Language Selection

English French German Italian Portuguese Spanish

Game Over for Modders?

Filed under
Gaming

When the smoke clears around the Grand Theft Auto sex scandal, the innocent bystanders of the collision between politics, puritans and corporate dissembling may prove to be the community of "modders" who tinker with game content for their own amusement.

Game hackers have probed, tweaked and enhanced everything from Halo to The Sims 2 over the years without incurring the wrath of game makers -- despite widespread click-wrap contracts prohibiting unauthorized modifications, and ambiguities in copyright law that make distributing the hacks legally uncertain.

All that changed last week when game industry opponents and some Democratic lawmakers raised a furor over a sexually themed mini game baked into Rockstar Games' best-selling PC and console title GTA: San Andreas. The raunchy bonus material was hidden from normal play, but could be unlocked by a downloadable mod titled "Hot Coffee" developed by hacker Patrick Wildenborg of Deventer, Netherlands, last month.

Rockstar's parent company, Take Two Interactive, was quick to blame the modder and disavow responsibility for the racy content. In a July 13 press release, the company claimed that "a determined group of hackers" had gone to "significant trouble to alter scenes in the official version of the game," a process that the company said involved disassembling, recompiling and "altering the game's source code."

But on Wednesday, an investigation by the Entertainment Software Ratings Board concluded that Take Two was, in fact, responsible for the sex content, which was found in all three versions of San Andreas: the PC, Xbox and PlayStation2 discs. Wildenborg's Hot Coffee download merely made the scenes accessible.
The industry group revoked the game's M rating, which labeled it appropriate for players 17 or older, and re-filed it under AO for "adults only" -- raising the minimum age to 18, the year at which a delicate teen becomes less susceptible to the harmful influence of computer-generated cartoon sex.

The new rating has major retailers pulling the game from their shelves, while Take Two preps a replacement version that will satisfy the ESRB requirements for an M rating. The company now acknowledges that the sex scenes were shipped on the game discs, but describes them as vestigial code that was cut from gameplay before release, and was not intended to be accessible to players.

Sen. Hillary Clinton has called for an FTC investigation of the whole affair, but Take Two is trying to keep attention on the modders. Spokesman Jim Ankner won't say whether the company is removing the sexual content from the new discs (it is if it wants an M rating, the ESRB says) but instead emphasizes that the next release will have "enhanced security" against hackers like Wildenborg.

The company also said, in a Wednesday press release, that it's "exploring its legal options as it relates to companies that profited from creating and distributing tools for altering the content" of the game. Ankner declined to elaborate on what that might mean, but the PlayStation2 version of the Hot Coffee hack required the use of a consumer cheat device called "Action Replay" that allows players to tweak console games, typically to get extra lives or unlimited ammo.

The U.S. subsidiary of the company that makes Action Replay, Datel Design & Development, didn't return phone calls Thursday. A spokesman for U.S. distributor Intec says it's watching the controversy closely. "We're definitely staying on top of the issue to see how this plays out," said VP of marketing Mark Stanley.

In 1992, Nintendo lost a lawsuit against the maker of a similar customization tool called Game Genie, when a federal appeals court found that the device didn't infringe Nintendo's copyrights.

Full Story.

More in Tux Machines

Games: Ostriv, Back to Bed, EVERSPACE, Hiveswap: Act 1

Openwashing and Microsoft FUD

BlueBorne Vulnerability Is Patched in All Supported Ubuntu Releases, Update Now

Canonical released today new kernel updates for all of its supported Ubuntu Linux releases, patching recently discovered security vulnerabilities, including the infamous BlueBorne that exposes billions of Bluetooth devices. The BlueBorne vulnerability (CVE-2017-1000251) appears to affect all supported Ubuntu versions, including Ubuntu 17.04 (Zesty Zapus), Ubuntu 16.04 LTS (Xenial Xerus) up to 16.04.3, Ubuntu 14.04 LTS (Trusty Tahr) up to 14.04.5, and Ubuntu 12.04 LTS (Precise Pangolin) up to 12.04.5. Read more

Security: Updates, 2017 Linux Security Summit, Software Updates for Embedded Linux and More

  • Security updates for Tuesday
  • The 2017 Linux Security Summit
    The past Thursday and Friday was the 2017 Linux Security Summit, and once again I think it was a great success. A round of thanks to James Morris for leading the effort, the program committee for selecting a solid set of talks (we saw a big increase in submissions this year), the presenters, the attendees, the Linux Foundation, and our sponsor - thank you all! Unfortunately we don't have recordings of the talks, but I've included my notes on each of the presentations below. I've also included links to the slides, but not all of the slides were available at the time of writing; check the LSS 2017 slide archive for updates.
  • Key Considerations for Software Updates for Embedded Linux and IoT
    The Mirai botnet attack that enslaved poorly secured connected embedded devices is yet another tangible example of the importance of security before bringing your embedded devices online. A new strain of Mirai has caused network outages to about a million Deutsche Telekom customers due to poorly secured routers. Many of these embedded devices run a variant of embedded Linux; typically, the distribution size is around 16MB today. Unfortunately, the Linux kernel, although very widely used, is far from immune to critical security vulnerabilities as well. In fact, in a presentation at Linux Security Summit 2016, Kees Cook highlighted two examples of critical security vulnerabilities in the Linux kernel: one being present in kernel versions from 2.6.1 all the way to 3.15, the other from 3.4 to 3.14. He also showed that a myriad of high severity vulnerabilities are continuously being found and addressed—more than 30 in his data set.
  • APNIC-sponsored proposal could vastly improve DNS resilience against DDoS