13.03.2013 Views

Hacking the Xbox

Hacking the Xbox

Hacking the Xbox

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Prologue - README.1ST 9<br />

paper because I had nothing to lose, and because I believed in making a<br />

statement about my rights as a hacker. Unfortunately, <strong>the</strong>re is a silent<br />

majority of hackers out <strong>the</strong>re who have families to feed and jobs to lose,<br />

and not everyone can be so fortunate as to have <strong>the</strong> EFF helping <strong>the</strong>m out.<br />

This book you are reading is yet ano<strong>the</strong>r example of how <strong>the</strong> DMCA has a<br />

chilling effect on free speech. Originally commisioned by <strong>the</strong> technical<br />

publisher, John Wiley & Sons, Ltd., this book was cancelled in <strong>the</strong> last<br />

hour over fears of lawsuits and backlash from Microsoft. Such censorship<br />

is frustrating and discouraging, and perhaps some authors would<br />

have stopped <strong>the</strong>re and allowed <strong>the</strong>ir voice to be silenced by fear. I am<br />

taking <strong>the</strong> legal and financial risk of self-publishing this book to make a<br />

statement about my right to free and unimpeded speech as a hacker. Even<br />

this path is not free of impediments, however. The book pre-order<br />

process was suspended on its second day because <strong>the</strong> original e-commerce<br />

provider, Americart, “declined to offer [me] cart service for<br />

selling hacker materials . . . $15 per month doesn’t pay for us to take <strong>the</strong><br />

risk of being named in a DMCA suit.”<br />

I must emphasize that this book does not infringe on Microsoft’s<br />

copyrights, and <strong>the</strong> knowledge presented in this book cannot be directly<br />

applied to copyright circumvention. To perform an infringing act, one<br />

would have to hone <strong>the</strong>ir skills and apply a substantial amount of<br />

additional art and know-how aimed specifically at copyright control<br />

circumvention. To claim that this book is a circumvention tool would be<br />

tantamount to claiming that all books about circuit boards, embedded<br />

software or cryptography are also circumvention tools.<br />

The scope of <strong>the</strong> DMCA with respect to <strong>the</strong> “fair use” of hardware is<br />

ano<strong>the</strong>r important political topic with enormous economic repercussions. Is<br />

it illegal to modify or circumvent a cryptographically secured boot sequence<br />

for <strong>the</strong> purpose of running alternate, legitimately purchased or created,<br />

software? This question may be decided in part by <strong>the</strong> fate of <strong>Xbox</strong> hackers.<br />

A strict interpretation of <strong>the</strong> reverse engineering exemption of <strong>the</strong> DMCA 7<br />

reveals strong arguments for making such acts of circumvention illegal.<br />

In particular, reverse engineering is only allowed for interoperability,<br />

where interoperability means “<strong>the</strong> ability of computer programs to<br />

exchange information, and of such programs mutually to use <strong>the</strong><br />

information which has been exchanged.” But this definition contains two<br />

potential land mines: First, circumventing hardware-based security<br />

measures is arguably different from circumventing a program’s (software)<br />

security measures. It may not be a very strong argument technically, but<br />

<strong>the</strong> clause has yet to be legally tested, to <strong>the</strong> best of my knowledge.<br />

Second, <strong>the</strong> purpose is not really to exchange information with <strong>the</strong><br />

hardware security measures — it is to bypass <strong>the</strong>m.<br />

The final argument against allowing <strong>the</strong> reverse engineering of <strong>the</strong><br />

hardware security mechanisms is incidental copyright circumvention. The<br />

7 17 U.S.C § 1201(f), Reverse Engineering

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!