This is a follow-up to the earlier story, which adds the info that the rootkit 
contacts a Sony server (according to Sony, this is only in order to load new 
artwork...)
http://www.sysinternals.com/blog/2005/11/more-on-sony-dangerous-decloaking.html

I think the funniest thing is the point made in the comments, that if you 
rename a ripping program using the rootkit's $sys$ name prefix, it will then 
be able to rip the "protected" music in 100% digital quality ....  obviously 
someone hasn't really thought through the implications of this DRM approach 
here.  Another wag notes that Sony may be guilty under the DMCA of cracking 
its own DRM ...

-- 

Pob hwyl / Best wishes

Kevin Donnelly

www.kyfieithu.co.uk - Meddalwedd Rhydd yn Gymraeg
www.cymrux.org.uk - Linux Cymraeg ar un CD


_______________________________________________
Fsfe-uk mailing list
[email protected]
http://lists.gnu.org/mailman/listinfo/fsfe-uk

Reply via email to