Feeds

CNet suckered by CPRM spin

Leaves brain in jar

  • alert
  • submit to reddit

The essential guide to IT transformation

Special to The Register, RegisterTV, the Register Shopping Channel, AllRegDevices.com, VultureDesk, DirectReg! and all other subsidiaries of Situation Publishing International

As we suspected, the 4C Entity's damage control airforce has succeeded in scoring a direct hit. A report on the CNet/ZDNet media behemoth by CNet Staff Writer John Borland covers the recent CPRM on ATA furore, pitching it - as IBM and Intel strenuously - as a copy control mechanism for removable media.

According to the report, "the plans are initially likely to affect removable or portable data storage, such as Zip drives...." by including "digital piracy protections". Phew. Don't you feel safer already?

"Fixed hard drives are a possibility, but that's unlikely at first," IBM researcher Lotspiech is quoted as saying. "It's not impossible, but that's certainly not (this technology's) intent."

Alas, the author has ignored the fact that removable drives Zip and Jazz use the packet-based ATAPI cousin of the ATA specification, the standard used by fixed hard disk drives. What's under consideration by the T.13 committee are extensions to the ATA interface itself.

And quite specifically, as examination of the proposed new calls will reveal, the interface contains parameters that ATA need but that ATAPI devices don't. Specifically, the sector start and offset information requested by CPRM on ATA is not required by an ATAPI device. So why is it there?

Although IBM microdrives have been cited by both IBM and Intel as a raison d'etre for the new specification, extending CPRM to these does not require extending the ATA command set itself, merely a small and device-specific subset. So again, why is it there, in the ATA specification?

As we pointed out, the CPRM proposals extend copy control into the standard used by fixed hard disk drives. If as IBM and Intel maintain, this is an unforeseen, or even undesired consequence - "this wouldn't help us," Intel told us yesterday, "why would we cut off our nose to spite our face?" - the fact is indisputable. Until the CPRM on ATA proposals are modified, it remains a fact. We'll have more details later today.

Happy holidays everyone, and thanks for your correspondence. ®

Related Link

FAIR - Fairness and Accuracy in Reporting

Related Stories

EFF's Gilmore calls for CPRM hardware boycott
Stealth plan puts copy protection into every hard drive
CPRM on hard drives - IBM takes a spin
Linux lead slams 'pay per read' disk drive plan

Secure remote control for conventional and virtual desktops

More from The Register

next story
6 Obvious Reasons Why Facebook Will Ban This Article (Thank God)
Clampdown on clickbait ... and El Reg is OK with this
No, thank you. I will not code for the Caliphate
Some assignments, even the Bongster decline must
Kaspersky backpedals on 'done nothing wrong, nothing to fear' blather
Founder (and internet passport fan) now says privacy is precious
TROLL SLAYER Google grabs $1.3 MEEELLION in patent counter-suit
Chocolate Factory hits back at firm for suing customers
Mozilla's 'Tiles' ads debut in new Firefox nightlies
You can try turning them off and on again
Sit tight, fanbois. Apple's '$400' wearable release slips into early 2015
Sources: time to put in plenty of clock-watching for' iWatch
Facebook to let stalkers unearth buried posts with mobe search
Prepare to HAUNT your pal's back catalogue
prev story

Whitepapers

Endpoint data privacy in the cloud is easier than you think
Innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look for in a solution.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Advanced data protection for your virtualized environments
Find a natural fit for optimizing protection for the often resource-constrained data protection process found in virtual environments.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.