Please, someone, explain to me why Stringer & gang are not already indicted?
What Sony does is different from this guy...how?
Oh, wait, this hacker did for financial gain!
" AUGUST 29, 2005 (IDG NEWS SERVICE) - The creator of software designed to surreptitiously observe individuals' online activities has been indicted for allegedly violating U.S. federal computer privacy laws, local and federal authorities said Friday.
If convicted, Carlos Enrique Perez-Melara could face a maximum sentence of 175 years in prison and fines of up to $8.75 million. His current whereabouts are unknown.
Four individuals who purchased the Loverspy software to illegally spy on others were also indicted. "
Love the last sentence.
Really, read it again. Priceless.
It will be entertaining to watch a 67$Billion revenue dinosaur like Sony try to hide behind a front like the 1$ million market cap Suncomm.
The de-Sonyification campaign thanks you, Mr Stringer. Couldn't have done it without ya!
I gave you a rec for this. You posted factual information with a link back to the article.
Chuckleup (chklp) could learn a lot from you.
It's still a rootkit.
By the way, if a program sends information back to another computer about my machine and my habits without my knowledge, I consider it malicious. So does the EFF.
I think you're wrong here. Keyloggers are only one subset of spyware. There are many other types, most of which are less nefarious than keyloggers.
Several leading computer security companies (at least, the ones who were ethical enough to condemn Sony for distributing this malware) have labeled the Sony malware as spyware and as a trojan. Spyware is ANY software that reports any activities of the computer's user without that persons knowledge or consent, often by working invisibly in the background and using the computer user's own internet connection. See Computer Associates definition of spyware below:
Spyware : Any product that employs a user's Internet connection in the background without their knowledge, and gathers/transmits info on the user or their behavior. Many spyware products will collect referrer info (information from your web browser which reveals what URL you linked from), your IP address (a number that is used by computers on the network to identify your computer), system information (such as time of visit, type of browser used, the operating system and platform, and CPU speed.) Spyware products sometimes wrap other commercial products, and are introduced to machines when those commercial products are installed. See also Adware.
Here is a link to Computer Associates' web page dedicated to the Sony spyware/malware. Note that it contains links to additional pages that cover individual elements of the malware, as well as the patches Sony issued to disable the rootkit functionality:
Happy Thanksgiving everyone!!!
I agree but still SONY still a strong buy.
The DRM software does not self-replicate and doesn't contain malicious features and thus should not be considered a virus. According to current guidelines the software can still be considered malware since it hides from the user and doesn't offer a way to uninstall itself.
Although the software isn't directly malicious, the used rootkit hiding techniques are exactly the same used by malicious software to hide themselves. The DRM software will cause many similar false alarms with all AV software that detect rootkits.
The hiding techniques used by the DRM software can be abused by less technical malware authors to hide their backdoors and other tools. If a malware names its files beginning with the prefix "$sys$", the files will also be hidden by the DRM software. Thus it is very inappropriate for commercial software to use these techniques.
PS. Happy Thanks Giving.
<What's Microsoft have to do with Sony Music breaking US law?>
While Sony holds positions in the legislative branch, Microsoft is long in executive and judicial markets.
Due to recent disclosures, Sony needs to trade.
Lots of what IF but, the intent was not to make spyware but to prevent music piracy. Ergo Napster, KAZZAR and Peer to Peer sharing amongst PCs. Its not SNE fault if - Hackers have perverted this so called rootkit beyond SNE intentions. Just as the saying goes - its people who kill people - not the gun. Let them file suit and let the market decide.
<<Lots of what IF but, the intent was not to make spyware but to prevent music piracy. Ergo Napster, KAZZAR and Peer to Peer sharing amongst PCs. Its not SNE fault if - Hackers have perverted this so called rootkit beyond SNE intentions. Just as the saying goes - its people who kill people - not the gun. Let them file suit and let the market decide. >>
Sorry to point this out, but you're WRONG (as usual) on two counts!
1. The intent of the software was NOT to prevent music piracy (Yar!) but rather to impede consumers' lawful right to listen to their music on the portable mp3 player of their choice. The malware made it very difficult to transfer music to iPods and in fact encouraged consumers to complain to Apple. Sony's proprietary mp3 player with its proprietary file format, battery and memory stick, of course, was not affected by the malware. This whole music piracy (Yar!) nonsense is nothing but a smokescreen.
2. The Sony malware acts like malware and spyware even BEFORE any hackers use it to piggyback their viruses. Some security companies are even labeling it as a trojan. It degrades computer performance, it shortens the life of critical components like the hard drive, it can cause applications or even the operating system to crash, it can prevent applications from performing normally, it adds noise to mp3 files ripped from non-Sony CDs, it can disable the CD drive (especially if the computer's owner attempts to remove the malware himself), it tracks the music you listen to and reports this information along with your computer IP address to Sony, it hides itself and is extremely difficult to remove, before this fiasco hit the news Sony made it almost impossible to obtain an uninstaller -- you had to beg them for it and disclose all kinds of personal information and they still wouldn't provide an uninstaller. In what way does the Sony malware not meet the standard definitions of malware and spyware?!?!? Let's call a duck a duck.
lets clear a little of the technical stuff up?
first the PAYING CUSTOMERS(NOT PIRATES) got tricked into trusting sony to be selling them what they thought they were PAYING for.sony sneaked a rootkit deliberately and with willful disregard to problems this might cause PAYING CUSTOMERS.then they lied about the removal tool that left security problems on the systems.
in fact that are still on lots of systems of PAYING CUSTOMERS>
so please explain to me why i care about the pirates now?
i hope they steal sony to bankruptcy.
because if sony doesnt respect the PAYING CUSTOMER,then they deserve whatever karma comes their way.
Did you read the court documents for the existing suits?
SONY's rootkit violated several laws.
How do you know what "SNE intentions" for the software were? The most damning quote came from Hesse. Sony/BMG didn't care WHAT it did to their customers' systems.
We will just have to wait and see how it all plays out.
but, but ...
That law is designed to scare the bejeebus out of individuals. It doesn't scale up to multinational corporations. They have the legislators in their pockets and the full force of the RIAA and MPAA on their side.