Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×
Encryption Security Entertainment Games

Atari Founder Proclaims the End of Gaming Piracy 831

OMGZombies writes "Speaking on a conference held yesterday in New York, the Atari founder Nolan Bushnell said that a new stealth encryption chip called TPM will 'absolutely stop piracy of gameplay'. The chip is apparently being embedded on most of the new computer motherboards and is said to be 'uncrackable by people on the internet and by giving away passwords' though it won't stop movie or music piracy, since 'if you can watch it and you can hear it, you can copy it.'"
This discussion has been archived. No new comments can be posted.

Atari Founder Proclaims the End of Gaming Piracy

Comments Filter:
  • by ILuvRamen ( 1026668 ) on Monday May 26, 2008 @12:23PM (#23545385)
    I dunno, those "people on the internet" are pretty resourceful lol. I hear they're good at removing and replacing chips on motherboards, or at least on gaming consoles. I think he forgot about those people in their homes that don't want some stupid overlord chip overruling basic tasks on their computer. But at least he knows enough that music and videos can't be controlled no matter how hard the MPAA and RIAA try just because of the basic nature of them. Quite the smart/dumb mix.
  • by QX-Mat ( 460729 ) on Monday May 26, 2008 @12:25PM (#23545417)
    Exactly! People don't seem to want to learn nowadays.

    Defeating copying schemes has always been an educational past-time of mine. I learned to write my 8's almost perfectly when I copied out, number by number, the Quarantine chart mass/velocity chart because I couldn't photocopy the black text on dark brown glossy paper.

    I even improved my memory when I memorized both the X-Wing and Tie Fighter manual keywords... that was a lot of manuals for a 12 y/o - I actually think it helped. I wouldn't be where I am today if I wasn't capable of picking up a software manual :D

    So, TPM is a way for me to spice up on my logic probing eh?

    Matt
  • by Q-Hack! ( 37846 ) * on Monday May 26, 2008 @12:33PM (#23545523)
    The PS3's babysitting OS also doesn't let Linux on the PS3 use 3D acceleration

    Ya, that is the one thing I would like to see. With the rate of development for Linux on the PS3, I think we won't have to wait long.

     
  • by sammyF70 ( 1154563 ) on Monday May 26, 2008 @12:35PM (#23545543) Homepage Journal
    hmm ... let's see. It's embedded on the mainboard, and as I understand it, they use that to encrypt the game key or whatever.
    What happens if I have to change the mobo? Do I have to buy the game again? Do I have to re-register with a newly generated key? That would mean that there is some confirmation coming from some site, which, sorry Nolan, means someone from the intertubes will certainly be able to fake it.
  • by leuk_he ( 194174 ) on Monday May 26, 2008 @12:36PM (#23545555) Homepage Journal
    TPM allows Them to authenticate that the game runs only on one pc. That is, if you trust to run their software on your pc. The whole point is, who owns the TPM module, owns a lot. Who you are going to trust.

    It is like the trusted path for blueray content in vista, but then for software. You cannot run software unless it is in a signed environment.

    If in 10 years the OS consists of virtual machines, one of those machines will be a TPM box that is controlled by Big media/game makers, that will only allow their games in a secure(by their viewpoint) environment.

    That is, if you let them have it.

    If you see how much is invested (and lost) on DRM in pc computer games this might be sooner than you think.

  • Re:Famous last words (Score:2, Interesting)

    by Anonymous Coward on Monday May 26, 2008 @12:41PM (#23545611)
    Here's another fun one:

    Lets say I rip the "sounds" and "models" then simply write a knockoff engine to play the same content. People have gone though harder means to make offline clients for MMORPGS. This is why his words are total bollocks.
  • by tomtomtom777 ( 1148633 ) on Monday May 26, 2008 @12:45PM (#23545663) Homepage

    Games would include a downloaded component, ...

    If a game or program requires a downloaded component it is pretty easy to make it impossible to crack. If every sold product has a large unique key and that key is stored in a database on the server then you can check if a key isn't used from different locations or in parellel.

    For normal games, you wouldn't want to make an internet connection a requirement though.

  • Piracy of gameplay? (Score:4, Interesting)

    by tepples ( 727027 ) <tepplesNO@SPAMgmail.com> on Monday May 26, 2008 @12:46PM (#23545677) Homepage Journal

    From the article: "The TPM will, in fact, absolutely stop piracy of gameplay." I assume this TPM is a Trusted Platform Module [wikipedia.org]. For example, Windows Vista Ultimate's BitLocker feature uses the TPM. But don't you need at least Windows Vista to run games for Windows that require the TPM?

    Besides, is it even possible to pirate "gameplay" as such? The Tetris Company likes to assert a copyright on Tetris, but game rules can't be copyrighted [copyright.gov]. One leading case is Lotus v. Borland.

  • by Anonymous Coward on Monday May 26, 2008 @12:51PM (#23545761)
    "Stealth encryption chip" is a stupid way to describe what a TPM does. It hashes memory to provide assurance that running software is authentic (signed by a trusted certificate), and it grounds this assurance in hardware that would be extremely difficult to hack.

    Uses for TPM are mostly evil (DRM enforcement), but also good: They could make things a lot harder for the authors of worms, trojans, and virii.
  • by Etherwalk ( 681268 ) on Monday May 26, 2008 @12:55PM (#23545801)
    From a theoretical standpoint, that works assuming you can run through or predict the outcome of every possible input sequence anyone can give it. (Or at least, say, the most frequent 80-90% of possible inputs if you want bad copies.) Even a computer can't play-test a modern game to that degree of completion, though maybe a computer with a human to spend a lot of time patching conditional state changes into it could.

    To my knowledge, though, nobody has gotten a system together which is theoretically uncrackable. (Without having holes in the theory, anyway.) So we haven't gone down the "if you can watch it and you can hear it, you can copy it route." Well, not for games, anyway.
  • by Animats ( 122034 ) on Monday May 26, 2008 @01:03PM (#23545895) Homepage

    The game industry already has a copy-protect mechanism that works. It's called "game consoles".

  • by alta ( 1263 ) on Monday May 26, 2008 @01:04PM (#23545907) Homepage Journal
    He had the right idea. Not compainies that don't embed, but companies that let you turn it off in the BIOS. Those are the ones that will be flocked to.
  • New TPM chip? (Score:5, Interesting)

    by nurb432 ( 527695 ) on Monday May 26, 2008 @01:09PM (#23545969) Homepage Journal
    Umm its not new, its been in Thinkpads for years at the least.

    If it does stop piracy 100% ( which i doubt ) then it will cripple the industry as he's got no clue how much piracy HELPS the market, just like it does the music market and regular software market.

    + my system wont ever have a TPM, so does that mean they are selling defective products ?
  • TPM is Optional (Score:2, Interesting)

    by MBHkewl ( 807459 ) on Monday May 26, 2008 @01:14PM (#23546053)
    You can disable TPM by unticking its option from Linux kernel configuration (mine was enabled by default).

    And TPM has been around for a while. Nothing new here.
  • Comment removed (Score:5, Interesting)

    by account_deleted ( 4530225 ) on Monday May 26, 2008 @01:23PM (#23546155)
    Comment removed based on user account deletion
  • by C0vardeAn0nim0 ( 232451 ) on Monday May 26, 2008 @01:24PM (#23546169) Journal
    i was going to post about this. in late 80's early 90's magazines were chock full of ads for paralel port dongles, while here in brasil (a piracy heaven to these days) we were using all kinds of software that were supposed to have dongles, absolutelly free.

    using hardware to lock software is like trying to hold pudding with string. it doesn't work.

    proof of this is the fact that i had for some months MacOS X running in standard home-build PC. apple does everything they can to limit MacOS to their hardware, just to have people cracking the stuff.

    so, here's my tip for game companies, either limit yourselves to erite games for consoles, or lower the price of original games. nothing's better than lower prices to curb piracy.
  • by j-turkey ( 187775 ) on Monday May 26, 2008 @01:28PM (#23546221) Homepage

    Exactly! People don't seem to want to learn nowadays. Defeating copying schemes has always been an educational past-time of mine. I learned to write my 8's almost perfectly when I copied out, number by number, the Quarantine chart mass/velocity chart because I couldn't photocopy the black text on dark brown glossy paper. I even improved my memory when I memorized both the X-Wing and Tie Fighter manual keywords... that was a lot of manuals for a 12 y/o - I actually think it helped. I wouldn't be where I am today if I wasn't capable of picking up a software manual :D So, TPM is a way for me to spice up on my logic probing eh? Matt

    One particularly annoying part is that the paying customers must foot the bill for the copy protection. This applies to both motherboard components and licensing the protection scheme itself. Software developers/publishers won't just eat these costs out of the kindness of their hearts. It's usually a triple-hit for the consumer, who not only have to cover hardware and licensing costs, but generally have to endure the burden of intrusive copy-protection schemes. Whether it's entering a long and complex serial key, fumbling for a game disk that's not needed for anything more than verifying authenticity, or some other method -- it all tends to put an undue burden on a customer who has already paid for a product.

    In my opinion, this actually encourages some people (who would otherwise pay for a product) to violate the terms of the EULA in one way or another. No matter the copy protection scheme, most cracks allow a user with average technical knowledge are able to easily circumvent a scheme.

    Perhaps I'm missing something - but it sure would be nice to abandon these copy protection schemes. I seriously doubt that the practice prevents anything but the most cavalier copying/sharing - and I doubt that this copying is what developers/publishers are targeting.

  • Re:Play it (Score:3, Interesting)

    by bennomatic ( 691188 ) on Monday May 26, 2008 @01:28PM (#23546223) Homepage
    Maybe the parent poster should have said, instead, "If you can play it, you can hack it." Once it's hacked, it can be copied and distributed. There's certainly no analog hole, but there's no reason to think that someone won't figure out a way to dump the encrypted content, excise the TPM-accessing code and leave the actual game for copying.

    When I was just a lad, Electronic Arts had a copy protection scheme so byzantine that it would not allow me to run games I had actually purchased on my MSD Super Drive [wikipedia.org], which was hooked up to my C64. I had purchased One-on-One (Dr J vs. Larry Bird), and it didn't work, and the store wouldn't take it back. So I took it to a friend who had a friend who had successfully cracked several EA games. A week later, I had a cracked copy back that worked wonderfully, and I'm sure many other people did, too.
  • by jimicus ( 737525 ) on Monday May 26, 2008 @01:29PM (#23546229)

    Four months? I find your lack of faith disturbing! What was CSS broke in, three hours with three lines of recursive code?
    CSS was broken mainly because it was fundamentally lousy encryption to begin with - and it was probably lousy because the developers didn't want to fall foul of what (at the time) was an absolutely draconian US policy regarding the export of decryption.

    That policy no longer exists.

    The "why bother, it will be broken" argument appears to be based upon the premise that the developers want to build 100% guaranteed uncrackable-under-any-circumstances protection which they can safely sell in millions to every man and his dog without fear of it being cracked. I would argue that they know full well that this is nigh-on impossible - all they're aiming for is "good enough to keep 99% of customers under the thumb".
  • by spotter ( 5662 ) on Monday May 26, 2008 @01:29PM (#23546231)
    you don't get it.

    tpm works the same way SSL works.

    namely there's a PKI.

    i.e. each chip has its own key which the user cant get to, which is verified by a certificate chain (ala SSL).

    if the software can't verify the chain, it will refuse.

    so attacking the TPM chip isn't how you attack it.

    you attack is by simply getting the software to verify with a trojaned certificate. We can do that today w/ web browsers by inserting our own "top level" certificate. You think it be difficult w/ games?
  • by Anonymous Coward on Monday May 26, 2008 @01:46PM (#23546421)
    Uh, there is another option:

    (4) Decrypt and then remove the TPM checking code from the game.

    In other words, run it legally on a TPM-equipped machine and then crack the hell out of it and create a new unencrypted executable minus the DRM shit.
  • by Anonymous Coward on Monday May 26, 2008 @01:50PM (#23546473)
    Spot on. Trusted Computing has never been aimed at DRM. There are some academic papers floating around about using it for this, but they tend to be aimed at a more military context, e.g. enforcing confidentiality of top-secret documents.

    TPMs have some great uses, but mainly for internal corporate networks and computer grids. Check out Trusted Network Connect and IF-MAP for more details. There are often a spectacular number of assumptions necessary to make any serious use of a TPM, and as such solutions on the internet that use them simply wont work*.

    For one, they aren't resistant to non-trivial hardware attacks. There have been some great vulnerabilities discovered in various chips. The whole aim of this initiative is to prevent malware from making your software behave badly, not a determined attacker.

    Cheers,

    John

    *Or wont work any better than a solution that doesn't use them.
  • by DrYak ( 748999 ) on Monday May 26, 2008 @01:59PM (#23546555) Homepage

    Actually, these two have already been disproved as far as Atari is concerned. They've already used some heavy-handed DRM schemes in the past, and got away with it - all Neverwinter Nights (the original one) premium modules, of which Atari was the publisher, required authorization over the Net every time you started a new game or loaded a saved game. There was an outcry among the community for the first two releases where it was introduced, of course,
    At which point in time, the whole thing reached that entry in the original poster's list :

    (X) It will stop video game piracy for two weeks and then we'll be stuck with it
    The initial outcry was from inconvenienced users.
    There wasn't any outcry afterwards, because the users weren't inconvenienced any more, thanks to what was available on GameCopyWorld.

    Disclaimer: I, too, tend to download fixed exe for every game I've legally bought, just to avoid being inconvenienced by the protection scheme (NO, I will *NOT* install StarForce on my system !)
  • by irc.goatse.cx troll ( 593289 ) on Monday May 26, 2008 @01:59PM (#23546565) Journal

    you attack is by simply getting the software to verify with a trojaned certificate.


    Or give it a legit TPM chip and just capture the output of whatever it is verifying. I'm guessing its the equiv of a cdkey check that returns some kind of hash needed to play.

    Theres no way any large number of actual operations go through this chip as it would kill performance, which is the bread and butter of selling new pc games. All you need to do is replace, skip, or duplicate the pieces of code that depend on this chip.
  • by hedwards ( 940851 ) on Monday May 26, 2008 @02:12PM (#23546667)
    And where does the stealing come in? You have to pay for the PS3 in order to install Linux on it, and Linux doesn't run PS3 games. At what point does this become and issue of piracy?

    It's really this kind of ignorant, the corporate masters must be right bull, which allows them to get away with it. The reason why the PS3 has that sort of restriction is so that you don't run OSS or Linux compatible games on it instead of the games that Sony wants you to buy.
  • Re:I wonder.. (Score:4, Interesting)

    by SanityInAnarchy ( 655584 ) <ninja@slaphack.com> on Monday May 26, 2008 @02:15PM (#23546691) Journal

    Adding an encryption chip may prevent the piracy from those who can afford it, but like something for nothing.
    No it won't. Those people will go to The Pirate Bay or GameCopyWorld and download a crack and/or the full game. DRM does not work, and cannot work.

    I think that neatly addresses your other point:

    They are under no obligation to provide cheaper games if they're maximizing their profits by selling them at a higher price.
    I don't think they're maximizing their profits. By selling them at a higher price, and including DRM, the most common scenario is one where it's not only cheaper and more convenient to pirate -- just type "Game I want" into The Pirate Bay and click Download -- but you actually get a better product, because the draconian DRM measures are already removed.

    There are certain DRM schemes I will tolerate, but most of them, even if I buy the game legitimately, I will go straight to the Internet for a crack.

    So, piss off the more technically savvy customers, and still lose at least as many customers to piracy as before. Sounds like a no-brainer lose situation for the developers.
  • by drhank1980 ( 1225872 ) on Monday May 26, 2008 @02:26PM (#23546823)

    No encryption scheme is 100%; some are just better than others. When will people learn!
    This is completely true and I fail to see the benefit of doing this kind of stuff in hardware, I happen to work for one of the many semiconductor companies actively losing money trying to sell this TPM crap. Our largest volume TPM chip is on its tenth design rev because it keeps getting cracked. Every time this happens we get to eat our stack of old rev chips and scrap the wafers inline past the mask that needs to be fixed. On top of the risk of getting hacked the gross margins are crap to begin with, so I can only hope we will exit this business soon.
  • by Z80xxc! ( 1111479 ) on Monday May 26, 2008 @02:53PM (#23547143)
    I'm not 100% sure what you're talking about, but I would assume that the "The stupid code built into DELL motherboards" you are referring to is the string in the BIOS that identifies it as a Dell motherboard so that Windows OEMBIOS activation works. Ironically, it is that specific technology that makes it unnecessary to activate Windows on a Dell machine as long as you keep a copy of the OEMBIOS activation files, since regardless of how you change the hardware, it will always activate without even having to contact microsoft because it detects that BIOS string. Not only that, but since it just id's itself as Dell, you can use ANY dell OEM disk on ANY dell computer and it'll activate - meaning that an XP Pro disk will work on a Vista Home-licensed machine with no trouble.
  • Re:Famous last words (Score:3, Interesting)

    by OeLeWaPpErKe ( 412765 ) on Monday May 26, 2008 @03:35PM (#23547497) Homepage
    -TPM in and of itself won't protect against piracy at all if the implementation is botched.

    True, but they're "tamper proof". It will take a hell of a lot more hardware to crack them. Start with an electron microscope, and you're not done with just that one little part ...

    Furthermore, due to the mandatory CRL's, there will not be any widely published hacks.

    -Tying purchased software or media to a specific hardware device p*sses people off when they repair, replace or upgrade and their DRMed stuff no longer works.

    The TPM allows just not doing that (of course whether people use it like that is another question) : you can prove, to another TPM or to the publisher, that you deleted something beyond retrieval.

    Therefore the TPM could easily be made to allow the "first sale doctrine" to go digital in a non-stupid way.

    -Talk about opening up Asian markets, etc, is proceeding under the flawed assumption that those who acquire illegal copies of a game would even purchase a legit copy.

    Then they can do without. Just wondering : do you feel bad that thieves are denied the use of your car ? No ?

    You're laboring under the assumption that those thieves would even buy a car if they were prevented from stealing yours !

    So you'll leave them in the ignition from now on ? No ? Isn't it hypocritical to force others to let their stuff be stolen and not do the same yourself ?

    -Restricting your potential install base in this manner will reduce exposure, popularity, and ultimately sales of your game despite the opposite being your goal.

    Actually the goal is to maximize PAYING CUSTOMERS. Not "exposure". Exposure doesn't pay. Exposure is what Al Gore is after. What Obama is after (in the case of a Chicago politician, perhaps exposure does indeed pay, just look at the govt. job his wife has "somehow" gotten). What Bush is after. For all us non-politicians, we're in it for the money (well, for a living at least).
  • by mpeg4codec ( 581587 ) on Monday May 26, 2008 @04:47PM (#23548207) Homepage
    Sometimes you don't even need to find something as complicated as a buffer overflow. Look at the recent Wii homebrew explosion: the backdoor was exactly as you describe, a flaw in the implementation of RSA. However, the flaw was as trivial as using strcmp instead of memcmp, rendering it equivalent to about 8 bits of security. Homebrew devlopers used this knowledge to trivially break the encryption, allowing them to run code that wasn't signed by Nintendo.

    People make mistakes. Programmers are people. And furthermore, this isn't just some theoretical thing. It happened recently to Nintendo, a game company that likely has more money to throw at such problems than most.
  • by whirred ( 182193 ) on Monday May 26, 2008 @04:47PM (#23548209)

    And if you spend years making a car on the promise that you'll sell a hundred of them. And then sell one to a person who makes exact copies of it... well you probably wont make any more cars, will you?
    Yes, at that point, technology will have reached a point where that business model has become outdated... this is basically what happened with video games, music, and movies. So these monolithic corporations need to adapt, change, or abandon their business models.
  • by Anonymous Coward on Monday May 26, 2008 @05:25PM (#23548579)
    Sorry, you are wrong. The Wii's protection has repeatedly been disabled by a trivial mod to the DVD drive. This simple hack is what has made the Wii a huge seller. Any kid competent with a soldering iron can chip it. Eventually Nintendo made it a little hard to do, but again, you're only adding more wired to the DVD driver controller. I.E. you're only dealing with PS1 level protecting, viz, none!

    The xbox360 is also hacked, more complex but pirate scene is pretty big.

    The PS3 is locked down at boot at firmware level. It's a complete bastard with signed keys. It remains unbroken over 18 months after launch. I'm surprised people cannot even do much more than "hello world", and that's on a dev console that's far more open than retail units. Don't expect hackers to beat it for quite some time, if at all.

    If you want a usable Linux on the PS3, hassle Sony to have NVidia release their driver for it. It's only PPC, it exists, but it's locked away. Maybe it allows a hook into the RSX that Sony don't want published. Installing Linux on the PS3 without a proper driver is pointless. It's shit as a server thanks to its laptop drive, shit as a desktop due to framebuffer only video. The only saving grace is the three people on the planet that want to play with limited cell processors can buy commodity gear and do so.
  • by arkhan_jg ( 618674 ) on Monday May 26, 2008 @06:26PM (#23549119)
    Swapping motherboard requires a reactivation without fail on windows xp, with the one exception where it has an absolutely identical chipset. The automated activation then of course fails for OEM licenced PCs. Having repaired hundreds of windows PCs, I've encounted reactivation constantly from pretty trivial hardware changes.

    I therefore assume the rest of that microsoft article is a similar load of bullshit. That said, no, changing RAM alone will not usually trigger a reactivation.
  • by KKlaus ( 1012919 ) on Monday May 26, 2008 @06:42PM (#23549235)
    I don't think consumers eat the costs of these schemes. I'm an economics student, and it seems that the costs of DRM implementation function much like a tax; i.e. they add a single additional cost to the price of the good the consumer is buying. That means that Tax Incidence [wikipedia.org] comes into play. Long story short, for those that don't want to read the Wikipedia article, tax incidence is the idea that the tax is really distributed to those that respond the least to changes in the price of whatever good we're talking about. The underlying economics is more complicated, having to do with elasticities of supply and demand, but that's the bottom line.

    Tax incidence is the reason every economist in the world came out against the Gas Tax Holiday; the elasticity of Gas supply is inelastic, so the Oil Companies were already eating the cost of the gas tax and removing it would only profit them.

    But in the case of the TPM chips, if you really wanted to see who pays the cost for their implementation, you'd need to know how both producers and consumers of the boards they're on respond to the price hike they force. As long as some boards are available that don't have TPM and are thus cheaper, the manufacturers have to eat the costs of the DRM or else they wouldn't be able to sell any boards (few people pay more for nothing). So I wouldn't be surprised to see a fair amount of backroom dealing in the convincing of manufacturers to include the TPM chip, because not only does it do nothing for them, I suspect it actually hurts their bottom line.
  • by AmiMoJo ( 196126 ) on Monday May 26, 2008 @06:59PM (#23549389) Homepage Journal

    (4) Decrypt and then remove the TPM checking code from the game.


    That's exactly what people did when removing the StarForce DRM from games.

    TPM only does validation of certain code. Ultimately an unencrypted copy of the game will end up in memory. Even if the OS is locked down, you can hit the reset button, load Linux and dump the contents of RAM.
  • by Technician ( 215283 ) on Monday May 26, 2008 @08:33PM (#23550021)
    All of you guys have COMPLETELY missed his point.

    I agree. The biggest point mostly missed is the one on if piracy were eliminated, then everyone would need to buy their own copy...... BZZZT...

    That is the assumption. The reality is if piracy is eliminated, then there would be fewer titles in circulation and the support buzz and community would erode. Do you really think Microsoft would have had a chance at all if they had eliminated piracy from day one? They would be in great company of Lotus 123, Framework, and other market leaders that got replaced.

He has not acquired a fortune; the fortune has acquired him. -- Bion

Working...