cracking

Latest

  • Getty Images/iStockphoto

    Notorious Denuvo gaming cracker Voksi arrested in Bulgaria

    by 
    Rachel England
    Rachel England
    07.26.2018

    Anti-piracy tech company Denuvo isn't messing around when it comes to game hackers. It touts its digital rights management (DRM) tool as uncrackable and for the most part, it held up for years. But in 2016, a Bulgarian games cracker called Voksi managed to break the system, and now he's been arrested.

  • Pirates are finding it harder to crack new PC games

    by 
    Steve Dent
    Steve Dent
    01.07.2016

    Pirates at the infamous Chinese hacking forum 3DM are complaining that recent PC games are simply too darn hard to crack, according to Torrent Freak. The problem is apparently Denuvo, a copy protection scheme that prevents tampering of the underlying DRM. Two recent games that use the scheme, FIFA 16 and Just Cause 3, have still not been cracked, despite appearing in early December. Based on the current pace of encryption tech, "in two years time I'm afraid there will be no free games to play in the world," said one forlorn pirate.

  • Hackers can crack the self-aiming rifle to change its target

    by 
    Andrew Tarantola
    Andrew Tarantola
    07.29.2015

    TrackingPoint's computer-augmented rifle sights, better known as the ShotView targeting system, have set off a wave of controversy and debate since they first debuted in 2014. That debate is about to get even hotter now that security researchers Runa Sandvik and Michael Auger have shown Wired a way to break into the rifle and shut it down or, even worse, change the target to the hacker's choosing.

  • Apple reportedly cracking down on App Store pirates

    by 
    Steve Sande
    Steve Sande
    01.04.2012

    According to a post this morning on Ars Technica, Apple is taking legal measures to make it more difficult for pirated copies of App Store apps to make their way to the hands of iOS device owners. The company is sending takedown notices to Apptrackr, a site that commonly directs users to cracked versions of popular apps. The takedown notices are being sent under the auspices of the Digital Millennium Copyright Act (DMCA), which is the US implementation of two treaties of the World Intellectual Property Organization. Apptrackr developer "Dissident" says that Apple has scraped links from Apptrackr, and then sent takedown notices in an attempt to cut off access to the cracked apps. To combat Apple's anti-piracy efforts, Apptrackr has moved to servers outside of the US, and -- according to Ars -- is "using a form of redirection to avoid 'direct' links to infringing content." Some developers have reported that piracy rates for their apps are as high as 80 percent, which would result in losses in the millions of dollars for individual developers and possibly billions of dollars to Apple. Apptrackr defends their activities by saying that their "service" is "for application trials, and nothing else." On the Apptracker site "About Us" page, Dissident claims that "pirates who do not choose to purchase the applications they install are not lost sales. They were very, very likely never potential customers in the first place. Piracy's conversion rate is absurdly low, and developers know that." Regardless of how you personally feel about software piracy, it's fascinating to see that Apple is coming to the defense of App Store developers by attacking Apptrackr with takedown notices.

  • Sony releases statement on PS3 hacking, surprisingly comes out against it

    by 
    Joseph L. Flatley
    Joseph L. Flatley
    02.16.2011

    In the wake of recent developments in Sony's war on Geohot, the company has released an "Official Statement Regarding PS3 Circumvention Devices and Pirated Software," which reads, in part: Consumers using circumvention devices or running unauthorized or pirated software will have access to the PlayStation Network and access to Qriocity services through PlayStation 3 system terminated permanently. To avoid this, consumers must immediately cease use and remove all circumvention devices and delete all unauthorized or pirated software from their PlayStation 3 systems. In other words: get caught with custom firmware, find yourself banished from the PlayStation Network forever. Seems rather reasonable. More reasonable than, say, filing a motion in court for the usernames and IP addresses of everyone who posted comments on Geohot's YouTube video. Read the entire statement at the source link.

  • PS3 firmware 3.56 hacked in less than a day, Sony's lawyers look confused (update)

    by 
    Nilay Patel
    Nilay Patel
    01.29.2011

    Sony's taken some strong steps against PS3 cracking in the past week -- not only has it taken to the courts and won a temporary restraining order against Geohot and fail0verflow for cracking the console, but it also released firmware 3.56, which locked things down again. Unfortunately, that restraining order doesn't mean anyone else has to stop a-crackin', and wouldn't you know it: 3.56 was cracked open in less than a day by KaKaRoToKS, who was behind one of the first 3.55 custom firmwares. Now that the 3.56 signing keys are out, we'd guess updated custom firmware is soon to come -- and we'd bet Sony's lawsuit will just inspire an entirely new wave of people to jailbreak once those hit the scene. Way to put that genie back in the bottle, Sony. Update: We're hearing that new custom firmware isn't on the table quite yet, because Sony changed most of the locks, and is reportedly actually storing the all-important ECDSA private key with random-number cryptography this time around. Be warned: if you upgrade to 3.56, there's no easy way back down. In related news, Github complied with a DMCA takedown notice to remove KaKaRoToKS's repositories, so you'll have to head on over to Gitorious (at our more coverage link) to get at the fail0verflow tools. [Thanks, Tomi R]

  • Confirmed: Intel says HDCP 'master key' crack is real

    by 
    Joshua Topolsky
    Joshua Topolsky
    09.16.2010

    It's been just a few days since we broke news of the HDCP master key crack -- a rogue unlocking of the code that keeps HD content under strict control. Now Intel has independently confirmed to both Fox News and CNET that the code is indeed the genuine article. According to company spokesman Tom Waldrop, "It does appear to be a master key," adding that "What we have confirmed through testing is that you can derive keys for devices from this published material that do work with the keys produced by our security technology... this circumvention does appear to work." Coming from the company that developed and propagated the protocol, that's about as clear as you can get. If Intel is worried about the potential damage to copyrighted material and a new flood of super high-quality pirated material, however, the company certainly isn't showing it. "For someone to use this information to unlock anything, they would have to implement it in silicon -- make a computer chip," Waldrop told Fox News, and that chip would have to live on a dedicated piece of hardware -- something Intel doesn't think is likely to happen in any substantial way. Of course, like any major corporation, Intel seems prepared to duke things out in the legal arena should any super-rich hackers decide to do the unthinkable. So, to the Batcave then?

  • iPhone SMS database hacked in 20 seconds, news at 11

    by 
    Sean Hollister
    Sean Hollister
    03.25.2010

    It's a story tailor-made for the fear-mongering subset of news media. This week, a pair of gentlemen lured an unsuspecting virgin iPhone to a malicious website and -- with no other input from the user -- stole the phone's entire database of sent, received and even deleted text messages in under 20 seconds, boasting that they could easily lift personal contacts, emails and your naughty, naughty photos as well. Thankfully for us level-headed souls, those gentlemen were Vincenzo Iozzo and Ralf-Philipp Weinmann, security researchers performing for the 2010 Pwn2Own hacking contest, and their $15,000 first prize ensures that the winning formula will go to Apple (and only Apple) for further study. Last year, smartphones emerged from Pwn2Own unscathed even as their desktop counterparts took a beating, but this makes the third year in a row that Safari's gotten its host machines pwned. That said, there's no need for fear -- just a healthy reminder that the Apple logo doesn't give you free license to click links in those oh-so-tempting "beta-test the new iPad!" emails.

  • 1024-bit RSA encryption cracked by carefully starving CPU of electricity

    by 
    Sean Hollister
    Sean Hollister
    03.09.2010

    Since 1977, RSA public-key encryption has protected privacy and verified authenticity when using computers, gadgets and web browsers around the globe, with only the most brutish of brute force efforts (and 1,500 years of processing time) felling its 768-bit variety earlier this year. Now, three eggheads (or Wolverines, as it were) at the University of Michigan claim they can break it simply by tweaking a device's power supply. By fluctuating the voltage to the CPU such that it generated a single hardware error per clock cycle, they found that they could cause the server to flip single bits of the private key at a time, allowing them to slowly piece together the password. With a small cluster of 81 Pentium 4 chips and 104 hours of processing time, they were able to successfully hack 1024-bit encryption in OpenSSL on a SPARC-based system, without damaging the computer, leaving a single trace or ending human life as we know it. That's why they're presenting a paper at the Design, Automation and Test conference this week in Europe, and that's why -- until RSA hopefully fixes the flaw -- you should keep a close eye on your server room's power supply.

  • WPA networks cracked in just under a minute, researchers claim

    by 
    Ross Miller
    Ross Miller
    08.27.2009

    To think it was just a few months ago that we thought taking 15 minutes to crack WPA encryption was a feat. Researchers from Kobe University in Japan are claiming they can best that by a wide margin by cracking any WPA-protected connection using the TKIP algorithm within just one minute flat. The details will be revealed at a tech conference on September 25th. Feeling paranoid? Bump up your encryption to the still-secure AES algorithm or WPA2... and if you're just wanting to live life on the edge, consider downgrading to WEP -- it's as good as open at this point anyway.

  • Palm quietly improving Pre build quality, tweaking hardware

    by 
    Nilay Patel
    Nilay Patel
    08.12.2009

    It's not the most comprehensive survey, nor is there any official confirmation, but the crew at PreThinking has checked in with a number of new Pre owners and discovered that Palm's apparently building its webOS handset better lately -- and what's more, it's even made some minor improvements. The biggest change appears to be a fix for that nasty bug that caused the Pre to reset or turn off when the keyboard was closed -- that bit of grey foam pictured was added to the battery compartment to tighten up the battery connection. There's a also word that the screen cracking and unintended rotation issues have been addressed, although time will tell on those, and the button color has changed from pearl to silver. As for improvements, well, there's a new battery model, and the Palm logo is now embossed on the carrying case. Yep, just little stuff, but it's good to see Palm addressing the build issues on the Pre, which are by far the most common complaint about the device. Let us know if you've spotted anything else, would you?

  • iPhone app phones home to foil pirates

    by 
    Michael Rose
    Michael Rose
    03.09.2009

    Like many iPhone developers, Ben Chatelain is frustrated to see cracked versions of his project, Full Screen Web Browser, showing up online. Following the usability suggestions of John Gruber, Ben has chosen to do something about it. The latest version of his app has detection capabilities for pirated instances, and reports the UUID of the device back to his server. After 10 days of running a cracked version, users are presented with a "trial over" dialog box and given the option to buy up to the legitimate version.As antipiracy measures go, this is about as benign as you can get, and it's in good alignment with the stated 'we crack so we can try before buying' philosophy that the crack community espouses; the alternative approach from RipDev may block piracy altogether, but it also involves more work and more cost. There might be some legitimate purchasers who balk at any phone-home capabilitity that includes personally identifiable data, but Ben claims his implementation only pings back from cracked versions. With the pingback code running, his preliminary stats show that about 10% of the users of his latest version are running unlicensed copies -- that's very low compared to some popular games, where whisper numbers estimate that more than half of all users never paid for the app. It's important to remember that pirated copies ≠ 'lost sales,' at least not at a 1:1 ratio, as most users of cracked copies would never have bought the app at retail. Ben's approach at least gives those users the opportunity to choose a legit copy over a cracked one.[hat tip to Razorianfly]

  • Sony Ericsson's XPERIA X1 developing cracks?

    by 
    Darren Murph
    Darren Murph
    12.28.2008

    Sheesh, what's up with top tier handsets cracking this year? First the iPhone 3G, now SE's XPERIA X1? A curiously high amount of cracking complaints are starting to build around the web, possibly indicating that a quality issue could be somewhat widespread. We're hesitant to believe that this here quirk is even close to happening everywhere, but it is somewhat suspicious that HTC and SE have recently been rumored to be going their separate ways after this phone has faded from the limelight. At any rate, we've no choice but to poll our own audience here, so have you seen unwanted cracks appear in your X1? If so, hit the read link -- you definitely aren't alone in all of this.[Via WMPowerUser]

  • Alienware Area-51 m15x owners outraged by overheating, cracking issues

    by 
    Darren Murph
    Darren Murph
    03.12.2008

    We've been inundated with e-mails from Alienware m15x owners who have shelled out thousands of bucks in order to take home a serious piece of gaming hardware, only to find that their machine is overheating and / or developing cracks in the frame for no apparent reason. If you'll recall, this isn't the first time the laptop aficionados over at Notebook Review got all worked up over an issue with the m15x, but it seems the latest round of quirks have pushed the community over the edge. So, have any of you out there awoke to see your machine slightly more damaged than it was the night before? Are things getting way too heated for anyone's comfort? Let us know what's up in comments below.Update: Alienware pinged us to say that the linked response below is in fact authentic, and that the company is "aware of the issue and working hard to figure out what's going on." [Thanks to everyone who sent this in]Read - Area-51 m15x owners experience overheating and cracking issuesRead - Alienware's reply to the issue (confirmed as authentic by Alienware)

  • Project Hacker Kakusei; Uplink for your DS

    by 
    Conrad Quilty-Harper
    Conrad Quilty-Harper
    06.30.2006

    An intriguing television commercial for a Japanese game called Project Hacker: Kakusei, a title for the DS that closely resembles the innovative hacking title Uplink, has popped up on the internets. The game will place you in the role of Satoru, a detective with an organization called the GIS, for which you will have to face hacking-themed puzzles like password cracking. The commercial demonstrates effective use of the stylus combined with Uplink-style hacking, along with elements similar to Phoenix Wright's detective style and 2D anime artwork; hopefully the developers plan to emulate Ace Attorney's over-the-top dialog and light-hearted premise too.According to IGN's page on Project Hacker, the title was announced in October '05 when it was originally called Detect Hacker. It's being produced by Nintendo and developed by Red Entertainment and is due for release in Japan before the year is out. I couldn't find anything online about an English localization, so unfortunately we must assume that this is going to remain exclusive to Japan for now. With a little luck (and some pressure from you guys--for a start, the game's wiki page could do with some work), that will change.