Amazon, Netflix Copy Protection Loophole Leads to 4K Piracy Leaks

A slew of 4K releases on the usual piracy sites suggests that pirates have found a loophole in the copy protection schemes that have so far managed to safely protect 4K content on streaming services such as Amazon and Netflix.4K rips of Netflix series …



A slew of 4K releases on the usual piracy sites suggests that pirates have found a loophole in the copy protection schemes that have so far managed to safely protect 4K content on streaming services such as Amazon and Netflix.

4K rips of Netflix series 'Jessica Jones' and Amazon's 'The Man in the High Castle', among others, have started appearing on popular piracy sites.

A breakthrough in 4K ripping was thought to have first surfaced in August, when a Netflix 4K copy of 'Breaking Bad' was uploaded online, but the 4K ripping scene had remained quiet until last week.

Sources close to TorrentFreak told the torrent news website that there indeed has been a new breakthrough in defeating the copy protection on these streams.

It is thought that the HDCP 2.2 content protection scheme that comes with HDMI 2.0 connections has not yet been cracked, but the availability of 4K content on older devices such as the Amazon Fire TV, which features an older version of HDCP (1.4b), has allowed pirates to find a loophole.

The release of a new 4K compatible Roku player in early November may also have led to the ripping breakthrough.

But with relatively few 4K screens in people's homes, and with 4K downloads coming in more than 10 GB per hour of content, 4K pirated downloads currently remains a niche choice for most.

Appeals court orders Chicago sheriff to stop attacks on Backpage.com escort business

In which Judge Posner quotes Backpage’s “dom & fetish” section.

Cook County Sheriff Thomas Dart. (credit: Cook County Sheriff's Office)

In a sharply worded opinion (PDF), a panel of appeals judges has ordered Cook County Sheriff Thomas Dart to stop his campaign seeking to "crush" Backpage.com's adult advertisement section.

Ars last wrote about the dispute between Dart and Backpage in July, when US District Judge John Tharp Jr. issued a temporary restraining order stopping some of Dart's pushier behavior, when he confronted Visa and Mastercard over their relationships with Backpage. But Tharp changed his tune the following month, denying Backpage a preliminary injunction that would have stopped Dart from trying to "coerce, threaten, or intimate repercussions" to card companies or other financial institutions. The credit card companies stayed away from Backpage.

US Circuit Judge Richard Posner, writing for a unanimous three-judge panel, writes today that the district court judge was wrong, and he grants Backpage the injunction it sought. In Posner's view, Dart was using his power as sheriff of a populous county to bully payment processors into backing away from a site that hosted ads he didn't like, a clear violation of the First Amendment. It's telling, Posner writes, that Dart didn't just sue Backpage.com. Dart had already tried that strategy against Craigslist, and lost.

Read 11 remaining paragraphs | Comments

Hacked toymaker leaked gigabytes’ worth of kids’ headshots and chat logs

Company encouraged parents to use the pictures and chats with the apps it sold.

(credit: Motherboard)

VTech, the hacked maker of electronic toys and apps that leaked the data of 4.8 million customers, including hundreds of thousands of children, exposed gigabytes' worth of pictures and chat histories on the same compromised servers, according to an article published on Motherboard, the website that first broke news of the breach.

The news website said a hacker who asked to remain anonymous was able to download almost 200 gigabytes' worth of photos of both parents and children who had registered with the site. The hacker also obtained logs of chats conducted between parents and their kids and in some cases recordings of conversations. VTech encouraged parents to take the headshots and use them with apps that allow them to interact with children. The hacker, who said he didn't intend to publish or sell the data, provided Motherboard with 3,832 image files and at least one audio recording for verification purposes.

It's not clear why VTech stored the data on its servers in the first place. The article reported:

Read 1 remaining paragraphs | Comments

Just Cause 3 review: A great game, if you can play it

Server and performance problems obscure stellar aerial acrobatics.

Rico's wingsuit is the game's best method of travel.

Every time I boot up Just Cause 3, there are a few minutes of absolute brilliance. An average in-game journey might begin by catapulting via grappling hook into a perfect backflip before soaring into the atmosphere on an indestructible parachute. Properly alternating between grappling hook, parachute, and wingsuit keeps my momentum going. Before I realize it, I've reached my target: a red and silver depot filled with papier-mâché gas tanks and fascists.

Just as I un-sling the ironically indiscriminate grenade launcher at my side, the game stalls. I groan because this has happened before, and it will happen over and over before I’m done with the game.

Weapons of interactive destruction

Just Cause 3 on the PC is a fireball, digitally and metaphorically. In the third entry in the series, pseudo-protagonist Rico Rodriguez has returned to the land where he was raised. His mission: to indiscriminately lay waste to its state-run infrastructure by means that, while maybe not strictly necessary, are certainly many and varied.

Read 26 remaining paragraphs | Comments

Dealmaster: Cyber Monday brings bigger savings than Black Friday

Save $50 on a Playstation 4 Uncharted bundle from Amazon and Dell, and much more.

Greetings, Arsians! Thanks to our partners at TechBargains, we have a ton of Cyber Monday deals to share. Many retailers have upped the ante from Black Friday, including Amazon which now offers 50 percent off a one-year subscription to Playstation Plus when you purchase the Playstation 4 Uncharted: Nathan Drake bundle. That gaming bundle has also received a $50 price cut, bringing it down to $299. Anyone with a Dell credit should take a look at the company's website, as they are offering the same Playstation bundle for $299 as well.

As usual, we have a bunch of other deals on laptops, TVs, accessories, and more below.

Featured Deals

Read 7 remaining paragraphs | Comments

BlackBerry says no to Pakistani backdoor gambit

Government ordered shutdown of enterprise service unless BlackBerry gave total access.

In response to a demand for backdoor access to its enterprise messaging products, BlackBerry is completely pulling out of the Pakistan market. The announcement comes as a ban on providing BlackBerry Enterprise Services over mobile networks in Pakistan was due to take effect today.

The Pakistan Telecommunications Authority's ban on BlackBerry Enterprise Services (BES) was issued this summer, and it was planned to become effective on November 30, as Ars reported in July. "Security reasons" were cited as the cause of the ban. But just before the restriction was announced, Privacy International issued a report that warned of the Pakistani Inter-Services Intelligence (ISI) agency's efforts to gain network surveillance capabilities within the country that rival those of the National Security Agency.

While the government has pushed back the effective date of that order to December 30, BlackBerry COO Marty Beard announced today that the company would exit the Pakistani market completely rather than meet government demands for unfettered access to the service's message traffic.

Read 2 remaining paragraphs | Comments

How tech fails led to Air Force strike on MSF’s Kunduz hospital

Sensor and network failures put crosshairs on the wrong target.

On November 25, General John F. Campbell, the commander of US Forces in Afghanistan, announced the findings of an initial investigation into the air strike by an Air Force AC-130 gunship that hit a Médecins Sans Frontières (MSF, or Doctors Without Borders) trauma center in Kunduz, Afghanistan on October 3. The strike—in which the AC-130 attacked using its onboard cannon, killing 30 patients and members of the MSF hospital staff and injuring another 34—lasted nearly a half-hour.

Campbell called the strike "a tragic, but avoidable accident caused primarily by human error." But among the secondary factors cited in the report, he noted, there were several contributing technical failures, including a networking failure that could have provided information that would have prevented the mistaken targeting of the hospital. Furthermore, information systems available to the command responsible for the aircraft failed to alert those on duty in the operations center that the target selected by the aircraft was on a no-strike list.

Spooky action at a distance

The aircraft responsible for the errant attack on the hospital was an AC-130U "Spooky" gunship, a 20-year-old aircraft that carries a five-barreled 25 millimeter Gatling gun, a 40mm Bofors cannon, and a 105mm howitzer. The airplane is a veritable flying artillery battery that "orbits" its targets while firing upon them with high-explosive rounds. (The Air Force has also deployed the AC-130W "Stinger," a modified version of the special operations transport the MC-130W "Dragon Spear," to Afghanistan. These aircraft carry a 30mm automatic cannon and launch tubes for Griffin and Hellfire missiles and laser-guided glide bombs.)

Read 10 remaining paragraphs | Comments

Hey Reader’s Digest: Your site has been attacking visitors for days

Researchers estimate the same campaign has infected thousands of other sites.

Enlarge (credit: Malwarebytes)

An active hacking campaign is forcing Reader's Digest and many other websites to host malicious code that can surreptitiously infect visitors with malware and linger for days or weeks before being cleaned up.

Reader's Digest has been infected since last week with code originating with Angler, an off-the-shelf hack-by-numbers exploit kit that saves professional criminals the hassle of developing their own attack scripts, researchers from antivirus provider Malwarebytes told Ars. People who visit the site with outdated versions of Adobe Flash, Internet Explorer, and other browsing software are silently infected with malware that gains control over their computers. Malwarebytes researchers said they sent Reader's Digest operators e-mails and social media alerts last week warning the site was infected but never got a response. The researchers estimate that thousands of other sites have been similarly attacked in recent weeks and that the number continues to grow.

"This campaign is still ongoing and we see dozens of new websites every day being leveraged to distribute malware via the Angler exploit kit," Malwarebytes Senior Security Researcher Jérôme Segura wrote in an e-mail. "This attack may have been going on for some time but we noticed a dramatic increase in infections via WordPress sites in the past couple of weeks."

Read 3 remaining paragraphs | Comments

The National Security Letter spy tool has been uncloaked, and it’s bad

No warrants needed to get browsing history, online purchase records, and other data.

It took 11 years to finally unveil what the FBI demands in a National Security Letter. How it evolved over the years is shown above. (credit: ACLU)

The National Security Letter (NSL) is a potent surveillance tool that allows the government to acquire a wide swath of private information—all without a warrant. Federal investigators issue tens of thousands of them each year to banks, ISPs, car dealers, insurance companies, doctors, and you name it. The letters don't need a judge's signature and come with a gag to the recipient, forbidding the disclosure of the NSL to the public or the target.

Nicholas Merrill (credit: Wikipedia)

For the first time, as part of a First Amendment lawsuit, a federal judge ordered the release of what the FBI was seeking from a small ISP as part of an NSL. Among other things, the FBI was demanding a target's complete Web browsing history, IP addresses of everyone a person has corresponded with, and records of all online purchases, according to a court document unveiled Monday. All that's required is an agent's signature denoting that the information is relevant to an investigation.

"The FBI has interpreted its NSL authority to encompass the websites we read, the Web searches we conduct, the people we contact, and the places we go. This kind of data reveals the most intimate details of our lives, including our political activities, religious affiliations, private relationships, and even our private thoughts and beliefs," said Nicholas Merrill, who was president of Calyx Internet Access in New York when he received the NSL targeting one of his customers in 2004.

Read 7 remaining paragraphs | Comments

MPAA ‘Softens’ Movie Theater Anti-Piracy Policy, Drops Bounty

The MPAA has issued an updated version of its best practices for the prevention of movie piracy in theaters. While much remains the same, theater managers are no longer required to call the police for every incident. In addition, the long-standing pirate hunting bounty program has disappeared.

Source: TorrentFreak, for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services.

recillegalThe MPAA sees illegally recorded movies as one of the biggest piracy threats and goes to extremes to stop it.

During pre-release screenings and premieres, for example, employees are often equipped with night-vision goggles and other spy tech to closely monitor movie goers.

In some cases members of the public have been instructed to hand over all recording-capable devices including phones and Google glasses.

Through these measures the MPAA hopes to prevent pirates from camcording movies or recording audio in theaters. The underlying policy is drafted in cooperation with the National Association of Theatre Owners (NATO), and a few days ago the most recent version was released.

At first sight not much has changed. The MPAA still recommends theater owners to keep an eye on suspect movie goers while prohibiting the use of any recording devices including phones.

“Preventative measures should include asking patrons to silence and put away their phones and requiring they turn off and stow all other devices capable of recording, including wearable technology capable of recording.

“If individuals fail or refuse to put any recording device away, managers—per your theater’s policy — can ask them to leave,” the recommendation reads.

There are several subtle changed throughout the document though, especially regarding the involvement of police. Previously, theater employees were encouraged to detain suspect visitors and hand them over to the authorities.

This is explicitly stated in the following snippet taken from the 2014 version of the best practices.

“Theater managers should immediately alert law enforcement authorities whenever they have clear indications that prohibited activity is taking place—the proper authorities will determine what laws may have been violated and what enforcement action should be taken.”

In the new document, however, it’s no longer a requirement to call the police. Instead, this is now optional.

“Theater managers have the option to immediately alert law enforcement authorities whenever they have clear indications that prohibited activity is taking place or managers can the stop the activity without law enforcement assistance.”

Similar changes were made throughout the document. Even reporting incidents to the MPAA no longer appears to be mandatory, which it still was according to last year’s text.

“After your theater manager has contacted the police, your theater manager should immediately call the MPAA 24/7 Anti-Camcording Hot Line to report the incident.”

The language above has now been changed to a less urgent option of simply reporting incidents, should a theater manager deem it appropriate.

“Your theater manager can also call the MPAA 24/7 Anti-Camcording Hot Line to report the incident.”

Aside from the softer tone there’s another significant change to the best practices. The $500 “reward” movie theater employees could get for catching pirates is no longer mentioned.

The old Take Action Award mention

takeactionreward

In fact, the entire “take action award” program appears to have been discontinued. The NATO page where it was listed now returns a 404 error and the details on FightFilmTheft have been removed as well.

This stands in stark contrast to the UK where the rewards for a similar program were doubled just a few weeks ago, with officials describing it as a great success.

The question that remains unanswered is why the MPAA and NATO have implemented these changes. Could it be that there were too many false positives being reported to the police, or is there an image problem perhaps?

In recent years several questionable police referrals resulted in a media backlash. A 19-year-old girl was arrested for recording a 20 second clip from the movie “Transformers,” which she wanted to show to her brother, for example.

And just last year the FBI dragged a man from a movie theater in Columbus, Ohio, after theater staff presumed his wearing of Google Glass was a sign that he was engaged in camcorder piracy.

Meanwhile, reports of real pirates being apprehended in a similar fashion have been notable by their absence.

Best Practices to Prevent Film Theft

Source: TorrentFreak, for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services.