Feeds

CPS2 arcade encryption smashed

Morality debate ensues

  • alert
  • submit to reddit

Bridging the IT gap between rising business demands and ageing tools

A group of gaming enthusiasts called the CPS-2 Shock Team claims to have broken the encryption on the CPS-2 arcade board from Capcom.

While the algorithm itself has not been compromised, the group has managed to extract unencrypted data from the board using the 68k code on the hardware itself, according to a poster on SlashDot. Whether this actually constitutes a break of encryption is a subject under discussion at the aforementioned geek site.

The morality and legality of the break are also up for debate. Members of the team which extracted the data have said that they will not use their new-found knowledge to pirate new releases, and have posted the following on their site:

"CPS2shock will no longer release any information that can be used to break CPS-2 encryption until such times as Capcom no longer release new titles on the system. CPS2shock will work of dumping older CPS-2 games and releasing them for your enjoyment to play in emulators."

This sentiment has been both applauded for being responsible and slammed for being hypocritical, and has sparked an interesting conversation.

The news seems to have taken Capcom by surprise, and it could not comment today. More on that as and when it arrives. ®

Build a business case: developing custom apps

More from The Register

next story
BBC goes offline in MASSIVE COCKUP: Stephen Fry partly muzzled
Auntie tight-lipped as major outage rolls on
You! Pirate! Stop pirating, or we shall admonish you politely. Repeatedly, if necessary
And we shall go about telling people you smell. No, not really
Airbus promises Wi-Fi – yay – and 3D movies (meh) in new A330
If the person in front reclines their seat, this could get interesting
UK Parliament rubber-stamps EMERGENCY data grab 'n' keep bill
Just 49 MPs oppose Drip's rushed timetable
ITC: Seagate and LSI can infringe Realtek patents because Realtek isn't in the US
Land of the (get off scot) free, when it's a foreign owner
Samsung threatens to cut ties with supplier over child labour allegations
Vows to uphold 'zero tolerance' policy on underage workers
Dude, you're getting a Dell – with BITCOIN: IT giant slurps cryptocash
1. Buy PC with Bitcoin. 2. Mine more coins. 3. Goto step 1
There's NOTHING on TV in Europe – American video DOMINATES
Even France's mega subsidies don't stop US content onslaught
prev story

Whitepapers

Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.