{"id":3193,"date":"2003-04-15T20:37:03","date_gmt":"2003-04-16T00:37:03","guid":{"rendered":"http:\/\/blogs.law.harvard.edu\/cmusings\/2003\/04\/15\/interview-with-xbox-security-researc"},"modified":"2003-04-15T20:37:03","modified_gmt":"2003-04-16T00:37:03","slug":"interview-with-xbox-security-researcher","status":"publish","type":"post","link":"https:\/\/archive.blogs.harvard.edu\/cmusings\/2003\/04\/15\/interview-with-xbox-security-researcher\/","title":{"rendered":"Interview with XBox Security Researcher"},"content":{"rendered":"<p><a name='a135'><\/a><\/p>\n<p><P>News.com has <A href=\"http:\/\/news.com.com\/2008-1082-996787.html?tag=fd_nc_1\">an interview<\/A> with Andrew &#8220;Bunnie&#8221; Huang, who has researched how to hack the XBox.<\/P><br \/>\n<P>Interesting quote: &#8220;Right after <A href=\"http:\/\/news.com.com\/2100-1040-931296.html?tag=nl\">I did the paper<\/A>, I worked with a guy to find the avenues to completely bypass the Xbox security systems. And what we ended up with was amazing. It was a concatenation of four bugs from various vendors that allowed it to happen. It&#8217;s a real-life example of why I think Palladium isn&#8217;t going to work&#8211;every vendor is going to have some small bug that individually doesn&#8217;t mean much, but when you stack &#8217;em together, it becomes a big security hole. And once you commit it to silicon, it becomes a billion-dollar bug.&#8221;<\/P><br \/>\n<P>The feasibilty of something like Palladium still fascinates me.&nbsp; First,&nbsp; it&#8217;ll be interesting to see if Palladium will really be as hackable as Huang says.&nbsp; This sort of DRM seems to be the way of future.&nbsp; If it can&#8217;t work, it&#8217;s going to provide even more impetus for the entertainment companies to alter their business models &#8212; or, to pursue harsh legislation.&nbsp; Second, I wonder if finding a hardware hack will be significant for most people.&nbsp; Finding, downloading, and running some software is pretty easy for moderately motivated individuals.&nbsp;I don&#8217;t imagine the same is true for hacking hardware.&nbsp; So, what impact would these hacks actually have on the general success of hardware-based DRM?<\/P><br \/>\n<P>&nbsp;<\/P><\/p>\n","protected":false},"excerpt":{"rendered":"<p>News.com has an interview with Andrew &#8220;Bunnie&#8221; Huang, who has researched how to hack the XBox. Interesting quote: &#8220;Right after I did the paper, I worked with a guy to find the avenues to completely bypass the Xbox security systems. And what we ended up with was amazing. It was a concatenation of four bugs [&hellip;]<\/p>\n","protected":false},"author":72,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[84],"tags":[],"class_list":["post-3193","post","type-post","status-publish","format-standard","hentry","category-general-news"],"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/archive.blogs.harvard.edu\/cmusings\/wp-json\/wp\/v2\/posts\/3193","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/archive.blogs.harvard.edu\/cmusings\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/archive.blogs.harvard.edu\/cmusings\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/cmusings\/wp-json\/wp\/v2\/users\/72"}],"replies":[{"embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/cmusings\/wp-json\/wp\/v2\/comments?post=3193"}],"version-history":[{"count":0,"href":"https:\/\/archive.blogs.harvard.edu\/cmusings\/wp-json\/wp\/v2\/posts\/3193\/revisions"}],"wp:attachment":[{"href":"https:\/\/archive.blogs.harvard.edu\/cmusings\/wp-json\/wp\/v2\/media?parent=3193"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/cmusings\/wp-json\/wp\/v2\/categories?post=3193"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/cmusings\/wp-json\/wp\/v2\/tags?post=3193"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}