×
DRM

Developer Hacks Denuvo DRM After Six Months of Detective Work and 2,000 Hooks (tomshardware.com) 37

After six months of work, DRM developer Maurice Heumann successfully cracked Hogwarts Legacy's Denuvo DRM protection system to learn more about the technology. According to Tom's Hardware, he's "left plenty of the details of his work vague so as not to promote illegal cracking." From the report: Heumann reveals in his blog post that Denuvo utilizes several different methods to ensure that Hogwarts Legacy is being run under appropriate (legal) conditions. First, the DRM creates a "fingerprint" of the game owner's system, and a Steam Ticket is used to prove game ownership. The Steam ticket is sent to the Steam servers to ensure the game was legitimately purchased. Heumann notes that he doesn't technically know what the Steam servers are doing but says this assumption should be accurate enough to understand how Denuvo works.

Once the Steam ticket is verified, a Denuovo Token is generated that only works on a PC with the exact fingerprint. This token is used to decrypt certain values when the game is running, enabling the system to run the game. In addition, the game will use the fingerprint to periodically verify security while the game is running, making Denuvo super difficult to hack.

After six months, Heumann was able to figure out how to hijack Hogwart Legacy's Denuvo fingerprint and use it to run the game on another machine. He used the Qiling reverse engineering framework to identify most of the fingerprint triggers, which took him two months. There was a third trigger that he says he only discovered by accident. By the end, he was able to hack most of the Denuvo DRM with ~2,000 of his own patches and hooks, and get the game running on his laptop using the token generated from his desktop PC.
Heumann ran a bunch of tests to determine if performance was impacted, but he wasn't able to get a definitive answer. "He discovered that the amount of Denuvo code executed in-game is quite infrequent, with calls occurring once every few seconds, or during level loads," reports Tom's Hardware. "This suggests that Denuvo is not killing performance, contrary to popular belief."
Apple

Apple Vision Pro Review Roundup 80

Apple has lifted the embargo on the first wave of non-curated reviews of its Vision Pro headset, and the results are somewhat surprising. The initial "high" experienced upon first impressions, where reviewers laud the headset's "incredibly impressive displays" and "near perfect" tracking capabilities, has waned. In real-world conditions outside of Apple's heavily-regulated demos, the Vision Pro appears to suffer from limited productivity usecases, DRM'd apps, and half-baked features that suggest this device is still very much in the dev-kit stage. Above all, however, is the isolation experienced when using the Vision Pro. It offers very few options for wearers to socialize and share memories with one another in any meaningful way. Tim Cook may be right when he said headsets are inherently isolating.

"You're in there, having experiences all by yourself that no one else can take part it," concludes Nilay Patel in his review for The Verge. "I don't want to get work done in the Vision Pro. I get my work done with other people, and I'd rather be out here with them."

These are some of our favorite reviews of the Apple Vision Pro:

- The Verge: Apple Vision Pro review: magic, until it's not
- The Wall Street Journal: Apple Vision Pro Review: The Best Headset Yet Is Just a Glimpse of the Future
- Washington Post: Apple's Vision Pro is nearly here. But what can you do with it?
- Tom's Guide: Apple Vision Pro review: A revolution in progress
- CNET: Apple Vision Pro Review: A Mind-Blowing Look at an Unfinished Future
- CNBC: Apple Vision Pro review: This is the future of computing and entertainment
AI

Ask Slashdot: Could a Form of Watermarking Prevent AI Deep Faking? (msn.com) 67

An opinion piece in the Los Angeles Times imagines a world after "the largest coordinated deepfake attack in history... a steady flow of new deepfakes, mostly manufactured in Russia, North Korea, China and Iran." The breakthrough actually came in early 2026 from a working group of digital journalists from U.S. and international news organizations. Their goal was to find a way to keep deepfakes out of news reports... Journalism organizations formed the FAC Alliance — "Fact Authenticated Content" — based on a simple insight: There was already far too much AI fakery loose in the world to try to enforce a watermarking system for dis- and misinformation. And even the strictest labeling rules would simply be ignored by bad actors. But it would be possible to watermark pieces of content that deepfakes.

And so was born the voluntary FACStamp on May 1, 2026...

The newest phones, tablets, cameras, recorders and desktop computers all include software that automatically inserts the FACStamp code into every piece of visual or audio content as it's captured, before any AI modification can be applied. This proves that the image, sound or video was not generated by AI. You can also download the FAC app, which does the same for older equipment... [T]o retain the FACStamp, your computer must be connected to the non-profit FAC Verification Center. The center's computers detect if the editing is minor — such as cropping or even cosmetic face-tuning — and the stamp remains. Any larger manipulation, from swapping faces to faking backgrounds, and the FACStamp vanishes.

It turned out that plenty of people could use the FACStamp. Internet retailers embraced FACStamps for videos and images of their products. Individuals soon followed, using FACStamps to sell goods online — when potential buyers are judging a used pickup truck or secondhand sofa, it's reassuring to know that the image wasn't spun out or scrubbed up by AI.

The article envisions the world of 2028, with the authentication stamp appearing on everything from social media posts to dating app profiles: Even the AI industry supports the use of FACStamps. During training runs on the internet, if an AI program absorbs excessive amounts of AI-generated rather than authentic data, it may undergo "model collapse" and become wildly inaccurate. So the FACStamp helps AI companies train their models solely on reality. A bipartisan group of senators and House members plans to introduce the Right to Reality Act when the next Congress opens in January 2029. It will mandate the use of FACStamps in multiple sectors, including local government, shopping sites and investment and real estate offerings. Counterfeiting a FACStamp would become a criminal offense. Polling indicates widespread public support for the act, and the FAC Alliance has already begun a branding campaign.
But all this leaves Slashdot reader Bruce66423 with a question. "Is it really technically possible to achieve such a clear distinction, or would, in practice, AI be able to replicate the necessary authentication?"
Christmas Cheer

FSF Shares Holiday Fairy Tale Warning 'Don't Let Your Tools Control You' (fsf.org) 25

"Share this holiday fairy tale with your loved ones," urges the Free Software Foundation.

A company offers you a tool to make your life easier, but, when you use it, you find out that the tool forces you to use it only in the way the tool's manufacturer approves. Does this story ring a bell? It's what millions of software users worldwide experience again and again, day after day. It's also the story of Wendell the Elf and the ShoeTool.
They suggest enjoying the video "to remind yourself why you shouldn't let your tools tell you how to use them." First released in 2019, it's available on the free/open-source video site PeerTube, a decentralized (and ActivityPub-federated) platform powered by WebTorrent.

They've also created a shortened URL for sharing on social media (recommending the hashtag #shoetool ). "And, of course, you can adapt the video to your liking after downloading the source files." Or, you can share the holiday fairy tale with your loved ones so that they can learn not to let their tools control them.

If we use free software, we don't need anyone's permission to, for example, modify our tools ourselves or install modifications shared by others. We don't need permission to ask someone else to tailor our tools to serve our wishes, exercise our creativity. The Free Software Foundation believes that everyone deserves full control over their computers and phones, and we hope this video helps you explain the importance of free software to your friends and family.

"Don't let your tools tell you how to use them," the video ends. "Join the Free Software Foundation!"
DRM

'Copyright Troll' Porn Company 'Makes Millions By Shaming Porn Consumers' (yahoo.com) 100

In 1999 Los Angeles Times reporter Michael Hiltzik co-authored a Pulitzer Prize-winning story. Now a business columnist for the Times, he writes that a Southern California maker of pornographic films named Strike 3 Holdings is also "a copyright troll," according to U.S. Judge Royce C. Lamberth: Lamberth cwrote in 2018, "Armed with hundreds of cut-and-pasted complaints and boilerplate discovery motions, Strike 3 floods this courthouse (and others around the country) with lawsuits smacking of extortion. It treats this Court not as a citadel of justice, but as an ATM." He likened its litigation strategy to a "high-tech shakedown." Lamberth was not speaking off the cuff. Since September 2017, Strike 3 has filed more than 12,440 lawsuits in federal courts alleging that defendants infringed its copyrights by downloading its movies via BitTorrent, an online service on which unauthorized content can be accessed by almost anyone with a computer and internet connection.

That includes 3,311 cases the firm filed this year, more than 550 in federal courts in California. On some days, scores of filings reach federal courthouses — on Nov. 17, to select a date at random, the firm filed 60 lawsuits nationwide... Typically, they are settled for what lawyers say are cash payments in the four or five figures or are dismissed outright...

It's impossible to pinpoint the profits that can be made from this courthouse strategy. J. Curtis Edmondson, a Portland, Oregon, lawyer who is among the few who pushed back against a Strike 3 case and won, estimates that Strike 3 "pulls in about $15 million to $20 million a year from its lawsuits." That would make the cases "way more profitable than selling their product...." If only one-third of its more than 12,000 lawsuits produced settlements averaging as little as $5,000 each, the yield would come to $20 million... The volume of Strike 3 cases has increased every year — from 1,932 in 2021 to 2,879 last year and 3,311 this year.

What's really needed is a change in copyright law to bring the statutory damages down to a level that truly reflects the value of a film lost because of unauthorized downloading — not $750 or $150,000 but perhaps a few hundred dollars.

Anone of the lawsuits go to trial. Instead ISPs get a subpoena demanding the real-world address and name behind IP addresses "ostensibly used to download content from BitTorrent..." according to the article. Strike 3 will then "proceed by sending a letter implicitly threatening the subscriber with public exposure as a pornography viewer and explicitly with the statutory penalties for infringement written into federal copyright law — up to $150,000 for each example of willful infringement and from $750 to $30,0000 otherwise."

A federal judge in Connecticut wrote last year that "Given the nature of the films at issue, defendants may feel coerced to settle these suits merely to prevent public disclosure of their identifying information, even if they believe they have been misidentified."

Thanks to Slashdot reader Beerismydad for sharing the article.
AI

Science Fiction and Fantasy Writers Take Aim At AI Freeloading (torrentfreak.com) 73

An anonymous reader quotes a report from TorrentFreak: Members of the Science Fiction and Fantasy Writers Association have no trouble envisioning an AI-centered future, but developments over the past year are reason for concern. The association takes offense when AI models exploit the generosity of science fiction writers, who share their work without DRM and free of charge. [...] Over the past few months, we have seen a variety of copyright lawsuits, many of which were filed by writers. These cases target ChatGPT's OpenAI but other platforms are targeted as well. A key allegation in these complaints is that the AI was trained using pirated books. For example, several authors have just filed an amended complaint against Meta, alleging that the company continued to train its AI on pirated books despite concerns from its own legal team. This clash between AI and copyright piqued the interest of the U.S. Copyright Office which launched an inquiry asking the public for input. With more than 10,000 responses, it is clear that the topic is close to the hearts of many people. It's impossible to summarize all opinions without AI assistance, but one submission stood out to us in particular; it encourages the free sharing of books while recommending that AI tools shouldn't be allowed to exploit this generosity for free.

The submission was filed by the Science Fiction and Fantasy Writers Association (SFWA), which represents over 2,500 published writers. The association is particularly concerned with the suggestion that its members' works can be used for AI training under a fair use exception. SFWA sides with many other rightsholders, concluding that pirated books shouldn't be used for AI training, adding that the same applies to books that are freely shared by many Science Fiction and Fantasy writers. [...] Many of the authors strongly believe that freely sharing stories is a good thing that enriches mankind, but that doesn't automatically mean that AI has the same privilege if the output is destined for commercial activities. The SFWA stresses that it doesn't take offense when AI tools use the works of its members for non-commercial purposes, such as research and scholarship. However, turning the data into a commercial tool goes too far.

AI freeloading will lead to unfair competition and cause harm to licensing markets, the writers warn. The developers of the AI tools have attempted to tone down these concerns but the SFWA is not convinced. [...] The writers want to protect their rights but they don't believe in the extremely restrictive position of some other copyright holders. They don't subscribe to the idea that people will no longer buy books because they can get the same information from an AI tool, for example. However, authors deserve some form of compensation. SFWA argues that all stakeholders should ultimately get together to come up with a plan that works for everyone. This means fair compensation and protection for authors, without making it financially unviable for AI to flourish.
"Questions of 'how' and 'when' and 'how much money' all come later; first and foremost the author must have the right to say how their work is used," their submission reads.

"So long as authors retain the right to say 'no' we believe that equitable solutions to the thorny problems of licensing, scale, and market harm can be found. But that right remains the cornerstone, and we insist upon it," SFWA concludes.
DRM

Polish Hackers Repaired Trains the Manufacturer Artificially Bricked. Now The Train Company Is Threatening Them (404media.co) 221

Hackers unbricked a train in Poland that had been deliberately disabled by its manufacturer. Now the manufacturer is threatening legal action against the hackers despite evidence it sabotaged the trains. From a report: The manufacturer is also now demanding that the repaired trains immediately be removed from service because they have been "hacked," and thus might now be unsafe, a claim they also cannot substantiate.

The situation is a heavy machinery example of something that happens across most categories of electronics, from phones, laptops, health devices, and wearables to tractors and, apparently, trains. In this case, NEWAG, the manufacturer of the Impuls family of trains, put code in the train's control systems that prevented them from running if a GPS tracker detected that it spent a certain number of days in an independent repair company's maintenance center, and also prevented it from running if certain components had been replaced without a manufacturer-approved serial number.

This anti-repair mechanism is called "parts pairing," and is a common frustration for farmers who want to repair their John Deere tractors without authorization from the company. It's also used by Apple to prevent independent repair of iPhones.

PlayStation (Games)

PlayStation To Delete A Ton Of TV Shows Users Already Paid For (kotaku.com) 123

Sony is about to delete tons of Discovery shows from PlayStation users' libraries even if they already "purchased" them. Why? Because most users don't actually own the digital content they buy thanks to the mess of online DRM and license agreements. Some of the soon-to-be-deleted TV shows include Mythbusters and Naked and Afraid. Kotaku reports: The latest pothole in the road to an all-digital future was discovered via a warning Sony recently sent out to PlayStation users who purchased TV shows made by Discovery, the reality TV network that recently merged with Warner Bros. in one of the most brutal and idiotic corporate maneuvers of our time. "Due to our content licensing arrangements with content providers, you will no longer be able to watch any of your previously purchased Discovery content and the content will be removed from your video library," read a copy of the email that was shared with Kotaku.

It linked to a page on the PlayStation website listing all of the shows impacted. As you might imagine, given Discovery's penchant for pumping out seasons of relatively cheap to produce but popular reality TV and documentary-based shows, there are a lot of them. They include, but are not limited to, hits such as: Say Yes to the Dress, Shark Week, Cake Boss, Long Island Medium, Deadly Women, and many, many more. [...] Now, essentially anything you buy on PSN, whether a PS5 blockbuster or, uh, Police Women of Cincinnati, is essentially just on indefinite loan until such time as the PlayStation servers die or the original copyright owner decides to pull the content.

Chrome

Chrome Not Proceeding With Web Integrity API Deemed By Many To Be DRM (9to5google.com) 24

An anonymous reader shares a report: Back in July, Google's work on a Web Integrity API emerged and many equated it to DRM. While prototyped, it was only at the proposal stage and the company announced today it's not going ahead with it. With this proposal, Google wanted to give websites a way to confirm the authenticity of the user and their device/browser.

The Web Integrity API would let websites "request a token that attests key facts about the environment their client code is running in." It's not all too different from the Play Integrity API (SafetyNet) on Android that Google Wallet and other banking apps use to make sure a device hasn't been tampered with (rooted).

Open Source

OpenBSD 7.4 Released (phoronix.com) 8

Long-time Slashdot reader Noryungi writes: OpenBSD 7.4 has been officially released. The 55th release of this BSD operating system, known for being security oriented, brings a lot of new things, including dynamic tracer, pfsync improvements, loads of security goodies and virtualization improvements. Grab your copy today! As mentioned by Phoronix's Michael Larabel, some of the key highlights include:

- Dynamic Tracer (DT) and Utrace support on AMD64 and i386 OpenBSD
- Power savings for those running OpenBSD 7.4 on Apple Silicon M1/M2 CPUs by allowing deep idle states when available for the idle loop and suspend
- Support for the PCIe controller found on Apple M2 Pro/Max SoCs
- Allow updating AMD CPU Microcode updating when a newer patch is available
- A workaround for the AMD Zenbleed CPU bug
- Various SMP improvements
- Updating the Direct Rendering Manager (DRM) graphics driver support against the upstream Linux 6.1.55 state
- New drivers for supporting various Qualcomm SoC features
- Support for soft RAID disks was improved for the OpenBSD installer
- Enabling of Indirect Branch Tracking (IBT) on x86_64 and Branch Target Identifier (BTI) on ARM64 for capable processors

You can download and view all the new changes via OpenBSD.org.
DRM

Cory Doctorow: Apple Sabotages Right-to-Repair Using 'Parts-Pairing' and the DMCA (pluralistic.net) 112

From science fiction author/blogger/technology activist Cory Doctorow: Right to repair has no cannier, more dedicated adversary than Apple, a company whose most innovative work is dreaming up new ways to sneakily sabotage electronics repair while claiming to be a caring environmental steward, a lie that covers up the mountains of e-waste that Apple dooms our descendants to wade through... Tim Cook laid it out for his investors: when people can repair their devices, they don't buy new ones. When people don't buy new devices, Apple doesn't sell them new devices. It's that's simple...
Specifically Doctorow is criticizing the way Apple equips parts with a tiny system-on-a-chip just to track serial numbers solely "to prevent independent repair technicians from fixing your gadget." For Apple, the true anti-repair innovation comes from the most pernicious US tech law: Section 1201 of the Digital Millennium Copyright Act (DMCA). DMCA 1201 is an "anti-circumvention" law. It bans the distribution of any tool that bypasses "an effective means of access control." That's all very abstract, but here's what it means: if a manufacturer sticks some Digital Rights Management (DRM) in its device, then anything you want to do that involves removing that DRM is now illegal — even if the thing itself is perfectly legal...

When California's right to repair bill was introduced, it was clear that it was gonna pass. Rather than get run over by that train, Apple got on board, supporting the legislation, which passed unanimously. But Apple got the last laugh. Because while California's bill contains many useful clauses for the independent repair shops that keep your gadgets out of a landfill, it's a state law, and DMCA 1201 is federal. A state law can't simply legalize the conduct federal law prohibits. California's right to repair bill is a banger, but it has a weak spot: parts-pairing, the scourge of repair techs...

Parts-pairing is bullshit, and Apple are scum for using it, but they're hardly unique. Parts-pairing is at the core of the fuckery of inkjet printer companies, who use it to fence out third-party ink, so they can charge $9,600/gallon for ink that pennies to make. Parts-pairing is also rampant in powered wheelchairs, a heavily monopolized sector whose predatory conduct is jaw-droppingly depraved...

When Bill Clinton signed DMCA 1201 into law 25 years ago, he loaded a gun and put it on the nation's mantlepiece and now it's Act III and we're all getting sprayed with bullets. Everything from ovens to insulin pumps, thermostats to lightbulbs, has used DMCA 1201 to limit repair, modification and improvement. Congress needs to rid us of this scourge, to let us bring back all the benefits of interoperability. I explain how this all came to be — and what we should do about it — in my new Verso Books title, The Internet Con: How to Seize the Means of Computation.

Games

Starfield's Missing Nvidia DLSS Support Added By a Mod - With DRM (arstechnica.com) 48

tlhIngan writes: Starfield, a Bethesda space-based RPG that was recently released, was criticized for not having Nvidia DLSS support -- instead the game was primarily written to feature AMD's FSR support. This isn't too surprising since the major consoles all use AMD processors and GPUs. However, an enterprising modder created a mod that enables players with Nvidia cards to enable DLSS. This isn't the unusual bit -- the mod makes DLSS2 (ca. 2020) available for free, while the version enabling DLSS3 (which adds the ability to use AI to generate frames in-between) is behind a Patreon paywall. This has lead to several other people to crack the DRM protecting the mod itself (note: this is not the DRM on the game itself -- the game's Steam page doesn't seem to imply use of 3rd party DRM beyond Steam). Imagine that -- DRM on a game mod because it requires payment.
Your Rights Online

Scientologists Ask Federal Government To Restrict Right To Repair (404media.co) 135

The organization that represents the literary works of Scientology founder L. Ron Hubbard has filed a petition with the Federal Government, asking it to make it illegal to circumvent software locks for the repair of a highly specific set of electronic devices, according to a letter reviewed by 404 Media. From the report: The letter doesn't refer to any single device, but experts say the petition covers Scientology's "E-Meter," a "religious artifact" and electronic that is core to Scientology. Author Services Inc., a group "representing the literary, theatrical, and musical works of L. Ron Hubbard," told the U.S. Copyright Office that it opposes the renewal of an exemption to Section 1201 of the Digital Millennium Copyright Act that makes it legal for consumers to hack their personal electronics for the purposes of repair.

This exemption to copyright law is needed because many electronics manufacturers put arbitrary software locks, Digital Rights Management systems, or other technological prevention measures that stop consumers from diagnosing or repairing devices unless they are authorized to do so. Special exemptions to copyright law make it legal for farmers to hack past John Deere's DRM to fix their tractors, consumers to use software tools to help them repair certain parts of game consoles, or use third-party software to circumvent repair locks on printers, air conditioners, laptops, etc.

DRM

Denuvo Security Is Now On Switch, Including New Tech To Block PC Switch Emulation (videogameschronicle.com) 57

Denuvo has become the first security partner to be added to the Nintendo Developer Portal. According to Video Games Chronicle, Switch developers can use Denuvo's tools for their games to block users from playing them on PC emulators. From the report: "Even if a game is protected against piracy on its PC version, the version released on Nintendo Switch can be emulated from day one and played on PC, therefore bypassing the strong protections offered on the PC version," the company says. "This can happen with any of the numerous games available on Nintendo Switch. "By blocking unauthorized emulations on PC, studios are able to increase their revenue during the game launch window, which is the most important period for monetization. The Nintendo Switch Emulator Protection will ensure that anyone wishing to play the game has to buy a legitimate copy. As with all other Denuvo solutions, the technology integrates seamlessly into the build toolchain with no impact on the gaming experience. It then allows for the insertion of checks into the code, which blocks gameplay on emulators."
The Courts

AI-Generated Works Aren't Protected By Copyrights, US Judge Rules (billboard.com) 28

A U.S. federal judge "ruled Friday that U.S. copyright law does not cover creative works created by artificial intelligence," reports Billboard magazine: In a 15-page written opinion, Judge Beryl Howell upheld a decision by the U.S. Copyright Office to deny a copyright registration to computer scientist Stephen Thaler for an image created solely by an AI model. The judge cited decades of legal precedent that such protection is only afforded to works created by humans. "The act of human creation — and how to best encourage human individuals to engage in that creation, and thereby promote science and the useful arts — was ... central to American copyright from its very inception," the judge wrote. "Non-human actors need no incentivization with the promise of exclusive rights under United States law, and copyright was therefore not designed to reach them."

In a statement Friday, Thaler's attorney Ryan Abbot said he and his client "disagree with the district court's judgment" and vowed to appeal: "In our view, copyright law is clear that the public is the main beneficiary of the law and this is best achieved by promoting the generation and dissemination of new works, regardless of how they are created."

Though novel, the decision was not entirely surprising. Federal courts have long strictly limited to content created by humans, rejecting it for works created by animals, by forces of nature, and even those claimed to have been authored by divine spirits, like religious texts.

The Hollywood Reporter notes that "various courts have reached the same conclusion." In another case, a federal appeals court said that a photo captured by a monkey can't be granted a copyright since animals don't qualify for protection, though the suit was decided on other grounds. Howell cited the ruling in her decision. "Plaintiff can point to no case in which a court has recognized copyright in a work originating with a non-human," the order, which granted summary judgment in favor of the copyright office, stated.
Music

Record Companies Sue Internet Archive For Preserving Old 78 Rpm Recordings (reuters.com) 73

Long-time Slashdot reader bshell shared this announcement from the Internet Archive: Some of the world's largest record labels, including Sony and Universal Music Group, filed a lawsuit against the Internet Archive and others for the Great 78 Project, a community effort for the preservation, research and discovery of 78 rpm records that are 70 to 120 years old.

The project has been in operation since 2006 to bring free public access to a largely forgotten but culturally important medium. Through the efforts of dedicated librarians, archivists and sound engineers, we have preserved hundreds of thousands of recordings that are stored on shellac resin, an obsolete and brittle medium. The resulting preserved recordings retain the scratch and pop sounds that are present in the analog artifacts; noise that modern remastering techniques remove.

"The labels' lawsuit said the project includes thousands of their copyright-protected recordings," reports Reuters, including Bing Crosby's "White Christmas" and Chuck Berry's "Roll Over Beethoven."

"The lawsuit said the recordings are all available on authorized streaming services and 'face no danger of being lost, forgotten, or destroyed.'" The labels' lawsuit filed in a federal court in Manhattan said the Archive's "Great 78 Project" functions as an "illegal record store" for songs by musicians including Frank Sinatra, Ella Fitzgerald, Miles Davis and Billie Holiday. They named 2,749 sound-recording copyrights that the Archive allegedly infringed. The labels said their damages in the case could be as high as $412 million.
Printer

Canon Is Getting Away With Printers That Won't Scan Sans Ink (theverge.com) 72

Last year, Queens resident David Leacraft filed a lawsuit against Canon claiming that his Canon Pixma All-in-One printer won't scan documents unless it has ink. According to The Verge's Sean Hollister, it has quietly ended in a private settlement rather than becoming a big class-action. From the report: I just checked, and a judge already dismissed David Leacraft's lawsuit in November, without (PDF) Canon ever being forced to show what happens when you try to scan without a full ink cartridge. (Numerous Canon customer support reps wrote that it simply doesn't work.) Here's the good news: HP, an even larger and more shameless manufacturer of printers, is still possibly facing down a class-action suit for the same practice.

As Reuters reports, a judge has refused to dismiss a lawsuit by Gary Freund and Wayne McMath that alleges many HP printers won't scan or fax documents when their ink cartridges report that they've run low. Among other things, HP tried to suggest that Freund couldn't rely on the word of one of HP's own customer support reps as evidence that HP knew about the limitation. But a judge decided it was at least enough to be worth exploring in court. "Plaintiffs have plausibly alleged that HP had a duty to disclose and had knowledge of the alleged defect," wrote Judge Beth Labson Freeman, in the order denying almost all of HP's current attempts to dismiss the suit.

Interestingly, neither Canon nor HP spent any time trying to argue their printers do scan when they're low on ink in the lawsuit responses I've read. Perhaps they can't deny it? Epson, meanwhile, has an entire FAQ dedicated to reassuring customers that it hasn't pulled that trick since 2008. (Don't worry, Epson has other forms of printer enshittification.) HP does seem to be covering its rear in one way. The company's original description on Amazon for the Envy 6455e claimed that you could scan things "whenever". But when I went back now to check the same product page, it now reads differently: HP no longer claims this printer can scan "whenever" you want it to. Now, we wait to see whether the case can clear the bars needed to potentially become a big class-action trial, or whether it similarly settles like Canon, or any number of other outcomes.

Books

Cory Doctorow's New Book On Beating Big Tech At Its Own Game (boingboing.net) 43

Cory Doctorow, author, digital rights advocate, and co-editor of the blog Boing Boing, has launched a Kickstarter campaign for his next book, called The Internet Con: How To Seize the Means of Computation. "The book presents an array of policy solutions aimed at dismantling the monopolistic power of Big Tech, making the internet a more open and user-focused space," writes Boing Boing's Mark Frauenfelder. "Key among these solutions is the concept of interoperability, which would allow users to take their apps, data, and content with them when they decide to leave a service, thus reducing the power of tech platforms." From Cory's Medium article announcing the Kickstarter: I won't sell my work with DRM, because DRM is key to the enshittification of the internet. Enshittification is why the old, good internet died and became "five giant websites filled with screenshots of the other four" (h/t Tom Eastman). When a tech company can lock in its users and suppliers, it can drain value from both sides, using DRM and other lock-in gimmicks to keep their business even as they grow ever more miserable on the platform.

Here is how platforms die: first, they are good to their users; then they abuse their users to make things better for their business customers; finally, they abuse those business customers to claw back all the value for themselves. Then, they die.

The Internet Con isn't just an analysis of where enshittification comes from: it's a detailed, shovel-ready policy prescription for halting enshittification, throwing it into reverse and bringing back the old, good internet.

DRM

Google's Nightmare 'Web Integrity API' Wants a DRM Gatekeeper For the Web 163

Google's newest proposed web standard is... DRM? Over the weekend the Internet got wind of this proposal for a "Web Environment Integrity API. " From a report: The explainer is authored by four Googlers, including at least one person on Chrome's "Privacy Sandbox" team, which is responding to the death of tracking cookies by building a user-tracking ad platform right into the browser. The intro to the Web Integrity API starts out: "Users often depend on websites trusting the client environment they run in. This trust may assume that the client environment is honest about certain aspects of itself, keeps user data and intellectual property secure, and is transparent about whether or not a human is using it."

The goal of the project is to learn more about the person on the other side of the web browser, ensuring they aren't a robot and that the browser hasn't been modified or tampered with in any unapproved ways. The intro says this data would be useful to advertisers to better count ad impressions, stop social network bots, enforce intellectual property rights, stop cheating in web games, and help financial transactions be more secure. Perhaps the most telling line of the explainer is that it "takes inspiration from existing native attestation signals such as [Apple's] App Attest and the [Android] Play Integrity API." Play Integrity (formerly called "SafetyNet") is an Android API that lets apps find out if your device has been rooted.

Root access allows you full control over the device that you purchased, and a lot of app developers don't like that. So if you root an Android phone and get flagged by the Android Integrity API, several types of apps will just refuse to run. You'll generally be locked out of banking apps, Google Wallet, online games, Snapchat, and some media apps like Netflix. [...] Google wants the same thing for the web. Google's plan is that, during a webpage transaction, the web server could require you to pass an "environment attestation" test before you get any data. At this point your browser would contact a "third-party" attestation server, and you would need to pass some kind of test. If you passed, you would get a signed "IntegrityToken" that verifies your environment is unmodified and points to the content you wanted unlocked. You bring this back to the web server, and if the server trusts the attestation company, you get the content unlocked and finally get a response with the data you wanted.
Games

Ubisoft Will Suspend and Then Delete Long-Inactive Accounts (pcgamer.com) 51

Leaving a Ubisoft account inactive for too long "apparently puts it at risk of permanent deletion," writes PC Gamer, calling the policy "a customer-unfriendly practice." A piracy and anti-DRM focused Twitter account, PC_enjoyer, recently shared a screenshot of a Ubisoft support email telling the user that their Ubisoft account had been suspended for "inactivity," and would be "permanently closed" after 30 days. The email provided a link to cancel the move. Now, that sounds like a phishing scam, right? I and many commenters wondered that, looking at the original post, but less than a day later, Ubisoft's verified support account responded to the tweet, seemingly confirming the screenshotted email's legitimacy.

"You can avoid the account closure by logging into your account within the 30 days (since receiving the email pictured) and selecting the Cancel Account Closure link contained in the email," Ubisoft Support wrote. "We certainly do not want you to lose access to your games or account so if you have any difficulties logging in then please create a support case with us."

I was unable to find anything regarding account closure for inactivity in Ubisoft's US terms of use or its end user licence agreement, but the company does reserve the right to suspend or end services at any time. Ubisoft has a support page titled "Closure of inactive Ubisoft accounts." The page first describes instances where the service clashes with local data privacy laws, then reads: "We may also close long-term inactive accounts to maintain our database. You will be notified by email if we begin the process of closing your inactive account."

This page links to another dedicated to voluntarily closing one's Ubisoft account, and seems to operate by the same rules: a 30-day suspension before permanent deletion. "As we will be unable to recover the account once it has been closed, we strongly recommend only putting in the request if you are absolutely sure you would like to close your account."

"If you have a good spam filter or just reasonably assume it's a phishing attempt, then you might one day try your old games and find they're just gone," worries long-time Slashdot reader Baron_Yam. "If you're someone who still plays games from decades ago every so often, this is a scenario you might want to think about."

The site Eurogamer reports that when a Twitter user complained that "I lost my Ubisoft account, and all the Ubisoft Steam game[s] I've bought are now useless", Ubisoft Support "responded to say that players can raise a ticket if they would like to recover their account."

The original tweet now includes this "reader-added context" supplied by other Twitter users — along with three informative links: For added context, Ubisoft can be required under certain data protection laws, such as the GDPR, to close inactive accounts if they deem the data no longer necessary for collection.

Ubisoft has claimed they don't close accounts that are inactive for less than 4 years.

Slashdot Top Deals