Hackers Access Sony PS3 Software Keys - InformationWeek
IoT
IoT
Mobile
News
1/5/2011
12:29 PM
50%
50%

Hackers Access Sony PS3 Software Keys

Fail0verflow says the mod restores the PlayStation's Linux functionality, allowing any program to run without authentication on the gaming console.

Best PC Games Of All Time
(click image for larger view)
Slideshow: Best PC Games Of All Time
A group of hackers called fail0verflow claims to have gained access to the private software keys Sony uses to execute programs for its hot-selling PlayStation 3.

During the 27th Chaos Communication Congress, held Dec. 27-30 in Berlin, the group said it created the hack to restore Linux operating system functionality which Sony removed in 2010, according to GamePro. The firmware hack lets the PS3 run any program without authentication, so that PS3 games burned onto a Blu-ray disc will function just like a traditional PS3 retail disc, regardless of the firmware required to play that game, a Sony Insider report said. In theory, this could simplify game piracy.

Last May, a group of PS3 users took an alternate route to voice their displeasure, filing a lawsuit against Sony for its "unfair and deceptive business practice perpetrated on millions of unsuspecting consumers."

In the Chaos Communication Congress presentation, available on YouTube, the six members of fail0verflow discussed console hacking in general, as well as holes the hackers found in PS3's architecture.

Fail0verlow, which was behind last year's Wii homebrew, does not plan to release custom firmware, according to the group. However, it plans to offer proof-of-concept and tools, according to Sony Insider.

iPhone hacker GeoHot has released his PS3 hack which modifies the PS3's hypervisor, adding two calls for reading and writing to the system memory, according to PS3 News.

"In the interest of openness, I've decided to release the exploit. Hopefully, this will ignite the PS3 scene, and you will organize and figure out how to use this to do practical things, like the iPhone when jailbreaks were first released. I have a life to get back to and can't keep working on this all day and night," he said. "I'd like to see the missing HV calls filled in, nice memory maps, the boot chain better documented, and progress on a 3D GPU driver. And of course, the search for a software exploit."

We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
2017 State of IT Report
2017 State of IT Report
In today's technology-driven world, "innovation" has become a basic expectation. IT leaders are tasked with making technical magic, improving customer experience, and boosting the bottom line -- yet often without any increase to the IT budget. How are organizations striking the balance between new initiatives and cost control? Download our report to learn about the biggest challenges and how savvy IT executives are overcoming them.
Register for InformationWeek Newsletters
White Papers
Current Issue
Top IT Trends for 2018
As we enter a new year of technology planning, find out about the hot technologies organizations are using to advance their businesses and where the experts say IT is heading.
Video
Slideshows
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Flash Poll