Euphoria14 said:
You are also aware that he just recently purchased that chip right? After he already hacked the PS3 and created his custom firmware that re-enabled Other OS. I am also aware that it is a versatile chip that can be used on more than just the PS3.
Here is something written by Geohot after he showcased his CFW. "It's possible this CFW will also work on the slim to actually *enable* OtherOS; I'll know when my ******* gets here." You know what the **** means.
So you are partially correct at the moment as it is possible that at the moment Slims may require a chip, but currently people who are below 3.21 would not need one. |
yea i am aware of that but also it will not mean much in the long run anyway.
root lab's own nate L. did a review of the Geohot hack:
nate: stated this:
The PS3, like the Xbox360, depends on a hypervisor for security enforcement. Unlike the 360, the PS3 allows users to run ordinary Linux if they wish, but it still runs under management by the hypervisor. The hypervisor does not allow the Linux kernel to access various devices, such as the GPU. If a way was found to compromise the hypervisor, direct access to the hardware is possible, and other less privileged code could be monitored and controlled by the attacker.
and what did nate state is the counter to Geohotz's hack?
It remains to be seen what security measures Sony has taken to address a hypervisor compromise. One countermeasure would be to lock down the OtherOS environment, since the attack depends on the ability to manipulate low-level OS memory structures. They could be using a simpler hypervisor than the GameOS side (say, one that just prevents access to the GPU). Perhaps the SPEs have a disable bit that turns off the hardware decryption unit, and the hypervisor does this before booting OtherOS.
by the way if you do not know what root lab's are:
Root Labs offers design and review services for embedded and kernel security, crypto, and software protection.
I’m Nate Lawson of Root Labs (contact info), and I’m writing about embedded and kernel security, cryptography, software protection, FreeBSD, and the occasional trip into retrocomputing. During the day, I assist companies with the design and review of security aspects of their products. My personal site, root.org, provides copies of my latest articles, talks, code, and other resources. I post more time-sensitive material here, on the following topics.

I AM BOLO
100% lover "nothing else matter's" after that...
ps:
Proud psOne/2/3/p owner. I survived Aplcalyps3 and all I got was this lousy Signature.










