PlayStation 3 homebrew

Some enthusiasts participate in homebrew for the PlayStation 3 video game console.

Private key compromised

PlayStation 3 Free speech flag

At the 2010 Chaos Communication Congress (CCC) in Berlin, a group calling itself fail0verflow announced it had succeeded in bypassing a number of the PlayStation 3's security measures, allowing unsigned code to run without a dongle. They also announced that it was possible to recover the Elliptic Curve DSA (ECDSA) private key used by Sony to sign software, due to a failure of Sony's ECDSA implementation to generate a different random number for each signature. However, fail0verflow chose not to publish this key because it was not necessary to run homebrew software on the device.[1] The release of this key would allow anyone to sign their code and therefore be able to run it on any PlayStation 3 console. This would also mean that no countermeasures could be taken by Sony without rendering old software useless, as there would be no distinction between official and homebrew software.[2] On January 3, 2011, geohot published the aforementioned private key, as well as a Hello world program for the PS3.[3][4] On January 12, 2011, Sony Computer Entertainment America filed lawsuits against both fail0verflow and geohot for violations of the DMCA and CFAA.[5][6] The suit against geohot was settled at the end of March, 2011, with geohot agreeing to a permanent injunction.[7][8]

Custom firmware (CFW)

To allow for homebrew using the newly discovered encryption keys, several modified versions of system update 3.55 have been released by Geohot and others. The most common feature is the addition of an "App Loader" that allows for the installation of homebrew apps as signed DLC-like packages. Although Backup Managers could run at that time, they could not load games at first even though some success had been made by making backups look like DLC games and then signing them. An LV2 patch was later released to allow Backup Managers to load game backups and was later integrated into the Managers themselves so that it doesn't have to be run whenever the PS3 is restarted. This CFW jailbreak method is now the trend in jailbreaking the PS3 because it doesn't need any special hardware and can be permanently installed onto any PS3.

PS3 System Software updates v3.56 and v3.60 added security measures to prevent creation of custom firmwares, building on previous updates which blocked the PS Jailbreak exploit. However, users may choose not to update and games requiring a firmware version above 3.55 can be patched to run on v3.55 or lower. Soon after v3.60 was released, updates to the PlayStation Network were conducted to block any methods known that allowed PSN access on firmwares older than the latest required official firmware (v4.76 currently), thereby blocking users who chose not to update.

A custom firmware known as "Rebug",[9] released on March 31, 2011, gave retail PS3s most of the options and functionality of debug/developer PS3 units. One week later, tutorials became available allowing users to download PSN content for free, using fake (rather than stolen) credit card numbers.[10][11] One April 12 report described hackers using the jailbroken firmware to access the dev-PSN to get back on games like Call of Duty, with widespread reports of cheating.[12] While some sources blamed Rebug for the subsequent intrusion to Sony's private developer network, Time's "Techland" described such theories as "highly—as in looking down at the clouds from the tip-top of Mount Everest highly—speculative".[13]

References

  1. Bendel, Mike (2010-12-29). "Hackers Describe PS3 Security As Epic Fail, Gain Unrestricted Access". Exophase.com. Retrieved 2011-01-05.
  2. Fildes, Jonathan (2011-01-06). "iPhone hacker publishes secret Sony PlayStation 3 key". BBC. Retrieved 2011-03-20.
  3. "Hacker Claims To Have The PS3's Front Door Keys". Kotaku. 2011-01-03. Retrieved 2011-01-05.
  4. "Geohot: Here is your PS3 Root Key! – Now with "HELLO WORLD" proof!". (psx-scene administrator). (original GeoHot posting to psx-scene with key and hello world program)
  5. "Sony to Geohot: See you in court". Eurogamer. January 12, 2011. Retrieved January 12, 2011.
  6. "Motion for TRO". Scribd.com. 2011-01-12. Retrieved 2011-03-20.
  7. Sony and George Hotz Settle PS3 Hacking Lawsuit
  8. Settlement in George Hotz Case – PlayStation Blog
  9. The site rebug.me is credited in an April 26 Eurogamer.es report.
  10. "PlayStation Network taken down to halt piracy?". computerandvideogames.com. 2011-04-25. and linked articles
  11. A possible example of such a tutorial at ps3hax.net was deleted approximately April 21.
  12. "PlayStation 3 Hackers Using Developer Network to Access PSN". attackofthefanboy.com. 2011-04-12.
  13. Peckham, Matt (2011-04-26). "Did Custom 'Rebug' Firmware Kill Sony's PlayStation Network?". techland.time.com.

External links

This article is issued from Wikipedia - version of the Sunday, March 27, 2016. The text is available under the Creative Commons Attribution/Share Alike but additional terms may apply for the media files.