* Posts by Christian Berger

4851 publicly visible posts • joined 9 Mar 2007

Computer Science grads still finding it hard to get a job

Christian Berger

The point is not to match skills

...because companies usually have no idea what skills they need.

The point of education is to provide people with the ability to learn the skills they happen to need when they need it, plus the overview over the whole field so they can decide what technologies are the obvious traps and what technologies are actually useful. Of course vendors of crap technology see that a lot differently. :)

Teach people how to think, introduce them to as many fields as possible, that's the purpose of school. The purpose of university is not much different just the fields are a bit narrower.

Uber, Taskrabbit, other Silicon Valley darlings urge Europe not to screw their business

Christian Berger

Data protection has the rank of a human right in Germany

Back in the early 1980s there was a constitutional court decision that derived data protection as a basic right. So it essentially it's the same as the right for property or the right to maintain your body integrity.

Those "Sharing Economy" companies essentially want the legal equivalent of organ donation squads. Just like I have the right to not be cut open by someone, I do have the right to not have to give my data to someone.

Hold the miniature presses: Playmobil movie is go

Christian Berger

Actually

Playmobil figures are available in a variety of different sizes. You can get them up to a bit more than a meter.

Fleet of 4.77MHz LCD laptops with 8088 CPUs still alive after 30 years

Christian Berger

Wait, but laptop still have LCDs

Even though todays LCDs need almost as much power as plasma or EL displays, the TFT panels we have now are technically LCDs.

Canonical and Spain's BQ team to put Ubuntu on a tablet

Christian Berger

Re: The problem with this is that it's trying to be like the rest

Well you are missing the point. I don't want my device to be downloading news articles, I want a portable computer which does what I want, not what some marketing executive at Canonical thinks I want to do.

Christian Berger

Re: good, good...

Mine didn't come with a terminal app. They wanted me to register and then download it from their store.

Christian Berger

The problem with this is that it's trying to be like the rest

...so in the end you get a device you don't even have a terminal on (without downloading it from the store... which means registering), but you have all the crap nobody wants, like Spanish language news feeds and weather reports.

Ubuntu is now making exactly the same mistakes Microsoft makes. They are changing from a working desktop system to some horribly complex desktop system to a cut down mobile system which lacks all the features people like (i.e. apt-get on Ubuntu) and replace them with crap.

I mean just imagine a Windows phone which could join a domain just like Windows 95 could. It would sync all your data on login/logout. Done via some more modern protocol like rsync, this would have been an actual advantage over other systems.

Remember Netbooks? Windows 10 makes them good again!

Christian Berger

Re: But.... where are the netbooks?

"tablet + keyboard = laptop!!"

...until you try to actually use it without having a table. There is a reason why laptops have most of their weight under the keyboard and the display is firmly attached to it. That way you can use it without having a table. Just hold it in one hand and type with the other.

If you're reading this on your phone, pray you're in Singapore

Christian Berger

It's a question of political will

For example in Germany in the 1980s there was a project called BIGFON, it was designed to explore the possibilities of the (then news) fibre optic cables for use in subscriber line. The idea was to give every subscriber 280 MBit/s downstream and 140MBit/s upstream and once testing was successful and suitable standards were found, to go ahead and provide that kind of service to everyone in Germany. Even the money was already there from profits the post office made...

The project was aborted for political reasons. The results can be seen now. Most Germans don't even have access to one megabit. The German telecommunications equipment industry is _far_ behind the competition. You cannot buy a German equivalent to a Cisco. Companies like Siemens, which used to be on the forefront of innovation, didn't feel any need to innovate any more, so development stagnated to a halt. Gradually you had the choice between equipment from Siemens, or equipment from the rest of the competition, which had more capacity with less rack space... and was cheaper. So Siemens regularly sells off their innovative departments when they fail to meet arbitrarily set goals, which then go bust because they don't have the momentum to survive.

Investing in those projects has long lasting effects, even far beyond the actual project. If Singapore wants to have an advanced cellular network, they will need lots of network engineers. They will have people who are inspired by this to go into engineering and those people will get jobs.

BlackBerry axes 200 jobs – including a third of its HQ staff

Christian Berger

"The biggest security feature of BBOS is not being subject to the patriot act."

This may be hypothetically true, however do you really believe that Blackberry would put up a serious fight? Is there any indication that they ever have done so?

We are past the point where we can just assume that companies will protect our rights. Having a secure phone, whatever that means, is not actually a business model. Not selling your data to the highest bidder might be, however companies like Blackberry would still like to get lucrative governmental contracts and not be banned in countries. Since Blackberries, like most mobile devices today, are dependent on central services, it's easy for a country to block access to those and render even smuggled in devices worthless.

So they allow secret services to access the devices, and as we know by now, those are not contempt with accessing individual devices, they want it all.

What we'd really need would be a device which would be secure despite being subject to the patriot act. Essentially a device that cannot be easily backdoored or bugdoored without you knowing. One solution would be to have a device that has multiple independent units. For example you would have your LTE module for Internet connectivity. That module would not have access to the rest of the system except for a high speed serial link. That way even when security problems of the LTE module were found (those are very likely to exist), you'd still be rather safe. Then you'd have a dedicated encryption processor. It would store its keys internally and prevent the rest of the system from talking with anything else but your predefined server (which you own). That processor must be auditable, for example by providing a JTAG connector which can be sealed. It's software has to be minimal. In any case the whole system needs to be rather minimalistic so it can be audited even in binary form.

Christian Berger

They ignored their potential customers

"nearly everyone I know who takes security seriously has one"

The problem is that we now know that the security advantage was just fictional. People believed that a manufacturer could somehow provide security by locking down everything. In reality we now know that manufacturers can simply be taught to put in back doors. And in many cases they will follow those orders.

Now that by itself wouldn't be much of a problem, if your architecture is designed in a way so you could run most components all by yourself with your own code. For example you have a wide range of mail servers to choose from, and you can even write your own mail server if you are inclined to do so. Mail is comparatively simple, even if you add IMAP.

Now for many years the Blackberry was the exact opposite. You had to run every e-mail through a Blackberry Backend server. Later they sent your e-mail passwords to their server.

http://www.heise.de/newsticker/meldung/BlackBerry-spaeht-Mail-Login-aus-1919718.html

http://frank.geekheim.de/?p=2379

So by now we know that Blackberry is in the same league, security wise, as all the other companies. They have lost that advantage. And Blackberry doesn't seem to be interested in security any more. If they were, they would release alternative firmware turning their devices into "dumb terminals" offering an open protocol (e.g. ssh/mosh/VNC) you can connect to whatever server you want without storing data locally. Having a hardware keyboard even enables you to enter passwords to unlock cryptographic keys. That would have been an actual chance for Blackberry, unfortunately they didn't take it.

So in the end, security minded people have turned to other systems, particularly Android as they can at least get non-vendor ROMs for some phones and they have at least some chance of weeding out a bit of the trash/backdoors.

People who just want to "access Exchange remotely" will probably look towards Windows Phone, as they can be made to believe that a Microsoft phone might interact nicely with a Microsoft server.

ioSafe releases x86 server for the 'we don't have a geek with a screwdriver' crowd

Christian Berger

Re: Oh dear

Yeah, plus those dealers are probably not the most technically competent. You can see the same problem with PBXes where you have to deal with installers who are installers because they have a contract with the PBX manufacturer... not because they have any idea about how telephony works.

So in the end those servers will be incompetently set up and they will send their data to an offsite backup facility... so you, or other people, can easily get to them.

Google licks its lips at sight of Qualcomm's 64-bit server ARM chips

Christian Berger

The interresting question is: Will it be a common platform

Unlike mobile phones which are usually sold along with the OS, selling a server which can only run one (version of one) operating system is a hard job. People want to choose their own operating system. For this you need sensible ways to make sure one OS image can boot on all machines... at least enough to enumerate the hardware and load proper drivers. (which for security reasons cannot be closed source in many companies)

If such a platform emerges, there will be a chance that it'll be used outside the server business. For example for workstations or "high-end" mobile phones. If we had that, we'd finally be able to run one image on multiple phones and finally have some competition and progress in the mobile area.

Sure, encrypt your email – while your shiny IoT toothbrush spies on you

Christian Berger

The problem is that cloud services are allowed for such things

I mean particularly with IPv6 all of those problems could be solved easily at home. If you want to look into the fridge while you are out, just press a button on it, it'll display its IPv6 address and a one time authentification token on its display (perhaps as a QR code). You snap it with your phone, decode the QR code and use your browser to access it. No cloud service necessary to spy on you. Since it's IPv6 you can have your public IPv6 address there and it'll just work.

However in any case, the main problem is that such solutions require a minimum amount of effort and competence. Current systems are catered to people who have no idea of what they are doing.

Windows 10 will now automatically download and install on PCs

Christian Berger

It's like a fish taken out of the water...

... it struggles to live on, but clearly it's likely to die anyhow.

The times when Windows upgrades happened automatically, because every n years more new PCs were bought than there already were, are over. Since roughly a decade PCs have a useful lifespan of 5-10 years. Additionally most of the Windows software in production use today was written in the 1990, full of technologies which seemed cool at the time, but now are long obsolete and often not found in current versions of Windows. One example is DCOM which is crucial for industrial applications.

It's foolish to build a new system based on Windows. Even if Microsoft survives another decade, they probably will regularly break your software by force upgrading computers to a new version of their OS.

VirusTotal bashes bad BIOSes with forensic firmware fossicker

Christian Berger

OpenFirmware

Yes, that was OpenFirmware. It could do all the things UEFI can and more... but at a thousand times less code.

Christian Berger

Virus scanners don't analyze software...

... particularly since that's been proven mathematically to be impossible in 1953 by Henry Gordon Rice.

What virus scanners do is to try do unpack containers and then search for byte strings. That's why they only find malware that was explicitly put into the databases they use. If you "hand craft" some malware it will simply not be detected.

Of course the sensible way to do security is to simplify everything down to a level you have a chance to understand. Essentially you'd have a tiny "compiler/interpreter" which is small enough to be understood in binary (Forth can do that for example) from which you bootstrap your system by running source code from the disk. When you keep it all small enough, it probably won't even take longer to boot than our current systems.

Chip company FTDI accused of bricking counterfeits again

Christian Berger

Supporting USB

"They are only licensed for use with genuine FTDI parts. If you don't like that get your own drivers"

That's actually a big question I'm having for years. FTDI essentially makes devices compatible to the USB standard for "serial ports". Just about any operating system has default vendor independent drivers for that, after all that's one of the few bits where USB is actually standardized. The only exception is Windows. If Microsoft would get off their asses and finally support USB in any meaningful way this whole mess wouldn't be possible.

Christian Berger

There are safeguards against malware

Free software typically has safeguards against malware so such malware wouldn't make it into the official kernel.

Unfortunately free software projects have now become so huge, it's getting hard to leave out the parts you don't like.

Most of the world still dependent on cash

Christian Berger

There's a good and a bad side to this

The good side is that it makes it easy to make your everyday transactions anonymously. This is important in any democracy.

The bad thing is that "suitcases full of money" actually exist and are a common form of money transfer for large illicit purchases. Back when Swiss still had anonymous accounts, it was not uncommon to have people drive over the border with huge amounts of cash.

So ideally we'd get rid of high value denominations. Getting rid of everything above 100 Euros/Dollars would turn one suitcase of money into 5 or 10, making this kind of illegitimate transfer much more cubersome.

Land Rover Defender dies: Production finally halted by EU rules

Christian Berger

This also applies to that car from the sci-fi series where they travel back in time...

...you know, the Lada Niva from Návštěvníci.

https://www.youtube.com/watch?v=_rm4ciogF3s

I guess the reason is that, as mentioned in the series, it still runs on petrol.

Reg readers battle to claim 'my silicon's older than yours' crown

Christian Berger

Looking back those machines weren't that slow

Sure at our school we had a Xenix system with around 30 terminals on a 386 which did get slow when 30 pupils were hacking away in Works for Xenix, but then again many modern applications are just as slow on modern hardware. I have seen KMail not keeping up with my typing speed. I have seen computers taking minutes to load the work processing application.

Maybe the reason for this is just bloat as suggested by this talk here:

https://www.youtube.com/watch?v=Nbv9L-WIu0s

Christian Berger

I've been to a company having a R&S Spectrum analyser

Those are still being sold used and 20+ years old for around 5kEuro. I don't know what's the main CPU, but it certainly has some Transputers in it. :)

Samsung: Is gadget lust still a thing in 2016? Nope

Christian Berger

If every product on the market is the same

your market will be like the one for sugar, the cheapest seller wins.

I mean seriously please differentiate. Build mobile devices which are different to the others. For example mobile devices that are easy to fix and can run any operating system you want. Perhaps devices with a keyboard, perhaps devices which don't follow the brain dead idea of having the front being a full sheet of glass which fractures at the slightest drop.

Met Police: Yes, outsourcing IT to Steria has 'risks'

Christian Berger

In a way a problem of botched mass education

Imagine everyone had some meaningful IT classes during their school career. Surely most would know nearly nothing about it when they start working, however you still have a basic idea about it in the heads of the people. Over all, it's likely they will get a feeling about what's easy to do and what's not.

And this is the big problem about many software projects. People don't have a feeling for how hard something is. That's why they often choose unnecessarily hard ways to solve a problem. At least that's one problem, many programmers also try to cut the boredom by trying to make their work challenging, unfortunately usually beyond the point of their own abilities. The earlier you have started to program the more likely you are to be beyond this point and just write software as easy as you are able to.

Ban internet anonymity – says US Homeland Security official

Christian Berger

Democracy requires the option of anonymity

particularly when you deal with issues regarding forming an opinion. This is one of the most basic rights in any society.

We do accept number plates on cars since driving a car usually isn't a form of political expression, however you can potentially harm other while doing so. This is something completely different, though there are edge cases where you are driving with a car to a demonstration or something.

A completely open society won't work either, since certain people can just create new legal persons (companies) and use those to obscure their actions.

Microsoft legal eagle explains why the Irish Warrant Fight covers your back

Christian Berger

Re: Why don't they make an actual step forward...

Uhm... you do realize that, particularly since Outlook parses and reformats e-mail anyhow (it's not like they are using Maildir or something), they can easily just decrypt any received mail the first time you open it.

Yes, you can get GPG plug-ins, but that's not the point. Encryption must be as simple as possible to use, adding extra, completely unnecessary steps like installing plug-ins is hot helpful.

Christian Berger

Why don't they make an actual step forward...

... for example by including PGP/GPG by default in Outlook, and have it work in an opportunistic encryption mode. Simply have it generate a key on installation, sign every outgoing mail by default, attach the public key of outgoing mail by default and store every incoming public key. If you have the public key of your peer, simply use it for encryption by default.

Just make Outlook act reasonably by default and we'd have a big step forward. Once one of the big actors start doing so, the whole ecosystem will shift.

Christian Berger

The question is...

...how much they are actually doing and how much that actually helps. I mean Microsoft can fight cooperating with secret services as much as they want to, but it's of no use to me if their systems are already back doored. After all it's moderately simple to tap fibres and encryption on a 10 Gigabit level is not trivial.

For fsck's SAKKE: GCHQ-built phone voice encryption has massive backdoor – researcher

Christian Berger

Re: They all have the same flaw...

"What's to stop a man in the middle from identifying and/or mangling the stego?"

That's a general problem of cryptography. Some people claim it can be solved by public key infrastructures... which has been proven to be wrong. Some people claim this can be solved by a web of trust... which has its own problems...

So what can you do against "man in the middle"? Well maybe you can exchange some credentials previously by displaying a QR code on the screen, and scanning it with another phone. Or you could display some numeric/letter code during the phone call and ask the people to read it out loud. Faking that would mean faking the voice which adds another difficult step in the process.

In any case, the idea behind this is that even bad crypto is better than no crypto, since it increases the effort from just sniffing to actually doing a man in the middle attack.

Christian Berger

They all have the same flaw...

... they require your VoIP provider to support this for you. They need to add additional code to allow you to use it. Plus they only work via current VoIP so whatever the next generation of networks will be, it won't work.

It would be a lot smarter to use inband signalling of encryption. Essentially when you make a call, your user agents would use steganography to negotiate the cryptographic key, then they would alert you that the key has been established and encrypt your voice data. Since virtually all VoIP connections are bit transparent... even when going out to ISDN and increasingly GSM, this is very feasible. The additional benefit is that this would work regardless of what network you are connected to and it would work without your VoIP provider even knowing.

There is no reason why intermediate points should even know about end to end security.

RSA asks for plaintext Twitter passwords on conference reg page

Christian Berger

Well it's RSA

They sell closed source "security" solution... that alone would be a reason to not trust them as finding back doors is incredibly hard there... plus they have a track record of actually working with the NSA to put in back doors.

Christian Berger

Re: You got your password in my Oauth

Well the CCC actually proudly proclaims "We are not on Facebook".

GCHQ spies quashed this phone encryption because it was too good against snoopers

Christian Berger

No! You _must_ blame them for trying!

Not blaming them for trying is like not blaming a bank robber for trying to rob a bank. The GCHQ is paid by the people, so in a democratic society it must not turn on them.

The GCHQ is not some child testing its limits, they are the ones who _claim_ to be the good guys. They are the ones who, by their own standards, must never do such a thing. They are the ones who claim to protect you. Trying to reduce the level of encryption, and therefore security, is exactly the opposite.

No, Agile does not 'equal' DevOps: Examining complexity and the long haul

Christian Berger

The problem with this will be...

... that people have been trained to make highly complex interfaces like SOAP or whatever.

This concept only was able to be so successful on Unix because the interfaces were dead simple yet incredibly efficient. Take a look at sort, it can sort any kind of dataset. It doesn't need to be adapted when you change your dataset as long as it's tabular data with one line per dataset.

It's little use splitting your task into several if most of the complexity will lie in the interface between them.

Self-regulation can address issues that arise in the digital economy, says Airbnb

Christian Berger

There seems to be one area where self regulation actually works

...and that's ransom ware. They do have very good customer service so you do get your data back when you pay.

Whether or not we actually want to have that particular business model is a different question. Unfortunately we do have to little regulation in that regard, that's why, for example, companies making DRM are still legal.

AMD's 64-bit ARM server chip Seattle finally flies the coop ... but where will it call home?

Christian Berger

Will there be a common platform

The big problem about ARM right now is that virtually every computer requires its own OS image. While on PCs you can boot your OS on virtually all PCs with just 2 images, ARM systems are incredibly diverse.

Seriously on a PC you can blindly access some ports and you will always find a serial port. Same goes for basic graphics, USB, SATA or whatever you could wish for. And for things that do not have fixed ports you can query the devices in a standardized way.

This needs to be established first before we can think about having ARM servers. There's no point in having one that can only run version X of operating system Y.

Hopefully eventually such a standard platform will move into the mobile world. This would finally mean that you could choose your operating system independently of your manufacturer. You could even update your software without it. Suddenly a mobile device might actually be useful for a longer period of time.

One Ring to pwn them all: IoT doorbell can reveal your Wi-Fi key

Christian Berger

Re: Uhm, you can probably still read the flash chip

Actually even if you could safely contain the secret to access the network in a separate WIFI chip... you could _still_ just send different command to that chip and it would allow you access to the network.

Christian Berger

Uhm, you can probably still read the flash chip

I mean the doorbell has to have the secret to gain access to the network, and if you have physical access to it you will always be able to get that.

Obviously the least you should do is to have several dedicated wireless networks with filtering in between.

$30 webcam spun into persistent network backdoor

Christian Berger

Running your own firmware is not a security problem, it's an essential right you have

The problem in this case was that you could change the firmware without being physically at the device. A simple button, or in fact a timer that only allows firmware updates for the first n minutes after booting would have solved that problem.

Of course this is an easy find. Just look at the firmware images, take them apart and change them before putting them together again. Installing the cross compiler to make your own binaries to put into that image is more complicated than that. Many people who want to start a carrier in security or who want to promote their security outfit just bring that out purely for promotion. That would be perfectly al right if it wouldn't set the idea into peoples mind that running your own firmware is a security risk.

Let me put it in another way. What they did is to change the firmware and remove the update function. A legitimate user might do exactly the same. First remove all the junk from the firmware you don't want (i.e. the calling home functions) then remove the update function so nobody would install the less secure vendor provided version again. Removing functionality is relatively easy and it can bring you a great security benefit.

Anyone using M-DISC to archive snaps?

Christian Berger

The problem with optical media when it comes to copying...

...is that they are _very_ slow and cumbersome to read. I have lots of CD-Roms I'd like to copy to something more modern, however just reading them would take days. Unlike hard disks you also need to manually insert them into your drive.

So sure, you can make an additional copy on such disks, and maybe that's the copy you will have to go back to when everything fails, but the smarter way is to have a diverse range of media which are easy to copy.

Philae's phinal phling: Germans made weekend spin-up attempt

Christian Berger

That's just a bad transliteration. I'm sure they meant "schäik".

Star Wars BB-8 toy in firmware update risk, say UK security bods

Christian Berger

Again, running your own firmware is not a security problem

Sure, firmware updates over the Internet should use HTTPs and perhaps some checksumming to check if you really have the firmware you wanted, however putting your own firmware onto a device is a right you have, not a security bug.

Checkpoint chap's hack whacks air-gaps flat

Christian Berger

I've seen the talk

First of all, if the discovery process really happened as described... that was the teams first attempt at hardware reverse engineering... and they obviously had nobody to ask. If they had asked someone they could have skipped several time consuming steps.

Then again, running your own firmware on a device is not a security bug, it's a vital feature to keep you from having such bugs. Only then can you develop alternative versions without vendor induced back doors. The KVM manufacturer did everything correctly by enabling firmware updates only via the serial port. It may actually even be impossible to update the firmware via USB as the microcontroller needs to run the USB stack which it might not be able to do while flashing firmware. (in short on those boxes you cannot update the code you run so you are limited to a small "bootloader" memory)

So the only problem would be IP-KVMs, which they haven't looked at. Obviously you shouldn't connect them to a public network, just like you shouldn't connect your normal KVM to a public network. The whole point of having such a device is to have a separate channel to your servers from the network.

And please don't link to ackward to use websites like Youtube when there's a perfectly simple download link at the official video location:

https://media.ccc.de/v/32c3-7189-key-logger_video_mouse

Intel lobs out new Core m3/m5 Compute Sticks, shouts 'Fetch!'

Christian Berger

Re: Why two boxes?

Well HDMI supports controlling devices over it. Not every TV has that functionality, but many now do have. So you usually don't need infrared or bluetooth if you want to use it as a "media PC". What's actually worse is that this device doesn't seem to have Ethernet so you cannot easily connect it to networks.

Did North Korea really just detonate a hydrogen bomb? Probably not

Christian Berger

No it was pole vault training

At least to this news report from a respected German source:

http://www.der-postillon.com/2016/01/erschutterung-in-nordkorea-laut-cia-nur.html

How long is your password? HTTPS Bicycle attack reveals that and more

Christian Berger

Uhm, that's what Digest Access Authentication is for

https://en.wikipedia.org/wiki/Digest_access_authentication

Essentially it means that you'll never send your password over the connection, but only random numbers and hashes. This is a feature in HTTP which is there for probably over a decade.

UK universities unveil £28m hub for Internet of Things

Christian Berger

It's to early to provide solutions... provide canvases instead

I mean look at 1980s home computers. Those weren't "pre buildt" machines. They were computers which, when you connected them and turned them on, provided you with a (more or less) blank screen you could program on. You could just start typing, and program them. You could even just enter a single line of program into them and they would just execute it. All thanks to the magic of BASIC.

The company making that computer did not tell you what to do with it, at best it gave you suggestions. That's why you suddenly had a Cambrian explosion of uses for computers. While before that your computer would be used to hunt down oppositional forces or organizing a funeral, you could now do lots of different things. You could hook up a robot arm to it so it would drop an egg onto your breakfast table or simply play a computer game.

This is what's missing in the IoT world today.

Dutch govt says no to backdoors, slides $540k into OpenSSL without breaking eye contact

Christian Berger

The Dutch had a special problem when it comes to IT security and governments

They once had a census. It contained lots of question and was made with the back then state of the art technology of punch cards. One seemingly harmless question was "religion". Surely there can't be any harm in that can there?

Well some months later the Netherlands were invaded by Nazi Germany. So the Nazis went to the governmental offices, got those punchcards and threw them into a sorter and a tabulator to get nice lists of all the Jews... that's why the percentage of Jews in the Netherlands killed back then was so high.

So you don't store data you don't need on your servers. You don't weaken encryption so you can store more data about your people. It's just bad, even if you do it with good intentions.

Here's your Linux-booting PS4, says fail0verflow

Christian Berger

Wrong security model

The whole idea behind the "security" of such a games console is that people cannot pirate games or sell games without a license. That's the whole idea about all of this.

There are 2 people who want to break your security system. The first is people who want to pirate games, the other is people who want to have control over their hardware, for example to run Linux on it. Experience has shown that it's the second group you have to worry about.

The PS3 has the ingenious idea of just keeping the second group happy. You could run Linux on it right from the start. That's why the second group was pacified so it wouldn't look at your security systems. So even a trivial system was good enough to defend against the first group. Then however the PS3 slim came which removed the capability to run Linux. This angered the second group to find ways to regain their right... which lead to exploits... which lead to pirated games.

I know managers and executives at that level rarely think things through, but they should know by now who their enemies are. Declaring your customers to be your enemies is not a viable long term business strategy, though in the mid term it might work. Just look at BluRay sales, which only took off after you could rip those disks, or DVD sales which did the same (though a bit delayed as hard disk sizes had to increase first), or online music sales after the DRM was lifted.