyond lawsuit that could immediately and automatically penalize businesses or individuals that try to use legal proceedings to "fine" people through being forced to hire legal representatives?
(Also on Slashdot on September 21, 2009.)Last edited by TheCotMan; September 28, 2009, 23:19.Tags: None
Leave a comment: