On 08/27/2015 06:25 AM, Lisi Reisz wrote:
On Thursday 27 August 2015 10:44:20 Thomas Schmitt wrote:

I am curious to learn more about the Sony-CD incident.

I googled it.
http://news.bbc.co.uk/1/hi/technology/4456970.stm

So sorry, Gene, but Thomas's instincts are right in this case.  The player
was "bricked" only in so far as the root-kit sometimes prevented access.

https://www.google.co.uk/search?q=Sony-CD+incident&oq=Sony-CD+incident&aqs=chrome..69i57.1102j0j7&sourceid=chrome&es_sm=93&ie=UTF-8

Lisi


Thanks for the links. Somehow I missed this story when it came out (back in 2005).

What this incident points up is that *any* code which cannot be examined-- be it in software or hardware or firmware or other possible -ware-- can be malware. Heck, even FOSS, if its code sufficiently obscure, can contain malware.

Second, it's rather remarkable that the Sony malware/rootkit was discovered at all.

Third: But it was. And there were considerable legal and business repercussions resulting from that, so much so that, I would think and hope that other corporations will in future avoid attempting anything like Sony did. (Government entities, however, are a wholly different matter.)

To return this subthread to the original question, are there relevant differences between DVD and Blu-ray in this regard? I mean, it's possible for either or both to have malicious code in their firmware. But is either *known* to?

Reply via email to