Feeds

Western Digital's 'crippleware': Some lessons from history

The panic that wasn't

Combat fraud and increase customer satisfaction

Seven years ago, The Register broke what became the biggest DRM story of all time. It described a plot that took place in obscure committee rooms that was quite cunning in its insidiousness. Had it succeeded and been implemented, it would have seen the demise of the open personal computer platform - without anyone realising it. For the first time, many of us became fully aware of the consequences of a locked-down PC.

This wasn't science fiction, but a very real and present danger.

CPRM was a sophisticated, cryptographically-based restriction technology designed for use on removable media, developed at IBM's Alamaden Research Lab. It's the "S" on an SD Card, and 200 million copies of CPRM media have been sold.

However, at the behest of Hollywood interests, moves began to incorporate it into PC Hard Drives, by making CPRM a part of the standard command set for ATA disks. Each hard drive would be individually signed, and total control of the media could be assumed by the rights holder. A CPRM-compliant song or movie file that resided on a CPRM-compatible hard drive could be deleted or locked-down at will: assuming you were given the right to save it in the first place.

This caused an outcry from enterprise users and their software vendors, who quickly realised that CPRM would break existing storage and backup systems. Then, as the implications spread, it became apparent that this provided the Holy Grail copyright holders had been seeking.

CPRM was incredibly hard to break. As a broadcast encryption system it provided a constantly moving target for hackers in the form of a matrix of tens of thousands of device keys; these keys could be revoked and refreshed by the rights holder. A group of manufacturers comprising Intel, IBM, Matsushita (Panasonic), and Toshiba formed a group to license the technology widely.

We published shortly before Christmas 2000, and a fascinating and fairly nerve shredding few days followed. There was no anti-DRM lobby at the time: no P2P bloggers to hound the manufacturers. But understanding this one required learning some obscure technical procedures, and a little about standards committee politics.

CNet followed-up, but the reporter failed to do the necessary homework, so was easily misdirected by PR spin. It looked like our story might die, and it was only when Dawn Chmielewski put the issue on the front page of the San Jose Mercury nine days later that I could breathe easily.

In the ensuing storm, the issue reached the boardrooms of Intel and IBM. The perception of a locked-down media appliance hurts business. What the hell are we doing? directors demanded.

CPRM on ATA was dropped from the spec - but from there we entered even more dangerous territory. The T.13 committee produces a specification that covers only the lowest common denominator set of operations, and two thirds of commands are "vendor-specific". A Western Digital or a Seagate often produces its own.

See any parallels to today? Let's see...

3 Big data security analytics techniques

More from The Register

next story
This time it's 'Personal': new Office 365 sub covers just two devices
Redmond also brings Office into Google's back yard
Kingston DataTraveler MicroDuo: Turn your phone into a 72GB beast
USB-usiness in the front, micro-USB party in the back
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
BOFH: Oh DO tell us what you think. *CLICK*
$%%&amp Oh dear, we've been cut *CLICK* Well hello *CLICK* You're breaking up...
Cisco reps flog Whiptail's Invicta arrays against EMC and Pure
Storage reseller report reveals who's selling what
AMD's 'Seattle' 64-bit ARM server chips now sampling, set to launch in late 2014
But they won't appear in SeaMicro Fabric Compute Systems anytime soon
prev story

Whitepapers

SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.