Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×
Security Businesses Media Music Sony

Sony Warned Weeks Ahead of Rootkit Flap 335

pdschmid writes "Business Week has an article describing how Sony BMG had been warned by F-Secure on Oct. 4 about the dangers of their rootkit protection, but failed to do anything until Oct. 31 when computer-systems expert Mark Russinovich revealed the rootkit in his blog." From the article: "Sony BMG officials insist that they acted as quickly as they could, and that they expected to be able to go public and offer a software patch at the same time. However, Russinovich posted his blog item first, forcing Sony BMG to scramble to contain the crisis. It recalled millions of CDs recorded by 52 artists, including Van Zant, Celine Dion, and Neil Diamond. Plus, it offered exchanges to customers."
This discussion has been archived. No new comments can be posted.

Sony Warned Weeks Ahead of Rootkit Flap

Comments Filter:
  • by MaskedSlacker ( 911878 ) on Tuesday November 29, 2005 @02:26PM (#14139610)
    So Sony was lying its collective arse off when saying it reacted as quickly as it could? This is news how?
  • What a load (Score:5, Insightful)

    by Microlith ( 54737 ) on Tuesday November 29, 2005 @02:28PM (#14139628)
    Scramble? To contain the crisis?

    They almost never admitted what they had done, and continually denied the dangers posed by this rootkit.

    They only started the recall after people pointed out repeatedly that their "uninstaller" didn't, and recieved criticism from the government.

    "as quickly as they could" my ass.

    Of course, they could have been smarter and never released it to begin with.
  • by Anonymous Coward on Tuesday November 29, 2005 @02:28PM (#14139632)
    Until a security hole is widely published (not privately communicated) it's very likely to continue spreading unchecked.


    I think this is great evidence that early public disclosure is very important. At the minimum, the affected users can start using workarounds (turn off insecure systems) until fixes are available.

  • by bigtallmofo ( 695287 ) on Tuesday November 29, 2005 @02:28PM (#14139635)
    So Sony was lying its collective arse off when saying it reacted as quickly as it could?

    That they were lying is one possible explanation. Looking on the bright side, another possibility is that they're just incompetent.

  • If this is true... (Score:5, Insightful)

    by julesh ( 229690 ) on Tuesday November 29, 2005 @02:31PM (#14139658)
    If this is true, then sony just lost them court cases we've been hearing about. Having been told about it and not issued a product recall at the earliest opportunity (i.e. within a day or two) means that they were intentionally subverting people's computers.

    The only defence available to them was that they didn't realise this was happening. They've just lost that.
  • Impressions (Score:5, Insightful)

    by A beautiful mind ( 821714 ) on Tuesday November 29, 2005 @02:31PM (#14139662)
    When the Sony rootkit case first hit the news, I considered F-Secure to be quite good for an anti-virus company because they were reasonably quick adding the rootkit to their signature file.

    They've just lost that credit for me. They knew for a month and were sitting on it! That is not acceptable. There should have been no warning to Sony, just a public statement from F-Secure at the beginning of October about the rootkit.
  • by MaskedSlacker ( 911878 ) on Tuesday November 29, 2005 @02:33PM (#14139679)
    True, and you should never ascribe to malice that which can be explained by incompetence. Though in fun world of corporations, the two seem to go hand in hand.
  • by Jerry Coffin ( 824726 ) on Tuesday November 29, 2005 @02:37PM (#14139716)
    Sony BMG officials insist that they acted as quickly as they could,

    In this case, "as quickly as they could" seems to really mean "as slowly as they could get away with."

    How long is it going to be before these companies realize that attacking their customers and treating them like criminals really is NOT a good way to do business? Microsoft's "product activation", Sony's rootkit, etc. ad naseum do essentially nothing to stop real hackers from copying software, music, etc., as much as they want, so the only thing they really accomplish is hurting the legitimate customers.

    These lousy business practices are reflected in their (lack of) sales too. I don't mean to say a boycott of Sony would necessarily be a bad thing, but for those who haven't looked, take a look at Sony's stock prices [yahoo.com] -- boycott or no, they're not exactly burning up the charts right now.

    Now, Sony (etc.) will undoubtedly point to Napster and such as the reason they're not doing as well recently. I don't think that's the case. I think what's happened is that Sony is now concentrating more on forcing customers to pay than they are on producing things customers want. As is visible in their stock price, that simply leads to oblivion, not prosperity.

    --
    The universe is a figment of its own imagination.

  • I call b.s. (Score:3, Insightful)

    by akad0nric0 ( 398141 ) on Tuesday November 29, 2005 @02:39PM (#14139735)
    It doesn't take that many weeks to recall CD's and tell resellers to take them off of their shelves.

    They're telling the truth, in part: they reacted as fast as they could to the bad press. But not to the real issue - the flawed software.
  • by Concerned Onlooker ( 473481 ) on Tuesday November 29, 2005 @02:45PM (#14139781) Homepage Journal
    Until a security hole is widely published

    I don't think this was a security hole so much as breaking and entering. I realize the players are different here but didn't Kevin Mitnick spend years in jail for stuff like this? I guess when a corporation hacks a consumer it's OK.

  • This is wonderful! (Score:3, Insightful)

    by drinkypoo ( 153816 ) <drink@hyperlogos.org> on Tuesday November 29, 2005 @02:45PM (#14139783) Homepage Journal
    It's always a lot easier to bust a corporation when there is evidence that they knew they were doing something wrong. Haven't you seen Erin Brockovitch? :D
  • by HTL2001 ( 836298 ) on Tuesday November 29, 2005 @02:50PM (#14139833)
    not so much hand-in-hand as that incompitence is used as an excuse.

    which is rediculus because ignorance is NOT (supposed to be) a viable defense in legal actions. I see so many people say "sony probably didn't know blah blah blah" but the truth is, they are responsable for it, so they should make it their duty to know. And if they don't, its (supposed to be) law that they be held accountable.

    However, ignorance seems to get you a pass if it involves technology, <sarcasm>since no-one can possably understand that stuff anyway, except for the hackers that exploit it</sarcasm>
  • Re:Impressions (Score:5, Insightful)

    by Tmack ( 593755 ) on Tuesday November 29, 2005 @02:51PM (#14139843) Homepage Journal
    Its called proffesional courtesey. If they immediatly notified the public, there would have been an exploit that many days sooner, before ANY action could be taken to fix it. This is the same as any MS or other exploit. Once a firm knows about it, they notify the software's management to fix it and wait a few days to release the news to the public. That gives the developers time to at least create a patch to prevent any further damage. Is it F-Secure's fault Sony did something stupid in the first place? Are you going to blame Semantic on the next exploit they find, tell microsoft about, and wait a few days before alerting the public? How about the IE bug just moved to cirtical status thats been around for many months, is that to be blamed on Secunia? They knew about it since june and waited until this weekend to escalate it to critical, only after a proof of concept was released.

    Its easier to prevent a fire by notifying management to fix the sparking wires than to put one out after notifying a world full of pyros to come dump gasoline on it.

    tm

  • It doesn't matter. (Score:3, Insightful)

    by gasmonso ( 929871 ) on Tuesday November 29, 2005 @02:54PM (#14139861) Homepage

    Until there are devastating consequences for any company that dies this, it just doesn't matter. 90% of the their customers don't even know about this, and the ones that do, don't fully understand it. This can only change once the average consumer is educated on the issue and there are successful lawsuits that punish companies like Sony. Sony knows that this will blow over in a few months and most people will forget about it (except Slashdot readers of course). People will just continue to buy cds like they always have.

    gasmonso http://religiousfreaks.com/ [religiousfreaks.com]
  • by Generic Guy ( 678542 ) on Tuesday November 29, 2005 @02:58PM (#14139901)
    Sony is a BIG company, huge enough to be considered a part of The Man.

    Sony is primarily a foreign company, so they won't get a free pass. However, the majority way these things usually work out is one or more politically ladder-climbing motivated Attorney Generals sue Sony "on behalf of the people" or somesuch hollow excuse. The proceedings drag on at a glacial legal-system pace, bad PR fades out of the public eye, and eventually AG announces an out of court "settlement" between company and the State. Said settlement money goes straight into State's coffers, never to be seen or heard about again.

    All in the end, you are still out $18 for a dodgy CD disc and stuck with a rootkit infecting your PC.

  • Re:Impressions (Score:5, Insightful)

    by Anonymous Coward on Tuesday November 29, 2005 @03:00PM (#14139922)
    This isn't the equivalent of a bug in IE. Sony deliberately infected their customers' computers with malware. Sure it was buggy malware but that's hardly the main issue. If you see a Sony executive breaking into someone's house, would you let the Sony exec know so that he could have a month to fix the problem before anyone else found out?
  • Re:Impressions (Score:4, Insightful)

    by pdschmid ( 916837 ) on Tuesday November 29, 2005 @03:00PM (#14139923)
    I think F-Secure's response was very appropriate. Imagine the following scenario: A serious flaw that could be exploited by a worm is discovered in Windows. All one needs to write a worm is to know some vague information about the flaw, e.g. where to look for it. A good programmer could write a worm in a day. A patch for the flaw takes longer to create, as it needs to pass some rigorous testing (after all the patch shouldn't break your Windows installation). So, what do you prefer? Immediate public disclose and a day later a worm infects windows installations all around the world? Or public disclosure concurrent with a patch from Microsoft which had been privately warned about it? I know I prefer the latter scenario. F-Secure was acting in the best interest of the people who had been infected by this rootkit. Sony BMG though had no interest in helping those people, because they were more interested in covering up their illegal doings. F-Secure would have gone public eventually. They would have not just sat there and watched Sony get away with it. However, they gave Sony BMG a reasonable chance in fixing the security holes, as they do give any other company rightly so. Patrick Schmid
  • by person-0.9a ( 161545 ) on Tuesday November 29, 2005 @03:06PM (#14139986)
    This has already been said by Bruce Schneier, but...

    F-Secure warned Sony about the dangers on October 4th, yet still failed to protect any of it's users in a timely manner.
  • Re:Impressions (Score:3, Insightful)

    by harrkev ( 623093 ) <kevin.harrelson@ ... om minus painter> on Tuesday November 29, 2005 @03:09PM (#14140008) Homepage
    Its easier to prevent a fire by notifying management to fix the sparking wires than to put one out after notifying a world full of pyros to come dump gasoline on it.
    It is sad, but these days, nothing gets fixed until AFTER the fire has started, no matter how much notice that you give.

    F-Secure should have made this public 30 days after notifying Sony. This way, at least Sony has a chance to fix this. And if they didn't too bad for them and they deserve what they get.

    Of course, for all we know F-Secure might have planned to do this. The rootkit was made public slightly less than 30 days after Sony was informed. Perhpas a couple of days later, F-Secure would have blown the whistle.
  • by Descalzo ( 898339 ) on Tuesday November 29, 2005 @03:10PM (#14140009) Journal
    Actually, it is my firm belief that you CAN trust a successful company to do things that are in their best interests. Clearly, they seem to think that customer ignorance is good for business. Why would they think that? Perhaps we have trained them to think that. The real lessons here are:
    Be proactive.
    Watch out for yourself.
    The only way to get a corporation to look out for your best interests is to convince it (remind it?) that your interests are their interests (happy customers!).
    Make your interests clear by voting with your wallet. Is there a company out there that tries to fix security holes before the customer knows about them? If so, buy your products from them.

    As I wrote that last bit, it occurred to me: perhaps leaving the security-hole-finding business up to the customer base is good business sense because it works and is cheaper than hiring your own security-hole-finders. I guess that brings us back to the proactive list.

    In short, I agree totally with your post.

  • Re:Sony LOVES DRM (Score:4, Insightful)

    by Vicsun ( 812730 ) on Tuesday November 29, 2005 @03:11PM (#14140023)
    Buy a sony Walkman and it won't play anything but a Sony CD?

    Sony's way ahead of you. Buy a sony Walkman "MP3" player and it won't play anything but propriatery ATRAC files. It won't even play MP3s, hence the quotation marks on MP3 above.
  • by Murmer ( 96505 ) on Tuesday November 29, 2005 @03:16PM (#14140060) Homepage
    Bruce Schneier has covered this already, but I would like to know why F-Secure didn't contact, say, everyone else when they found out that Sony was installing a rootkit on people's machines. I would like to know why nobody else on the long list of companies that get paid protection money to keep this sort of thing from happening saw fit to inform the world about this, instead of having it appear on some guy's weblog. It's not like that little cabal isn't paid what amounts to protection money specifically so that this kind of thing doesn't happen.
  • by Scarletdown ( 886459 ) on Tuesday November 29, 2005 @03:18PM (#14140082) Journal
    Yet I'm sure that the EULA from them reads: "we are not responsible for any damage done to anyone's computers for using this product".


    And I am sure a judge would call bullshit on this and in fact hold them responsible for the malware that they created, should this ever come up in court. After all, a program doesn't write itself, and the programmer(s) should have been aware of the nature of the code they were creating.

    Just because something is in a EULA does not always make it legally binding, such as... (fill in the usual outlandish hypothetical EULA terms that get posted as examples here.)

  • Yeah... (Score:5, Insightful)

    by penguinbrat ( 711309 ) on Tuesday November 29, 2005 @03:19PM (#14140093)
    ""Most people, I think, do not even know what a Rootkit is, so why should they care about it?"

    You can just hear the urgency can't you...
  • Re:Impressions (Score:5, Insightful)

    by A beautiful mind ( 821714 ) on Tuesday November 29, 2005 @03:20PM (#14140099)
    Someone mod parent up.

    The difference between a Microsoft security issue and the Sony rootkit is earth and sky.

    If F-Secure would have identified a flaw in Microsoft's software, then it's ok if they give the company a grace period to get a patch ready.

    There was no such patch to be prepared in the case of Sony.

    The following things are sensible to be done when someone finds a new rootkit spreading in the wild:
    • Identify it's source [Sony DRM on cd's - CHECK]
    • Find a way to stop the infections/prevent further infections - this can be only done by forcing Sony to stop shipping infected cds - a public disclosure is essential. Also adding the rootkit to the signature file is required. [FAIL]
    • Clean up the infections - most anti-virus companies write even small utilities to remove rootkits/viruses/trojans. [???]


    Let's face it: By telling Sony about it and not going for public disclosure F-Secure accomplished nothing but let even more users get infected by this rootkit. Sony is not a software company, there wasn't a flaw in a software that needed to be fixed, but the software itself removed! That requires no cooperation on behalf of Sony.
  • by Al Dimond ( 792444 ) on Tuesday November 29, 2005 @03:31PM (#14140212) Journal
    I may be in the minority of /. readers: I don't really know the story of Mitnik. But if GP is accurate, he spent time in jail. You can't put a corporation in jail. $100,000 is a slap on the wrist; probably any fine that will be assessed is a slap on the wrist and probably is just a drop in the bucket of all the money that Sony will spend on legal matters in any given year. But if you fine a corporation enough to actually hurt it, a lot of innocent people lose jobs. So what's the solution to this?

    The actual people that did the hacking were working for this "First4Internet" company. Anyone that designed, wrote or approved a part of the software deemed to be inappropriate could face jail time. There were people at Sony that approved this technology for use on CDs; they could face jail time. There were people at Sony that knew that their software included a rootkit and insecure kernel modifications, and yet claimed otherwise; they could face fraud charges (for an individual to say, "I am not a crook," is legal, but to knowingly lie about a product offered for sale is fraud). Anyone with much knowledge of the workings of this product should have known that it was illegal, just as Kevin Mitnik or any other cracker surely knows that whatever he does (like I said, I have no idea what it was that he did) is illegal. That would be equal justice.
  • by Lead Butthead ( 321013 ) on Tuesday November 29, 2005 @03:35PM (#14140249) Journal
    In their mind, the entire fiasco boils down to the following --

    a. How to hide the DRM software better so it will not be detected NEXT TIME.
    b. How to silence the whistle blower so that if line item a fails, the word never leaks out.
    c. How to fabricate pausable deniablity if the word leaked out despite line item b.

    In summary, for the media company, the entire affair isn't about what wrong they inflicted on their PAYING CUSTOMERS, but about how to contain the situtation and continue to "protect THEIR rights."
  • Re:Impressions (Score:1, Insightful)

    by Anonymous Coward on Tuesday November 29, 2005 @03:44PM (#14140320)
    There wasn't a bug to be fixed. Sony's disc installed malware. F-Secure is in the business of removing malware. Upon learning of Sony's damaging software, F-Secure could have released updated virus definitions to remove the rootkit completely.

    I'm not picking specifically on F-Secure here; all of the other antivirus companies are just as guilty. My point is that these companies don't send out a notice to virus writers--why is Sony getting special treatment?

  • by Yartrebo ( 690383 ) on Tuesday November 29, 2005 @03:49PM (#14140368)
    I feel that technology should be a valid excuse under the right circumstances. A mom-and-pop store or a private individual cannot reasonable be expected to do a good faith patent search when choosing an operating system (MS Windows and Mac OS undoubtedly violate hundreds of software patents, and Linux violates thousands of patents if you include software commonly found in distros, like mp3 players - the mplayer project alone has close to 1,000 known patent violations and countless unknown violations). Legally every single user of a halfway modern OS should have injunctions granted against the use of their computer and massive damages be paid out to the dozens or hundreds of patent holders covering some aspect of their OS.

    In the case of operating systems, even Microsoft should be able to invoke ignorance, as the best minds money could buy cannot properly figure out exactly what a patent covers, and even if they could, proper enforcement would result in losses to GDP easily exceeding 20% as companies retool to avoid the use of computers and replace them with typewriters and file cabinets (typing and data storage), servos and relays (industrial processes, automobiles, microwaves, anything else currently built with computers). On top of increased staffing needs for most corporations, energy efficiency will decline as the carbeurator will replace fuel injection in autos and electric power plants retool to manual operations (certain plants, like many solar plants and photovoltaic systems, are likely to be entirely unoperable and mothballed). Efficiency might be maintained by switching to turbine-based engines (say, steam turbines or gas turbines), but such a switch would drastically increase the cost and complexity of automobiles. Telephone companies in particular will have to hire many switchboard operators and we can expect to see call costs rise back to pre-AT&T breakup costs. A modern Cold War-style military such are our own is dependant on computers from everything from remote control drones to fighter planes to secure and rapid communications. And lastly, Slashdot would not be possible without computers.

    That said, I feel that Sony is entirely responsible for what they did as they should have known better. Trojan horses being no-nos is just plain common sense and they serve no legitamite purpose. Sony purposefully wrote or purchased a program to have this function, and as Sony is in the software business they can be expected to be authorities on the subject and act accordingly (as opposed to patents which require substantial knowledge in law just to understand, no less safely navigate - and the cost of compliance is so high that no reasonable corporation can be expected to fully comply with them as it would entail disbanding the corporation in many instances)
  • No excuse (Score:2, Insightful)

    by Trails ( 629752 ) on Tuesday November 29, 2005 @03:57PM (#14140443)
    While I find your timeline plausible, I think it's only part of the story. It wouldn't surprise me at all if that happened at the START of the project, but I don't find it plausible that they never involved themselves in the software at all. Sony, like any other large scorporation is risk averse, especially in terms of their image. I'm sure they reviewed the software/technical design of what was being suggested by First4. What I don't buy is that Sony distributed software they were so clueless about. Lets face facts, folks: Sony has definitely behaved badly, but they're not stupid. The amount of incompetence required to justify their "duh, we just shipped it" argument is staggering to the point of absurdity.
  • Re:Impressions (Score:3, Insightful)

    by pdschmid ( 916837 ) on Tuesday November 29, 2005 @03:58PM (#14140456)
    Let's assume Sony had acted ethically once they were informed by F-Secure. The patch they created would have then been a removal tool for the rootkit. Sony would have announced that they experimented with DRM software, but unfortunately the company they hired to do this did a bad job. They would announce the patch in the same instance, sever their ties with that software company and recall the CDs. Sony would acknowledge F-Secure's role in notifying them of the problem. That would have been the correct and ethical response by Sony BMG. I doubt anyone would have critized F-Secure then for notifying Sony first. Unfortunately for Sony, they tried to cover it up. Reminds me of a comment I read in an article about the CIA leak investigation. The reporter noted that with Watergate and the CIA leak investigation, the cover up was a worse offense than the actual incident. I guess Sony executives didn't read that story.
  • Re:Impressions (Score:4, Insightful)

    by Phanatic1a ( 413374 ) on Tuesday November 29, 2005 @04:38PM (#14140852)
    A serious flaw that could be exploited by a worm is discovered in Windows. All one needs to write a worm is to know some vague information about the flaw, e.g. where to look for it.

    This analogy doesn't work.

    This wasn't a flaw being exploited by some immoral third party. This wasn't a bug, this wasn't an unforeseen error in functionality.

    This was malware, doing precisely what it was intended to do.

    F-Secure was acting in the best interest of the people who had been infected by this rootkit.

    No, they weren't. What would have been acting in the best interested of the people who had been infected would be to tell people "You've been infected by a rootkit."

    However, they gave Sony BMG a reasonable chance in fixing the security holes, as they do give any other company rightly so.

    They do?

    They give the authors of viruses and trojans the chance to fix their viruses and trojans before they offer fixes for them?

    Oh, they don't do that? Then why should they do that for Sony when Sony deliberately releases malware into the wild?

    Once again, this was not a bug. This was malware. You don't notify authors of malware that you've found their stuff, and give them an opportunity to rewrite it to be slightly less mal before you go public. You write a fix, and notify the public.
  • by Braino420 ( 896819 ) on Tuesday November 29, 2005 @04:58PM (#14141060)
    Just say NO to DRM. The only thing Sony seems to understand is lost sales.

    Haven't you learned by now that any lost sales are blamed on piracy? Which means it will probably just lead to more DRM bullshit. I mean, it's gotten to the point where I can no longer justify buying a CD. Why shouldn't I be able to backup a cd I payed 20 bucks for? It will end up with me doing something illegal either way. It's cool because the stuff I download doesn't have DRM!

  • Mitnik (Score:3, Insightful)

    by nukenerd ( 172703 ) on Tuesday November 29, 2005 @05:12PM (#14141221)
    Yes, Mitnick did time - he got a severe sentence, including solitary. It was out of proportion to his crime because his was an early instance of cracking (the swallow before the summer) and he was made a scapegoat. Also, the press paid great interest partly because of the fascinating story of his pursuit and capture, which the authorities treated as a mission deserving all their energy.

    Looking back now, you can't help wondering why all the fuss. Mitnick did pry around some academic, corporate and military related systems but always maintained he did no damage. He certainly seemed to act out of curiosity and as a challenge rather than with malice. He has yet to write his account of the episode.

    What Mitnik did pales into insignificance compared with what goes on now - spammers acting with apparent impunity, crackers installing and controlling bots in their tens of thousands, market researchers planting spyware, and even previously respected household names like Sony pushing Trojans onto the unsuspecting public. Activities which seriously threaten the continued viablity of the internet as a medium.

    Company directors can be sent to jail, as Mitnik was. However I doubt it will happen because the legal authorities and the public are now punch drunk with misbehaviour in the IT field. They were sharp and keen against Mitnik but now they are weary and cannot be bothered to pursue the wrong-doers.

    It is much easier for the authorities to dismiss this case with "Oh well, surely Sony couldn't have meant any harm, could they?"
  • by Anonymous Coward on Tuesday November 29, 2005 @05:14PM (#14141246)
    The real impact this may have is that it may finally convince the idiots in Sony's management that DRM costs them far more money than it saves them.

    At least, as a Sony employee, that's my hope.

    If I were a Sony investor, I'd be asking real hard questions about why the company is spending many millions of dollars on "technology" that does not work, will never work, and is instead just dragging the company's formerly good name through the dirt and pissing off costumers.
  • by CowboyBob500 ( 580695 ) on Tuesday November 29, 2005 @06:11PM (#14141950) Homepage
    A mom-and-pop store or a private individual cannot reasonable be expected to do a good faith patent search when choosing an operating system (MS Windows and Mac OS undoubtedly violate hundreds of software patents, and Linux violates thousands of patents if you include software commonly found in distros, like mp3 players - the mplayer project alone has close to 1,000 known patent violations and countless unknown violations). Legally every single user of a halfway modern OS should have injunctions granted against the use of their computer and massive damages be paid out to the dozens or hundreds of patent holders covering some aspect of their OS.

    MPlayer, Linux, LAME etc etc, are perfectly legal here in the UK since software patents are not enforcable. The problem is not with the software, it's with the US patent system.

    Bob
  • by Yartrebo ( 690383 ) on Tuesday November 29, 2005 @09:25PM (#14143448)
    It's called the law of large numbers. If a little digging unveils 1,000 patent violations, it's likely that a little more digging would have uncovered more. They're unknown because the violations have not actually be found and written into a list. Some patents are even secret and not published until they are issued, and no amount of research (short of industrial espionage) is going to find them. A large program is like playing minesweeper with a blindfold. Each line of a code is a square, which potentially could violate a patent. Uncover enough squares (the average number is not very high, probably under 100 lines of code), and you will find a mine. MPlayer consists of around 1,000,000 lines of code implementing hundreds of audiovisual algorithms, and certain parts of MPlayer, like wavelet-based codecs (ie., the Snow and Dirac codecs), have been avoided by all US-based and international corporations because of the patent mess surrounding wavelets (in particular, the fragmented and litigious nature of the patent holders, not so much the raw number of patents). If a project is extremely careful, then they might be able to avoid 99 of 100 patents through very careful research (easily exceeding development costs), but that still means about 1 line in 10,000 will be infringing, or 100 infringments for a program of the scale of MPlayer. Perhaps using a bitfield to store 8 1-bit pixels in 1 byte is patented and a careless optimizer introduced that into the code naively trying to save a few bytes.

    It's just as safe to say that there are yet to be discovered patent violations in (insert name of large software project) as it is safe to say that at least a single extra reservoir of oil will be found or that you will find at least one mine by clicking randomly on the squares in minesweeper and that you will undoubtedly lose with that strategy.
  • by dbIII ( 701233 ) on Tuesday November 29, 2005 @10:26PM (#14143715)
    F-Secure would probably be facing legal action from Sony if they deliberately prevented Sony's software from running. In the land of the DMCA where a guy who plays chess against the Russians is a traitor and a guy who sells weapons to Iran to give money to a drug dealer is a patriot who knows which way it would go? Either way the antivirus companies lose - viruses and malware produced by companies with major legal clout will most likely be a major headache for the antivirus companies from now own.
  • Re:Impressions (Score:3, Insightful)

    by aug24 ( 38229 ) on Wednesday November 30, 2005 @08:26AM (#14145961) Homepage
    You can't 'patch' a rootkit to turn it into 'not a rootkit'.

    F-Secure shouldn't have given Sony a chance at all - they should have added a signature so that if I stuck a Sony CD in my machine it would be detected and I would be warned. What the fuck else would I want their product for?

    Justin.

Neutrinos have bad breadth.

Working...