Feeds

EFF pimps X-Box cracker ‘victory’

Not getting enough attention lately

  • alert
  • submit to reddit

The Power of One Brief: Top reasons to choose HP BladeSystem

"The Electronic Frontier Foundation (EFF) is pleased to announce that former MIT doctoral student Andrew 'Bunnie' Huang will present a paper explaining a security flaw in the Microsoft Xbox (TM) videogame system," a recent press release begins.

Of course the paper has been available from Huang's account at MIT since April, so any danger from his appearance at a conference is largely imaginary. Huang long ago notified MS of his paper with EFF supervision, presumably appealing to the Digital Millennium Copyright Act (DMCA) exclusion for cryprographic research.

MS replied that while it would prefer that Huang not publish his findings, it had no intention of trying to jam him up with the DMCA. If there were an issue here worth reporting, it would have come up some time ago.

This is pure recycled news. Huang's talk is simply an occassion for the EFF to get some publicity mileage for its selfless struggle to liberate us all.

We recall the last non-issue which EFF inflated into gargantuan proportions as Princeton University Computer Science Professor Edward Felten -- who credited himself and his team with cracking the Secure Digital Music Initiative (SDMI) Public Challenge -- claimed his 'speech was being chilled' by a vague nastygram from the Recording Industry Ass. of America (RIAA) which cited potential DMCA complications if he delivered his findings in public.

After coaching Felten to voluntarily withdraw from a talk in which he was scheduled to spill the beans, the EFF trumpeted this as an example of protected speech being chilled by DMCA threats. Once he'd enacted that choreographed media stunt, Felten later gave his talk at a different conference and survived without a scratch.

EFF has apparently taught Huang to parrot its victim rap verbatim, as the gentleman is quoted in an organization press release fretting conspicuously that, "the DMCA clearly had a chilling effect on my work. I was afraid to submit my research for peer review until after the EFF's efforts to clear potential legal restraints."

Another close call with catastrophe narrowly averted by EFF vigilance, we're sure. ®

The Essential Guide to IT Transformation

More from The Register

next story
Secure microkernel that uses maths to be 'bug free' goes open source
Hacker-repelling, drone-protecting code will soon be yours to tweak as you see fit
NO MORE ALL CAPS and other pleasures of Visual Studio 14
Unpicking a packed preview that breaks down ASP.NET
KDE releases ice-cream coloured Plasma 5 just in time for summer
Melty but refreshing - popular rival to Mint's Cinnamon's still a work in progress
Leaked Windows Phone 8.1 Update specs tease details of Nokia's next mobes
New screen sizes, dual SIMs, voice over LTE, and more
Put down that Oracle database patch: It could cost $23,000 per CPU
On-by-default INMEMORY tech a boon for developers ... as long as they can afford it
Another day, another Firefox: Version 31 is upon us ALREADY
Web devs, Mozilla really wants you to like this one
Google shows off new Chrome OS look
Athena springs full-grown from Chromium project's head
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Securing Web Applications Made Simple and Scalable
Learn how automated security testing can provide a simple and scalable way to protect your web applications.