Feeds

Hackers crack Ubisoft always-online DRM controls

Game on

7 Elements of Radically Simple OS Migration

Hackers have overcome Ubisoft's controversial DRM system that relied on constant connection to the internet for games to function.

A crack for Ubisoft’s anti-piracy system published by a group called Skid Row allows gamers to circumvent the controls for games such as Assassin's Creed II. A message from the group on a gamers' forum sets out the group's agenda: allowing legitimate copies of PC games to be played without an internet connection, rather than facilitating piracy. Skid Row cheekily thanks Ubisoft for posing an interesting intellectual challenge.

Thank you Ubisoft, this was quiete a challenge for us, but nothing stops the leading force from doing what we do. Next time focus on the game and not on the DRM. It was probably horrible for all legit users. We just make their lifes easier.

This release is an accomplishment of weeks of investigating, experimenting, testing and lots of hard work. We know that there is a server emulator out in the open, which makes the game playable, but when you look at our cracked content, you will know that it can't be compared to that. Our work does not construct any program deviation or any kind of host file paradox solutions. Install game and copy the cracked content, it's that simple.

Chris Boyd (AKA PaperGhost), a security researcher at Sunbelt Software and a long-time gamer, Told The Register that Ubisoft's controls were fundamentally misconceived.

“In general, it seems DRM restrictions in gaming are becoming more intrusive and creating problems for genuine customers, rather than the pirates who happily bypass these measures every time," Boyd said. "PC gaming should be about portability - what use are games you can't play at the airport or on a train if you can't get online?

"We already see layered DRM in gaming - for example, the Ubisoft DRM is used if you buy certain titles on Steam, the PC content delivery system which also ties games to user accounts. Eventually we could see games with so many restrictions and requirements needed to play that they would be all but unusable to everybody but the pirates. This would clearly not be a good situation for either the consumer or the games publisher.” ®

Build a business case: developing custom apps

More from The Register

next story
Nice computers don’t need to go to the toilet, says Barclays
Bad computers might ask if you are Sarah Connor
4K video on terrestrial TV? Not if the WRC shares frequencies to mobiles
Have your say with Ofcom now, before Freeview becomes Feeview
PEAK LANDFILL: Why tablet gloom is good news for Windows users
Sinofsky's hybrid strategy looks dafter than ever
YES, iPhones ARE getting slower with each new release of iOS
Old hardware doesn't get any faster with new software
You didn't get the MeMO? Asus Pad 7 Android tab is ... not bad
Really, er, stands out among cheapie 7-inchers
Apple winks at parents: C'mon, get your kid a tweaked Macbook Pro
Cheapest models given new processors, more RAM
VMware builds product executables on 50 Mac Minis
And goes to the Genius Bar for support
Leaked Windows Phone 8.1 Update specs tease details of Nokia's next mobes
New screen sizes, dual SIMs, voice over LTE, and more
Microsoft stands on shore as tablet-laden boat sails away
Brit buyers still not falling for Windows' charms
prev story

Whitepapers

7 Elements of Radically Simple OS Migration
Avoid the typical headaches of OS migration during your next project by learning about 7 elements of radically simple OS migration.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Solving today's distributed Big Data backup challenges
Enable IT efficiency and allow a firm to access and reuse corporate information for competitive advantage, ultimately changing business outcomes.
A new approach to endpoint data protection
What is the best way to ensure comprehensive visibility, management, and control of information on both company-owned and employee-owned devices?