Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×
Encryption Security Entertainment Games

Atari Founder Proclaims the End of Gaming Piracy 831

OMGZombies writes "Speaking on a conference held yesterday in New York, the Atari founder Nolan Bushnell said that a new stealth encryption chip called TPM will 'absolutely stop piracy of gameplay'. The chip is apparently being embedded on most of the new computer motherboards and is said to be 'uncrackable by people on the internet and by giving away passwords' though it won't stop movie or music piracy, since 'if you can watch it and you can hear it, you can copy it.'"
This discussion has been archived. No new comments can be posted.

Atari Founder Proclaims the End of Gaming Piracy

Comments Filter:
  • by Sockatume ( 732728 ) on Monday May 26, 2008 @12:27PM (#23545453)
    That's how Engadget is describing it, and I'm inclinded to agree. Firstly, it's not a "stealth chip", they tend to be prominently listed as a feature because they're so bloomin' rare and you really need one if you want to be able to use Vista's disk encryption without a dongle. Secondly, nobody has even proposed using them as a DRM measure, presumably because of the aforementioned rarity. Thirdly, this is spectacularly old news - those who follow hardware developments have been chatting about the TPM and its implications since Two Thousand and FIVE [bbc.co.uk].
  • TPM wtf? (Score:5, Informative)

    by Bazman ( 4849 ) on Monday May 26, 2008 @12:31PM (#23545479) Journal
    Trusted Platform Module - not mentioned in the article. You can probably google it yourself, or wikipedia [wikipedia.org] has an entry.

    It's pretty much Palladium all over again. Remember that?

  • Re:Yes. (Score:5, Informative)

    by mikael ( 484 ) on Monday May 26, 2008 @12:32PM (#23545507)
    TPM = Trusted Platform Module [wikipedia.org].

    The system creates a hash key based upon an analysis of the encrypted software and hardware combined together. If this matches a third party checksum, then the third party releases the decryption key to the encrypted software.

    This would make sense for networked console games or PC's with broadband connections.
  • by Anonymous Cowpat ( 788193 ) on Monday May 26, 2008 @12:42PM (#23545619) Journal
    they are not. Infogrammes bought the remnants of the company so that they could use the name.
  • by tepples ( 727027 ) <tepples.gmail@com> on Monday May 26, 2008 @12:47PM (#23545701) Homepage Journal

    You want to know how to stop game piracy?
    Simple...let's go back to the cartridges...
    DS cartridges are already widely pirated, as were GBA cartridges before them.
  • by BLKMGK ( 34057 ) <morejunk4me@@@hotmail...com> on Monday May 26, 2008 @12:48PM (#23545703) Homepage Journal
    +1 insightful! This guy must have just woken up, that he has seized upon this with such fervor makes me wonder how long Atari is going to be around. These things are FAR from common save for laptops and certainly not something you're likely to find on a gamer's desktop. My machine has a slot for a TPM module but it didn't ship with one and I see NO reason to shell out a pile of cash to obtain one. People such as myself will simply vote with our feet and wallets. Think he will blame piracy for the low sales?
  • Re:Play it (Score:5, Informative)

    by shutdown -p now ( 807394 ) on Monday May 26, 2008 @12:50PM (#23545743) Journal
    Not necessarily. The difference between music/video and games is that the latter is highly interactive - there's no analog hole there, you cannot just record it. You can, of course, hack the executable, but using TPM, they can encrypt the game resources, and you'll need to break the TPM itself to get to them - you can't work around that as you can with the analog hole.
  • by supradave ( 623574 ) <supradave@yaho[ ]om ['o.c' in gap]> on Monday May 26, 2008 @12:50PM (#23545755)
    The software my company writes is tied to the TPM chip. What it prevents you from doing is taking a copy of our software and running it on another machine. When you register it, you then download an encrypted image for that specific TPM chip. Without systems level access to that machine and some pretty expensive hardware tools, there's no reasonable way to hack it. Of course, our entire application/OS is encrypted whereas encrypting an entire game would become a hinderence to game play. Therefore, I doubt it will take off.

    But heck, it's the securiest OS on the planet be running those games. TPM is irrelevant then.
  • by shutdown -p now ( 807394 ) on Monday May 26, 2008 @01:01PM (#23545865) Journal

    (X) Legitimate gamer uses would be affected
    (X) Users of gamer will not put up with it
    Actually, these two have already been disproved as far as Atari is concerned. They've already used some heavy-handed DRM schemes in the past, and got away with it - all Neverwinter Nights (the original one) premium modules, of which Atari was the publisher, required authorization over the Net every time you started a new game or loaded a saved game. There was an outcry among the community for the first two releases where it was introduced, of course, but there were enough purchases for Atari to proclaim it a success, and use it in all the following modules. Now, they are deliberately delaying [bioware.com] the already finished expansion pack for NWN2 for several months already so that they can include some new "super tough" form of copy protection into it - I wonder if that's actually related to TFA. Says the Atari guy:

    I am the Atari producer for Mysteries of Westgate (MoW) among other D&D products. Most of you know that the release of Mysteries of Westgate has been delayed because of ongoing development of a new security system. Near the end of MoW's development last year, we realized that the traditional protection of the .exe file would not work with it so we scrambled to find a reliable commercial method that would do the job. At the time, there was no solution that met our requirements. That is why, since the end of 2007, Atari has been working hard to develop a new security system that can be used not just for MoW but for all Atari products that need protection for data files without using the traditional route of wrapping the .exe file. Unfortunately, developing this system has taken longer than we anticipated and MoW's release has suffered as a result, because it is the first product that will use this new system.

    ...

    I realize that many of you are anxious to get your hands on Mysteries of Westgate, and I know from firsthand experience that it is a fantastic adventure. MoW has been ready to ship for a while now and we are close to finalizing the new security system that will ensure that it has its proper day in the sun. In the meantime, we are working hard to keep cool information about the game coming.

  • by Bluehorn ( 34947 ) on Monday May 26, 2008 @01:06PM (#23545943)

    And anyway - there has to be some code that accesses the TPM chip, and that also means that given enough time and effort it's possible to circumvent it, or even simulate the TPM chip.
    In fact there is already a TPM Emulator [berlios.de], running on Linux. Which will buy you - nothing. Because software will only run on certified TPMs.

    Sure there will be some code that talks to the TPM - the so called Trusted Computing Base (TCB). This will be built into unchangeable ROM or into the CPU itself. You'll have to work at Intel or AMD to have the technology to get around this.

    The game itself will be encrypted with a small wrapper doing the handshake with the manufacturer to load the decryption key into the TPM.

    There are only a few options to get around this:
    • Break the underlying cryptography (AES - unlikely, SHA-1 - maybe).
    • Micro-probe to your CPU (have fun with 45 um cores!)
    • Don't buy anything which has this protection.


    I'll go for (3), that's for sure.

  • by Anonymous Coward on Monday May 26, 2008 @01:19PM (#23546107)
    More information can be found at wikipedia [wikipedia.org]
  • Re:TPM is Optional (Score:3, Informative)

    by nurb432 ( 527695 ) on Monday May 26, 2008 @01:19PM (#23546115) Homepage Journal
    Its only optional if you don't want to run the software you just bought. If you *have* to run some special app, it might just become required.

    Or later, to run that HSD approved "connection monitor" ( which would be called something like "security protector" ) to be allowed to connect to your ISP.
  • Re:Virtual Machines (Score:1, Informative)

    by Anonymous Coward on Monday May 26, 2008 @01:24PM (#23546167)
    > Do they support TPM?

    No, but they don't have to -- they just can't access anything that's locked by the TPM (or more accurately, encrypted such that the TPM is the ultimate custodian of the keys). Plenty of existing copy protection mechanisms already don't work in virtual machines.
  • by nuzak ( 959558 ) on Monday May 26, 2008 @01:26PM (#23546191) Journal
    Four months? I find your lack of faith disturbing! What was CSS broke in, three hours with three lines of recursive code?

    Try two years. And AACS still isn't truly broken.
  • by supradave ( 623574 ) <supradave@yaho[ ]om ['o.c' in gap]> on Monday May 26, 2008 @01:27PM (#23546215)
    It's not really an anti-piracy play. It's being able to verify and trust the image of the software you are running. You cannot trust Windows, Linux or Mac OSX from compromise, therefore you cannot trust them to do security work. If you're not concerned with security then our product isn't for you.
  • We had this (Score:2, Informative)

    by JackassJedi ( 1263412 ) on Monday May 26, 2008 @01:31PM (#23546257)
    Did anyone bother to point out that TPM has [slashdot.org] been [slashdot.org] discussed [slashdot.org] to [slashdot.org] death [slashdot.org] and the mere existence of the Trusted Platform Module is no news at all?
  • by ksd1337 ( 1029386 ) on Monday May 26, 2008 @01:39PM (#23546341)

    Break the underlying cryptography (AES - unlikely, SHA-1 - maybe).
    SHA-1's not encryption. It's a hash function.
  • TPM != NGTCB (Score:5, Informative)

    by mlts ( 1038732 ) * on Monday May 26, 2008 @01:39PM (#23546347)
    The TPM chip that comes in computers is totally different than the hardware chips, curtained memory, and super-root apps that were in Palladium. In the NGSCB, the hardware had an active role of maintaining I/O, and managing memory.

    The current version of the TPM is not in the active path at all. Fundamentally, all a TPM 1.2 chip is, is a smart card that is attached to the motherboard. The only difference between it and an Aladdin eToken that is plugged into a USB port are two things. First, are the platform configuration registers, which you manually have to put data into, and second the TPM is resettable from the BIOS screen.

    TPM chips, as per the TCG 1.2 spec ship disabled and deactivated, and the user of the machine has to go into BIOS to enable the chip and take physical ownership. Otherwise, it can't be accessed by the machine in any way.

    Motherboards TPM chips are rare to find. For a server I built that is to be able to boot unattended, but have all its volumes encrypted using BitLocker, I had to chase down stats on Intel's website and compare them to currently selling motherboards, then cross-reference them to make sure there was an actual chip, and not just BIOS headers.

    The Atari founder is quite wrong. Using the TPM won't give much protection from pirates. We've already hard hardware devices encrypting software for decades -- the good old fashioned dongles.

    Second, no modern OS ships with a trusted, sealed OS path that is forever static and can be signed from the OS company and passed directly to the TPM like console operating systems are done. Windows Server 2008 has different drivers load for RAID and other low level devices which vary widely party. For example, If you install a new role like Hyper-V on Windows Server 2008, you have to disable and re-enable BitLocker, or the OS path won't be the same. Bitlocker doesn't use OS signatures from a central source, when its enabled, it does its own signing and sealing of the boot path and other user selectable data (BIOS settings, NTFS stats, MBR, partition table.)

    The Atari founder assumes too much. PCs are not consoles where having a chip on a static OS and hardware can provide adequate protection. For the TPM chip on PCs to be used for piracy protection, every gaming machine would have to have one physically present, enabled, activated, and ownership taken in the OS the chip is running under, the OS would have to have a static low level kernel that never changes from machine to machine regardless of CPU or devices installed, which for a PC is virtually impossible.

    TPM chips also have been emulated too. All it takes is one person to be able to bypass the protection, and the game is cracked.

    All and all, in my personal experience, TPM chips are a good thing, especially with BitLocker. A server can boot unattended but still possess hard disk encryption so someone who gets physical access to the box can't just boot a CD and copy off the server's contents. I'd recommend this for co-loc boxes, especially in these times where thieves are learning that a data center heist can net far more cash in information to sell on the ID theft market (or just plain old extortion) than a bank robbery would haul in.

    A laptop owned by a company bound by corporate regs can use BitLocker or PGP to ensure the laptop has hard disk encryption, but doesn't have any more passwords the user has to remember. Finally, someone can use BitLocker + a PIN, so if someone steals a laptop or machine, they only have 3-5 guesses before the TPM refused entries or starts adding substantial delays between password guesses.

    Of course, there are hard disk encryption programs with pre-boot authentication (TrueCrypt, PGP, etc.), but BitLocker is the only one that offers the feature of booting a machine completely unattended, but yet remain secure. Of course, one can have an OS boot then manually mount encrypted volumes, but BitLocker removes the hassle of this, especially if the machine is in a remote location where no admins would be present, and a network connection is not feasible.

    The TPM chip in its current form is a security asset (IMHO). It, in its current incarnation, would provide little help for new DRM or antipiracy schemes.
  • by SanityInAnarchy ( 655584 ) <ninja@slaphack.com> on Monday May 26, 2008 @02:07PM (#23546625) Journal

    No encryption scheme is 100%
    Wrong. Encryption can be very much uncrackable, given certain conditions, such as the assumption that no viable quantum computers exist yet.

    Oh, and the other (obvious) assumption that an attacker doesn't already have the key.

    The confusion arises from assuming encryption can be applied to copy protection. It can't. That fails the second test above -- the "attacker" is the end-user, and if they didn't have a working key in some form, they couldn't play the game. Because they have the key, they can copy the game, full stop.

    It might take awhile, but it's not the encryption that's flawed, it's the very concept of DRM. As the old saying goes, "Trying to make bits not copyable is like trying to make water not wet."

    The only real result of most of these schemes is to piss off the end-user to where we'll actually buy the game, and then download a crack. I'm argue that DRM causes at least as much piracy as it solves.
  • by flnca ( 1022891 ) on Monday May 26, 2008 @02:07PM (#23546631) Journal
    It has been around much longer. It started with the Trusted Computing Platform Alliance, which was founded somewhere between 2001 and 2002 (in the Wikipedia article [wikipedia.org], there's unfortunately not much information about its history. The organization is now called Trusted Computing Group [trustedcom...ggroup.org] (of course, with an SSL encrypted homepage! ;-) ).

    The FSF and EFF have been upset about this for a long time, and for a good reason. The initial design of Windows Vista would have included a "trusted kernel" which would've allowed only trusted applications and documents. Luckily, they could not enforce the original design.
  • Re:TPM != NGTCB (Score:3, Informative)

    by Anonymous Coward on Monday May 26, 2008 @02:38PM (#23546959)

    Horseshit. Apart from being mostly specious crap based on the idea that TPMs aren't abused YET... you are dodging the real issue. TPMs allow "remote attestation" - a software maker can ask your machine whether everything is in an approved state - are you running "cracked" software (does the digital signature of the code match), and if not... refuse to deal with you. Hence NB's comment about it not stopping music/video piracy... it's SOFTWARE that the TPM will control: your use of it, your ownership of it, and what you can know about how it works, what it is recording, what it is doing etc etc. This is why the technology companies have such hard-ons for it, and why they constantly lie and dodge when asked about their functions (it doesn't help that the basic problem with them is somewhat abstract as understanding it requires some CS knowledge).

    Many of the basic concepts of the TPM could be an asset, but they were designed for DRM from the start, they were born out of a long-term project to allow Microsoft etc to enforce their EULAs. They were designed from the basic principle that the owner of the machine is a thief who cannot be trusted and must therefore be policed.

    The short version is: you do not own a machine with a TPM. The software maker does.

  • by mapleneckblues ( 1145545 ) on Monday May 26, 2008 @02:42PM (#23547019)
    You guys still dont get it. The whole idea behind trusted computing is to prevent such duplication. The TPM checksums the hardware and every piece of code from the boot-loader up to the application. The other end uses these checksums to verify that only valid pieces of code are running at each level. This makes it very hard to actually circumvent it by duplicating or modifying any code or running any modified hardware which could steal the keys used to encrypt these checksums. The major problem with trusted computing is not the possibility of circumvention but attestation. For example each new OS patch will cause your OS checksum to be differ, and for remote attestation to work the entity validating your OS checksum should be aware of this new patch. How do we keep track of so many OS versions? or each new BIOS version? and so on and so forth. This means that Linux users with modified kernels will not be able to run their kernels if they are using an application which uses trusted computing. If you want to watch a movie, you have to watch it on a player which can be attested to. This prevents you from running it on a player which might record the movie while it is being streamed for example. The other problem as you mentioned is that these fritz chips need to be really fast. Is trusted computing evil? In many ways yes. It has immense potential to be exploited and kill customer choice. But it may do some good too if used right (for example to ensure that you are not running malicious hardware or infected software unknown to you). Given that basic premise behind trusted computing is to come up with a foolproof DRM mechanism, I would place my bets on it being abused to run a virtual dictatorship. That said, watch this: http://www.youtube.com/watch?v=XgFbqSYdNK4 [youtube.com]
  • by dave420 ( 699308 ) on Monday May 26, 2008 @02:58PM (#23547197)
    I don't want to call you a liar, but Windows activation (for both XP and Vista) requires a large change to hardware for the version of Windows to become de-activated. Maybe you changed a bunch of different stuff over the years, and adding more RAM was the straw that broke the camel's activation? You can read here [microsoft.com] about that (it's for XP but Vista is the same in this regard). Changing the RAM on its own is not enough - you have to change at least 6 components in your PC for it to freak out. Here's a snippet from the page linked above:

    Scenario A:

    PC One has the full assortment of hardware components listed in Table 1 above. User swaps the motherboard and CPU chip for an upgraded one, swaps the video adapter, adds a second hard drive for additional storage, doubles the amount of RAM, and swaps the CD ROM drive for a faster one.

    Result: Reactivation is NOT required.

    Scenario B:

    PC Two has the full assortment of hardware components listed in Table 1 except that it has no network adapter. User doubles the amount of RAM, swaps the video card and the SCSI controller.

    Result: Reactivation is NOT required.

    Dockable PCs are treated slightly more leniently. In a dockable PC, if a network adapter exists and is not changed, 9 or more of the other above values would have to change before reactivation was required. If no network adapter exists or the existing one is changed, 7 or more changes (including the network adapter) will result in a requirement to reactivate.

    Scenario C:

    Dockable PC Three has the full assortment of hardware components listed in Table 1 except that it has no network adapter. User doubles the amount of RAM, swaps to a bigger hard disk drive, and adds a network adapter.

    Result: Reactivation is NOT required.

  • by Tom ( 822 ) on Monday May 26, 2008 @03:08PM (#23547267) Homepage Journal
    One search at a torrent site would tell you that you're so wrong it's not even +4 funny, much less +4 interesting.
  • by Dogtanian ( 588974 ) on Monday May 26, 2008 @03:27PM (#23547441) Homepage
    Regarding the title "PR department at Atari is having a heart attack"; not really!

    Nolan Bushnell may have founded the *original* Atari, but he left in 1979 (having sold it to Warner Communications in 1976), and I see no indication that he has anything to do with the present-day company.

    Besides which, the modern "Atari" is effectively just a brand purchased and used by Infogrames which has no real relationship or business continuity with the original Atari (which split into Atari Corp. and Atari Games in 1984- both streams are now effectively defunct).

    The PR department at Atari probably couldn't give a toss! :)
  • by flibuste ( 523578 ) on Monday May 26, 2008 @03:46PM (#23547647)

    "and that will spell out a death sentence for Windows Users having a motherboard that do not support it."

    There, fixed it for ya.
  • by xaxa ( 988988 ) on Monday May 26, 2008 @03:53PM (#23547725)

    You may just as well ask that Joe Sixpack asks Anheuser Bush if he can backup his Bud, have the recipe so he can use better hops, and then sell the resulting product. He won't because he doesn't care.
    Joe Sixpack would be pissed off if his Bud couldn't be used except in official Bud glasses, or if it was illegal to sell/give it to his friends.
  • by whirred ( 182193 ) on Monday May 26, 2008 @03:56PM (#23547763)
    You can't steal it, but if you are able to make an exact replica of it while still leaving my car right where it is, please: be my guest!

    Make me one while you're at it and then I'll have spare parts. Thanks.
  • by zakezuke ( 229119 ) on Monday May 26, 2008 @04:37PM (#23548099)

    And where does the stealing come in? You have to pay for the PS3 in order to install Linux on it, and Linux doesn't run PS3 games. At what point does this become and issue of piracy?
    From a corp. perspective, they often under sell these products based under the assumption that they will make back money on media. I wouldn't call it stealing, piracy. or even illegal since the product is sold, not rented. In fact I would just call it modding.

  • by toddestan ( 632714 ) on Monday May 26, 2008 @05:35PM (#23548653)
    If you're running Windows XP, try going into Device Manager and expanding 'System Devices', and see if you see anything. On my Thinkpad, it's listed as 'Atmel TPM'. I think the same should apply for Vista.
  • by lgw ( 121541 ) on Monday May 26, 2008 @09:20PM (#23550391) Journal
    The TPMs are everywhere, but they do no harm by themselves: it's just a hardware encryption chip. If you have the keys you can created a region of protected storage that no process can access without the keys. While that's handy and all, and could be incredibly valuable in protecting a spare partition for use in removing rootkits from your real partition, it's no aid to DRM on any computer for which you have the keys.

    Now, if we're talking about consoles, the manufacturer can keep the keys and copying console games could be made much harder - much like Bluray etc, just an industry-standard scheme. But, for a general purpose PC, you have the keys and the TPM chip is there for your use.

    Of course, the Atari guy is being an idiot here for another reason: if you can play the game, you can copy the game. Just like you can copy anything you can see or hear, you can copy the stream of instructions and game data as it passes through the CPU, and re-create the game from it, using an in-circuit emulator (ICE). An ICE is quite expensive, but not to the point it would deter anyone professionally priating games on a large scale.
  • Re:Yes. (Score:1, Informative)

    by Anonymous Coward on Tuesday May 27, 2008 @02:34AM (#23552693)
    Crackers always buy the games. They also encourage others to do the same! You should read the .nfo files for things other than the cd keys =P
  • He's on the board (Score:3, Informative)

    by landtuna ( 18187 ) on Tuesday May 27, 2008 @11:40AM (#23556937)
    Nolan Bushnell is on the board of Wave Systems [wave.com], who makes these chips. (Or at least he used to be.)

    (I used to work at Wave myself.)

Top Ten Things Overheard At The ANSI C Draft Committee Meetings: (5) All right, who's the wiseguy who stuck this trigraph stuff in here?

Working...