Sponsored Links

Sponsored Links

 

Sony Finds GeoHot PSN Account, PS3 Hacker in South America

1350°
172w ago - Update: Some more legal doc updates have now surfaced, which include GeoHot's laywers response refuting Sony's claims (via [Register or Login to view links]) that the "blickmaniac" PSN account belongs to him.

[Register or Login to view links] is also reproting that GeoHot's PS3 SCEJ manuals remained sealed, that he couldn't have known of SCEA to set up a PSN account and that the PlayStation 3 serial numbers don't match.

Today many sites are reporting that Sony has allegedly found George Hotz's PSN account under the nickname of blickmanic which would subject him to their TOS, that the PS3 hacker is currently [Register or Login to view links] or [Register or Login to view links] in South America, and finally that GeoHot may have intentionally removed integral components of his impounded hard drives prior to delivery.

To quote from [Register or Login to view links]:...[/B]
 

SoftLayer to Quash Sony Subpoena, GeoHot on Protective Order

1350°
173w ago - Today [Register or Login to view links] reports that PS3 hacker GeoHot is now accusing Sony of "false representations" to the court and petitioning for a protective order while [Register or Login to view links] confirmed that SoftLayer is moving to quash Sony's subpoena on George Hotz Forum account details in the pending PlayStation 3 hacking case despite their recent PayPal victory.

To quote from Groklaw: "Specifically, Hotz says that Sony Computer Entertainment America falsely claimed at a recent hearing that the Software Developer Kit at issue in this litigation referenced SCEA being in California. The SDK, Hotz says, is owned by Sony Computer Entertainment in Japan, and the installation procedures reference Sony Japan, not SCEA.

This is relevant, Sony argued, because if they found any of the SDK tools on his computer, it would "establish contacts between SCEA and Mr. Hotz" in that they claimed SCEA is the only entity distributing the SDKs. The discovery that the court ordered was based on SCEA's representations. Now what? Should the discovery...
 

Video: PS3 3.60 JailBreak Rumor, Mathieulh Claims Running Code

1350°
173w ago - Just over a week ago PlayStation 3 hacker Mathieulh confirmed finding a PS3 3.56 Exploit, and today [Register or Login to view links] tweeted part of an IRC chat log where Mathieulh stated the following regarding PS3 Firmware 3.60 running homebrew code, as follows:

"[03:15] while you are insulting me like morons, I already have code running on 3.60, and I am laughing, and guess what ? I am happy I stopped sharing, you can hate me for it, I don't care."

He followed up with the following Tweets: To those planning on building a 3.56+ pup for whatever reason, the files attributes changed, the group and user ids for the files as well. The new 3.56+ values for tarballs are the following: owner_id, “0000764″ group_id, “0000764″ owner, “tetsu” group, “tetsu” ustar, “ustar”

You can use fix_tar to use those new values. Use with caution. By comparison, those are the pre-3.56 values. owner_id, “0001752″ group_id, “0001274″ owner, “pup_tool” group, “psnes” ustar, “ustar”

3.60 isn’t “hardcore...
 

PS3 Hacker Mathieulh Finds PlayStation 3 Firmware 3.56 Exploit

1350°
175w ago - Today PS3 hacker Mathieulh reports finding a PlayStation 3 Firmware 3.56 exploit, although he states he has no plans to give any further details about it.

To quote from PSX-Scene (linked above): Well-known hacker Mathieu Hervais has reportedly found a bug that allows exploiting metldr, the bootloader and firmware version 3.56. Unfortunately, he refuses to release it.

Originally Posted by Mathieulh (via [Register or Login to view links]):

I hesitated a lot before tweeting about it, but a bug allows exploiting metldr, the bootloader and 3.56+. I don't intent to ever unveil it.

So much for "unhackable" PS3s though... I am not giving any further details about it. Sorry.

Actually the revocation list exploit doesn't allow you to exploit isoldr, you could however sign a revoke list if you had the revocation list keys and knew the sign fail, and use that to dump isoldr. Metldr does not load revocation lists.

This has been tested, how do you think I could release the lv2ldr and appldr keys ? (about 24hrs before Geohot showed up with metldr keys) This has been tested, how do you think I could release the lv2ldr and appldr keys ? (about 24hrs before Geohot showed up with metldr keys)

You can...
 

Judge Allows Sony to Unmask Anybody Who Visited GeoHot Site

1350°
175w ago - Today Wired.com (linked above) has published legal documents confirming a federal judge has granted Sony the right via subpoena to unmask anybody who visited GeoHot's site, including but not limited to those who downloaded the PS3 "jailbreak.zip" file.

To quote: "A federal magistrate is granting Sony the right to acquire the Internet IP addresses of anybody who has visited PlayStation 3 hacker George Hotz' website from January of 2009 to the present.

Thursday's decision (.pdf) by Magistrate Joseph Spero to allow Sony to subpoena Hotz' web provider raises a host of web privacy concerns.

The subpoena to Bluehost, which maintains Hotz' geohot.com site, is part of Sony's lawsuit against the 21-year-old New Jersey hacker. Respected for his iPhone hacks and now the PlayStation 3 jailbreak, Hotz is accused of breaching the Digital Millennium Copyright Act and other laws after he published on his website an encryption key and software tools that allow Playstation owners to gain complete control of their consoles from the firmware on up.

Sony also won subpoenas (.pdf) for data from YouTube and Google, as well as Twitter account data...
 
Sponsored Links

Sponsored Links
Sponsored Links

Sponsored Links






Affiliates - Contact Us - PS3 Downloads - Privacy Statement - Site Rules - Top - © 2014 PlayStation 3 News