Illegal number

Last updated
Free Speech flag, from the HD DVD AACS case Sample 09-F9 protest art, Free Speech Flag by John Marcotte.svg
Free Speech flag, from the HD DVD AACS case

An illegal number is a number that represents information which is illegal to possess, utter, propagate, or otherwise transmit in some legal jurisdiction. Any piece of digital information is representable as a number; consequently, if communicating a specific set of information is illegal in some way, then the number may be illegal as well. [1] [2] [3]

Contents

Background

A number may represent some type of classified information or trade secret, legal to possess only by certain authorized persons. An AACS encryption key (09 F9 11 02 9D 74 E3 5B D8 41 56 C5 63 56 88 C0) that came to prominence in May 2007 is an example of a number claimed to be a secret, and whose publication or inappropriate possession is claimed to be illegal in the United States. It allegedly assists in the decryption of any HD DVD or Blu-ray Disc released before this date. The issuers of a series of cease-and-desist letters claim that the key itself is therefore a copyright circumvention device, [4] and that publishing the key violates Title 1 of the US Digital Millennium Copyright Act.

In part of the DeCSS court order [5] and in the AACS legal notices, the claimed protection for these numbers is based on their mere possession and the value or potential use of the numbers. This makes their status and legal issues surrounding their distribution quite distinct from that of copyright infringement. [5]

The PlayStation 3 edition of the free speech flag Free-speech-flag-ps3.svg
The PlayStation 3 edition of the free speech flag

Any image file or an executable program [6] can be regarded as simply a very large binary number. In certain jurisdictions, there are images that are illegal to possess, [7] due to obscenity or secrecy/classified status, so the corresponding numbers could be illegal. [1] [8]

In 2011 Sony sued George Hotz and members of fail0verflow for jailbreaking the PlayStation 3. [9] Part of the lawsuit complaint was that they had published PS3 keys. Sony also threatened to sue anyone who distributed the keys. [10] Sony later accidentally retweeted an older dongle key through its fictional Kevin Butler character. [11]

Flags and steganography

The word "Wikipedia" translated into colors via hex codes Wikipedia Steganography Flag.png
The word "Wikipedia" translated into colors via hex codes

As a protest of the DeCSS case, many people created "steganographic" versions of the illegal information (i.e. hiding them in some form in flags etc.). Dave Touretzky of Carnegie Mellon University created a "Gallery of DeCSS descramblers". In the AACS encryption key controversy, a "free speech flag" was created. Some illegal numbers are so short that a simple flag (shown in the image) could be created by using triples of components as describing red-green-blue colors. The argument is that if short numbers can be made illegal, then any representation of those numbers also becomes illegal, like simple patterns of colors, etc.

In the Sony Computer Entertainment v. Hotz case, many bloggers (including one at Yale Law School) made a "new free speech flag" in homage to the AACS free speech flag. Most of these were based on the "dongle key" rather than the keys Hotz actually released. [12] Several users of other websites posted similar flags. [13]

Illegal primes

An illegal prime is an illegal number which is also prime. One of the earliest illegal prime numbers was generated in March 2001 by Phil Carmody. Its binary representation corresponds to a compressed version of the C source code of a computer program implementing the DeCSS decryption algorithm, which can be used by a computer to circumvent a DVD's copy protection. [14]

Protests against the indictment of DeCSS author Jon Lech Johansen and legislation prohibiting publication of DeCSS code took many forms. [15] One of them was the representation of the illegal code in a form that had an intrinsically archivable quality. Since the bits making up a computer program also represent a number, the plan was for the number to have some special property that would make it archivable and publishable (one method was to print it on a T-shirt). The primality of a number is a fundamental property of number theory and is therefore not dependent on legal definitions of any particular jurisdiction.

The large prime database of the PrimePages website records the top 20 primes of various special forms; one of them is proof of primality using the elliptic curve primality proving (ECPP) algorithm. Thus, if the number were large enough and proved prime using ECPP, it would be published.

Other examples

There are other contexts in which smaller numbers have run afoul of laws or regulations, or drawn the attention of authorities.

See also

Related Research Articles

<span class="mw-page-title-main">DeCSS</span> Free open-source program to decode DVDs with encryption

DeCSS is one of the first free computer programs capable of decrypting content on a commercially produced DVD video disc. Before the release of DeCSS free and open source operating systems could not play encrypted video DVDs.

<span class="mw-page-title-main">Privilege escalation</span> Gaining control of computer privileges beyond what is normally granted

Privilege escalation is the act of exploiting a bug, a design flaw, or a configuration oversight in an operating system or software application to gain elevated access to resources that are normally protected from an application or user. The result is that an application with more privileges than intended by the application developer or system administrator can perform unauthorized actions.

Homebrew, when applied to video games, refers to games produced by hobbyists for proprietary video game consoles which are not intended to be user-programmable. The official documentation is often only available to licensed developers, and these systems may use storage formats that make distribution difficult, such as ROM cartridges or encrypted CD-ROMs. Many consoles have hardware restrictions to prevent unauthorized development.

<span class="mw-page-title-main">David S. Touretzky</span>

David S. Touretzky is a research professor in the Computer Science Department and the Center for the Neural Basis of Cognition at Carnegie Mellon University. He received a BA in Computer Science at Rutgers University in 1978, and earned a master's degree and a Ph.D. (1984) in Computer Science at Carnegie Mellon University. Touretzky has worked as an Internet activist in favor of freedom of speech, especially what he perceives as abuse of the legal system by government and private authorities. He is a notable critic of Scientology.

<span class="mw-page-title-main">Dolphin (emulator)</span> Nintendo GameCube and Wii emulation software

Dolphin is a free and open-source video game console emulator for GameCube and Wii that runs on Windows, Linux, macOS, Android, Xbox One, Xbox Series X and Series S.

<span class="mw-page-title-main">Susan Illston</span> American judge

Susan Yvonne Illston is a senior United States district judge of the United States District Court for the Northern District of California. She was nominated by President Bill Clinton and confirmed by the Senate in 1995. She assumed senior status in 2013.

<span class="mw-page-title-main">Advanced Access Content System</span> Standard for content distribution and digital rights management

The Advanced Access Content System (AACS) is a standard for content distribution and digital rights management, intended to restrict access to and copying of the post-DVD generation of optical discs. The specification was publicly released in April 2005. The standard has been adopted as the access restriction scheme for HD DVD and Blu-ray Disc (BD). It is developed by AACS Licensing Administrator, LLC, a consortium that includes Disney, Intel, Microsoft, Panasonic, Warner Bros., IBM, Toshiba and Sony. AACS has been operating under an "interim agreement" since the final specification has not yet been finalized.

<span class="mw-page-title-main">George Hotz</span> American software engineer

George Francis Hotz, alias geohot, is an American security hacker, entrepreneur, and software engineer. He is known for developing iOS jailbreaks, reverse engineering the PlayStation 3, and for the subsequent lawsuit brought against him by Sony. Since September 2015, he has been working on his vehicle automation machine learning company comma.ai. Since November 2022, Hotz has been working on tinygrad, a deep learning framework.

<span class="mw-page-title-main">Video game console emulator</span> Program that reproduces video game consoles behavior

A video game console emulator is a type of emulator that allows a computing device to emulate a video game console's hardware and play its games on the emulating platform. More often than not, emulators carry additional features that surpass limitations of the original hardware, such as broader controller compatibility, timescale control, easier access to memory modifications, and unlocking of gameplay features. Emulators are also a useful tool in the development process of homebrew demos and the creation of new games for older, discontinued, or rare consoles.

The WIPO Copyright and Performances and Phonograms Treaties Implementation Act, is a part of the Digital Millennium Copyright Act (DMCA), a 1998 U.S. law. It has two major portions, Section 102, which implements the requirements of the WIPO Copyright Treaty, and Section 103, which arguably provides additional protection against the circumvention of copy prevention systems and prohibits the removal of copyright management information.

<span class="mw-page-title-main">AACS encryption key controversy</span> Controversy regarding copyright

A controversy surrounding the AACS cryptographic key arose in April 2007 when the Motion Picture Association of America and the Advanced Access Content System Licensing Administrator, LLC began issuing cease and desist letters to websites publishing a 128-bit (16-byte) number, represented in hexadecimal as 09 F9 11 02 9D 74 E3 5B D8 41 56 C5 63 56 88 C0, a cryptographic key for HD DVDs and Blu-ray Discs. The letters demanded the immediate removal of the key and any links to it, citing the anti-circumvention provisions of the United States Digital Millennium Copyright Act (DMCA).

<span class="mw-page-title-main">Digital Millennium Copyright Act</span> United States copyright law

The Digital Millennium Copyright Act (DMCA) is a 1998 United States copyright law that implements two 1996 treaties of the World Intellectual Property Organization (WIPO). It criminalizes production and dissemination of technology, devices, or services intended to circumvent measures that control access to copyrighted works. It also criminalizes the act of circumventing an access control, whether or not there is actual infringement of copyright itself. In addition, the DMCA heightens the penalties for copyright infringement on the Internet. Passed on October 12, 1998, by a unanimous vote in the United States Senate and signed into law by President Bill Clinton on October 28, 1998, the DMCA amended Title 17 of the United States Code to extend the reach of copyright, while limiting the liability of the providers of online services for copyright infringement by their users.

On Apple devices running iOS and iOS-based operating systems, jailbreaking is the use of a privilege escalation exploit to remove software restrictions imposed by the manufacturer. Typically it is done through a series of kernel patches. A jailbroken device permits root access within the operating system and provides the right to install software unavailable through the App Store. Different devices and versions are exploited with a variety of tools. Apple views jailbreaking as a violation of the end-user license agreement and strongly cautions device owners not to try to achieve root access through the exploitation of vulnerabilities.

Rooting is the process by which users of Android devices can attain privileged control over various subsystems of the device, usually smartphones. Because Android is based on a modified version of the Linux kernel, rooting an Android device gives similar access to administrative (superuser) permissions as on Linux or any other Unix-like operating system such as FreeBSD or macOS.

<span class="mw-page-title-main">PlayStation 3 Jailbreak</span>

PlayStation 3 Jailbreak was the first USB chipset that allowed unauthorized execution of code, similar to homebrew, on the PlayStation 3. It works by bypassing a system security check using a memory exploit which occurs with USB devices that allows the execution of unsigned code.

<span class="mw-page-title-main">Hacking of consumer electronics</span>

The hacking of consumer electronics is an increasingly common practice that users perform to customize and modify their devices beyond what is typically possible. This activity has a long history, dating from the days of early computer, programming, and electronics hobbyists.

<i>Sony Computer Entertainment America, Inc. v. Hotz</i> Lawsuit between Sony Entertainment and hackers geohot and fail0verflow

SCEA v. Hotz was a lawsuit in the United States by Sony Computer Entertainment of America against George Hotz and associates of the group fail0verflow. It was about jailbreaking and reverse engineering the PlayStation 3.

Video game piracy is the unauthorized copying and distributing of video game software, and is a form of copyright infringement. It is often cited as a major problem that video game publishers face when distributing their products, due to the ease of being able to distribute games for free, via torrenting or websites offering direct download links. Right holders generally attempt to counter piracy of their products by enforcing the Digital Millennium Copyright Act, though this has never been totally successful. Digital distribution of pirated games has historically occurred on bulletin board systems (BBS), and more recently via decentralized peer-to-peer torrenting. In terms of physical distribution, Taiwan, China and Malaysia are known for major manufacturing and distribution centers for pirated game copies, while Hong Kong and Singapore are major importers.

Homebrew software was first run on the PlayStation 3 by a group of hackers under the name "Team Ice" by exploiting a vulnerability in the game Resistance: Fall of Man. Following various other hacks executed from Linux, Sony removed the ability to install another operating system in the 3.21 firmware update. This event caused backlash among the hacker communities, and eventually the group Fail0verflow found a flaw in the generation of encryption keys which they leveraged to restore the ability to install Linux. George Hotz (Geohot), often misattributed as the genesis of homebrew on the PS3, later created the first homebrew signed using the private "metldr" encryption key which he leaked onto the internet. Leaking the key led to Hotz being sued by Sony. The court case was settled out of court, with the result of George Hotz not being able to further reverse engineer the PS3.

<span class="mw-page-title-main">Video game preservation</span> Form of preservation in video gaming

Video game preservation is a form of preservation applied to the video game industry that includes, but is not limited to, digital preservation. Such preservation efforts include archiving development source code and art assets, digital copies of video games, emulation of video game hardware, maintenance and preservation of specialized video game hardware such as arcade games and video game consoles, and digitization of print video game magazines and books prior to the Digital Revolution.

References

  1. 1 2 Carmody, Phil. "An Executable Prime Number?" . Retrieved December 30, 2018. Maybe I was reading something between the lines that wasn't there, but if arbitrary programs could be expressed as primes, the immediate conclusion is that all programs, including ones some people wished didn't exist, can too. I.e. the so called 'circumvention devices' of which my previous prime exploit was an example.
  2. Greene, Thomas C. (March 19, 2001). "DVD descrambler encoded in 'illegal' prime number". The Register . Retrieved December 30, 2018. The question, of course, is whether an interesting number is illegal merely because it can be used to encode a contraband program.
  3. "The Prime Glossary: illegal prime" . Retrieved December 30, 2018. The bottom line: If distributing code is illegal, and these numbers contain (or are) the code, doesn't that make these number illegal?
  4. "AACS licensor complains of posted key". Lumen . April 17, 2007. Retrieved December 30, 2018. Illegal Offering of Processing Key to Circumvent AACS Copyright Protection [...] are thereby providing and offering to the public a technology, product, service, device, component, or part thereof that is primarily designed, produced, or marketed for the purpose of circumventing the technological protection measures afforded by AACS (hereafter, the "circumvention offering"). Doing so constitutes a violation of the anti-circumvention provisions of the Digital Millennium Copyright Act (the "DMCA")
  5. 1 2 "Memorandum Order, in MPAA v. Reimerdes, Corley and Kazan". February 2, 2000. Retrieved December 30, 2018.
  6. "Prime Curios: 48565...29443 (1401-digits)" . Retrieved December 30, 2018. What folks often forget is a program (any file actually) is a string of bits (binary digits)—so every program is a number.
  7. "Criminal Justice Act 1988" . Retrieved December 30, 2018.
  8. Wells, David (2011). "Illegal prime". Prime Numbers: The Most Mysterious Figures in Math. Wiley. pp. 126–127. ISBN   9781118045718.
  9. Patel, Nilay (January 12, 2011). "Sony follows up, officially sues Geohot and fail0verflow over PS3 jailbreak". Engadget . Retrieved December 30, 2018.
  10. Kravets, David (February 8, 2011). "Sony lawyers now targeting anyone who posts PlayStation 3 hack". Ars Technica. Retrieved December 30, 2018.
  11. Miller, Ross (February 9, 2011). "PS3 'jailbreak code' retweeted by Sony's Kevin Butler, no punchline needed". Engadget. Retrieved December 30, 2018.
  12. S., Ben (March 1, 2011). "46-dc-ea-d3-17-fe-45-d8-09-23-eb-97-e4-95-64-10-d4-cd-b2-c2". Yale Law Tech. Retrieved December 30, 2018.
  13. See File:Free-speech-flag-ps3.svg description.
  14. "Prime glossary - Illegal prime". Primes.utm.edu. 1999-10-06. Retrieved 2013-03-26.
  15. Hamilton, David P. "Banned Code Lives in Poetry and Song"
  16. MacKinnon, Mark (June 4, 2012). "Banned in China on Tiananmen anniversary: 6, 4, 89 and 'today'". The Globe and Mail. Retrieved December 30, 2018.
  17. Meyer, Jeremy P. (September 5, 2012). "Greeley school ban on gang numbers includes Peyton Manning's 18". The Denver Post. Retrieved December 30, 2018.
  18. "Police charge leader of Slovak far-right party with extremism". Reuters. July 28, 2017. Retrieved December 30, 2018.
  19. "Pierre Bourdon (@delroth@delroth.net)". 27 May 2023.
  20. Fenlon, Wes (May 26, 2023). "Nintendo blocks Steam release of Wii emulator Dolphin". PC Gamer . Archived from the original on June 13, 2023. Retrieved July 20, 2023.
  21. Davis, Wes (May 29, 2023). "Dolphin says Nintendo blocked a Steam release of its Wii and GameCube emulator". The Verge . Archived from the original on July 8, 2023. Retrieved July 20, 2023.