IDG News Service - Sony Computer Entertainment has launched legal action against five hackers who recently released a set of tools that allows illegally copied games to run on the PlayStation 3 game console.
The group, called fail0verflow, gave a presentation at a hacker conference in Berlin in late December, saying they had figured out a way to bypass Sony's "technical protection measures" (TPMs) that stop unauthorized code from running on the system, included pirated games.
On Tuesday, Sony filed a lawsuit against the group and asked for temporary restraining order to block distribution of the tools. The company filed suit in U.S. District Court for the Northern District of California, naming defendants George Hotz of Cambridge, Mass.; Hector Martin Cantero of Samano, Spain; Sven Peter of Hungary and two others, one identified as "Segher," who resides in the Netherlands, and "Bushing" who lives in San Francisco.
Fail0ver has written on Twitter that its aim was to "be able to run Linux with dual-boot into GameOS, without 3D restrictions, on every PS3 currently out there" rather than encourage the piracy of games.
But Sony says the tools are in violation of U.S. copyright law, including the Digital Millennium Copyright Act and the Computer Fraud and Abuse Act. Already, "pirated games are being packaged and distributed with these circumvention devices," Sony wrote in its filing for a temporary restraining order, which Hotz posted on his website.
Hotz said in an e-mail statement that he is a firm believer in digital rights.
"I would expect a company that prides itself on intellectual property to be well-versed in the provisions of the law, so I am disappointed in Sony's current action," Hotz said. "I have spoken with legal counsel and I feel comfortable that Sony's action against me doesn't have any basis."
Fail0ver's programs -- called Metldr Keys, dePKG Firmware Decrypter, 3.55 6 Firmware Jailbreak code and Signing Tool -- compromise access control, encryption and digital signature protections that are enabled in the PS3, Sony wrote.
Files that are authorized to run on the PS3 have a unique digital signature, which is generated from a pair of electronic keys. The PS3 verifies the signature -- which is not present on pirated games -- using one of the keys, which is encrypted and embedded the system. The other key is held by Sony.
Hotz compromised the root keys, also called the Metldr Keys, which are used to authenticate code, according to Sony. "With access to this particular level, one can control crucial functions and operations of the PS3 system and execute code that will enable pirated games to run," Sony wrote.
- 20 Best iPhone/iPad Games of 2013
- Google Chromebook Buyer's Guide
- 10 Signs You're Probably a Techie
- 8 Things Kindle Fire HDX Does That iPad Air Can't
- Slideshow: 5 ways to lock down your mobile device
- Slideshow: 10 mistakes companies make after a data breach
- How to rob a bank: A social engineering walk through
- Which smartphone is the most secure?
Cloud has proven to be a sticky marketing term, even (especially?) among non-technical consumers. There is a growing consensus that “the cloud” promises a quicker and cheaper way of purchasing IT than the traditional, build-it-yourself model. This in turn has led to internal debates between application developers and infrastructure teams on the best approach for implementing “the cloud” within IT organizations. (And of course, IT architects know that when they hear management say, “We want to move to the cloud,” they will be the ones who have to figure out how to do it!)
- IT Certification Study Tips
- Register for this Computerworld Insider Study Tip guide and gain access to hundreds of premium content articles, cheat sheets, product reviews and more.
- Bring Networks and Applications Closer--Cisco ONE
- A series of sweeping trends is placing new requirements on the tried-and-true network model--requiring network infrastructure and applications to communicate. Get the open...
- Lippis Research Reviews the Cisco Catalyst 2960-X
- In this Lippis Report Research Note, Lippis Research reviews the latest edition of the "most popular access switch on the planet" -- the...
- Design Guide--Scaling Up to a Campus-Wide LAN
- Is it time to scale your network environment to a campus wired LAN? Here's the framework you need to set up your LAN...
- Comprehensive Security: Cisco Catalyst 2960 Series
- With a rich and comprehensive set of security features, Cisco Catalyst 2960-X and 2960-XR Series Switches can help you address networking megatrends such...
- Be Energy Efficient--The Cisco Catalyst 2960 Series
- How much energy could be saved if all 230 million Layer 2 and 3 fixed managed switch ports sold in 2012 were as... All Government IT White Papers
- IT Transformation: Making the Move to Services IT transformation is happening in businesses of all sizes
- How SIEM Addresses the Challenges of Big Security Data This webcast will help you understand today's big data security challenges and how intelligent and scalable SIEM solutions give IT the tools and...
- BlackBerry Enterprise Service 10 In Action Designed for business leaders, IT decision-makers and IT administrators, this webcast features organizations that have migrated to BlackBerry® Enterprise Service 10 - or...
- BlackBerry Enterprise Service 10 Implementation Solutions - BlackBerry Technical Services to Make your Deployment Fast, Effective and Robust Find out how BlackBerry® implementation and migration services can help you optimize your Enterprise Mobility Management infrastructure and ease your transition to BlackBerry®...
- BlackBerry Enterprise Server 5 to BlackBerry Enterprise Service 10 - Lifting The Hood This webcast takes a close look at the differences between BlackBerry Enterprise® Service 10 and BlackBerry® Enterprise Server 5. Learn how BlackBerry Enterprise...
- All Government IT Webcasts