1373

It's amazing what a difference a little bit of time can make: Two years after kicking off what looked to be a long-shot campaign to push back on the practice of shutting down server-dependent videogames once they're no longer profitable, Stop Killing Games founder Ross Scott and organizer Moritz Katzner appeared in front of the European Parliament to present their case—and it seemed to go very well.

Official Stream: https://multimedia.europarl.europa.eu/en/webstreaming/committee-on-internal-market-and-consumer-protection-ordinary-meeting-committee-on-legal-affairs-com_20260416-1100-COMMITTEE-IMCO-JURI-PETI

Digital Fairness Act: https://ec.europa.eu/info/law/better-regulation/have-your-say/initiatives/14622-Digital-Fairness-Act/F33096034_en

you are viewing a single comment's thread
view the rest of the comments
[-] grue@lemmy.world 247 points 3 days ago* (last edited 3 days ago)

Games should be required to have reproducible source for all components (client and server) sent to whatever the European equivalent of the Library of Congress is, to be made available in the Public Domain whenever the publisher stops publishing them.

[-] SpeedRunner@europe.pub 231 points 3 days ago* (last edited 3 days ago)

Not only games. Goes for all electronics as well.

Sick of supporting your 'old phones'? You're required by law to disclose all binary blobs as source code to let somebody else pick it up the slack.

Feeling like bricking old Kindles? Fine, but users must be able to install alternative OS on your old device.

Not providing software updates for your TV anymore after you removed features? That's your right, but so is the right of the effing device owner to install something else on it.

And it's not just consumer electronics. (caugh John Deere caugh).

[-] JasonDJ@lemmy.zip 23 points 3 days ago

Not to be pro-corporate/anti-repair...but I feel I have to play devils-advocate here...

That sounds like a legal and security nightmare.

If you just give binary blobs and no sources, there's no way to maintain the code/device long term. As exploits continue to be found in upstream dependencies, the hardware continues to become increasingly insecure.

But if the source needs to be released...I imagine that there are heaps of proprietary code that is still in use on "active" devices even after another model goes EoL...so if that code is released, there's instantly thousands of nefarious eyes on it.

On top of the regular zero-days that are found out when a popular product reaches EoL.

I think that's potentially a lot to ask of users. Will your technically-challenged great-Aunt switch to post-support build when her phone hits EoL, or will hackers be able to remote control her banking app and take away your inheritance before the community can even patch it (assuming there's enough community support out there for an 8-year-old Galaxy A-series...)

Then there could also be licensed code that would need to be released as well...hence the legal nightmare.

Not saying it's impossible...in fact, I greatly agree with your stance and stated position. Just saying that there are some blockers on this epic.

[-] qqq@lemmy.world 131 points 3 days ago* (last edited 3 days ago)

Security is constantly used as a guise for removing consumer rights and as someone who has been in the security industry for about 9 years I'm so sick of it.

First and foremost, everyone please understand: the user should be allowed to opt into your concept of insecurity: you do not know their threat model and you do not know their risk tolerance.

Using exploits in low level drivers in the wild is approaching APT level, and even if there were a simple one to use it'd likely be useless without some sort or local access to the device (bar some horror show bug in a Bluetooth or WiFi firmware). The risk is incredibly low for the average person. I'd put it pretty close to 0.

Wire transfers aren't instant and for large sums (your inheritance) the banks will likely require more than just a request from your app. If the bank cares about that then they can also use the attestation APIs which would be more than sufficient, as much as I hate them.

This boogey man of the APT going after my technologically illiterate with nation state level exploits needs to die. Long ago we entered a new era of security where it just isn't worth it to waste exploits. Especially when you can just text people and ask for their money and that works plenty well.

Security is not a valid reason to soft brick consumer devices at some arbitrary end of life date.

[-] porcoesphino@mander.xyz 9 points 3 days ago

Agreed, but I think a framing or two is missing here, and it only applies to a subset, is that the people of the world shouldn't have to deal with more/larger bot nets because these things haven't been considered.

Another is just that the average great aunt isn't opting into a concept of insecurity they're simply ignorant to what threats there are. If it's possible to distinguish between the two sets of people, or to maybe even bucket devices by potential threat, it might go a long away. I probably a lot wrong here, I just woke up.

But yeah, agreed security is an argument that's hidden behind

[-] qqq@lemmy.world 17 points 3 days ago* (last edited 3 days ago)

Yes I'm not going to take some "survival of the fittest" nonsense approach to security: consumers need securely built devices and software. This is the first line of defense always: we need to make things secure and then have secure defaults according to whatever we decide "secure" means in the context of our widget or software. Then we need to provide "advanced" (or even just "ignorant but risk tolerant") users with the ability to change the device or software to match their definition of "secure".

The easiest example is secure boot. Your laptop likely has a key provided by your OEM and likely Microsoft's key preinstalled. This is a valid "secure boot" path for the average user, provided your OEM and Microsoft don't get compromised, which is APT territory. However you are provided with the ability to use a different key if you know how to do that. You have thus opted in to protecting your own private key but now you have more control over your device. This design is notably absent in phones, which is absolutely bananas and actually less secure in some threat models

You could extend examples like this if you wanted. One could easily imagine a device that does soft brick itself after the EOL date to simply protect people that are ignorant of the potential risks, but also provides an advanced user with the ability to revive it in a "less secure" state. The less advanced user will then have to either learn something new or buy a new device.

[-] porcoesphino@mander.xyz 1 points 2 days ago

That's seems pretty reasonable, it just sounded in you post like you were so emotionally invested in how often security is used as an out that you were ignoring that the post you were responding to brought up some valid points about security for some segments of the population that aren't as knowledgeable as you seem to be

[-] VieuxQueb@lemmy.ca 39 points 3 days ago

Security by obscurity is a myth

[-] galacticbackhoe@lemmy.world 2 points 2 days ago

it's a mythos.

[-] iglou@programming.dev 6 points 3 days ago

No. It's a valid tactic but needs to be part of a much broader strategy.

Absolute security is unachievable, but it is much harder to probe a black box to understand how it works than reading its entire manual.

[-] imgcat@lemmy.ml 2 points 2 days ago* (last edited 2 days ago)
[-] iglou@programming.dev 2 points 2 days ago

And what part, exactly, is not true?

[-] qqq@lemmy.world 4 points 2 days ago

People like to think in black and white, but you're definitely right. Having your SSH server on port 36271 will likely stop a ton of drive by attacks because they simply won't check it. Having it only listen on IP6 would stop almost all of them because you can't trawl the IP6 space efficiently. These are "obscurity", but they have real benefits. The idea that "obscurity" doesn't help is just a meme that people love to quote because it's a great single sentence with some nice rhyming "security by obscurity". I assume the reason it became a meme is because tons of products fully relied on obscurity; I still see it all the time. As you said, it's all layers.

[-] iglou@programming.dev 1 points 2 days ago

Yep! I don't know a single engineer who would say that security by obscurity is never useful. Everyone knows, as you said, to put SSH on a random port. It's the first step you do to secure a server.

[-] BreakerSwitch@lemmy.world 2 points 2 days ago

I mean really the whole thing. Security by obscurity is no security at all. Device search engines like shodan exist and seeking out specifically insecure devices becomes easier by the day.

Absolute security is achievable, but comes with costs. If I'm willing to airgap everything and never go online, only using my own code, my device will be safe.

Black box testing is MUCH harder than white box testing, especially as, and I hate to say it, AI based security scanners become better and better at identifying flaws in source code. Having more information about your target is always the first step in penetration testing, and more information is ALWAYS better.

[-] qqq@lemmy.world 2 points 2 days ago

The difficulty of black box over white box is the reason obscurity has benefits...

only using my own code

You're going to write your kernel and bootloader as well? Drivers for the hardware? And a compiler for those? And an assembler to build that bootstrap compiler? Build the CPU? The second any of these are "out of your control" you lose "absolute security". The reason people say there is no "absolute security" is that it is not a useful concept to even consider. Since you have to approach it theoretically, you can easily end up stuck at the fact that every computation changes the state of the world and thus every computation can in some way be measured. It's a useless endeavor even if it were theoretically possible because it leads you to absurd solutions against absurdly powerful attackers. You want security in a well defined threat model not some "absolute".

Air gapping isn't sufficient to prevent communication either. For example there are functional TCP stacks working over audio. Silence on the Wire is quite old at this point, but also explores esoteric exfiltration methods.

[-] iglou@programming.dev 1 points 2 days ago

This comment... Confuses me.

Black box testing is MUCH harder than white box testing, especially as, and I hate to say it, AI based security scanners become better and better at identifying flaws in source code. Having more information about your target is always the first step in penetration testing, and more information is ALWAYS better.

This is exactly why security by obscurity is a valid tactic. It hides information and makes a system harder to attack.

Absolute security is achievable, but comes with costs. If I'm willing to airgap everything and never go online, only using my own code, my device will be safe.

No, it's not. Every system has flaws. Using your own code is especially a bad idea, as it is much more likely to be flawed than a 20 yo open source project. Your airgapped device may be secure from remote attacks, since it is not connected to any network, but if it is stolen, that means nothing.

Absolute security is impossible.

[-] sp3ctr4l@lemmy.dbzer0.com 6 points 3 days ago

Technically, I'd say its a stalling tactic, but yeah, by no means is it a sound, comprehensive strategy.

[-] CileTheSane@lemmy.ca 30 points 3 days ago

That implies any and all FOSS project should be getting exploited constantly, especially those being run by a community of hobbiests, and that is simply not the case.

[-] JasonDJ@lemmy.zip 9 points 3 days ago

There's been a notable uptick in supply chain attacks coming from the odd FOSS dependency.

Fortunately the FOSS environment as a whole, ironically, reflects the best aspects of a "free market" in the capitalist sense. If a package is no longer maintained, or poorly maintained, or the maintainer is a douche/Russian asset, it forks and many users jump ship to the newer package.

Users have full transparency into how the sausage is made. Everybody does.

So if exploitable code is discovered, it can just as well be discovered first by a defensive researcher (non-inclusive term: white-hat) or offensive researcher (black-hat).

And if an offensive researcher discovers it first, they have a choice:

  • Use it and risk being spotted. Once discovered in the wild, patching is only a matter of time.
  • Sit on it and hope a defensive researcher doesn't find it.

Submitting bad code to a project in itself though. Some new user with no reputation is going to be heavily scrutinized putting a PR on a large/popular project. And even with a good reputation, you're still putting the exploit code out there in the open and hoping none of the reviewers or maintainers catch it.

load more comments (3 replies)
load more comments (1 replies)
[-] unwarlikeExtortion@lemmy.ml 1 points 2 days ago

If you just give binary blobs and no sources

The main point is that you give the source to the blobs, so it's not a black box anymore - new maintainers knowing what the blob does (and how) saves a HUGE amount of time prodding the black box (blob) to infer its behaviour.

And it doesn't pose a security risk - if anything, more eyes on the code is better. Security through obscurity has been proven a myth since open code has more eyes on it. Security researches have smarter things to do than prod some binary blob when there's so much code that's either open source in the first place or at least only they got access to closed code.

What obscurity does is limit the eyes on the code, but the share of bad actors hoping to strike gold to researches looking at it outdoes any benefit.

Will your technically-challenged great-Aunt switch to post-support build when her phone hits EoL

She won't. But you as her niece/nephew might. And the local repair tech might when she comes to ask. Abd she's not an idiot, just the technology isn't mature enough in the societal sense: people don't think of bringing their phone to a repair shop like they do their cars, which is a fixable issue - even without much advocacy groups time will fix this issue.

hackers [will] be able to remote control her banking app and take away your inheritance before the community can even patch it

You might be mixing apples and orabnes here: why and how is the community expected to "fix" a banking app?

A banking app is a closed blob just like phobes nowadays. It's a parasitic relationship: blobbed phones are used to justify blobbed apps and vice versa. It's like saying "well, the foubdation of the building is bad, but to fix it we'd need to also deal with the crumbling walls" - so instead of fixing, it often is better to do a fresh start. But you're suggesting we should continue making buildings with bad walls and foubdations because we have the wall materials lying around, so why not use them?

Then there could also be licensed code

This is a recipe for disaster. I hope you're trolling.

The Internet wouldn't work if DNS were centralized, and the only thing DNS is used for is translating key pairs (basically). Now a single point of failure would have to do code vetting?

It's the totalitarian dream! Oh, and absolutely out of touch with reality.

[-] porcoesphino@mander.xyz 2 points 2 days ago

I can't believe this is so heavily downvoted for pointing out flaws in the expressed/written stance while still expressing they agree with the general position

load more comments (1 replies)
[-] cecilkorik@piefed.ca 8 points 3 days ago

And the private encryption keys they use for DRM and bootloader locking too. I doubt that would go over well, but it needs to fucking happen. It is the only way to truly have right to repair and digital device ownership.

[-] helpImTrappedOnline@lemmy.world 49 points 3 days ago* (last edited 3 days ago)

I like it. If the publisher no longer sells/supports the full game as purchased, then they no longer to get to complain about people pirating it.

I don't like instantly throwing it public domain, that's the wrong license to use. I think Creative Common CC BY-NC-SA would be more appropriate. (Credit the original, no commercial use, and any modified/redistributed version must follow same license).

This will prevent xbox from taking all the old PlayStation games, stealing an emulator, and selling them under game pass to people that don't know those games are freely available.

I'd also add the game must be available as an individual 1-time purchase. If it's only available as a bundle or subscription service (like game pass), that doesn't count.

[-] grue@lemmy.world 21 points 3 days ago

The Public Domain isn't a "license." It's simply the default state of a work when copyright is no longer being enforced for it. I'm saying that copyright should immediately expire for any published work that is no longer being made available by some entity with the right to do so (phrased carefully so as not to break copyleft licenses, BTW) and that anyone should be able to get it directly from a government archive of all Public Domain works.

As for selling Public Domain works, that's always been allowed and I don't see any particular reason to change it, provided that regulatory capture doesn't result in the public archive being the digital equivalent of hidden away in a disused lavatory in a locked basement with a sign saying "beware of the leopard." If the free option is prominent and well-known but you want to pay money for some reason anyway (in theory, because the person selling it added value in some way), that's your business.

[-] CosmicTurtle0@lemmy.dbzer0.com 5 points 3 days ago

I'm going to hard disagree on NC.

If the original publisher decided to dump their IP, and someone else has a good enough idea to make money off of it, they absolutely should.

BY-SA gets you the same vibe and encourages the new IP to keep making new content and allows others to do the same.

load more comments (1 replies)
[-] SpaceScotsman@startrek.website 26 points 3 days ago

This is one of the points that a French MEP brought up during the meeting. If this is pursued it could as a side effect open up space for digital "orphaned works" which would be fantastic.

[-] grue@lemmy.world 29 points 3 days ago* (last edited 3 days ago)

It's not even an issue of "orphaned works." Every work becomes Public Domain eventually; that's the point of it.

In fact (according to originalist American sensibilities, at least) the entire point of copyright law is "to promote the progress of science and the useful arts" (i.e., to enrich the Public Domain) to begin with! Allowing works to be copyrighted (essentially, borrowed back from the Public Domain temporarily so the creator can profit, thus incentivizing the creation of works) is merely a means to that end, not some sort of moral entitlement.

[-] gian@lemmy.grys.it 5 points 3 days ago

Nah, if the publisher stop selling a game, just make him to release a docker image for the server and the game patched to use such docker image. No source code needed (even if it would be nice).

[-] raspberriesareyummy@lemmy.world 13 points 3 days ago

Pardon my French but would you please kindly fuck off with "container solutions"? Cheers.

[-] gian@lemmy.grys.it 3 points 3 days ago

Look, I don't really like container, I would not suggest they are the solution for everything, but in some cases they have their use.

I see this as one of the cases where a container can have a use. You can also use a virtual machine if you want, the point is to have something that can be run even if the original OS or libraries needed are not available anymore because they are too old or have some incompatible changes, which in the case of old game server can happen, especially if you want to keep it running for many years after the release.

load more comments (5 replies)
load more comments (2 replies)
load more comments (24 replies)
this post was submitted on 22 Apr 2026
1373 points (100.0% liked)

Technology

84103 readers
2694 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related news or articles.
  3. Be excellent to each other!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
  9. Check for duplicates before posting, duplicates may be removed
  10. Accounts 7 days and younger will have their posts automatically removed.

Approved Bots


founded 2 years ago
MODERATORS