Feeds

Will Phoenix keep your disks and OS CPRM-free?

Mr Hedrick has a plan

  • alert
  • submit to reddit

Secure remote control for conventional and virtual desktops

The Phoenix Technologies proposal before the T.13 committee, which may pave the way to copy restrictions for users, shouldn't be seen as the son of CPRM, argues Linux ATA/IDE guy Andre Hedrick.

Although the proposal - which has not yet been published outside the open meeting - does not specifically prevent any command sets such as CPRM from applying to fixed hard drives at a later date, Hedrick says the important point is that the owner of the drive could disable the features. And furthermore, it gives users of operating systems that let such features through block them. However, he plans to reserve his final judgement until review of the published document.

Hedrick's primary concern, he says, is that the user has the ability to turn whatever copy restrictions may yet be in the pipeline, off, both at the system level and the OS level:

"It's like those big dogs, you put a muzzle on it. The question is to muzzle or not too muzzle," he told us. "Control over a technology is more important than it existing. If you know it's there, you're empowered."

Ironically says Hedrick, the modified, third revision of the CPRM specification gave users more flexibility in this respect than the Phoenix BIOS proposal.

"For me it didn't matter what it was; or if it was actual CPRM - the fact that it could have a switch to turn it off made me happy." Hedrick was precluded from the vote, standard practice when a member changes jobs between meetings.

Hedrick was invited to modify the CPRM proposal to give programmers a way of ensuring CPRM media could be rejected from fixed hard drives.

However, he says, the revision addresses a critical issue - who "owns" the drive. The latest "generic" feature mode proposal to CPRM specifically addressed concerns about the usage of new features before being presented. It's now impossible for these to slip through the back door without the user or the OS device driver writer knowing about them. In other words, in the future shadowy command sets will be flushed out into the open.

"OS's will be forced to strictly test for support of new, unknown commands and reject all that could not be handled safely. The effect will be to reject all commands that are not published or public, or have known data-phase responses," he says. And that's preferable option than fighting each command set battle, and infinitely more preferable than having these go "underground" in undocumented, vendor unique command sets.

Intel today said Curtis Stevens' proposal met its requirements:

"The Phoenix proposal would serve the same purpose of a generic command that we wanted to do for copy protection," said an Intel spokeman today. "It only activates when you are copying to removable devices and marries that content to that piece of blank media you have."

Phoenix had not returned our request for comment at press time. ®

Bootnote This one comes direct from the Ministry of Irony.

Like so many Register stories, CPRM bypassed the trade press almost entirely en-route to the national and international media, where it made the front page of the San Jose Mercury, and was covered by many national inkies including The Times and The Independent. But look in vain for coverage on Wired, or the CMP networks, and apart from one tragic effort - which failed to mention the boycott - it went ignored by the CNet/ZDNet conglomerate too. That explains the title of our FAQ on the topic.

Well, believe it or not, ZDNet still refuses to tell you anything about CPRM. Today ZDNet reporter Rob Lemos (hi, Rob) turned in a sterling story on the subject, but it was published only on CNet's site, and not by ZDNet News. Keeping the news away from your readers is quite a challenge for news editors, and must merit some lovely glass Anti-Journalism gong all of its own.

Ye gads, how long can they keep it up?

Related Stories

All our CPRM on ATA Stories

Choosing a cloud hosting partner with confidence

More from The Register

next story
Microsoft on the Threshold of a new name for Windows next week
Rebranded OS reportedly set to be flung open by Redmond
SMASH the Bash bug! Apple and Red Hat scramble for patch batches
'Applying multiple security updates is extremely difficult'
Business is back, baby! Hasta la VISTA, Win 8... Oh, yeah, Windows 9
Forget touchscreen millennials, Microsoft goes for mouse crowd
Apple: SO sorry for the iOS 8.0.1 UPDATE BUNGLE HORROR
Apple kills 'upgrade'. Hey, Microsoft. You sure you want to be like these guys?
ARM gives Internet of Things a piece of its mind – the Cortex-M7
32-bit core packs some DSP for VIP IoT CPU LOL
Lotus Notes inventor Ozzie invents app to talk to people on your phone
Imagine that. Startup floats with voice collab app for Win iPhone
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.