This is a follow-up to the earlier story, which adds the info that the rootkit contacts a Sony server (according to Sony, this is only in order to load new artwork...) http://www.sysinternals.com/blog/2005/11/more-on-sony-dangerous-decloaking.html
I think the funniest thing is the point made in the comments, that if you rename a ripping program using the rootkit's $sys$ name prefix, it will then be able to rip the "protected" music in 100% digital quality .... obviously someone hasn't really thought through the implications of this DRM approach here. Another wag notes that Sony may be guilty under the DMCA of cracking its own DRM ... -- Pob hwyl / Best wishes Kevin Donnelly www.kyfieithu.co.uk - Meddalwedd Rhydd yn Gymraeg www.cymrux.org.uk - Linux Cymraeg ar un CD _______________________________________________ Fsfe-uk mailing list [email protected] http://lists.gnu.org/mailman/listinfo/fsfe-uk
