EA to use newest Securom in upcoming games

Status
Not open for further replies.
This will not prevent people from pirating the games. Its not possible to make a hacker proof game. They can make it harder but I don't see single player games ever being that hard for hackers to crack.
 
I found my paper from last year. I had put it online. I'll post it here, too.

Trotter said:
In the American justice system, anyone accused is considered innocent until he is proven to be guilty.
"No person shall be held to answer for a capital, or otherwise infamous crime, unless on a presentment or indictment of a Grand Jury… nor shall be compelled in any criminal case to be a witness against himself, nor be deprived of life, liberty, or property, without due process of law; nor shall private property be taken for public use, without just compensation." (Constitution , Amendment V)
This protocol was installed as a protection for those who may be accused unjustly, in order to prevent an innocent man or woman from being sentenced to prison or death. This proof must show beyond a shadow of a doubt that the defendant is guilty as charged or he is allowed to go free. Unfortunately, this protocol does not have any weight when it comes to digital media.

In the world of today's digital entertainment, everyone is considered to be a criminal. No longer are people able to purchase music, movies, or computer programs; instead, people must pay for the right to use these things, but only in the manner permitted by the manufacturers of the media. If that were not enough, the manufacturers reserve the right to change the limitations on this media at their discretion without having to inform the public. In order to enforce these stringent restrictions, the producers of electronic media have incorporated many different measures to prevent unauthorized use or copying of the content, as well as successfully lobbying the government to pass laws that bring severe penalties to bear on those who break these restrictions. The draconian “anti-piracy” measures implemented by the manufacturers and distributors of today's digital media prohibit actual ownership and restrict the use of the product by limiting how the content may be used.

Imagine buying a new car. You have saved your money, and paid for the vehicle in full. As you prepare to take possession of your new automobile, you are stopped by the salesman and given a huge, multi-page document that you must agree to abide by before you can actually use the car you just bought. The contract outlines not only where you could and could not drive it, how often you could drive it, who you could allow to drive it, and that you would have to destroy it if you decided to get another vehicle. This is exactly the situation many are being put in today because of the restrictions being placed on the media purchased.

Take Apple's iTunes application and their online iTunes Store, for example. Due to the immense popularity of Apple's iPod music players, the iTunes Store and the iTunes application are extremely popular. The songs purchased through the iTunes store come in a specific format, called FairPlay. Until recently, only Apple's players could play songs in the FairPlay format due to Apple's refusal to license the format to other companies. Apple recently gave in to public outcries to be able to play the songs on other players.

Other restrictions used by Apple's iTunes include restricting the number of computers a song may be placed on, restricting songs from being converted to other formats than FairPlay, and preventing songs from being sampled or otherwise edited. (The customer is always wrong, 2007, ¶ 9). The same digital rights management, or DRM, is included in movies sold through the iTunes Store, as well.

The reasons for these restrictions and limitations are obvious. If Apple did not have these measures in place, there would nothing to prevent anyone from buying a song and then freely distributing to whoever might want it. The security measures that Apple does put into play are there to protect Apple's interest in selling the music and movies by making the free distribution of the media much more difficult to do. These same measures, however, also present difficulties for those who legally purchase the media.

Music and motion pictures are not the only forms of digital information being held for ransom. Computer programs, or software, are now rife with copy prevention measures. Take, for instance, Microsoft Windows XP. For now, Windows XP is the world standard. It is the most popular computer operating system ever known, and is used on over 75% of the computers used online (Reimer, 2007, ¶ 9). Windows XP incorporates two different copy prevention schemes, one upon installation and the other during operation.

The first security measure is a required registration upon installation of the operating system. This registration consists of entering a twenty-four digit alphanumeric code that comes with the Windows installation CD, along with an activation routine that must be accomplished either online or by phone. Failure to input the proper alphanumeric code will result in Windows aborting the installation. Failure to activate within 30 days will result in the operating system refusing to operate. Along these same lines, if the same Windows XP CD is used to re-install the operating system more than a few times (the exact number is vague and not disclosed), Windows will require you to contact Microsoft to procure special permission. While this is not a problem for the vast majority of users, it is a headache for those who prefer to re-install their operating system fairly often.

Microsoft is not the only one to use a serial key when installing software. Serial keys have become an industry standard, and are used for games, applications, and other various types of software. While it is possible to bypass the need for a serial key, it is not a simple procedure and would not be attempted by the average consumer. Serial keys can also be broken through the use of blind luck and several different programs that try limitless combinations of letters and numbers in an attempt to find the correct key. While the use of a serial key can be annoying, it is still a front-line defense against casual piracy.

The second stratagem used by Microsoft is called Windows Genuine Advantage, or WGA.
Launched in July of 2005, the Windows Genuine Advantage (WGA) program was designed to deliver additional benefits to fully licensed customers of Windows, help protect honest businesses from counterfeiters, and help Microsoft better protect its intellectual property and combat Windows piracy. WGA is one of many programs Microsoft uses to address the problem of software piracy. (Concerned about validation?, 2007, ¶ 1)

Originally launched as an option, WGA was fully implemented as a requirement in order to gain access to several Microsoft Windows services including Windows updates and downloading materials from the Microsoft Download Center. Microsoft requires users to allow the installation a small application on their computers that allows Windows to check if the installation is valid before any updates or downloads are allowed. WGA is then downloaded as a “critical update”. The only words of explanation given by the WGA “update” are, “The Windows Genuine Advantage Notification tool notifies you if your copy of Windows is not genuine. If your system is found to be a non-genuine, the tool will help you obtain a licensed copy of Windows” (Racoma, 2006). What the update does not explain to the consumer is exactly what it is and what it does.

To help you validate your software, the WGA tools must collect a certain amount of configuration information from your computer. The data collected includes:
• Computer make and model.
• Version information for the operating system and software using Genuine Advantage.
• Region and language setting.
• A unique number assigned to your computer by the tools (Globally Unique Identifier or GUID).
• Product ID and product key.
• BIOS name, revision number, and revision date.
• Volume serial number.
…In addition to the configuration information above, status information such as the following is also transferred:
• Whether the installation was successful.
• The result of the validation check.
As standard procedure, your Internet Protocol (IP) address is temporarily logged when your computer connects to a WGA website or server. (Concerned about validation?, 2007, ¶ 3, 5-6)

Although Microsoft claims to collect no personally identifiable information, a quick look at what WGA does collect shows that, not only does it collect more than enough information to pinpoint the exact computer used (make, model, version information, region, product ID and key, volume (hard drive) serial number), it also collects the IP address, which is the point that the computer connects to the internet and is normally static for most computers. With this information, Microsoft knows exactly which computer was used, as well as where that computer is located.

WGA is basically an attempt by Microsoft to catch those who have circumvented the serial key. Any serial key that Microsoft identifies as being used by more computers than it should is blacklisted, and any use of that key will flag WGA into launching into “nag” mode. If WGA detects what it thinks is a problem, it will go into “nag” mode. WGA is far from perfect, but it does fill an important role for Microsoft. Without the use of serial keys and WGA, there would be many more instances of pirated versions of Windows.

Operating systems are not the only forms of software that employ these “anti-piracy” measures. One such measure is a program known as StarForce. Exactly how StarForce works is unclear, but it is thought to measure the angles between the first and last sector of a written CD. StarForce prevents applications from being copied and cracked, or reverse engineered by third parties, as well as implementing software activation and licensing control (Software protection, 2006). This “protection” is included in many software installations, but it is not pointed out to the user. How this is done was explained by Abbie Sommer, of StarForce, in an interview with Jakub Wojnerowicz, of FiringSquad.com:
"There is no legal concern because before a user loads a game, he or she has agreed to accept the conditions of the end-user licensing agreement, typically known as a EULA. These are also known as click and go, or click and accept agreements. When you accept, you are saying I will load this game or application at my own risk, and have read and understood the terms. Or there will be a disclaimer that protects the publisher from damages of any kind due to their products' use. Our product is licensed to our customers, and becomes part of their product, so the user by accepting the terms, is giving approval." (Wojnerowicz, 2004, p. 3, ¶ 8)

End-user licensing agreements, or EULAs, are another avenue that developers and producers of software use to bring their “anti-piracy” policies to bear upon the consumer. EULAs are included in almost all software installations. A few of them are short and simple; these are found in the majority of open-source software, where the source code is open and freely available for anyone to see and improve upon. Most commercially sold software have lengthy EULAs that consist of several sections of mostly legal terminologies. Nestled in these lofty terms are the restrictions placed upon the use of the programs by the manufacturer, along with a clause that states that the EULA may be changed at any time, and that the manufacturer does not have to notify you if it does change. The person installing the software must accept the terms of the EULA by clicking the corresponding button, or refuse the terms and have the software abort the installation.

While EULAs can harbor legal landmines, they are, for the most part, simple agreements between the maker of the software and the user to not use the software in a way it was not intended and to not distribute the software to others. Some EULAs actually contain important information that the user of the software needs to know, like how to properly uninstall it or how to contact consumer support. It is definitely in the user's best interest to at least skim through the EULA and to become familiar with exactly what the EULA spells out as the consumer's responsibility.

Music distributors are now trying their hand at DRM. One recent example would be the debacle of the Sony BMG copy protection scandal. As a form of copy protection, Sony placed two versions of a rootkit, or a self-installing computer routine that runs at a very basic level that is undetectable through routine measures, on over 100 different titles of the music that they produce. These rootkits installed themselves on any computer that was used to play these CDs, silently hiding itself before the EULA was displayed. The EULA did not mention the installation. The rootkit opened holes in the security of Microsoft Windows that could allow an outside party to take control of the computer remotely. Attempted removal of the rootkits would damage the Windows installation beyond repair, requiring a reformat, or a complete wiping of the contents of the hard drive, and a re-installation of Windows (Orlowski, 2005). The fallout from the scandal resulting in Sony BMG recalling the CDs, as well as several lawsuits being filed against the company.

Although these companies, as well as a myriad of others, operate under the impression that all consumers are thieves and pirates, the truth is that most are not. According to a recent study, an estimated 22% of all software in the United States is not authentic (Crime statistics: Software piracy rate by country, 2005). While the number seems high, it must be taken into account that the study counted all backups as unauthentic copies.

This is not to say that piracy is not a problem, however. The US actually is on the bottom of the scale. Other countries, such as Vietnam and China, top the chart at 92%, while many poorer nations, such as Nigeria, Kenya, and the Philippines come in at 84%, 80%, and 72%, respectively (Crime statistics: Software piracy rate by country, 2005). The threat of piracy is a very real one when one looks at the global picture.

[Missing bar graph... didn't translate over]
(Crime statistics: Software piracy rate by country, 2005)

Continued
 
This global problem is only exacerbated by the internet. It is a very simple procedure to convert a music CD, a motion picture DVD, or a software program into an easily transferred form that can be sent anywhere in the world. Several programs exist whose sole purpose is to upload and download these files from other computers. The procedure of uploading and downloading content is known as peer-to-peer sharing, or files sharing. It is also known as “p2p”. While the programs that allow this are numerous, the most widely known and used are based off of a single program known as BitTorrent. BitTorrent was developed by programmer Bram Cohen in 2004, and, in less than three years, has become the most popular means of file sharing. Almost every p2p program available today is based on BitTorrent.

There are alternatives to some of these problems. For a growing percentage of computer users, open source software is becoming more and more commonplace. Open source software is software whose source code is freely available to the public for use, change, or study. There are numerous internet sites that freely distribute open source materials. Some examples of open source projects include OpenOffice (an alternative to Microsoft Office that allows the user to save documets in MS Office formats), numerous media players, and even complete operating systems.

Linux is a type of operating system that has been developed by countless individuals and groups over the years. Linux' name was created by combining Unix, the system Linux was originally based from, and Linus, the first name of Linus Torvalds, the man who began the original work on Linux. There is no longer a single version of Linux, but hundreds of different versions of it, with names such as Mandriva, Unbuntu, Debian, and KNOPPIX. Almost all versions of Linux are free to download and use, but there are a few commercial varieties. The best know of the commercial versions is RedHat, which is now used by many businesses and corporations. Besides being free, another major advantage of Linux is that it is extremely reliable and very seldom ever crashes.

Piracy of digital media is a very real occurrence, but not every individual is going to try to pirate it. So the whole situation boils down to a single question: why are all consumers treated as if they are already guilty of piracy? It is understandable that companies want to protect their products from unlawful theft and distribution, but where should that line be drawn?

Due to the activities of a global minority, the manufacturers and producers of the various digital media have taken it upon themselves to treat each and every person like a criminal by restricting exactly how the content may be used. There is not a single person who would not balk at “buying” a car that they would never be able to use as they see fit, so why must each and every individual be forced to accept the same terms and conditions for the music, movies, and software that they purchase?

Some of the measures used today are not overly burdensome. Serial keys can be annoying, and to lose your serial key can mean anything to having to call support and explain the situation to having to re-purchase the software in question. The practice of only allowing a song or movie to be placed on a set number of devices can be bothersome, but most do not own multiple devices. Unique file types were a problem, but no longer since Apple opened up the format to other manufacturers.

However, other types of copy prevention are not easily swallowed. The invasive practices of Microsoft's WGA and StarForce border on being illegal in the eyes of many. EULAs that hide exemptions and misleading clauses are bad business practice, no matter how it is viewed. Sony's use of rootkits was found to be illegal, but the same thing could easily be duplicated by another company.

Unfortunately, there is no easy answer to these problems. In a perfect world, there would not be a need for these “security” measures, but our world is from perfect. Some of the means used by today's digital content producers are overly restrictive and limiting, and these are used as blanket measures that are applied against everyone. While localized protocols would seem to be a better solution, the globalization brought about by the internet circumvents this solution. It is up to the producers and distributors of digital media to work with consumers to find less intrusive ways to prevent piracy that allow users to retain the rights to the media they purchase. It is also up to the consumer to make wise choices in both the media they choose and in the way they procure it.

The key is in the ignition. The engine is idling. What will happen will depend on the choices that are being made today.


Resources:
Concerned about validation? Get the facts here. (2007). Retrieved April 29, 2007, from Genuine Microsoft Software

Crime statistics: Software piracy rate by country. (2004). Retrieved April 29, 2007, from NationMaster - Software piracy rate (most recent) by country

Orlowski, A. (2005, November 1). Removing Sony's CD 'rootkit' kills Windows. Retrieved April 29, 2007, from Removing Sony's CD 'rootkit' kills Windows | The Register
Racoma, J. (2006). The Windows Genuine Advantage blurb. Retrieved April 29, 2007, from http://forevergeek.com/windows/the_windows_genuine_advantage_blurb.php
Reimer, J. (2006, November 28). Analyst predicts Vista adoption to trump XP. Retrieved April 29, 2007, from Analyst predicts Vista adoption to trump XP

Software protection. (2006). Retrieved April 29, 2007, from Software Protection

The customer is always wrong: A user's guide to DRM in online music. (n.d.). Retrieved April 29, 2007, from The Customer Is Always Wrong: A User's Guide to DRM in Online Music | Electronic Frontier Foundation

United States Constitution. (n.d.). Retrieved April 29, 2007, from LII: Constitution

Wojnarowicz, J. (2004, August 18). StarForce Interview and Piracy Discussion. Retrieved April 29, 2007, from StarForce Interview and Piracy Discussion

The formatting didn't carry over.
 
This will not prevent people from pirating the games. Its not possible to make a hacker proof game. They can make it harder but I don't see single player games ever being that hard for hackers to crack.
We are not saying that it will be stopped. But the fact of the matter is that online games are the most pirated piece of software. Do you really think that there is only 30,000 people that play UT3? With the success of UT2004? Comeon.

Now think if everyone who plays the game bought it. Why would they need to charge $50 for the game when they can make a profit at $30.

The only way to get games/software prices to truly drop is to buy it. Period.

I am not saying i am a saint. I am not saying that i have all the funds necessary to buy all the apps i use and keep them updated every year.

But i also do not complain about prices of a game or software. :rolleyes:
 
How is protection from piracy treating people like criminals? Microsoft, OS X, Adobe, and jsut about every major software developer that is a paid for applicaiton has something like this setup. WGA, Activation with Adobe and so on. So is it that every compnay treats you like a Criminal?

In honesty take a look at it. If it wasnt for the fact that Windows was pirated by around 50% of the population do you think that Microsoft would charge $400 a pop for a serial? Well maybe. But the game developers who do not get 5 Billion people playing their game can not have piracy. If they only sell 50,000 copies they barely cover costs to make the game. If another 200,000 people pirate how do they make out?

It will be gotten around. Without a doubt. But Piracy for PC Gaming is killing the industry faster than console gaming. At least that is tougher to pirate.

If EA wants something to do a hankshake every 10 days. So be it. With Microsoft if you want some specific downloads from their site you might have to validate your Windows with every download. EVERY one. But EA is single handedly killing gaming?

More like the people who openly admit to being game pirates are the killers. If you ilke the game..buy it. If you dont like the practices done by EA. Dont buy it. Same thing that we tell people about Vista. If you like it use it. If not dont.

Blaming EA for trying to prevent as much lose to slaes as possible is like blaming Microsoft and Adobe for doing the same thing. At that point might as well be a Open source person and convert to Linux and be done with it. Complaining about every step to prevent piracy will only encourage it more.

Buy the stuff. Then prices will come down after a period of time cause companies are making the money to cover costs much easier and faster.

Ya but dude, you dont know how much they make in contracts putting their os on premade computers like dell and hp, they make more than enough to support the software they make, microsoft is RICH they are doing just fine with piracy
 
Just a day ago we have reported that Electronic Arts had plans to publish some of their upcoming PC blockbuster titles with a new Securom copy protection that would validate the game every ten days online. Failure to validate the game in that time period would have the effect that the game would not start until the user would start the game with an active Internet connection so that it could be validated.
It seems that the press coverage and outcry of the gaming community made EA change their minds. The games will now run perfectly fine after an initial online activation and additional checks will only be performed before downloading additional content for the game.
That's definitely great news for the computer users who wanted to buy Mass Effect or Spore, the two affected titles, but could not ensure that they were able to authenticate the game every ten days to be able to continue playing it.
The updated FAQ by Bioware's community manager Jay Watamaniuk specifically mentions the armed forces and international users. I personally think that they still have not understood the real reason for the outcry but that's probably just me wondering why someone would copy protect games when cracked versions of the games normally make their appearance before or during the initial game release.
It's a wrong way of fighting piracy. I never understood why companies are fighting piracy on the backs of their customers.

EA backpedals on new Securom Protection
 
wouldn't it be easier for the game companies to just put a permanent file that couldn't be copied on the discs and all games would have to verify that the original disc is in for it to work.

Although I'm sure people would somehow be able to make a file that would do the same but not need the original.

So the point really is that no matter how hard the game companies try people are going to pirate games. Sadly honest people will have to pay the price.
 
^ thats exactly what most protections do,why do you think you cant burn games anymore? cracks and mini images bypass the protection tho
 
^and play games using burned cd's? i think not which game are you talking about? (install yes, play? no)
im pretty sure its not legal to burn games with nero, i havent tried it with the new nero version but i have with the older one it doesnt work, im going to try it right now to see

And the files that dont copy are the ones that allow the gamer to launch and play the game using the real cd


Edit:doesnt work, i dont know what your talking about. you can copy the games to install but when read in the cd drive it looks for the uncopyable file to see if its the legit cd to play the game (not install)
 
Status
Not open for further replies.
Back
Top Bottom