Hacker News new | past | comments | ask | show | jobs | submit login
EarthBound's Copy Protection (2011) (earthboundcentral.com)
45 points by JoshTriplett on Jan 3, 2016 | hide | past | favorite | 14 comments



Another favorite is in Zac McKracken - you need to enter symbols in from the manual when traveling to other areas, and failing a few times puts you in jail with a stern lecture (https://youtu.be/ArjZbizPrwY?t=48s)


That approach has its own problems. Working Model, a physics simulator from Knowledge Revolution (Macintosh, mid-1990s) used a copy protection scheme where it asked for the last word from some page in the manual. Unfortunately, after the copy protection was set up, but before the product shipped, someone made a small change to the manual that caused repagination. Page numbers in the first two thirds of the manual still worked, so the product seemed to be OK. Those in the last third didn't. Fortunately, you could just restart the program and try again, hoping for an early page number.


Makes me wonder when a paying customer being directly disadvantaged by DRM first happened, and what the effects were.


When we had Sun workstations at Ford Aerospace in the early 1980s, we had several software packages which were locked to specific CPU IDs. Sun CPU boards of the era were not very reliable. Every time we replaced a CPU board, the paid software packages stopped working until we got new serial-number stamped versions, on magnetic tape, of each package. This usually meant about a month of downtime for the workstation. That's the earliest example I have.


Well, you can go back to at least the Middle Ages in Europe, when valuable books were sometimes chained in place in monasteries or libraries to keep people from running off with them.


I would just like to take a break from the very literal responses (I admit I immediately thought "that's not digital" too) to say that this made me laugh. :-)


Physical books are not digital, therefore cannot have DRM. Also, DRM is about managing the "rights" of the copyrighted material's producer - not the end user. Chaining books in a public place maintains the book from being physically stolen, taken from the public's possession.


That's not DRM though. Nobody stopped you from making a copy without the chain. (apart from the fact that it would take ages and be quite expensive a the time) Actual theft protection is not DRM.


Right DRM is not copy protection. DRM is about keeping legitimate buyers from exercising free trade. You can't buy up a dozen games on steam, for example, and resell the games on. Of course people still do, but that's what steam's drm is intended to quell. You can't take a bluray, make a copy, upload it to somebody's email for a price, and destroy the original. This is a perfectly honest thing to do, it's super easy to do, but it's incredibly risky in the US to do it.


Would a publisher be liable to a pirate for damages if their anti-piracy measures include code of the form:

    IF is_pirated() THEN dd if=/dev/urandom of=/dev/sda


IANAL, but probably. Such a case would be somewhat comparable to the Sony BMG scandal from a decade ago. The circumstances would be somewhat different, especially if only pirates were actually harmed, but there would still probably be a good case under the CFAA.


They should be, IMO. What if a RAM error bitflip happens exactly on the is_pirated variable? :)

Similarly, someone had a piracy check autopost to users' twitter accounts but it apparently started happening for legit users: http://arstechnica.com/tech-policy/2012/11/ios-apps-hijack-t...


This is not unheard of for hardware. Firmware or driver updates to legitimate devices can detect pirate/counterfeit devices and brick them.

Attitudes are changing since the publicity about FTDI doing this https://en.wikipedia.org/wiki/FTDI#Driver_controversy


Consider an analogous situation: the developer knows the email address of a user that pirated their software. They send them a link to a trojan that will wipe their hard drive when run.

An illegal action is still illegal when it is done as revenge for copyright infringement.

From an ethical point of view, consider that the damage could be inflicted on innocent third parties. E.g. if a negligent employee runs a pirated game on a computer that controls medical or industrial equipment.




Join us for AI Startup School this June 16-17 in San Francisco!

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: