12:29 PM
Risk Data as a Strategy
Apr 06, 2016
There is a renewed focus on risk data aggregation and reporting (RDAR) solutions, as financial ins ...Read More>>

Hackers Access Sony PS3 Software Keys

Fail0verflow says the mod restores the PlayStation's Linux functionality, allowing any program to run without authentication on the gaming console.

Best PC Games Of All Time
(click image for larger view)
Slideshow: Best PC Games Of All Time
A group of hackers called fail0verflow claims to have gained access to the private software keys Sony uses to execute programs for its hot-selling PlayStation 3.

During the 27th Chaos Communication Congress, held Dec. 27-30 in Berlin, the group said it created the hack to restore Linux operating system functionality which Sony removed in 2010, according to GamePro. The firmware hack lets the PS3 run any program without authentication, so that PS3 games burned onto a Blu-ray disc will function just like a traditional PS3 retail disc, regardless of the firmware required to play that game, a Sony Insider report said. In theory, this could simplify game piracy.

Last May, a group of PS3 users took an alternate route to voice their displeasure, filing a lawsuit against Sony for its "unfair and deceptive business practice perpetrated on millions of unsuspecting consumers."

In the Chaos Communication Congress presentation, available on YouTube, the six members of fail0verflow discussed console hacking in general, as well as holes the hackers found in PS3's architecture.

Fail0verlow, which was behind last year's Wii homebrew, does not plan to release custom firmware, according to the group. However, it plans to offer proof-of-concept and tools, according to Sony Insider.

iPhone hacker GeoHot has released his PS3 hack which modifies the PS3's hypervisor, adding two calls for reading and writing to the system memory, according to PS3 News.

"In the interest of openness, I've decided to release the exploit. Hopefully, this will ignite the PS3 scene, and you will organize and figure out how to use this to do practical things, like the iPhone when jailbreaks were first released. I have a life to get back to and can't keep working on this all day and night," he said. "I'd like to see the missing HV calls filled in, nice memory maps, the boot chain better documented, and progress on a 3D GPU driver. And of course, the search for a software exploit."

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
InformationWeek Elite 100
InformationWeek Elite 100
Our data shows these innovators using digital technology in two key areas: providing better products and cutting costs. Almost half of them expect to introduce a new IT-led product this year, and 46% are using technology to make business processes more efficient.
Register for InformationWeek Newsletters
White Papers
Current Issue
4 Trends Shaping Digital Transformation in Insurance
Insurers no longer have a choice about digital adoption if they want to remain relevant. A comprehensive enterprise-wide digital strategy is fundamental to doing business today.
Twitter Feed
InformationWeek Radio
Archived InformationWeek Radio
Join us for a roundup of the top stories on for the week of April 24, 2016. We'll be talking with the editors and correspondents who brought you the top stories of the week!
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.