162w ago - Today Rich Taylor of the Entertainment Software Association has shared the following PSA via PlayStation Blog on the effort to help protect video games.
To quote: Today, the U.S. Supreme Court hears arguments in the case of Schwarzenegger v. EMA/ Entertainment Software Association. They'll decide whether a California law, which would restrict the sale of "violent" computer and video games, is constitutional.
What does this mean to you, PlayStation fans?
This case could have huge implications for the industry. No one is sure what counts as a "violent" game, so the California law would suppress game developers' imagination and right to self-expression. It would also prohibit retailers from selling the games that might be perfectly legal, "just in case."
It could mean an environment where "God of War" is banned from retail shelves, but the sometimes violent written works detailing Greek myths are still available on bookstores shelves and taught in classrooms.
It's a slippery slope, and the California law is similar to what Congress tried to do to comic books over fifty years ago. In a letter of support for video games, comic book legend...
199w ago - A few weeks back GeoHot Hacked PS3, and now a new patent has surfaced from Kanna Shimizu of IBM for a method to protect secrets against encrypted section attacks.
SKFU writes: It seems it is SONY's answer for GeoHot's progress.
Take a look here, to quote: "A method, system, and computer-usable medium are disclosed for controlling unauthorized access to encrypted application program code. Predetermined program code is encrypted with a first key.
The hash value of an application verification certificate associated with a second key is calculated by performing a one-way hash function. Binding operations are then performed with the first key and the calculated hash value to generate a third key, which is a binding key.
The binding key is encrypted with a fourth key to generate an encrypted binding key, which is then embedded in the application. The application is digitally signed with a fifth key to generate an encrypted and signed program code image.
To decrypt the encrypted program code, the application verification key certificate is verified and in turn is used to verify the authenticity of the...