Ubisoft’s DRM torpedoed!

Ubisoft recently launched its new game “Silent Hunter 5”, a simulation of submarine. The game was protected with a new generation of DRM that required constant online connection to servers. Of course, if you are online, it is easier to fight piracy. As usually, in the game arena, this new DRM generated a huge fury (remember Spore).

Unfortunately, 24 hours after the launch, a cracked version appeared on the P2P networks (see TorrentFreak). The cracked version does not require online connection!

Quickly, Ubisoft denied that the game was cracked.

“You have probably seen rumors on the web that Assassin’s Creed II and Silent Hunter 5 have been cracked. Please know that this rumor is false and while a pirated version may seem to be complete at start up, any gamer who downloads and plays a cracked version will find that their version is not complete,”

Unfortunately, when scouting the forums, I never find any person complaining that the game was not working. Nevertheless, the crack requires to avoid any connection to Ubisoft servers.

Ubisoft was expecting to deploy the same DRM for Assassin Creed II. Some delay may be foreseen.

As a citizen, I see the need of DRM. As a security expert, I “build” DRM. Piracy is bad. As a gamer, I hate DRM that requires a permanent connection for a game that does not need interaction with other entities. I often play games in train or plane. Such a DRM requirement would be deterrent for me. One of the most important requirements for DRM is that DRM should be as transparent as possible for honest user.

Software protection is one of the most complex tasks.

Digital Personal Property

Paul Sweazey believes he has found the solution that mitigates the problem of DRM. He wanted to emulate a property of physical goods: rivalry (If you want more information about rivalry, please have a look on Bomsel’s works). In a nutshell, rivalry is the fact that when consuming a good you reduce the access for others. For instance, when you play your DVD, someone else cannot play it on another player. This is not true for electronic files. By definition, electronic goods are non-rival. One of the purposes of DRM is to add a pinch of rivalry.

To do so, Sweazey created the concept of Digital Personal property. How does it work? Content has two elements: an encrypted folder containing the essence and a playkey that you preciously keep in a vault. Sounds familiar, isn’t it? In DRM vocabulary, his playkey is called a license. You may freely distribute the encrypted folder but will give your playkey only to trusted people who would not steal your license. The license must be UNIQUE in the sense that there is one unique instance at any time. Thus, if the person you gave your playkey does not return it, you lost its ownsership.

The technical trick will be to be able to create a rival license that should not be linked to a device (else you end up with the typical problem of interoperability).

He just moved the problem of DRM towards the license. He will still have to find a method to generate a license (playkey) that can exist only as one unique instance in the world and that could be played everywhere. This is the Holy Grail of DRM that we have been all looking for years. TCreating rivalry is difficult without introducing physical constraints.

It reminds me one of the concepts we built in an old system called SmartRight. The objective was to control the size of an authorized domain for a familly but without any central online authority. We used an electronic token that was passed to the newly joining device. Of course, you could add a device from your neighbour, but then your neighbour “owned” the electronic token. Would the neighbour leave or not collaborate anymore, you could not anymore add devices to your domain. It was based on the use of secure processors and on the fear of loosing the token.

Will DPP work? If Sweazy finds a robust and user friendly way to create this unicity of instance, it would work. This would also offer a lot more applications. But is it feasible? Bruce Schneier would probably say no. (Wait our next security newsletter with his interview.) And many brains are researching this topic.

For more information, read Goodbye, DRM; hello “stealable” Digital Personal Property at Ars technica.

Rights Locker

CES period is always interesting time because many initiatives are disclosed or present their progress. In the field of DRM, two interesting news:

Disney starts to unveil more about its KeyChest technology. CNBC presented the following spot.

At the same time, DECE made a press release presenting their latest milestones. In a nutshell, DECE has:

  • defined a common file format In the FAQ, it seems that it is compliant with Microsoft’s PIFF,
  • selected a company that will host the rights locker,
  • and announced that five DRMs will support it (Adobe, Marlin, Microsoft PlayReady, OMA and Widevine

Both KeyChest and DECE use the new concept of rights locker. In very simplistic terms, a rights locker is a database that stores the usage rights that a customer purchased. This database should be shared by content distributors. The promise is that if you purchase one piece of content, it may be played back (if you paid as such) on any of your devices (or at least on the devices compliant with this rights locker) independently of the DRM used by the device. In other words, the usage rights will be linked to a customer rather than to his/her devices.

This is a great progress in electronic content distribution. One of the strongest complains of customers is the lack of interoperability of DRMs. This is an answer.

Without doubt, this blog will come back on the topics of rights locker in the future.

Microsoft’s PIFF

Last month, Microsoft announced an important initiative for DRM interoperability. Within a larger announcement, they disclosed the Protected Interoperable File Format (PIFF). The media focused mainly on smooth streaming and SilverLight. But content protection community should be interested by PIFF.

In an nutshell, PIFF defines a file format with a list of supported codecs but above all (at least for security minded people) two mandatory AES based scrambling modes. The basic idea for interoperability is that the PIFF protected essence can use any system of DRM to protect the license. Provided they both have the scrambling key used to protect “Rambo 28”, merchant A and merchant B can sell it using different DRM. PIFF compliant device A with DRM A can play “Rambo 28” sold by merchant B with DRM B. Device A just needs to get license from merchant A. The essence, ie “Rambo 28”, remains the same.

Is it a new revolutionary approach? No. DVB embraced this approach for many years with simulcrypt. In 2004, Thomson proposed to standardize this layer of protection in the IST Medianet project.

Is it a good thing? YES. According to me, it is clearly the right approach. That a giant like Microsoft takes this path is huge. Furthermore, it is royalty free, which is wise from Microsoft to facilitate the adoption. Now, the condition of success is that there will be ONE unique such format. Would there be more than one, then it would decrease its impact.

Of course, we may expect that next generation of Windows DRM and Play Ready will support PIFF. Which DRM technology provider will be the next one?

DRM and games

I often described the ruckus generated by DRM for games (see Game and DRM or Spore and the DRM fury). Yesterday, I discussed with some French game editors. Their position was rather negative. According to them, game protections are today too weak. The result is that soon patches are available on P2P to defeat the protections. The paradoxical outcome is that honest customers who purchased games suffer of the constraints imposed by the game protection (for instance, checking the presence of a physical disc in the drive…) whereas dishonest users have the game without the constraints.

Using game theory (see the DRM game)), the winning strategy would be to steal the game! Thus, to change the winning strategy, there seems to be two possible solutions:

  • Make more robust DRM
  • Make DRM that are transparent to the customers but not to the dishonest users

Currently, I do not see this trend.

DRM free music

The movement towards DRM free music continues. The biggest event is of course iTunes that announces that its complete catalog will be available as DRM free songs. iTunes announced also a new price list adding $0.69 songs (in addition to $0.99 and $1.29)

Warner France followed this movement. It announced that its two sites Fnac Music and Virgin Media will sell DRM free songs in 2009. Nevertheless, it is a trial and the final decision will be taken in 2010.

DRM free music is a trend that will not stop. Will it extend to other fields such as games or video? I am not sure. of course, customers would like it. DRM free distribution with a session watermark to detect eventual illegal distribution is promoted, for instance by the Digital Watermark Alliance.. Nevertheless, there are several differences with music. According to me, the biggest one is that the investments are far huger than music. In the case of video, the release windows strategy and commercial agreements are also problems.

We will continue to monitor this trend in 2009.

Digital Future Symposium (DFS)

This event organized by the Center for Content Protection was hold with Asia TV at Singapore. Thus, the audience was rather large (140 people) and encompassed broadcasters, producers, and press.
The best presentations were:

  • Brad HUNT (former CTO of MPAA, and now consultant at Digital Media Directions) presented his four major trends in content protection
    • Use of fingerprinting to monetize content
    • Digital copy and managed copy for optical media
    • Domain based DRM
    • DECE with some emphasis on Marlin
  • Fabrice Moscheni (Fastcom) presented an impressive demonstration of DVB-CPCM. The demonstration raised a lot of interest.
  • Yangbin Wang (Vobile) explained how Vobile protected Olympic Games for CCTV

Conax, BayTSP, Verimatrix, Microsoft and Viaccess presented their products. Intertrust made a dull presentation of Marlin. I made two presentations:

  • A global approach of security explaining that using only fingerprint or watermark is insufficient, at least for tightly controlled distribution. The distinction between tightly controlled distribution and loosely controlled distribution was appreciated.
  • An introduction to DVB-CPCM before Fastcom’s demonstration.

Two main messages were conveyed during this symposium. Content Identification Techniques may allow monetization of content. Domain is the next paradigm in DRM.