<body><script type="text/javascript"> function setAttributeOnload(object, attribute, val) { if(window.addEventListener) { window.addEventListener('load', function(){ object[attribute] = val; }, false); } else { window.attachEvent('onload', function(){ object[attribute] = val; }); } } </script> <div id="navbar-iframe-container"></div> <script type="text/javascript" src="https://apis.google.com/js/platform.js"></script> <script type="text/javascript"> gapi.load("gapi.iframes:gapi.iframes.style.bubble", function() { if (gapi.iframes && gapi.iframes.getContext) { gapi.iframes.getContext().openChild({ url: 'https://www.blogger.com/navbar.g?targetBlogID\x3d10549249\x26blogName\x3dforenoon+filings\x26publishMode\x3dPUBLISH_MODE_BLOGSPOT\x26navbarType\x3dSILVER\x26layoutType\x3dCLASSIC\x26searchRoot\x3dhttps://forenoon.blogspot.com/search\x26blogLocale\x3den_GB\x26v\x3d2\x26homepageUrl\x3dhttp://forenoon.blogspot.com/\x26vt\x3d3737752697332086163', where: document.getElementById("navbar-iframe-container"), id: "navbar-iframe" }); } }); </script>

forenoon filings

shiny, oh so shiny

the sony drm infection spreads

A rather alarming statistic in relation to the continuing Sony DRM crisis surfaces.

It has been estimated that approximately half a million networks (including military and government sites) may have been infected by the copy-restriction software that was secretly bundled on a number of Sony BMG's recent audio CDs.

This figure was arrived at by independent security analyst Dan Kaminsky who traced evidence of DNS cache use.

Once a Sony rootkitted CD is used on a client PC on a network, the corresponding DNS server is prompted to make a request to a number of addresses: connected.sonymusic.com, updates.xcp-aurora.com and license.suncom2.com.

If a machine from that DNS server’s network has looked up either of these addresses, then it would point to the fact that any one or more of its clients has already been infected.

As Wired has summed up:

The damage spans 165 countries, with the top five countries being Spain, the Netherlands, Great Britain, the United States and Japan, which, with more than 217,000 DNS servers reporting knowledge of Sony-related addresses, takes the top spot. Kaminsky doesn't speculate on how many machines may actually be compromised.

... "My approach is entirely statistical -- the only people who know are the people who put together the software themselves. The problem is they don't have to tell us the truth."


Incidentally, as this situation has been lingering on for a number of weeks, Boing Boing has helpfully produced a timeline of events that collects the news as it has been happening.
« Home | Next »
| Next »
| Next »
| Next »
| Next »
| Next »
| Next »
| Next »
| Next »
| Next »


Top-notch Sony PSP accessories and games