Feeds

Western Digital's 'crippleware': Some lessons from history

The panic that wasn't

HP ProLiant Gen8: Integrated lifecycle automation

Seven years ago, The Register broke what became the biggest DRM story of all time. It described a plot that took place in obscure committee rooms that was quite cunning in its insidiousness. Had it succeeded and been implemented, it would have seen the demise of the open personal computer platform - without anyone realising it. For the first time, many of us became fully aware of the consequences of a locked-down PC.

This wasn't science fiction, but a very real and present danger.

CPRM was a sophisticated, cryptographically-based restriction technology designed for use on removable media, developed at IBM's Alamaden Research Lab. It's the "S" on an SD Card, and 200 million copies of CPRM media have been sold.

However, at the behest of Hollywood interests, moves began to incorporate it into PC Hard Drives, by making CPRM a part of the standard command set for ATA disks. Each hard drive would be individually signed, and total control of the media could be assumed by the rights holder. A CPRM-compliant song or movie file that resided on a CPRM-compatible hard drive could be deleted or locked-down at will: assuming you were given the right to save it in the first place.

This caused an outcry from enterprise users and their software vendors, who quickly realised that CPRM would break existing storage and backup systems. Then, as the implications spread, it became apparent that this provided the Holy Grail copyright holders had been seeking.

CPRM was incredibly hard to break. As a broadcast encryption system it provided a constantly moving target for hackers in the form of a matrix of tens of thousands of device keys; these keys could be revoked and refreshed by the rights holder. A group of manufacturers comprising Intel, IBM, Matsushita (Panasonic), and Toshiba formed a group to license the technology widely.

We published shortly before Christmas 2000, and a fascinating and fairly nerve shredding few days followed. There was no anti-DRM lobby at the time: no P2P bloggers to hound the manufacturers. But understanding this one required learning some obscure technical procedures, and a little about standards committee politics.

CNet followed-up, but the reporter failed to do the necessary homework, so was easily misdirected by PR spin. It looked like our story might die, and it was only when Dawn Chmielewski put the issue on the front page of the San Jose Mercury nine days later that I could breathe easily.

In the ensuing storm, the issue reached the boardrooms of Intel and IBM. The perception of a locked-down media appliance hurts business. What the hell are we doing? directors demanded.

CPRM on ATA was dropped from the spec - but from there we entered even more dangerous territory. The T.13 committee produces a specification that covers only the lowest common denominator set of operations, and two thirds of commands are "vendor-specific". A Western Digital or a Seagate often produces its own.

See any parallels to today? Let's see...

Reducing security risks from open source software

More from The Register

next story
Sysadmin Day 2014: Quick, there's still time to get the beers in
He walked over the broken glass, killed the thugs... and er... reconnected the cables*
Amazon Reveals One Weird Trick: A Loss On Almost $20bn In Sales
Investors really hate it: Share price plunge as growth SLOWS in key AWS division
Auntie remains MYSTIFIED by that weekend BBC iPlayer and website outage
Still doing 'forensics' on the caching layer – Beeb digi wonk
SHOCK and AWS: The fall of Amazon's deflationary cloud
Just as Jeff Bezos did to books and CDs, Amazon's rivals are now doing to it
BlackBerry: Toss the server, mate... BES is in the CLOUD now
BlackBerry Enterprise Services takes aim at SMEs - but there's a catch
The triumph of VVOL: Everyone's jumping into bed with VMware
'Bandwagon'? Yes, we're on it and so what, say big dogs
Carbon tax repeal won't see data centre operators cut prices
Rackspace says electricity isn't a major cost, Equinix promises 'no levy'
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.