IDG News Service - Sony Computer Entertainment has launched legal action against five hackers who recently released a set of tools that allows illegally copied games to run on the PlayStation 3 game console.
The group, called fail0verflow, gave a presentation at a hacker conference in Berlin in late December, saying they had figured out a way to bypass Sony's "technical protection measures" (TPMs) that stop unauthorized code from running on the system, included pirated games.
On Tuesday, Sony filed a lawsuit against the group and asked for temporary restraining order to block distribution of the tools. The company filed suit in U.S. District Court for the Northern District of California, naming defendants George Hotz of Cambridge, Mass.; Hector Martin Cantero of Samano, Spain; Sven Peter of Hungary and two others, one identified as "Segher," who resides in the Netherlands, and "Bushing" who lives in San Francisco.
Fail0ver has written on Twitter that its aim was to "be able to run Linux with dual-boot into GameOS, without 3D restrictions, on every PS3 currently out there" rather than encourage the piracy of games.
But Sony says the tools are in violation of U.S. copyright law, including the Digital Millennium Copyright Act and the Computer Fraud and Abuse Act. Already, "pirated games are being packaged and distributed with these circumvention devices," Sony wrote in its filing for a temporary restraining order, which Hotz posted on his website.
Hotz said in an e-mail statement that he is a firm believer in digital rights.
"I would expect a company that prides itself on intellectual property to be well-versed in the provisions of the law, so I am disappointed in Sony's current action," Hotz said. "I have spoken with legal counsel and I feel comfortable that Sony's action against me doesn't have any basis."
Fail0ver's programs -- called Metldr Keys, dePKG Firmware Decrypter, 3.55 6 Firmware Jailbreak code and Signing Tool -- compromise access control, encryption and digital signature protections that are enabled in the PS3, Sony wrote.
Files that are authorized to run on the PS3 have a unique digital signature, which is generated from a pair of electronic keys. The PS3 verifies the signature -- which is not present on pirated games -- using one of the keys, which is encrypted and embedded the system. The other key is held by Sony.
Hotz compromised the root keys, also called the Metldr Keys, which are used to authenticate code, according to Sony. "With access to this particular level, one can control crucial functions and operations of the PS3 system and execute code that will enable pirated games to run," Sony wrote.
- Best iPhone, iPad Business Apps for 2014
- 14 Tech Conventions You Should Attend in 2014
- 10 Desktop Apps to Power Your Windows PC
- How to Add New Job Skills Without Going Back to School
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
If you use ‘password,’ one the worst passwords, as your password, fail to keep antivirus protection updated and don’t bother to deploy security patches to close critical vulnerabilities, then maybe you should consider working for the cybersecurity-clueless federal government; you’d fit right in, according to Senator Tom Coburn's cybersecurity and critical infrastructure report.
- IT Certification Study Tips
- Register for this Computerworld Insider Study Tip guide and gain access to hundreds of premium content articles, cheat sheets, product reviews and more.
- Changing the Way Government Works: Four Technology Trends that Drive Down Costs and Increase Productivity
- This paper discusses four technology-based approaches to improving processes and increasing
productivity while driving down department and agency costs.
- Red Hat Enterprise Linux - The Original Cloud Operating System
- Linux adoption is growing against a number of measures, such as the
number of supercomputers that run Linux and the size of the contributing...
- OpenStack Hype vs. Reality: CIO Quick Pulse
- Open-source architecture can enable IT departments to build infrastructure-as-a-service (IaaS) clouds running on standard hardware.
- Building a Bridge to the Next Generation Data Center
- Selecting a widely adopted operating system is a foundational component of a standardization strategy.
- OpenStack and Red Hat: IDC White paper
- Most OpenStack deployments are by public cloud providers that are early adopters of technology and use OpenStack in a do-it-yourself deployment and support... All Government IT White Papers
- Webinar: Building a Big Data solution that's production-ready Big data solutions are no longer just a nice-to-have.
- Meg Whitman presents Unlocking IT with Big Data During this Web Event you will hear Meg Whitman, President and CEO, HP discuss HAVEn - the #1 Big Data platform, as well...
- The New Way to Work Knowledge Vault This Knowledge Vault focuses on how, in today's increasingly virtual world, it's more important than ever to engage deeply with employees, suppliers, partners,...
- Getting Ready for BlackBerry Enterprise Service 10.2 Find out how BlackBerry® Enterprise Service 10 helps organizations address the full spectrum of EMM challenges, while balancing the needs of both the...
- Containerization Options: How to Choose the Best DLP Solution for Your Organization This webcast outlines a framework for making the right choice when it comes to containerization approaches, along with the pros and cons of...
- All Government IT Webcasts