Tsudai said:
Comparing the jailbreak of the iPhone with what is happening to the PS3 is a stretch, at best. The ruling for the jailbreak of the iPhone being legal states specifically that that ruling only applies to "wireless telephone handsets". On Tuesday, July 27, 2010, the Librarian of Congress created 6 new class of works that would be exempt from the DCMA, with 2 dealing specifically with jailbreaking of those "wireless telephone handsets".
The two classes as quoted from the Federal Register / Vol. 75 No. 143 / Tuesday, July 27, 2010 / Rules and Regulations are:
"B. Computer programs that enable wireless telephone handsets to execute software applications, where circumvention is accomplished for the sole purpose of enabling interoperability of such applications, when they have been lawfully obtained, with computer programs on the telephone handset."
and:
"C. Computer programs, in the form of firmware or software, that enable used wireless telephone handsets to connect to a wireless telecommunications network, when circumvention is initiated by the owner of the copy of the computer program solely in order to connect to a wireless telecommunications network and access to the network is authorized by the operator of the network."
The first class is one that many people would see as applying to the PS3 for the case of homebrewing. However, it states specifically that this new class is in regards to wireless telephone handsets ONLY. The second class is probably the one most people know of, that allows people to jailbreak their phones so that they can use their phones on the wireless network provider of their choice.
What I find interesting is another class, that in all probablility not many people know about, that was introduced by the Librarian of Congress in the same document as stated above that deals specifically with video games and the circumvention of their security:
"D. Video games accessible on personal computers and protected by technological protection measures that control access to lawfully obtained works, when circumvention is accomplished solely for the purpose of good faith testing for, investigating, or correcting security flaws or vulnerabilities, if: •The information derived from the security testing is used primarily to promote the security of the owner or operator of a computer, computer system, or computer network; and •The information derived from the security testing is used or maintained in a manner that does not facilitate copyright infringement or a violation of applicable law."
This is where I think SONY could have a case if you say PS3s are PCs. If Geohot brought the weak security protection to SONY's attention beforehand so that SONY could look into it and not just post the key on his site for the world to see, I doubt SONY would be suing him. If PS3s are not PCs, then it could be argued that this class does not apply.
So yes, Geohot has every right to hack HIS system. But when he posted the keys to the PS3 for everyone and their mother to see while pretty much giving SONY the finger, he crossed a line. He broke and exposed a flaw in the PS3's "technological protection measures", but he didn't use this knowledge to help SONY fix it. What he really did by exposing this flaw in the way he did it is "facilitate copyright infringement".
Link to the Federal Register PDF: http://www.copyright.gov/fedreg/2010/75fr43825.pdf
|