Friday, January 31

Ajit Pai: Carrier sales of phone-location data is illegal, FCC plans punishment

A cell phone displays a map and directions while mounted on a car dashboard.

Enlarge (credit: Getty Images | Nakhorn Yuangkratoke/EyeEm)

Mobile network operators who sold their customers' real-time location data violated US law and the Federal Communications Commission will try to punish carriers that did so, FCC Chairman Ajit Pai wrote today.

"[T]he FCC's Enforcement Bureau has completed its extensive investigation and that it has concluded that one or more wireless carriers apparently violated federal law," Pai wrote in a letter today to Democratic members of Congress who asked for an update on the probe.

"I am committed to ensuring that all entities subject to our jurisdiction comply with the Communications Act and the FCC's rules, including those that protect consumers' sensitive information, such as real-time location data," Pai's letter continued. "Accordingly, in the coming days, I intend to circulate to my fellow Commissioners for their consideration one or more Notice(s) of Apparent Liability for Forfeiture in connection with the apparent violation(s)."

Read 8 remaining paragraphs | Comments

Coronavirus outbreak sparks first federal quarantine in over 50 years

A crew member of an evacuation flight of French citizens from Wuhan gives passengers disinfectant during the flight to France on February 1, 2020, as they are repatriated from the coronavirus hot zone.

Enlarge / A crew member of an evacuation flight of French citizens from Wuhan gives passengers disinfectant during the flight to France on February 1, 2020, as they are repatriated from the coronavirus hot zone. (credit: Getty | Hector Retamal)

The US Centers for Disease Control and Prevention has issued the first federal quarantine order in more than 50 years for 195 Americans who were evacuated out of Wuhan, China, the epicenter of the 2019 novel coronavirus outbreak (2019-nCoV)

The US citizens will be held under quarantine at the March Air Reserve Base in California, where they arrived from Wuhan on Wednesday, January 29 on an aircraft chartered by the US State Department. They have remained at the base since then. The quarantine will last 14 days from the time that their flight left Wuhan. Fourteen days is considered the likely maximum time of a 2019-nCoV infection incubation period—that is the time between an exposure and onset of symptoms.

The decision to issue a quarantine comes amid the continued spread of 2019-nCoV—both within and beyond China. It also comes on the heels of a report that an asymptomatic infected person from China spread the viral illness to a 33-year-old healthy business associate in Germany. Further testing found that three other associates at the same company in Germany had also contracted the infection. All four cases were mild, and the first infected associate, who noticed symptoms on January 24, started feeling better and returned to work on the 27. The report was published yesterday, January 30, in the New England Journal of Medicine.

Read 8 remaining paragraphs | Comments

Water Switch Lamp Illuminates Current Flow

They always told you not to mix water and electricity. And while yes, that is good general advice regarding the two, you won’t rip a hole in the fabric of space-time should you go about it responsibly. Water will conduct electricity, so why not use it to switch on a lamp?

[Manvith Subraya]’s Hydro Lamp is, among other things, a reminder not to let Big Switch dim your idea of what’s possible with simple components. Switches don’t have to be complex, and some of the most reliable switches are pretty simple — the reed switch and the mercury tilt switch are good examples. By salinating the water at a ratio of 1:1, [Manvith] ensures power will flow through the acrylic tank, completing the circuit and lighting the 20W LEDs in both ends.

The brief demo video after the break sheds light on an interesting aspect of using water as a tilt switch — it’s not instantaneous. As he slowly moves the lamp from vertical to horizontal and back again, the light brightens and dims with the tide of electrons. We think it would be interesting to build a motorized frame that takes advantage of this for mood lighting purposes, especially if there were a few LEDs positioned behind the water.

Water is often used to explain the basic principle of current flow and the relationship dynamics of voltage, current, and resistance. As we saw in this water computer, the concept flows all the way into logic gates.

Huawei outsells Apple in 2019, becomes No. 2 global smartphone vendor

Huawei's logo seen at a technology conference.

Enlarge / Huawei's logo at the Smart City Expo World Congress in Barcelona in November 2019. (credit: Getty Images | SOPA Images)

Market research firms Canalys and Counterpoint Research have posted their 2019 global smartphone market share reports. Both reports say the biggest mover is Huawei, which, thanks to a whopping 16-17 percent annual growth, claimed the No. 2 smartphone vendor spot in 2019, behind Samsung and ahead of Apple. Both firms have similar global market share numbers for 2019, with Samsung around 20 percent, Huawei at 16 percent, Apple at 13 percent, and Xiaomi and Oppo around eight percent each.

Counterpoint credits Huawei's success in its hometown of China for its success, saying, "This was the result of an aggressive push from Huawei in the Chinese market, where it achieved almost 40 percent market share." According to the firm, China makes up 60 percent of Huawei's shipments.

Is this "Peak Huawei?"

While holding onto the No. 2 spot is a big accomplishment for Huawei, the company's future in the smartphone market currently looks pretty murky. The Trump Administration's Huawei export ban means US companies can no longer do business with Huawei. Huawei should be OK when it comes to hardware, as the company has aggressively cut US components out of its hardware supply line. For software, however, it has a serious problem. No US products means the Google ecosystem is off-limits to Huawei, so Huawei phones don't have access to Gmail, YouTube, Google Maps, the Google Assistant, and the millions of apps on the Play Store. This seriously limits the appeal of Huawei phones outside of China.

Read 6 remaining paragraphs | Comments

Companion Bots Definitely Are the Droids You’re Looking For

Companion robots are a breed that, heretofore, we’ve primarily seen in cinema. Free from the limits of real-world technology, they manage to be charismatic, cute, and capable in ways that endear them to audiences the world over. Jorvon Moss and Alex Glow decided that this charming technology shouldn’t just live on the silver screen, and have been developing their own companion bots to explore this field. Lucky for us, they came down to Hackaday Superconference to tell us all about it!

The duo use a variety of techniques to build their ‘bots, infusing them with plenty of personality along the way. Jorvon favors the Arduino as the basis of his builds, while Alex has experimented with the Google AIY Vision Kit, BBC Micro:bit, as well as other platforms. Through clever design and careful planning, the two common maker techniques to create their unique builds. Using standard servos, 3D printed body parts, and plenty of LEDs, it’s all stuff that’s readily accessible to the home gamer.

[Alex]’s companion bot, Archimedes, has been through many upgrades to improve functionality. Plus, he’s got a cute hat!
Having built many robots, the different companions have a variety of capabilities in the manner they interact. Alex’s robot owl, Archimedes, uses machine vision to find people, and tries to figure out if they’re happy or sad. If they’re excited enough, it will give the person a small gift. Archimedes mounts on a special harness Alex built out of armature wire, allowing the avian to perch on her shoulder when out and about. Similarly, Jorvon’s Dexter lurks on his back, modeled after a monkey. Featuring an LED matrix for emotive facial expressions, and a touch sensor for high fives, Dexter packs plenty of character into his 3D printed chassis.

Alex and Jorvon also talk about some of the pitfalls and challenges they’ve faced through the development of their respective companion bots. Jorvon defines a companion robot as “any robot that you can take with you, on any type of adventure”. Being out in the real world and getting knocked around means breakages are common, with both of the duo picking up handfuls of smashed plastic and bundles of wires at times. Thankfully, with 3D printing being the tool of the trade, it’s easy to iteratively design new components to better withstand the rough and tumble of daily life out and about. This also feeds into the rest of the design process, with Jorvon giving the example of Dexter’s last minute LED upgrades that were built and fitted while at Supercon.

Develop on companion bots is never really finished. Future work involves integrating Chirp.io data-over-sound communications to allow the bots to talk. There’s been some headaches on the software side, but we look forward to seeing these ‘bots chatting away in their own droid language. While artificial intelligence doesn’t yet have homebrew companion bots matching the wisecracking droids seen in movies, designing lifelike bodies for our digital creations is a big step in that direction. With people like Alex and Jolyon on the case, we’re sure it won’t be long before we’re all walking around with digital pals on our shoulders — and it promises to be fun!

Ajit Pai’s “surprise” change makes it harder to get FCC broadband funding

A photo of Ajit Pai.

Enlarge / Ajit Pai, chairman of the Federal Communications Commission, during an interview in New York, on Tuesday, Nov. 5, 2019. (credit: Getty Images | Bloomberg)

After deciding to shut New York and Alaska out of a rural broadband fund, Federal Communications Commission Chairman Ajit Pai has made another change that could reduce or eliminate funding available for ISPs in other US states.

When the FCC yesterday approved the $20.4-billion Rural Digital Opportunity Fund (RDOF), the order contained a new provision that bans funding for areas already receiving money from any similar federal or state broadband-subsidy program. The new provision is so vague and expansive that it could affect areas in dozens of states or exclude some states from receiving money entirely, according to Democratic FCC Commissioner Geoffrey Starks.

"Based on my initial research, that means that the nearly 30 states that fund rural broadband through their own programs may find their eligibility reduced or eliminated," Starks said before yesterday's vote. "These provisions discourage badly needed state-federal partnerships, risk unequal application of the rules between states, and create an unnecessary risk of litigation."

Read 19 remaining paragraphs | Comments

The Internet of Football

While football in the United States means something totally different from what it means in the rest of the world, fans everywhere take it pretty seriously. This Sunday is the peak of U.S. football frenzy, the Super Bowl, and it is surprisingly high-tech. The NFL has invested in a lot of technology and today’s football stats are nothing like those of the last century thanks to some very modern devices.

It is kind of interesting since, at the core, the sport doesn’t really need a lot of high tech. A pigskin ball, some handkerchiefs, and a field marked off with some lime and a yardstick will suffice. However, we’ve seen a long arc of technology in scoreboards, cameras — like instant replay — and in the evolution of protective gear. But the last few years have seen the rise of data collection. It’s being driven by RFID tags in the player’s shoulder pads.

These aren’t the RFID chips in your credit card. These are long-range devices and in the right stadium, a computer can track not only the player’s position, but also his speed, acceleration, and a host of other statistics.

A Stripe of a Different Color

The company behind the technology is Zebra, and they make RFID solutions for many different industries. At first, this might seem a little gimmicky. Do you really need to know that the halfback is running at a certain speed? Does the color commentator really need to tell us that the quarterback’s average acceleration is down 30% today for some reason?  Maybe not, but then again baseball fans have obsessed about statistics for years. However, there are other consumers of this data. Coaches, scouts, and trainers can all use the horde of data to assess players and possibly plan improvements.

It is all part of an NFL program known as NFL NextGen Stats. If you want to know which team has the fastest runners, for example, you can find out on that site. We can now reveal that running back Matt Breida was the fastest ball carrier in the 2019 season with a peak speed of 22.3 miles per hour. Who knew statistics were so exciting?

Of course, all this data is subject to number crunching, so the site can tell you how one quarterback performs compared to the average of all quarterbacks and there are a number of fancy colorful graphs. There are even YouTube videos based completely on these harvested stats.

Cracking Open the Hardware

The RFID transponder is about the size of a coin and reports position and accelerometer readings at 25 Hz. Every compatible stadium has 20 receivers that ship the incoming data to Zebra’s San Jose, California control room in a little more than 100 milliseconds. The company claims they report data to broadcasters in under 500 milliseconds. Material on the vendor’s web site indicates the measurements of position are good to within six inches.

We understandably couldn’t find a lot of technical details on the Zebra or NFL websites. But we got lucky when we went to find some images. The photos above are screenshots from a Zebra promotional video which shows tag itself is clear enough that you can read the FCC ID!

Taking Bob Baddeley’s advice about FCC filings we managed to literally get a look inside of the tag itself. Above you can see the block diagram from the filing that indicates a PIC microcontroller and a CR1616 3V battery for power. A charge pump gives it 3.3V and the RF generation is at 6.55 GHz.

The filing even includes internal photos of the PCB. At 6.5 GHz everything is an antenna or a transmission line, so you can see there is a very distinctive PCB feature near U8 and Q1 that form part of the circuitry. If the big coil at L1 looks scary at 6 GHz, don’t be alarmed. That has to be part of the “magnetic interface” from the block diagram. That coil isn’t carrying anything that high in frequency.

For practice sessions, the tag also can send data in real-time via Bluetooth. This joins a host of other bio instrumentation coaches are starting to use during practice sessions like heart rate monitors. The NFL doesn’t allow this during games, though. But a coach might see that a player is, for example, dehydrated by monitoring stats gathered like this.

DIY

We started thinking about how hard this would be to do for your own backyard athletes. Long-range RFID gear is available, although it can be costly and only makes sense when harvesting data from numerous tags. However, a small wearable package that records data for later is workable. We wondered if some of the better fitness trackers could work in a pinch?

You can hack existing trackers or you can opt for open source. There are even some hacks for the cheap knock offs if you don’t want to lose the name brand tracker to a particularly nasty sack.

Living in the Future

Given that many of us remember when radio was a big purchase and a personal computer was unthinkable, it is funny to see radio and computers so commonplace and so tiny. It’s a story that repeats itself. Putting a computer in a toy, or even a car, would have been outlandish science fiction until relatively recently. The shoulder pad sensors are

So if you are watching the big game and you hear some oddball stat, you’ll know where it came from. Or, just hang out on the NFL stats site and find out the ratio of weight to acceleration for each player or something like that.

FCC proposes to fine racist troll $13 million for robocalling spree

Woman holds phone

Enlarge (credit: Tim Robberts)

The Federal Communications Commission is preparing to fine a Utah man $12.9 million for conducting a string of racist robocalling campaigns across the United States over the last two years.

The FCC says one of the campaigns seemed like an attempt to tamper with a jury in an ongoing case. Another targeted a newspaper for criticizing his earlier campaigns.

Shortly before the 2018 election, the man, Scott Rhodes, reportedly made 766 spoofed robocalls in Florida, where black Democrat Andrew Gillum was running for governor. According to the FCC, "robocalls falsely claimed to be from the candidate and used 'a caricature of a black dialect' with jungle background noises."

Read 6 remaining paragraphs | Comments

Hackaday Podcast 052: Shorting Components, Printing Typewriter Balls, Taking Minimal Time Lapse, and Building a Makerspace Movie Prop

Hackaday editors Elliot Williams and Mike Szczys recap a great week in hardware hacking. There’s perfection in the air as clever 3D-printing turns a button and LED matrix into an aesthetically awesome home automation display. Take a crash course in RF modulation types to use on your next project. Did you know the DB-9 connector is actually a DE-9? Building your own underwater ROV tether isn’t as simple as it sounds. And Elliot found a treasure trove of zero-ohm jumpers in chip packages — what the heck are these things for?

Take a look at the links below if you want to follow along, and as always tell us what you think about this episode in the comments!

Direct download (57 MB)

Places to follow Hackaday podcasts:

Episode 052 Show Notes:

New This Week:

Interesting Hacks of the Week:

Quick Hacks:

Can’t-Miss Articles:

Levitating sand escapes classical world, enters quantum ground state

Image of two scientists wearing gloves and sunglasses in amidst lab equipment.

Enlarge / Two of the scientists involved in the new work wearing proper safety equipment while playing with lasers. (credit: Lorenzo Magrini, Yuriy Coroli/University of Vienna)

How big can something get and still display quantum behavior? It's a fundamental question in physics, and it gets at the nature of reality itself. All sorts of weird behavior goes on in the quantum world: particles behave like they're in two places at once, there are limits to how certain we can be of where things are, and so on. But once things get bigger than a handful of atoms, we get the nice, orderly behavior of our familiar world, where things exist in definite locations.

The transition between the quantum and the familiar seems to be set by environmental interactions. Once an object gets big enough, it's constantly bumping into atoms and absorbing photons, any of which can push it out of a well-defined quantum state. So the question becomes one of how big we can let things get while still controlling their interactions with the environment.

For the last decade, the gold standard in this area has been a physical resonator linked to hardware that lets us control it with photons of a specific wavelength. To keep stray bits of energy from messing with the resonator, the whole device is kept very close to absolute zero. But now, researchers have found that they can control the interactions of a tiny bead that's levitated on laser light. While it's smaller than the resonators, the setup works at room temperature and doesn't require that the bead be physically linked to any special hardware.

Read 11 remaining paragraphs | Comments

The Multiyear Hunt for a Gameboy Game’s Bug

[Enddrift] had a real problem trying to run a classic game, Hello Kitty Collection: Miracle Fashion Maker, into a GBA (Gameboy Advance) emulator. During startup, the game would hit an endless loop waiting for a read from a non-existent memory location and thus wouldn’t start under the emulator. The problem is, the game works on real hardware even though that memory doesn’t exist there, either.

To further complicate things, a similar bug exists when loading a saved game under Sonic Pinball Party. Then a hack for Pokemon Emerald surfaced that helped break the case. The story is pretty interesting.

You can read the details in the original post, but the upshot was that reading an invalid address on a GBA just reads the open bus because the device doesn’t have a memory management unit to throw a page fault — known in that world as a data abort. Turns out, you’d expect an open bus to read the last value you’d read or written — either some data or the last instruction fetch. But it is more complicated than that.

The code was reading ghost values not from the last CPU memory read and write, but from the last DMA cycle! The workaround is clever, too, since it compares the expected end of the DMA time with the current instruction and forces it to read the right value.

A great piece of detective work. We aren’t sure we are lining up to play Hello Kitty, but it is nice to know that we could. Especially if we had an emulator inside our real device. If your hacking desires run more to real hardware, we would suggest this FPGA project.

Nintendo: No new Switch model planned for 2020

These are the only two Switch models that Nintendo plans to sell this year.

Enlarge / These are the only two Switch models that Nintendo plans to sell this year.

Nintendo says it won't be releasing another new version of the Switch this year. "Regarding Nintendo Switch, we believe that it is important to continue to communicate the appeal of both Nintendo Switch systems and expand the installed base," CEO Shuntaro Furukawa said in an investor briefing following an earnings report. "Please note that we have no plans to launch a new Nintendo Switch model during 2020."

The announcement counters multiple reports from the past 12 months that suggested Nintendo was looking into a more powerful Switch model with an improved OS, image rendering, and usability functions. A Nikkei report from April suggested that this "enhanced" version of the system was still in the early planning stages, though, and didn't even have anyone assigned to head its development at the time.

Will the Switch fall behind?

The hardware inside the Nvidia Tegra-based Switch is distinctly less powerful than the Xbox One or PS4, despite launching years later than Sony's and Microsoft's larger TV-based consoles. That power gap is even more pronounced for the PS4 Pro and Xbox One X and is set to widen even further later this year with the release of the PlayStation 5 and Xbox Series X.

Read 4 remaining paragraphs | Comments

The 2020 Mercedes-Benz GLB gets good infotainment, but don’t get the AI

If there were any doubt about the utter dominance of the market by SUVs, consider that prior to 2020, Mercedes—that storied brand built on luxury sedans—offered six different classes of them. Wait—seven, if you count the hatchback GLA they slot in as an SUV (and I do).

Well, brace yourselves. There's now an eighth. The GLB250 parks a squarish, upright, proper-looking SUV into the paper-thin slot under the C-Class-based GLC and over the definition-challenged GLA. But the GLB grabs its design clay far more from the big GLS and positively rectilinear G-Class than any of the softer, more pliably styled Mercedes SUVs. In fact, that boxier form factor makes the new GLB an even more authoritative-looking family box with wheels than many roaming the streets today, somewhat aimless in their design.

And one step further into family firmament, the GLB offers a third-row seat—nearly unheard of in this size class, and something you must venture way up into the mid-sized GLE class among other Mercedes models to find.

Read 11 remaining paragraphs | Comments

Adafruit Clue: A Micro:bit Form Factor Smorgasbord

Limor, the brains behind Adafruit, has been inspired to explore the Micro:bit form factor and the result is this versatile board called the Clue. This is designed to be a logical next step after you’ve explored the basics on your Micro: Bit. Packed with sensors and a full color TFT […]

Read more on MAKE

The post Adafruit Clue: A Micro:bit Form Factor Smorgasbord appeared first on Make: DIY Projects and Ideas for Makers.

This Week in Security: OpenSTMPD, Kali Release, Scareware, Intel, and Unintended Consequences

If you run an OpenBSD server, or have OpenSMTPD running on a server, go update it right now. Version 6.6.2, released January 28th, fixes an exploit that can be launched locally or remotely, simply by connecting to the SMTP service. This was found by Qualys, who waited till the update was released to publish their findings.

It’s a simple logic flaw in the code that checks incoming messages. If an incoming message has either an invalid sender’s username, or invalid domain, the message is sent into error handling logic. That logic checks if the domain is an empty string, in which case, the mail is processed as a local message, sent to the localhost domain. Because the various parts of OpemSMTPD operate by executing commands, this logic flaw allows an attacker to inject unexpected symbols into those commands. The text of the email serves as the script to run, giving an attacker plenty of room to totally own a system as a result.

Browser Locker

“Your browser has been locked to prevent damage from a virus. Please call our Windows help desk immediately to prevent further damage.” Sound familiar? I can’t tell you how many calls I’ve gotten from freaked-out customers, who stumbled upon a scare-ware site that locked their browser. This sort of scam is called a browlock, and one particular campaign was pervasive enough to catch the attention of the researchers at Malwarebytes.

“WOOF”, Malwarebyte’s nickname for this campaign, was unusual both in its sophistication and the chutzpah of those running it. Browsers were hit via ads right on the MSN homepage and other popular sites. Several techniques were used to get the malicious ads onto legitimate sites. The most interesting part of the campaign is the techniques used to only deliver the scareware payload to target computers, and avoid detection by automated scanners.

It seems that around the time Malwarebytes published their report, the central command and control infrastructure behind WOOF was taken down. It’s unclear if this was a coincidence, or was a result of the scrutiny they were under from the security community. Hopefully WOOF is gone for good, and won’t simply show up at a different IP address in a few days.

Kali Linux

Kali Linux, the distribution focused on security and penetration testing, just shipped a shiny new release. A notable new addition to the Kali lineup is a rootless version of their Android app. Running an unrooted Android, and interested in having access to some security tools on the go? Kali now has your back.

Not all the tools will work without root, particularly those that require raw sockets, and sending malformed packets. It’s still a potentially useful tool to put into your toolbox.

Cacheout, VRD, and Intel iGPU Leaks

Intel can’t catch a break, with three separate problems to talk about. First up is cacheout, or more properly, CVE-2020-0549, also known as L1DES. It’s a familiar song and dance, just a slightly different way to get there. On a context switch, data in the Level 1 cache isn’t entirely cleared, and known side-channel attacks can be used to read that data from unprivileged execution.

VRD, Vector Register Sampling, is another Intel problem just announced. So far, it seems to be a less exploitable problem, and microcode updates are expected soon to fix the issue.

The third issue is a bit different. Instead of the CPU, this is a data leak via the integrated GPU. You may be familiar with the most basic form of this problem. Some video games will flash garbage on the screen for a few moments while loading. In some cases, rather than just garbage, images, video stills, and other graphics can appear. Why? GPUs don’t necessarily have the same strict separation of contexts that we expect from CPUs. A group of researchers realized that the old assumptions no longer apply, as nearly every application is video accelerated to some degree. They published a proof of concept, linked above, that demonstrates the flaw. Before any details were released, Phoronix covered the potential performance hit this would cause on Linux, and it’s not great.

Unintended Legal Consequences

Remember the ransomware attack that crippled Baltimore, MD? Apparently the Maryland legislature decided to step in and put an end to ransomware, by passing yet another law to make it illegal. I trust you’ll forgive my cynicism, but the law in question is a slow-moving disaster. Among other things, it could potentially make the public disclosure of vulnerabilities a crime, all while doing absolutely nothing to actually make a difference.

GE Medical Equipment Scores 10/10

While scoring a 10 out of 10 is impressive, it’s not something to be proud of, when we’re talking about a CVE score, where it’s the most critical rating. GE Healthcare, subsidiary of General Electric, managed five separate 10.0 CVEs in healthcare equipment that they manufacture, and an 8.5 for a sixth. Among the jewels are statements like:

In the case of the affected devices, the configuration also contains a private key. …. The same private key is universally shared across an entire line of devices in the CARESCAPE and GE Healthcare family of products.

The rest of the vulnerabilities are just as crazy. Hard-coded SMB passwords, a network KVM that has no credential checking, and ancient VNC versions. We’ve known for quite some time that some medical equipment is grossly insecure. It will apparently take a security themed repeat of the Therac-25 incident before changes take place.

Odds’n’ends

The Windows 7 saga continues, as Microsoft’s “last” update for the venerable OS broke many users’ desktop backgrounds. Microsoft plans to release a fix.

Firefox purged almost 200 extensions from their official portal over the last few weeks. It was found that over 100 extensions by 2Ring was secretly pulling and running code from a central server.

The Citrix problems we discussed last week has finally been addressed, and patches released, but not soon enough to prevent the installation of future-proof backdoors on devices in the wild. There are already plenty of reports of compromised devices. Apparently the exploitation has been so widespread, that Citrix has developed a scanning tool to check for the indicators of compromise (IoCs) on your devices. Apply patch, check for backdoors.

WarCraft III Reforged: Not the flavor of chaos we were hoping for

You can practically hear the opening film's orc screaming, "You should seriously reconsider spending $30, you human sacks of filth!"

Enlarge / You can practically hear the opening film's orc screaming, "You should seriously reconsider spending $30, you human sacks of filth!" (credit: Blizzard Entertainment)

The more I look at this week's launch of WarCraft III: Reforged, the more I shake my head. I've grown up playing Blizzard games for a majority of my life, and while I can think of Blizzard game launches with technical issues or critical shoulder-shrugs, I can't recall a retail launch for a product that, quite simply, wasn't finished. WC3:R changes that.

What's more, the uneven and problematic changes to this "reforged" 2002 game come with a bold, new step for Blizzard: the official sunsetting of a classic game's client. The original code base, which has remained roughly 1.3GB in size after an expansion pack launch and years of patches, has been pushed aside. Anyone who already owned an official WC3 license is prompted by Blizzard's default game launcher to download the new 26+ GB version to play online, whether or not they pay an additional $30 for its GBs of "reforged" content.

Worse, between a new Terms of Service requirement and a number of features removed from the previous version, it looks like the game's online ecosystem—the very thing that kept the game afloat for decades and earned a glowing retrospective from us only days ago—may be gone for good. Pardon my English, but, what in the freaking world is going on, Blizzard?

Read 26 remaining paragraphs | Comments