The lead attorney for the plaintiffs, New York lawyer Scott Kamber, said the two parties signed a settlement which is awaiting preliminary approval by the U.S. District Court for the Southern District of New York.
"We have reached a settlement with all the parties and that settlement provides real value to the class in a timely manner," Kamber said. "This settlement is subject to court approval and no further comment would be appropriate from me at this time." コンシューマー側弁護士 <和解案は既にサインしました コンシューマー側弁護士 <あとは来年1月に正式裁定するだけ
Sony BMG spokesperson John McKay confirmed that the company had reached an agreement with the plaintiffs, saying Sony is looking forward to the court approval process. He declined to comment further, however. ソニーBMG <わはははははははははっははっは・・・
Building on previous research that suggested some 570,000 networks had computers affected by the software, infrastructure security expert Dan Kaminsky used a different address used by the copy protection software to estimate that, a month later, 350,000 networks--many belonging to the military and government--contain computers affected by the software.
"It is unquestionable that Sony's code has gotten into military and government networks, and not necessarily just U.S. military and government networks," Kaminsky said in an interview after his presentation at ShmooCon. The researcher would not say how many networks belonged to government or military top-level domains.
The most recent survey, which lasted between December 15 and December 23, he found 350,000 servers had the unique address in their caches. While other factors may increase or decrease the number, Kaminsky continues to stress that the experiment is about finding out the magnitude of the impact of Sony BMG's software.
"The data shows that this is most likely a hundreds-of-thousands to millions of victims issue," Kaminsky said.
"The global scope is the big mystery here," he said. "It is fairly likely that a lot of the discs were pirated."