This is the last time I'll post about the Sony rootkit debacle, because everyone knows about it by now and there's also nothing any of us can do about the possible damage to the Sony or Vegas names anyway.
The guy who first discovered the rootkit issue has posted again, this time with the details of trying to get the rootkit files removed. He discovers that Sony notes the machine ID of the PC infected, and sends an uninstall routine that works only on that machine.
Some of his post:
"...Sony has left us to speculate, but under the circumstances the answer to all these questions seems obvious: Sony doesn’t want customers to know that there’s DRM software installed on their computers and doesn’t want them to uninstall it if they somehow discover it. Without exaggeration I can say that I’ve analyzed virulent forms of spyware/adware that provide more straightforward means of uninstall.
"For those readers that are coming up to speed with the story, here’s a summary of important developments so far:
The DRM software Sony has been shipping on many CDs since April is cloaked with rootkit technology:
* Sony denies that the rootkit poses a security or reliability threat despite the obvious risks of both
* Sony claims that users don’t care about rootkits because they don’t know what a rootkit is
* The installation provides no way to safely uninstall the software
* Without obtaining consent from the user Sony’s player informs Sony every time it plays a “protected” CD
Sony has told the press that they’ve made a decloaking patch and uninstaller available to customers, however this still leaves the following problems:
* There is no way for customers to find the patch from Sony BMG’s main web page
* The patch decloaks in an unsafe manner that can crash Windows, despite my warning to the First 4 Internet developers
* Access to the uninstaller is gated by two forms and an ActiveX control http://www.sysinternals.com/blog/2005/11/more-on-sony-dangerous-decloaking.html
* The uninstaller is locked to a single computer, preventing deployment in a corporation
Consumers and antivirus companies are responding:
* F-Secure labeled the Sony software “spyware”
* A lawfirm has filed a class action lawsuit on behalf of California consumers against Sony
* ALCEI-EFI, an Italian digital-rights advocacy group, has formally asked the Italian government to investigate Sony for possible Italian law violations..."
Note to music industry execs reading this: This is a textbook example of what NOT to do.
The guy who first discovered the rootkit issue has posted again, this time with the details of trying to get the rootkit files removed. He discovers that Sony notes the machine ID of the PC infected, and sends an uninstall routine that works only on that machine.
Some of his post:
"...Sony has left us to speculate, but under the circumstances the answer to all these questions seems obvious: Sony doesn’t want customers to know that there’s DRM software installed on their computers and doesn’t want them to uninstall it if they somehow discover it. Without exaggeration I can say that I’ve analyzed virulent forms of spyware/adware that provide more straightforward means of uninstall.
"For those readers that are coming up to speed with the story, here’s a summary of important developments so far:
The DRM software Sony has been shipping on many CDs since April is cloaked with rootkit technology:
* Sony denies that the rootkit poses a security or reliability threat despite the obvious risks of both
* Sony claims that users don’t care about rootkits because they don’t know what a rootkit is
* The installation provides no way to safely uninstall the software
* Without obtaining consent from the user Sony’s player informs Sony every time it plays a “protected” CD
Sony has told the press that they’ve made a decloaking patch and uninstaller available to customers, however this still leaves the following problems:
* There is no way for customers to find the patch from Sony BMG’s main web page
* The patch decloaks in an unsafe manner that can crash Windows, despite my warning to the First 4 Internet developers
* Access to the uninstaller is gated by two forms and an ActiveX control http://www.sysinternals.com/blog/2005/11/more-on-sony-dangerous-decloaking.html
* The uninstaller is locked to a single computer, preventing deployment in a corporation
Consumers and antivirus companies are responding:
* F-Secure labeled the Sony software “spyware”
* A lawfirm has filed a class action lawsuit on behalf of California consumers against Sony
* ALCEI-EFI, an Italian digital-rights advocacy group, has formally asked the Italian government to investigate Sony for possible Italian law violations..."
Note to music industry execs reading this: This is a textbook example of what NOT to do.