If Intel is involved...

Mohnzh

Mohnzh

Krytan Explorer

Join Date: Mar 2007

Might find me roaming around doing missions in hard mode...or maybe I'm lost in the Underworld...

[KCOR]

Mo/

http://www.foxnews.com/story/0,2933,299021,00.html

...maybe we will get an anti-cheat system that actually works well. Maybe we should look for it in GW2?

Coridan

Coridan

Forge Runner

Join Date: Jun 2006

US

Old Married Gamers {OMG}

W/

I read about this earlier today as well...sounds interesting....but i think it is a long ways off yet.

Str0b0

Desert Nomad

Join Date: Feb 2006

North Carolina

N/Me

I wouldn't bet on it. there is always a way to exploit code. It's the nature of programming. It is impossible to program for every single instance. Eventually someone will figure out a way to get around any new anti-cheat measures and as soon as they plug that exploit another month will pass before someone figures out a way around the plug. Consign yourself to the reality of software. It can be hacked and no one can stop it from being hacked. The best they can do is try to hold it off for as long as possible.

On the flip side of that the more detailed and comprehensive the anti-cheat is the more man hours it costs to create and then you see an increase in game prices. It gets to the point where it isn't cost effective to prevent the cheating because you won't move enough units to offset the cost of creating the anti-cheat. Sorry man Intel or not that's life in the digital age.

Matfei

Matfei

Frost Gate Guardian

Join Date: Apr 2006

Australia

None. Being a loner X-Fire: matfei1

W/Mo

Im envisioning a system which looks for any changes in the game code at all (unofficial) even a texture transparency setting for see-thru walls in FPS games, to soemthing else, if a code has to be changed in any way, or linked to in an unofficial way (the devs would have to supply a anti-cheat company with the update details so the tracker can be updated) but if it finds any unofficial variation in code, it notifys the company of the erronous account and steps are taken...

Sure nothing perfect, but I think a constant file/code scanning system would work to some extent. Granted im not a coder or anything, its just an idea. Im not and expert on how code is handled etc.

Omega X

Omega X

Ninja Unveiler

Join Date: Jun 2005

Louisiana, USA

Boston Guild[BG]

W/Me

I smell ulterior motive. This is gonna be used for more than just cheating.

wilebill

wilebill

Desert Nomad

Join Date: Dec 2005

Mt Vernon, Ohio

Band of the Hawk

W/Mo

Omega X, sometime ago I remember reading that the IRS was interested in online games, and environments like Second Life, because there was a lot of taxable income not being reported. Taxable income from sales of ingame gold or plat, items, and the like. Possibly, this is why Intel is now getting involved; then again this may have nothing to do with it.

Dr Strangelove

Dr Strangelove

Furnace Stoker

Join Date: Dec 2005

Wasting away again in Margaritaville

[HOTR]

Thank god, because everyone knows punkbuster does a spot-on perfect job of preventing cheaters.

arcady

arcady

Wilds Pathfinder

Join Date: May 2006

San Francisco native

Mo/P

Got an alternate URL for that?

October Jade

October Jade

Wilds Pathfinder

Join Date: Jul 2005

drifting between Indiana and NorCal

Quote:
Originally Posted by arcady
Got an alternate URL for that?
Ah yes, San Franciscans are allergic to Fox News.

I'm not terribly fond of it either, but at least this is text media. You don't have to hear anyone screaming the article at your face.

Mohnzh

Mohnzh

Krytan Explorer

Join Date: Mar 2007

Might find me roaming around doing missions in hard mode...or maybe I'm lost in the Underworld...

[KCOR]

Mo/

Sorry, it's the only link I can find.

Wilebill, I think I also heard about the IRS getting interested in online games for the reasons you mentioned. A friend of mine showed me an article about a year ago in PCGamer (I think that was it) about just that.

Lord Sojar

Lord Sojar

The Fallen One

Join Date: Dec 2005

Oblivion

Irrelevant

Mo/Me

Pardon me, but this is my field of expertise. I will not let this happen so help me God... EVER. This type of direct hardware manipulation is a direct invasion of privacy. This could allow hackers to exploit the function, employing a very simple, yet effective form of key logging by simply assigning a value to each key and having the module detect yes or no to that value.

This had better not happen, or there will be federal lawsuits. It is the programmers duty to stop cheating, not the hardware manufacturers. Personally, this is just another ridiculous Intel PR stunt designed to make the common gamer feel comfortable in their office chair, but meanwhile, the implications this would create in regards to reverse engineering and module rewrites... UM NO.

arcady

arcady

Wilds Pathfinder

Join Date: May 2006

San Francisco native

Mo/P

Quote:
Originally Posted by October Jade
Ah yes, San Franciscans are allergic to Fox News.
Well when I joined the US military I swore this little oath to defend the Constitution against all enemies, foreign and domestic. so I don't tend to support threats to everything that document stands for.

It may seem absurd to some, but I see no point in clicking on a link to a site with a track record of politicized fabrications and a history of inciting paranoia rather than reporting. Doesn't matter what side they take, if a broadcaster takes such extremes as the above one does, they aren't worth paying attention to even for things as banal as weather reports.

Muspellsheimr

Muspellsheimr

Lion's Arch Merchant

Join Date: Feb 2007

The ONLY conceivable time this would be acceptable is assigned computers during a controlled environment tournament. Anything else, and it will have serious repercussions in regards to hacking and logging.

I would NEVER purchase such hardware, nor would nearly anyone else who understands it's possibilities, and I will actively promote boycotting any game that requires such hardware, as I suspect many others will as well.

bilateralrope

bilateralrope

Desert Nomad

Join Date: Nov 2005

New Zealand

Xen Of Onslaught (Xen of the Pacific division)

Quote:
Originally Posted by Mohnzh
http://www.foxnews.com/story/0,2933,299021,00.html

...maybe we will get an anti-cheat system that actually works well. Maybe we should look for it in GW2?
So you think there is a problem with Guild Wars when we have had one instance (the armbrace dupe exploit) of people exploiting bugs in the code, which was fixed quickly. So the security measures they are using for Guild Wars should be enough.

If you say there were others, you will need to provide proof of them.

Quote:
Originally Posted by Str0b0
I wouldn't bet on it. there is always a way to exploit code. It's the nature of programming. It is impossible to program for every single instance. Eventually someone will figure out a way to get around any new anti-cheat measures and as soon as they plug that exploit another month will pass before someone figures out a way around the plug. Consign yourself to the reality of software. It can be hacked and no one can stop it from being hacked. The best they can do is try to hold it off for as long as possible.
Yes, if you give the client access to the code it will be hacked. However the code sitting on the servers is much safer. And for Guild Wars all the important code is on the server, with the various clients treated as untrusted. The client computer doesn't say "I did this" to the server, instead it says "I try to do this" and the server checks to see if its possible.

I've seen how bad the hacking was in Maple Story when I played it for a few weeks. After asking around I found that the main design flaw was that calculations that players would want to hack were being done clientside, where they were getting hacked.

Though to be fair the server side processing does make lag more noticeable. For instance think of any tricky "jumping puzzle" you have played, then throw in about 250ms of lag and tell me how much harder it would make things.

Quote:
On the flip side of that the more detailed and comprehensive the anti-cheat is the more man hours it costs to create and then you see an increase in game prices. It gets to the point where it isn't cost effective to prevent the cheating because you won't move enough units to offset the cost of creating the anti-cheat. Sorry man Intel or not that's life in the digital age.
This is only true if you are somehow stupid enough to think that you can have full control of a computer when you have no physical access to it, and the person you are trying to take the control away from has full access.

Lets take the example from the fox news article of saying you fired 100 shots when you only fired one:
- In a baldy designed system, the server takes this as a fact.
- In a server side system, the server checks to see if firing those 100 shots is even possible. If not, it only lets you fire one while ignoring the other fire commands. Or the command simply says "start firing" and you keep firing until either you say stop, or something prevents you from firing again (say, your target dies).
- In the system Fox is promoting, the game maker will need control of your computer down to the hardware level (say goodbye to running windows games on other operating systems) and have it report back to them. But if someone figures out what is being reported back and spoofs it, there goes the anti-hack system. Not to mention various legal issues of spying on peoples computers.

Lets say someone uses this system for hack prevention, but the spyware module isn't on all computers. This means that either they lock out a portion of their market, or they have "trusted" and "untrusted" players. So the "trusted" players will be under less monitoring (if you aren't going to treat them differently, why have the chip ?). So when one of them does hack things, they will take longer to spot than if they were in the trusted group.

bilateralrope

bilateralrope

Desert Nomad

Join Date: Nov 2005

New Zealand

Xen Of Onslaught (Xen of the Pacific division)

Quote:
Originally Posted by Muspellsheimr
The ONLY conceivable time this would be acceptable is assigned computers during a controlled environment tournament. Anything else, and it will have serious repercussions in regards to hacking and logging.
A controlled tournament is very easy to secure without this spyware chip. The people hosting the tournament provide the computers to be used, load any required software, arrange them so that players don't have any quick access to the computer case, then have people watching them to make sure they don't attempt anything.

So basically I'd have the computer locked in a box with holes in it for the cables.

Mohnzh

Mohnzh

Krytan Explorer

Join Date: Mar 2007

Might find me roaming around doing missions in hard mode...or maybe I'm lost in the Underworld...

[KCOR]

Mo/

bilateralrope,

I dont think this is geared towards exploiting code bugs, per se. I think itis more generalized than that. Hopefully it will be something that can detect and prevent botting and other forms of "cheating". I tend to suspect whether or not the ideas can be implemented legally. But I cannot support the reporters choice to speculate that some companies do not talk about their anti-cheat technology because it probably violates certain Californian laws.

sindex

sindex

Wilds Pathfinder

Join Date: Aug 2006

California

Swords of Night & Day [SWRD]

I still am questioning why Intel bought Havok. Nevertheless I like Intel, but the whole big brother thing kind of creep’s me out. You have to understand there will always be a flaw in the system that can be eventually be exploited. I know the battle still rages with security systems/programs against identity theft, computer viruses, and other technical malicious stuff. What makes you think any of this will go away in the future?

immortius

immortius

Krytan Explorer

Join Date: Aug 2005

Black Cats

E/Mo

I'ld have to agree that Guild Wars doesn't need any sort of client-side cheat detection - it is too well designed to need it. The netcode found in Korean MMORPGs makes me cry, and I'ld prefer they fixed it rather than rely on external cheat detection systems.

The Intel anti-cheating system is more likely to be aiming to stop wall-hacks and aim bots in FPSes than anything else, as those are unavoidable holes client-side. And by its Intel nature it will necessarily be optional, as any AMD user will be unable to use it.

$neekie

Academy Page

Join Date: Jun 2006

Netherlands

R/

Quote:
Originally Posted by Rahja the Thief
Pardon me, but this is my field of expertise. I will not let this happen so help me God... EVER. This type of direct hardware manipulation is a direct invasion of privacy. This could allow hackers to exploit the function, employing a very simple, yet effective form of key logging by simply assigning a value to each key and having the module detect yes or no to that value.

This had better not happen, or there will be federal lawsuits. It is the programmers duty to stop cheating, not the hardware manufacturers. Personally, this is just another ridiculous Intel PR stunt designed to make the common gamer feel comfortable in their office chair, but meanwhile, the implications this would create in regards to reverse engineering and module rewrites... UM NO.
Dont wanna burst your bubble but its already, happening on a small scale. Take Punkbuster, its constantly running proces(since the handshake update). Even wenn your not running games(or non PB games).

BF2142 has a tracking system to, to check how much the players look at the ing add(wich are changeble). It has nothing to do with cheating, but they still look at what your doing. Killing this proces will crash your game...

I dont like these things, but i welcome some active cheater defence(pb is phew phew). I did a lot of research into BF2 cheats, macro use(just as bad as cheats and non detectable) and how PB isnt able to catch up, the cheaters that get cought often get couhgt by admins using PB screenies(investing time to look all of them over) and getting there server streamed by Punksbusted and the masterban list, what does dice/ea do with the official reports..................nothing because they dont accept pb screenies,WTF!

I quit bf2 because of this crap, there are even name spoof cheats(wich got some top 10 players reset) Cheat companies garantee, that you dont get cought, if you do they give you a new game key. But hey the game is 2 years old why support it anymore..............crappy EA.

Sry for the rant, but i really loved bf2 and its mods. Its frustrating to see the game go down. I for 1 would welcome better anti cheat software, or rather see it incoded(dont know if thats possible) in the game, plus i h8 to say it(i love the mods) but companies should stop giving out mod tools. And better protect there games(leggaly), ea isnt able to even sue the cheat companies(dont ask me why, country problem maybe?).

Online games are getting bigger and bigger, about time somebody actually did something about cheaters and autokeybind/macro use(make some clear rules). For all game types and how i dunno, i wouldent mind the spyware(its in alot of games already) Again sry for the rant....

mzzls

bamm bamm bamm

bamm bamm bamm

Krytan Explorer

Join Date: Jul 2006

Quote:
Originally Posted by immortius
And by its Intel nature it will necessarily be optional, as any AMD user will be unable to use it.
Well, AMD are a founding member of the Trusted Computing Group, so I wouldn't be too sure.

zwei2stein

zwei2stein

Grotto Attendant

Join Date: Jun 2006

Europe

The German Order [GER]

N/

Quote:
Originally Posted by Omega X
I smell ulterior motive. This is gonna be used for more than just cheating.
Bingo!

http://www.gnu.org/philosophy/can-you-trust.html

Any MMO game can (and should be) designed in a way that makes client-side tampering impossible.

Presearing exploit is example where anet developers messed up and added functionality supposed to be in server to client. Long time ago, regen/degen was handled client side, resulting in ludicrous godmode cheats.

Stuff like duping was server side error, and that intel thingie would have done NOTHING against that.

So, local anticheat = fail.

Fril Estelin

Fril Estelin

So Serious...

Join Date: Jan 2007

London

Nerfs Are [WHAK]

E/

Quote:
Originally Posted by bamm bamm bamm
Well, AMD are a founding member of the Trusted Computing Group, so I wouldn't be too sure.
Is this going to be another "Bash Trusted Computing" thread? If so, please educate yourself before you start discussing this issue (I'm at the second summer school on Trusted Computing right now, with Intel and AMD, and even Microsoft; but these guys are not paying me, directly or indirectly; and I work with AMD guys in an open-source project, just so you know I'm not waving the flag for nothing).

This measures are perfectly normal. Security was, is and always will be an arms race. Companies propose security systems (I would agree that TC is a much more sensitive technology than AV and FW) and hackers (bear in mind, now they no longer do it for the fun or reputation, we're talking millions in real money here, with links with mafia and other traffics) push through it, which force companies to fix until a certain point where they have to move to the next security paradigms.

I guess everyone would agree that when TJX's laptop were stollen and many customer information were available to hackers, fixing this issue would be welcome, right? Well, to fix this, you have to encrypt, and to make encryption work, you have to protect the key, and there are NO completely secure way to do that. Until you add hardware control (policy enforcement), which the most difficult and costly way to break (the hacker has to physically get at your computer, much more difficult than sending a trojan, isn't it?).

And since the gaming industry is the biggest one (more than movie and music, which makes people's scare about DRM very relative!), you can expect something big to happen here. I know that Intel's proposals in the last 2 years have been rejected due to their high cost (change in the way PCI works), but they are finding new innovative ways to improve the situation.

As can be seen from the /report system in GW, such features will be received by people shouting messages of "we're doomed" and "it won't work". Until they start to see it works. Which does not mean that this one will work, but at least they try. And if you have a BETTER solution, please apply for a job at Intel. If it's really better, you'll get a very well paid job!

shirosae

Academy Page

Join Date: Jul 2006

UK

Moon Unit Carby

R/Me

So this is how Intel are going to push their hardware DRM?

Fril Estelin

Fril Estelin

So Serious...

Join Date: Jan 2007

London

Nerfs Are [WHAK]

E/

Quote:
Originally Posted by zwei2stein
Ok, so just to spare you some time, you can look at the wiki site where the opponents of TC have put all their "arguments" (you should look for Ross Anderson's ideas about the TPM being controlled by the white house ...):
http://en.wikipedia.org/wiki/Trusted_computing

They even have a nice video for those who think that a complicated technology can be summarised with a nice video.

Most of this stuff has been debunked in the scientific community, has been implemented by companies and is currently rolled out in the business world (where the highest loss are seen, see health and banking records being stollen).

Quote:
Any MMO game can (and should be) designed in a way that makes client-side tampering impossible.
Totally true. And totally impossible today, because all software is breakable. Any solid programmer knows that. You can most of the time design the software so that exploits don't lead to problems, but for any relatively complex software, this is not true. So you have to introduce an element of hardware, which makes it more difficult (since you have to have physical access).

What scares people is that the same technology that can be used to prevent cheating (well, it's all relative, people can still create scams and phishing, but this is a social engineering attack on the persons, not the computer) can also be used to enforce DRM. And then no more free games, videos and music.

Fril Estelin

Fril Estelin

So Serious...

Join Date: Jan 2007

London

Nerfs Are [WHAK]

E/

Quote:
Originally Posted by shirosae
So this is how Intel are going to push their hardware DRM?
Intel develops the platform, not the application. It's like blaming the car companies for the way people drive their car. (or more precisely for the government's highway code...)

(something tells me I'm going to have a very hard time fighting the wrong ideas here ... please read all my messages before you post a reply, thanks!)

SotiCoto

SotiCoto

Banned

Join Date: Jan 2007

Drazach Thicket

Temple of Zhen Xianren [Sifu]

Quote:
Originally Posted by shirosae
So this is how Intel are going to push their hardware DRM?
Precisely.

Take me back to the old PSO way any day.
I doubt I would have enjoyed PSO as much if it hadn't been hacked to hell and back. Sega unfortunately didn't like it much.... but it did make the game more interesting. Plus there was a sense of satisfaction to teaching those without the hack-disks to exploit glitches in the game in order to defend themselves against the hackers.
It was the kind of anarchy I can only dream of these days.... but it worked wonders.

zwei2stein

zwei2stein

Grotto Attendant

Join Date: Jun 2006

Europe

The German Order [GER]

N/

Quote:
Originally Posted by Fril Estelin
Totally true. And totally impossible today, because all software is breakable. Any solid programmer knows that. You can most of the time design the software so that exploits don't lead to problems (WTF, seriosly, WTF), but for any relatively complex software, this is not true. So you have to introduce an element of hardware, which makes it more difficult (since you have to have physical access).
http://www.google.com/search?q=modchip HW can make it dificult, but not impossible. If enduser wants his freedom back, you cant really stop him.

---

ASAP programer tries to weasel out from making mess by claiming that mistakes are inevitable, its time to fire him on spot.

Amount of possible attacks on software is finite. All it takes is decent data entry filter and bam! Inpenetrable software. OFC, this is simple model. Its not cheap or anything, but guess what? If you dont do it, security chip wont save your ass because it can do nothing about rogue systems.

Its time for you to call buddies that work for banks. Believe me, they know better than "we cant fix all holes, yadada yadada".

Also, you really cant believe that DRM can be saved by that chip. Its defective by design: For enuser to access content, he must have key, sw to decrypt AND ciphertext. You can make it complicated, but you can never get around this simple fact.

FYI, before you start with "you have no idea..."... I work as software consultant. For banks.

Fril Estelin

Fril Estelin

So Serious...

Join Date: Jan 2007

London

Nerfs Are [WHAK]

E/

Quote:
Originally Posted by zwei2stein
Amount of possible attacks on software is finite. All it takes is decent data entry filter and bam! Inpenetrable software. OFC, this is simple model. Its not cheap or anything, but guess what? If you dont do it, security chip wont save your ass because it can do nothing about rogue systems.
Did you write a compiler? A library linker? Part of an OS kernel? Hardware firmware? (hint: that's roughly the chain of controls that you need to control in SW) I will leave you with this classic paper, before we delve deeper into the madness:
http://cm.bell-labs.com/who/ken/trust.html

Quote:
Its time for you to call buddies that work for banks. Believe me, they know better than "we cant fix all holes, yadada yadada".
You've heard of phishing attacks? And server DDoS? Guess who they target?

BTW, do you know the only OS that have a CC EAL4?

Quote:
Also, you really cant believe that DRM can be saved by that chip. Its defective by design: For enuser to access content, he must have key, sw to decrypt AND ciphertext. You can make it complicated, but you can never get around this simple fact.
Yep, unless it's done in hardware. Then you have to open the TPM to see they key. And I wish you good luck with that (You'll be billionaire in months if you succeed).

Quote:
FYI, before you start with "you have no idea..."... I work as software consultant. For banks.
Well, sorry but they should fire you. You apparently say things that are not true, so one could jump to consider what you program as "dodgy"...

(I taught software engineering in 1st year of a computing science university, we teach such things; I'm also working on formal methods, the only thing you could call close to safe computing in SE, look at EAL7 ...)

shirosae

Academy Page

Join Date: Jul 2006

UK

Moon Unit Carby

R/Me

Quote:
Originally Posted by Fril Estelin
Intel develops the platform, not the application. It's like blaming the car companies for the way people drive their car. (or more precisely for the government's highway code...)

(something tells me I'm going to have a very hard time fighting the wrong ideas here ... please read all my messages before you post a reply, thanks!)
I wasn't replying to you; i was making a statement.

Also, Intel specifically made mention of it as usable as hardware DRM back four and a bit years ago when the project was kinda widely picked up by the internet, and again highlighted when Apple announced it was going to start using Intel chips.

There are a ton of google entries dated around 2004-2005 which clearly show Intel trying not to say what the hardware was supposed to do, before admitting that it was 'forward-looking DRM'.

If Intel want to argue now that the direction of the project has changed, fine. But DRM was one of the fundamental purposes of that technology. I would be very surprised if it wasn't destined to end up being used in this fashion.

bamm bamm bamm

bamm bamm bamm

Krytan Explorer

Join Date: Jul 2006

Quote:
Originally Posted by Fril Estelin
snip
I'm already aware of all of this. I just said AMD are unlikely to be exempt. Where do you get off telling people to 'educate themselves'?

Str0b0

Desert Nomad

Join Date: Feb 2006

North Carolina

N/Me

Hardware or not it's still not going to work. Even if the majority of the code is kept server side all someone has to do is find the code that tells the bits of hardware on your end to report to the server. In other words you have program A sitting on a computer telling server B anything that is out of the ordinary. This means the actual monitoring is done client side but reported server side.

They already have this in network security. It's just a behavioral monitoring program put on a chip and it can be defeated. All you have to do is gather a baseline set of readings for normal operation and basically have another program report those to the reporting software while you do whatever you like. to that end you don't even need to know the server side code. All you need to know is the client side code and the normal parameters it checks for, which would also be in the codebase. Then you can design a program that does nothing but lie to the reporting software causing it to send false reports to the server.

The PoC of this has been around for over a year now. It's a simple macro virus that uses Excel features to attack your computer. It slipped past Symantec security and behavioral monitoring software because it was designed to search for and lie to those programs. It did it rather elegantly by taking a digital "snap shot" of the operating system at the moment of installation. It then fed those values to the behavioral monitoring software over and over and over again while it opened up excel and made your computer do bad things. Security software didn't know any better because the virus was sending it data that said everything was functioning normally.

EternalTempest

EternalTempest

Furnace Stoker

Join Date: Jun 2005

United States

Dark Side Ofthe Moon [DSM]

E/

Quote:
Originally Posted by Omega X
I smell ulterior motive. This is gonna be used for more than just cheating.
I agree with you, or it's just a tech they can sell to make more money.
The more that "hardware" does things like scan / check stuff or ... it can check for "unlicensed media files or pirated media files and notfiy X" at the hardware level, this should really be controlled at the software level.

The problem is you can have a "box" that between keyboard and usb/ps2 port that can use macro's to simluate keyboard strokes that pc will not be able to detect. Then they can use the arugment must come up with a "standard" to encrypt keyboard to pc communcation... which could also be broken.

Build a better mouse trap, get better mice.

zwei2stein

zwei2stein

Grotto Attendant

Join Date: Jun 2006

Europe

The German Order [GER]

N/

Quote:
Originally Posted by Fril Estelin
Did you write a compiler? A library linker? Part of an OS kernel? Hardware firmware? (hint: that's roughly the chain of controls that you need to control in SW) I will leave you with this classic paper, before we delve deeper into the madness:
http://cm.bell-labs.com/who/ken/trust.html
I wouldnt have degree if i werent able to write compiler...

Were talking service, with well defined API and input. There, your attacks are injection ... or injection.

Quote:


You've heard of phishing attacks? And server DDoS? Guess who they target?

BTW, do you know the only OS that have a CC EAL4?
server DDoS is problem, yes, but how would your chip help? It can be remedied by identifiying attacker before its too late, help a bit against swarm.

how does phishing come to this debate, but whever.

z/OS V1R8 for example? Is this googling contest anyway? Some linux distros aim for L5 btw.

EAL7 is possible. Not worth required money for public sector.

Quote:

Yep, unless it's done in hardware. Then you have to open the TPM to see they key. And I wish you good luck with that (You'll be billionaire in months if you succeed).
http://www.boingboing.net/2007/02/13...hddvd-bro.html for example.

HW still needs key inside, still needs it processed, and is prone to tampering.

But whatever.

Fril Estelin

Fril Estelin

So Serious...

Join Date: Jan 2007

London

Nerfs Are [WHAK]

E/

Quote:
Originally Posted by bamm bamm bamm
I'm already aware of all of this. I just said AMD are unlikely to be exempt. Where do you get off telling people to 'educate themselves'?
Basically, Intel is into this business because they design chipsets. AMD's market share in chipsets is pretty small, so I guess you won't see them anywhere close to this (especially given the risk of getting more people upset, as usually they react berserk when one mentions the magic word "DRM" ... but yes that's not what you said but what someone else said!)

Fril Estelin

Fril Estelin

So Serious...

Join Date: Jan 2007

London

Nerfs Are [WHAK]

E/

Quote:
Originally Posted by Str0b0
Hardware or not it's still not going to work. Even if the majority of the code is kept server side all someone has to do is find the code that tells the bits of hardware on your end to report to the server. In other words you have program A sitting on a computer telling server B anything that is out of the ordinary. This means the actual monitoring is done client side but reported server side.

They already have this in network security. It's just a behavioral monitoring program put on a chip and it can be defeated. All you have to do is gather a baseline set of readings for normal operation and basically have another program report those to the reporting software while you do whatever you like. to that end you don't even need to know the server side code. All you need to know is the client side code and the normal parameters it checks for, which would also be in the codebase. Then you can design a program that does nothing but lie to the reporting software causing it to send false reports to the server.

The PoC of this has been around for over a year now. It's a simple macro virus that uses Excel features to attack your computer. It slipped past Symantec security and behavioral monitoring software because it was designed to search for and lie to those programs. It did it rather elegantly by taking a digital "snap shot" of the operating system at the moment of installation. It then fed those values to the behavioral monitoring software over and over and over again while it opened up excel and made your computer do bad things. Security software didn't know any better because the virus was sending it data that said everything was functioning normally.
The way they will prevent that is called a "chain of trust": the TPM is a tamper-resistant hardware (open it and it will clear all its content); the BIOS uses it to store a hash of the boot loader, which i then started and in turns hashes the boot loader, and so on until the particular OS, libraries and the game (probably in a virtualised compartment, but this is a bit off-topic) run. And these last components will not enable you any kind of reverse engineering (the API will be restricted to what the game needs) or have any unrelated features (you run your game in one "compartment" and the rest in another, the two compartment use separate memory spaces that can't be read from the other compartment). Plus you'll use some of the crypto that the TPM provides to hide the communication with the server (you can't see the keys inside the TPM unless you hack the OS which will not be permitted in these scenarios).

This is NOT, to my knowledge, the way they plan to implement it. Just one possible scenario.

Chthon

Grotto Attendant

Join Date: Apr 2007

Quote:
Originally Posted by Omega X
I smell ulterior motive.
An ulterior motive? Behind a hardware keylogger? How could you possibly suspect a thing? My $5 says that data is going to end up fed to corporate "employee monitoring" spyware and/or Dick Cheney and his domestic spy programs relatively quickly after release.

At any rate, such a system would be easily defeated by a hardware dongle. It's not like we haven't had third-party hardware devices to spoof user input since the first "turbo" controller for the NES or anything....
If you wanted to get really fancy, you could give your dongle an additional USB connector and feed it the (complex, situation-dependent) output from a macro to feed back into the keyboard input.

Moreover, the unit is going to need a driver, either in windows or in firmware, which leaves open the possibility of disabling it with a "patched" driver.

So...

Quote:
Originally Posted by zwei2stein
So, local anticheat = fail.
Precisely.

While their implementation isn't always perfect, a-net's anti-cheating philosophy is -- Presume the client is infinitely hackable; Move everything that isn't "mere I/O" to the server; Make sure your input is coming from the right user (session encryption ftw); Sanity check you input (The pistol-turned-machine gun in the FoxNews <shudders with disgust> report could be easily dealt with by implementing a max refire rate for the gun.. duh...); And don't send any output to the client that you don't want the user to know (D2 maphack ftw).

Fril Estelin

Fril Estelin

So Serious...

Join Date: Jan 2007

London

Nerfs Are [WHAK]

E/

Quote:
Originally Posted by zwei2stein
server DDoS is problem, yes, but how would your chip help? It can be remedied by identifiying attacker before its too late, help a bit against swarm.
Ever heard of whitelists?

Quote:
how does phishing come to this debate, but whever.
Go ask the banks . Impenetrable SW does not exist in any way. You' have a good example of why in Ken Thomson's paper. Or when you realise that any SW runs on the processor, which the SW has no control over.

Quote:
HW still needs key inside, still needs it processed, and is prone to tampering.
Maybe if you're the chip maker. The big guns in the business already started trying to break it, without the hind of a chance. Furthermore, thanks to a clever design, if you succeed in opening your TPM, you'll only get keys for your platform, which are different from anyone else's.

zwei2stein

zwei2stein

Grotto Attendant

Join Date: Jun 2006

Europe

The German Order [GER]

N/

Quote:
Originally Posted by Fril Estelin
Ever heard of whitelists?
Yes, but they cant be emloyed in most places ...

Quote:
Go ask the banks . Impenetrable SW does not exist in any way. You' have a good example of why in Ken Thomson's paper. Or when you realise that any SW runs on the processor, which the SW has no control over.
But you have controll of HW - you choose it. Thats why majority should run server side where you controll it and why you expect every outside machine as dangerous, because you cant make sure that it stays trustworthy.

Point here is that you can not make software secure if there is physical access to machine which runs it (that procesor of yours helps, but does not stop it.).

But you can secure remote server enough to be inpenetrable /unless you got some social engineering going on, but nothing expect common sense helps against that./.

Quote:
Maybe if you're the chip maker. The big guns in the business already started trying to break it, without the hind of a chance. Furthermore, thanks to a clever design, if you succeed in opening your TPM, you'll only get keys for your platform, which are different from anyone else's.
Human factor is greatest threat here. Give it a while of being masproduced.

nightwatchman

nightwatchman

Lion's Arch Merchant

Join Date: Apr 2006

W/

The problem with this sort of thing is that we're going to get into a situation where Guildwars (etc) only runs on PCs with all the latest "trust" hardware from a "trusted" group of hardware vendors all of which probably charge a premium.

If you've got a PC thats a couple of years old, or if you don't want to pay for trust hardware you'll be flagged as a likely hacker, or banned from playing at all.

If MMOs think they have to rely on these sort of things, they should just do everyone a favor and run on consoles instead.

Fril Estelin

Fril Estelin

So Serious...

Join Date: Jan 2007

London

Nerfs Are [WHAK]

E/

Quote:
Originally Posted by nightwatchman
The problem with this sort of thing is that we're going to get into a situation where Guildwars (etc) only runs on PCs with all the latest "trust" hardware from a "trusted" group of hardware vendors all of which probably charge a premium.

If you've got a PC thats a couple of years old, or if you don't want to pay for trust hardware you'll be flagged as a likely hacker, or banned from playing at all.

If MMOs think they have to rely on these sort of things, they should just do everyone a favor and run on consoles instead.
Very good point. One thing you should know: all the people (including me I realise) talk about these system in the present tense, while they should mention these systems won't be here before 3 or 4 years. Until then, people will continue to be scammed and credit card databases will continue to be stolen.

This thread reminds me of the one on the /report feature. The only vocal people are the ones complaining, and sometimes whining (those that can no longer play nasty and get pleasure from annoying other people). The ones that have no problem with the system don't talk.