142w ago - Update: Some more legal doc updates have now surfaced, which include GeoHot's laywers response refuting Sony's claims (via Groklaw) that the "blickmaniac" PSN account belongs to him.
ArsTechnica is also reproting that GeoHot's PS3 SCEJ manuals remained sealed, that he couldn't have known of SCEA to set up a PSN account and that the PlayStation 3 serial numbers don't match.
Today many sites are reporting that Sony has allegedly found George Hotz's PSN account under the nickname of blickmanic which would subject him to their TOS, that the PS3 hacker is currently fleeing or vacationing in South America, and finally that GeoHot may have intentionally removed integral components of his impounded hard drives prior to delivery.
143w ago - Today Groklaw.net reports that PS3 hacker GeoHot is now accusing Sony of "false representations" to the court and petitioning for a protective order while Wired.com confirmed that SoftLayer is moving to quash Sony's subpoena on George Hotz Forum account details in the pending PlayStation 3 hacking case despite their recent PayPal victory.
To quote from Groklaw: "Specifically, Hotz says that Sony Computer Entertainment America falsely claimed at a recent hearing that the Software Developer Kit at issue in this litigation referenced SCEA being in California. The SDK, Hotz says, is owned by Sony Computer Entertainment in Japan, and the installation procedures reference Sony Japan, not SCEA.
This is relevant, Sony argued, because if they found any of the SDK tools on his computer, it would "establish contacts between SCEA and Mr. Hotz" in that they claimed SCEA is the only entity distributing the SDKs. The discovery that the court ordered was based on SCEA's representations. Now what? Should the discovery...
143w ago - Just over a week ago PlayStation 3 hacker Mathieulh confirmed finding a PS3 3.56 Exploit, and today drizzthacks tweeted part of an IRC chat log where Mathieulh stated the following regarding PS3 Firmware 3.60 running homebrew code, as follows:
"[03:15] while you are insulting me like morons, I already have code running on 3.60, and I am laughing, and guess what ? I am happy I stopped sharing, you can hate me for it, I don't care."
He followed up with the following Tweets: To those planning on building a 3.56+ pup for whatever reason, the files attributes changed, the group and user ids for the files as well. The new 3.56+ values for tarballs are the following: owner_id, “0000764″ group_id, “0000764″ owner, “tetsu” group, “tetsu” ustar, “ustar”
You can use fix_tar to use those new values. Use with caution. By comparison, those are the pre-3.56 values. owner_id, “0001752″ group_id, “0001274″ owner, “pup_tool” group, “psnes” ustar, “ustar”
145w ago - Today PS3 hacker Mathieulh reports finding a PlayStation 3 Firmware 3.56 exploit, although he states he has no plans to give any further details about it.
To quote from PSX-Scene (linked above): Well-known hacker Mathieu Hervais has reportedly found a bug that allows exploiting metldr, the bootloader and firmware version 3.56. Unfortunately, he refuses to release it.
I hesitated a lot before tweeting about it, but a bug allows exploiting metldr, the bootloader and 3.56+. I don't intent to ever unveil it.
So much for "unhackable" PS3s though... I am not giving any further details about it. Sorry.
Actually the revocation list exploit doesn't allow you to exploit isoldr, you could however sign a revoke list if you had the revocation list keys and knew the sign fail, and use that to dump isoldr. Metldr does not load revocation lists.
This has been tested, how do you think I could release the lv2ldr and appldr keys ? (about 24hrs before Geohot showed up with metldr keys) This has been tested, how do you think I could release the lv2ldr and appldr keys ? (about 24hrs before Geohot showed up with metldr keys)
145w ago - Today Wired.com (linked above) has published legal documents confirming a federal judge has granted Sony the right via subpoena to unmask anybody who visited GeoHot's site, including but not limited to those who downloaded the PS3 "jailbreak.zip" file.
To quote: "A federal magistrate is granting Sony the right to acquire the Internet IP addresses of anybody who has visited PlayStation 3 hacker George Hotz' website from January of 2009 to the present.
Thursday's decision (.pdf) by Magistrate Joseph Spero to allow Sony to subpoena Hotz' web provider raises a host of web privacy concerns.
The subpoena to Bluehost, which maintains Hotz' geohot.com site, is part of Sony's lawsuit against the 21-year-old New Jersey hacker. Respected for his iPhone hacks and now the PlayStation 3 jailbreak, Hotz is accused of breaching the Digital Millennium Copyright Act and other laws after he published on his website an encryption key and software tools that allow Playstation owners to gain complete control of their consoles from the firmware on up.
Sony also won subpoenas (.pdf) for data from YouTube and Google, as well as Twitter account data...