Please select the lauguage you need: Contact us
Powerful File Rules Callback and Change
File Displaying Runtime Management
Copy / Print Protection / License Control
Online Authentication / Monitoring
Defeat API Hook / Against Most Debuggers
PKI Featuring up to 1024 bit Public Key
SSL & CA Online Security Data Transfer
Run Time Encryption/Decryption
Defeat Reverse Engineering.........more
Blu-ray DRM defeated
The copy protection technology used by Blu-ray discs has been cracked by the same hacker who broke the DRM technology of rival HD DVD discs last month. The coder known as muslix64 used much the same plain text attack in both cases..

Encrypted Seagate Hard Drives Could Enable On-board DRM
Last February, storage provider Seagate announced it would be introducing later in the year new hard drive platforms that can be fully encrypted at the hardware level, rendering their usefulness to would-be thieves almost pointless...

Second Life struggles with copying
Cory Doctorow poses a question that gets at the heart of many of our DRM, licensing-versus-ownership, intellectual property rights discussions. Duping in a virtual environment is similar to stealing;....

How To Bypass The Zune's WiFi Sharing DRM
We knew it would be done sooner or later, and now that we have the mod to use your Zune as a portable hard drive, a method to bypass the Zune's WiFi sharing DRM is finally here.

Rather Rough Rollout for Redmond
I can tell right now the Gripe Line is going to be a bit Microsoft-heavy in the coming weeks. Not only are Vista and associated new business products bound to raise hackles on DRM and other fronts, it would appear Microsoft was not really all that well prepared even...


Encrypted Seagate Hard Drives Could Enable On-board DRM

Last February, storage provider Seagate announced it would be introducing later in the year new hard drive platforms that can be fully encrypted at the hardware level, rendering their usefulness to would-be thieves almost pointless.

Today, with the absorption of former competitor Maxtor almost complete, Seagate is moving with all speed to deploy its implementation of the Trusted Platform Module, now called DriveTrust, on upcoming Momentus hard drives, including one 2.5" model for notebook computers, and another for DV-R devices.

Along with this arguably compelling new technology, though, will come a component that has been a perennial wellspring of controversy ever since its inception: hard-wired digital rights management, such as the capability to lock down write operations within a DV-R based drive to only those that have been authorized by a certified server.

So Seagate is being very careful today how it positions its announcement of the unveiling of hard drives with a Trusted Platform Module (TPM) component for PCs, knowing full well that the capability for one's hard drive to overrule the operating system -- and, with it, the authority of the user or administrator with regard to what files can be written, where, and when -- is not necessarily something consumers automatically view as a "feature."

Key to the success of Seagate's architecture will be the integrity of the chain of communication between the TPM module on the PC -- upon whose existence DriveTrust will depend -- and the TPM on the hard drive (HDD). With the hard disk drive itself being one of the most closed systems in a computer assembly, it becomes relatively easier to secure the chain of communication between the CPU and HDD using hardware-based authentication. This disables any third party or unauthorized device from siphoning off portions of the bit stream, whether using hardware or software.

This kind of copying is a concern to content providers, including movie studios, that have to date been reluctant to throw their support behind any form of digital content recording system, until it can prove itself impenetrable to incursion for the purpose of making surreptitious copies.

Initially, Blu-ray Disc and HD DVD had promised to serve as the premiere vehicles for Internet-driven, high-quality digital downloads. But with high-definition media sales much lower than anticipated, even though the first edition of AACS copy protection is available for licensing, blue-laser recording consoles may both become the "Betamax" of their day.

As a result, attention is turning to hard-drive-based devices, where customers could conceivably download high-quality media at their leisure, though their ability to make digital copies on optical disc could be restricted or disabled. Furthermore, downloads could be given "expiration dates" that users wouldn't be able to override.

These policies could be established and maintained by DriveTrust, as Seagate's initial January 2005 demonstration to content providers' technologists showed.

Still, even if content providers were slow to leverage DriveTrust for its inherent DRM capabilities, the technology could still succeed with consumers if it increased the reliability of HDD transactions. With TPMs in both the CPU and the HDD, a new kind of data transfer scheme would be enabled, using what the Trusted Computing Group calls a "root of trust."

Previously, only the interaction between the CPU and RAM could be considered relatively impregnable. But with even Windows or Linux or Mac OS X reliant upon TPMs to provide services, conceivably the entire security architecture of computing could change very radically, to an extent Symantec and McAfee could only imagine.

The whole design behind viruses involves the ability for malicious code to hide in unmonitored locations (perhaps in plain sight) on hard drives, and replicate itself to similar locations elsewhere, these days using networks. With a new, TPM-anchored root-of-trust scheme in place, and with the operating system supporting the TCG stack (as Microsoft's already does), only authenticated transactions could enable data to be written to hard drives.

As a result, a crafty virus would need to either falsify its authentication or defeat the TPMs - which, while not theoretically impossible, is substantially more difficult than the state of affairs today. In any event, operating system-based anti-virus protection would probably need to be reconsidered from the ground up if it is expected to be effective, or even moderately useful, in a computing scheme where the operating system is no longer the principal authority for conducting data transactions in a computer.

BetaNews is scheduled to speak with Seagate Technology regarding DriveTrust, and will provide an extensive update on this topic in coming days.

copyright © 2007 waha Inc. All rights reserved