Token for WoW

Blizzard is the first online game that offers a login security equivalent to the one used by enterprises. In the enterprise world, remote workers are used to so called RS tokens to authenticate on their VPN. This token displays a 6-digit random number valid for a few seconds. When logging, user dials in the currently displayed number.

World Of Warcraft (WoW) suffers from account theft. Thus, Blizzard offers similar token that can be purchased for 6.5$. Once the token linked to our WoW account, you are safe against account theft (but not against character death :Wink:).

Professional grade security for entertainment.

Nico, have you already yours?

Wii Homebrew channel (2)

The things are going too fast. I reported the launch of the Homebrew Channel. Meanwhile Nintendo issued a firmware update 3.3 for the Wii. It is possible for Nintendo to patch its installed consoles through firmware update. This allows to add new features, repair some bugs, and answer some attacks. The upgrade checking occurs when the Wii is connected to the Internet. This is a main difference with Nintendo DS that does not have such firmware update.

The new upgrade closes the loop hole of Zelda. This hole allow to create the Twilight Hack supporting homebrew programs. Thus, this firmware should stop the homebrew channel. Nevertheless, it seems that the upgrade does not affect the homebrew channel if it was installed before the upgrade.

According to you, who will make next move:

  1. The hackers to circumvent the new firmware?
  2.   Nintendo to fully close the hole?

 

Wii’s afficionados have now their homebrew channel

Homebrew applications are applications, often games, developed by hobbyists to run on game platforms (or mobile phones). Wii had already some homebrew applications using a hack so called Twilight hack. Now, it is even more convenient. There is an application that can be loaded as a Wii channel. In other words, through the Homebrew channel, user can play games (or other applications) that were developed and distributed without the authorization of Nintendo. The games can be loaded through SD cards, and even remotely through TCP!

They are extremely well organized with even a Wiki at Wiibrew.org

Nintendo stroke back the linkers

The Nintendo DS is heavily hacked through the use of extension cards so called linkers. With these cards, it is possible to play any “ROM” game available. Officially, these linkers are only to allow playing backups rather than the original game. A linker may store several games. Nevertheless, the ROMs of every published games are widely available on the Internet. Interestingly, these linkers do not require any modification of the host console. This is not the case for instance for Nintendo Wii’s hacks that require hardware modifications

Interestingly, Final Fantasy: Cristal Chronicles had a strange behavior when used with some linkers. After 20 minutes, the DS displayed the screen “Thank you for playing” and stopped the game. Only the most widely sold linkers (i.e. M3 and R4) were affected. Linkers using other technologies such as Cycloid or Sunny Flash were not affected.

On the forums, the debate was raging. Two schools were fighting. Some people claimed that it was a bug of the linker. This type of linkers patches the ROM. Some people claimed that it was a new copy protection scheme designed by Nintendo that targeted the two main linkers. The favor was for the second hypothesis. A bug that nicely ends up with a greeting screen is highly unlikely. Whoow I would have dreamed of such nice bugs when I wrote software ;-).

The first response from the linkers’ provider was to distribute a clean patched ROM for Cristal Chronicles. It took them several days. The second riposte was to issue a new release (1.17) of the firmware that solved the problem. It took them several weeks.

Conclusions
It seems that it was a nice strike from Nintendo. Of course, hackers won at the end (this is law 1). Nevertheless, the story raises interesting thoughts and question:
1- The way to counter the linkers was elegant and smart. Rather than stopping brutally the game, it allows to play sometimes as a teaser. This frustrates dishonest users (especially if the game is a good one). Nintendo already used this strategy with the game boy.
2- NINTENDO gained several weeks which is sufficient in the game industry. Most of the sales of a game are performed during the few weeks following the launch. It would be interesting to see if there was a visible impact on the sales (for instance a bounce once the news spread in the forums)?
3- Will NINTENDO be able to reproduce this strike with other games? Like the foreseen strategy of BD+.

No free Linux equal call for hack?

A presentation about XBOX security at last Chaos Computer Camp (CCC) in December 2007 sheds some interesting lights on the hack of game consoles.

During the first five minutes, Michael Steil analyses the latest hacks. According to him, the influence of the Linux community is important. PS3 is still not yet hacked perhaps because it authorized Linux community to play homebrew applications. Thus, the linux hacker community had no incentive to hack. According to his figures, where Linux community was involved, hack occurred faster. I would like to remind that DVD Jon claimed that he wrote DeCSS, the software breaking the protection of DVD, because DVD play back was not available under Linux.
After this introduction, Felix Domke detailed the hack of XBOX360. Some interesting statements, unfortunately true :Sad:

  • Hackers own the flash memory, in fact the hacker controls all
  • The chain of trust does not work

The analysis of the attacks and countermeasures is impressive. It is also a good introduction to secure coding techniques.

Once more, a perfect illustration of Law 1. A lesson is that game console designers should not assume that their console is trusted. The hackers may control it.
Second lesson: enthusiasm is better incentive for hacking than commercial incentive. This is true for serious hacking: reverse engineering. It is perhaps less true for IT hacking (spam, intrusion, defacing, malware, …)
How long will PS3 resist?

Many thanks to Yves for this link  :Happy: