139w ago - Today Sony's Senior Director of Corporate Communications & Social Media Patrick Seybold has announced a settlement in the GeoHot PS3 hacking case, with the ruling issuing a permanent injunction against George Hotz barring him from hacking or collaborating with efforts to hack any Sony product moving forward.
To quote: Joint Statement
Sony Computer Entertainment America (SCEA) and George Hotz (Hotz) today announced the settlement of the lawsuit filed by SCEA against Hotz in federal court in San Francisco, California. The parties reached an agreement in principle on March 31, 2011. As part of the settlement, Hotz consented to a permanent injunction.
Both parties expressed satisfaction that litigation had been quickly resolved. Sony is glad to put this litigation behind us, said Riley Russell, General Counsel for SCEA. Our motivation for bringing this litigation was to protect our intellectual property and our consumers. We believe this settlement and the permanent injunction achieve this goal.
It was never my intention to cause any users trouble or to make piracy easier, said Hotz, Im happy to have the litigation behind me. Hotz was not involved in the recent attacks on Sonys internet services and websites.
142w ago - Update: Some more legal doc updates have now surfaced, which include GeoHot's laywers response refuting Sony's claims (via Groklaw) that the "blickmaniac" PSN account belongs to him.
ArsTechnica is also reproting that GeoHot's PS3 SCEJ manuals remained sealed, that he couldn't have known of SCEA to set up a PSN account and that the PlayStation 3 serial numbers don't match.
Today many sites are reporting that Sony has allegedly found George Hotz's PSN account under the nickname of blickmanic which would subject him to their TOS, that the PS3 hacker is currently fleeing or vacationing in South America, and finally that GeoHot may have intentionally removed integral components of his impounded hard drives prior to delivery.
The good news? Others whom GeoHot shared the PS3 METLDR info and LV2 dump with are currently using his work to continue hacking the PS3 console, with rumors from IRC (for what those are worth LOL) indicating a public "end-user" PS3 hack may arrive before September 2010 from their camp.
Unfortunately though, just like the past Dark_AleX and "M33" PSP releases, an incoming PS3 hack will probably be from a fictitious group and won't include anything useful to PS3 Devs such as dumps, reversals, sourcecode, etc.
Hopefully once a hole that Sony can't block is public, other PlayStation 3 Devs will begin working on the PS3 though... and sharing all the juicy...
207w ago - This weekend GeoHot, the hacker responsible for several Apple iPhone hacks, has returned to Sony PS3 hacking after his initial announcement a few months back and has opened a PS3 hacks blog (linked above).
"I just pulled everything from the USB bus... http://pastie.org/757313 the Cell processor SPI bus, PS3 is going down :-)"
These are the latest posts on his new PS3 hacks blog:
The Cell processor has an SPI port which is used to configure the chip on startup. Well documented here. It also allows hypervisor level MMIO registers to be accessed. In the PS3, the south bridge sets up the cell, and the traces connecting them are on the bottom layer of the board. Cut them and stick an FPGA between.
Quick theoretical attack. Set an SPU's user memory region to overlap with the current HTAB. Change the HTAB to allow read/write to the hypervisor! If that works it's full compromise...