Search

If you’ve been paying attention to tech news lately, you’ve been hearing a lot about the rootkit that Sony has been using as DRM on some of its BMG CDs for the past several months. It’s been covered on TWIT [ http://www.twit.tv/ ], Security Now! [ http://www.grc.com/securitynow.htm ] and a great deal of other technology news agencies. I put together a synopsis of the issue while it was breaking at my e-zine here:

[ http://www.pleasanttingle.net/story/2005/11/7/105955/991 ]

And the issue has developed since then. BoingBoing, an amazing blog [ http://www.boingboing.net/ ] posted an excellent timeline of events yesterday here:

[ http://www.boingboing.net/2005/11/14/sony_anticustomer_te.html ]

The trouble is that even since then, it’s been determined that Sony’s web uninstaller for the software is actually really dangerous and shouldn’t be used because even it’s so poorly written that it opens up yet another massive security hole in the process of trying to close another. Read about that tidbit over at the Freedom To Tinker blog in these posts:

Sony’s Web-Based Uninstaller Opens a Big Security Hole; Sony to Recall Discs
[ http://www.freedom-to-tinker.com/?p=927 ]

Update: Sony Uninstaller Hole Stays Open
[http://www.freedom-to-tinker.com/?p=928 ]

Sad. Very very sad.

Something to say?