![]() A network trace of the ActiveX control’s communication with the Sony site using Ethereal reveals that the control sends Sony an encrypted block of data:Ī Regmon trace of the ActiveX control’s activity when you press the submit button on the Web page reveals that the encrypted data is actually a signature that the control derives from the hardware configuration of your computer: However, if you visit it from another computer the page requires you install the same CodeSupport ActiveX control as the uninstall-request page, but then even if the computer has the DRM software installed you get this error:īesides the obvious question of why there’s not a universal uninstall link, the error also begs the question of how the Sony site knows that the uninstall link is for a different computer? For that matter, why do you have to install an ActiveX control just to fill out a web form and why does that form have to be filled out “using the computer where the software is currently installed”? The email, web page and ActiveX control offer no hints. If you visit the uninstall page from the computer where you filled out the first uninstall form then the DRM software is deleted from your system. Interestingly, the email address has a confidentially notice, which implies to me that Sony has something to hide, and it informs you that the uninstaller will expire in one week. (I’ve modified the link so it doesn’t work) to your personalized uninstall page. When you eventually receive the uninstall email from Sony BMG support it comes with a cryptic link in the form. Then you receive an email within a few minutes that informs you that a customer service representative will email you uninstall instructions within one business day. That page requires you to install an ActiveX control, CodeSupport.Ocx, that’s signed by First 4 Internet, enter your case ID and fill in the reason for your request. A few minutes later you receive that email, which directs you to install the patch and then visit another page if you still Then, after you submit the information the site takes you to a page that notifies you that you’ll be receiving an email with a “Case ID”. First you have to go to Sony’s support site, guess that the uninstall information is in the FAQ, click on the uninstall link and then fill out a form with your email address and purchasing information, possibly adding yourself to Sony’s marketing lists in the process. Sony even gives those users like me that are aware of the “uninstaller” several hurdles to jump over. ![]() The fact that Sony’s announcement was directed at the press and that they’ve made no effort to make contact with their customers makes the patch and uninstall look solely like a public relations gesture for the media. There’s no information on this story anywhere on the front page, no support link, and the FAQ only contains information about Sony’s merger with BMG. ![]() What if a user somehow discovers the hidden files, makes the connection between files and the Sony CD that installed them, and visits Sony BMG’s site in search of uninstall or support information? Or what about the unsuspecting Sony DRM user that happens to visit the Sony BMG site to look at their other offerings? Will these customers learn about the patch and uninstaller?Īnd search for the support site Sony has made available to the press. Further, the software installation does not include support information and lacks a registration option, making it impossible for users to contact Sony and Sony to contact its users. ![]() The End User License Agreement (EULA) does not provide any details on the software or its cloaking. The uninstall process Sony has put in place is on par with mainstream spyware and adware and is the topic of this blog post.Īs I’ve stated several times already, Sony’s rootkit hides the Digital Rights Management (DRM) files from users that have it installed, so users not monitoring the developments in this story are unaware of the scope and intrusiveness of the DRM. That it was making available a decloaking patch and uninstall capability through its support site. On Sony’s rootkit, Sony and Rootkits: Digital Rights Management Gone Too Far, Sony First published on TechNet on Nov 09, 2005 ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |