stiak said: Doesn't seem like it's even close to compromising the ps3. This comment discusses someone elses opinion of the 'hack': http://geohotps3.blogspot.com/2010/01/heres-your-silver-platter.html?showComment=1264554731283#c2320007638089650718 This article discusses the PS3's security: http://www.ibm.com/developerworks/power/library/pa-cellsecurity/#N10097 Put simply, this exploit is in software. The PS3's processor was designed with this kind of exploit in mind and prevents them having any effect. I don't see this leading to pirated games. |
yup..this hack is most likly going nowhere!
this pretty much say's it all:
its straight to the point, IQD's statement is pretty much spot on!
read on!
A guy on a site im a member of posted this thought it was interesting :
Below is iQD's statement regarding the recent GeoHot PS3 Hack news, partly it really seems as if he does not read any docs.
To quote: "So the PS3 is hacked ? Well that's nothing more than an urban legend.
Altough it's nice to capture all these HV calls and stuff from a plain (not encrypted) lv1 binary, but this will never lead to a hacked PS3.
Let's have a look. The major security architecture on the PS3 is called the "Secure Processing Vault" and is the most important thing regarding "hacking" the PS3.
There is NO WAY for the PPU or even the HV to gain access to the SPU, which is an application running inside of an isolated SPU.
Well you can kick out the isolated SPU, like geohot mentioned, but this gives you nothing, as ALL the encryption and execution of applications (HDD encryption, app encryption, decryption, executing, signature checking, root key extraction) happens inside the isolated SPU.
To run homebrew on the PS3 you would have to reassemble the whole functionality from the SPU inside a binary running on the PPU. For this you will need the root key.
The root key is stored in hardware (not even close to the things on the iPhone). The root key cannot be extracted by any software or hardware means and is essential to ALL encryption/decryption, executing and checking routines.
The only way to get the root key is inside of an isolated SPU, as it is kick-starting the hardware encryption facility. There is no other way to do that !
Let's just assume that geohot or some other guys are able to break into the local store of the isolated SPE. There they will just find some encrypted binaries.
The key for decryption is encrypted by the root key ! You won't get anywhere without the root key.
Let's assume that someone managed to do all those stuff from the isolated SPU on the PPU and creates a CFW.
There is still a secure booting environment. The first module loaded/bootet is integrity checked by the hardware crypto facility utilizing the root key. So you have also to address this booting stuff. Again, no root key, no booting.
So there's always runtime patching you might ask ? Not possible on the PS3 because the hardware crypto facility is able to check the signatures whenever it wants to.
And which part is responsible for this ? Exactly, the isolated SPU. So if you kick out the isolated SPU the system will not boot/run anymore.
The PS3 is neither an PSP nor an iPhone. It's the most secure system architecture of this time !
The girl behind this stuff, Kanna Shimizu, is not somebody. Messing around with this is not like saying Bruce Schneier is a n00b.
Btw.: forget about all those stories, that certain hackers are or will be employed by SONY. That's nothing more than another urban legend.
@geohot It is OBVIOUS that the HV is PPC. The Cell BE is a PPC architecture, you know Better read those IBM papers in first place !
- iQD"
thats means he does nothing really just baypass lvl1 security wich is great
but paradox did it before him!.
the hard and the unpossible thing to do is to get the root key from the
isolated SPU. and that is by far uncheckable.
I AM BOLO
100% lover "nothing else matter's" after that...
ps:
Proud psOne/2/3/p owner. I survived Aplcalyps3 and all I got was this lousy Signature.