On 08/27/2015 06:25 AM, Lisi Reisz wrote:
On Thursday 27 August 2015 10:44:20 Thomas Schmitt wrote:
I am curious to learn more about the Sony-CD incident.
I googled it.
http://news.bbc.co.uk/1/hi/technology/4456970.stm
So sorry, Gene, but Thomas's instincts are right in this case. The player
was "bricked" only in so far as the root-kit sometimes prevented access.
https://www.google.co.uk/search?q=Sony-CD+incident&oq=Sony-CD+incident&aqs=chrome..69i57.1102j0j7&sourceid=chrome&es_sm=93&ie=UTF-8
Lisi
Thanks for the links. Somehow I missed this story when it came out
(back in 2005).
What this incident points up is that *any* code which cannot be
examined-- be it in software or hardware or firmware or other possible
-ware-- can be malware. Heck, even FOSS, if its code sufficiently
obscure, can contain malware.
Second, it's rather remarkable that the Sony malware/rootkit was
discovered at all.
Third: But it was. And there were considerable legal and business
repercussions resulting from that, so much so that, I would think and
hope that other corporations will in future avoid attempting anything
like Sony did. (Government entities, however, are a wholly different
matter.)
To return this subthread to the original question, are there relevant
differences between DVD and Blu-ray in this regard? I mean, it's
possible for either or both to have malicious code in their firmware.
But is either *known* to?