Sony copy protection software raises security, privacy concerns
The sneaky software is designed to stop CDs from being copied
IDG News Service - Mark Russinovich couldn't understand how the rootkit had sneaked onto his system. An expert on the internals of the Windows operating system, he is careful when it comes to computer security and generally has a good idea of what is running on his PC at any given time.
And yet the security tool he uses to check his PC was pretty clear: It had found the "rootkit" cloaking software typically used by virus and spyware writers.
After a bit of detective work, Russinovich eventually tracked down the source: a Sony BMG Music Entertainment CD titled Get Right with the Man, performed by country music duo Donnie and Johnny Van Zant.
It turns out that Sony is using techniques normally seen only in spyware and computer viruses to restrict the unauthorized copying of some of its music CDs. Sony's software, licensed from a Banbury, England-based company called First 4 Internet Ltd., has become the basis of a dispute that pits computer advocates against an entertainment company experimenting with new ways to prevent unauthorized copying of its products.
After news about the anticopying software emerged, Sony last week issued a patch that removes the controversial cloaking technology used to hide it. But that patch has been blamed for crashing some PCs that run Windows (see "Sony XCP patch might crash Windows").
Sony has been using First 4's Extended Copy Protection (XCP) software since early 2005 as a copy protection mechanism, according to Sony spokesman John McKay. Added so far to about 20 of the company's music titles, it is one of two digital rights management products used by Sony. The other is SunnComm Inc.'s MediaMax software, he said.
The XCP software prevents users from making more than three backup copies of any CD, and Sony puts an XCP notification on the back of CDs that use the mechanism, according to Mathew Gilliat-Smith, First 4's CEO.
The Van Zant CD software came with an end-user license agreement (EULA) informing Russinovich that he would be installing software that would reside on his PC until removed. But Russinovich, chief software architect at systems software company Winternals Software LP, said he never expected to be installing a product that would then prove to be virtually undetectable and extremely difficult to remove.
McKay believes that the disclosures in the license agreement are adequate. "I think the EULA's pretty clear about what it is," he said. "The reason why consumers have really high acceptance levels of these content-protected disks is because they have the functionality that people want."
The First 4 software does nothing malicious and can
- Troubleshooting Common Issues in VoIP Learn more about Voice over Internet Protocol (VoIP), including common VoIP metrics used, best practices in VoIP management and tips and tricks for...
- 2013 Network Management Software (NMS) Buyers Guide This white paper contains an independent comparison study of six different network management solutions and provides guidance on how you can choose the...
- Rightsizing Your Network Performance Management Solution: 4 Case Studies This white paper discusses challenges encountered as organizations search for the most cost-effective network performance management solution.
- Global Growing Pains: Tapping into B2B Integration Services to Overcome Global Expansion Challenges A recent survey by IDG Research explored both the challenges and pain points companies face when growing globally, as well as the capabilities...
- E-Signature RFP Checklist Webcast If your organization is looking to adopt e-signatures, you may be overwhelmed by the number of providers that offer seemingly similar solutions. How...
- Cloud and Collaboration: Driving Your Business Value Mission Critical Cloud from Peer 1 Hosting is enterprise-grade. All Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!