Ребятки прочитатйте вот это)))
Ну а теперь к самому главному. «Взлом» PlayStation 3 – это не больше чем «городская легенда». История, которую любят рассказывать друг дружке горожане за чашкой чая, немного привирая, искажая факты и вообще – иногда приукрашивая все события. То, что сделал хакер – заслуживает уважения, почета и может шоколадной медальки. Вот только он взломал первый уровень защиты. После чего умыл руки и сказал, что у него есть и другие дела.
Собственно, знатоки уже сделали вывод – никто PS3 так и не взломал. Главная преграда в виде SPU не преодолена. Да и преодолеть ее вроде как нельзя в принципе – выкиньте из цепочки изолированный SPU и консоль, увы, больше никогда не запустится. Такие вот дела. «Городская легенда» продолжает свой жизненный путь. Ну а PlayStation 3 стала на несколько часов самым обсуждаемым девайсом на планете Земля – Sony это только на руку
Mr. ? said...
A guy on a site im a member of posted this thought it was interesting : Below is iQD's statement regarding the recent GeoHot PS3 Hack news, partly it really seems as if he does not read any docs.
To quote: "So the PS3 is hacked ? Well that's nothing more than an urban legend.
Altough it's nice to capture all these HV calls and stuff from a plain (not encrypted) lv1 binary, but this will never lead to a hacked PS3.
Let's have a look. The major security architecture on the PS3 is called the "Secure Processing Vault" and is the most important thing regarding "hacking" the PS3.
There is NO WAY for the PPU or even the HV to gain access to the SPU, which is an application running inside of an isolated SPU.
Well you can kick out the isolated SPU, like geohot mentioned, but this gives you nothing, as ALL the encryption and execution of applications (HDD encryption, app encryption, decryption, executing, signature checking, root key extraction) happens inside the isolated SPU.
To run homebrew on the PS3 you would have to reassemble the whole functionality from the SPU inside a binary running on the PPU. For this you will need the root key.
The root key is stored in hardware (not even close to the things on the iPhone). The root key cannot be extracted by any software or hardware means and is essential to ALL encryption/decryption, executing and checking routines.
The only way to get the root key is inside of an isolated SPU, as it is kick-starting the hardware encryption facility. There is no other way to do that !
Let's just assume that geohot or some other guys are able to break into the local store of the isolated SPE. There they will just find some encrypted binaries.
The key for decryption is encrypted by the root key ! You won't get anywhere without the root key.
Let's assume that someone managed to do all those stuff from the isolated SPU on the PPU and creates a CFW.
There is still a secure booting environment. The first module loaded/bootet is integrity checked by the hardware crypto facility utilizing the root key. So you have also to address this booting stuff. Again, no root key, no booting.
So there's always runtime patching you might ask ? Not possible on the PS3 because the hardware crypto facility is able to check the signatures whenever it wants to.
And which part is responsible for this ? Exactly, the isolated SPU. So if you kick out the isolated SPU the system will not boot/run anymore.
The PS3 is neither an PSP nor an iPhone. It's the most secure system architecture of this time !
The girl behind this stuff, Kanna Shimizu, is not somebody. Messing around with this is not like saying Bruce Schneier is a n00b.
Btw.: forget about all those stories, that certain hackers are or will be employed by SONY. That's nothing more than another urban legend.
@geohot It is OBVIOUS that the HV is PPC. The Cell BE is a PPC architecture, you know Better read those IBM papers in first place !
- iQD"
thats means he does nothing really just baypass lvl1 security wich is great
but paradox did it before him!.
the hard and the unpossible thing to do is to get the root key from the
isolated SPU. and that is by far uncheckable.
добавлено спустя 1 минуту: хак не состоялся...в очередной раз! ждите дальше...
PS3 Hack Means Nothing, Backups Are Years Away
The great "Geo Hotz" who initially hacked the very first iPhone to work on all service carriers, is now making front page news once again. This time Mr. Geo makes news, by exploding the PS3's hardware and software, in which he described as a "very secure system". Today he has released the PS3's exploit to the world. The exploit would give full memory access and therefore ring 0 access from OtherOS. What exactly does that mean? Who the heck knows, but how can you not have faith in the guy.
But, seriously how many people have the knowledge, money and team to pull this off right now? Geo has set the ground work, so all that's left to do, is the baking, and of course the icing on the cake. But that is easier said than done. Let's go back sometime when the PS2 initially got hacked.
P.S. идите лучше новые скрины из GOW3 посмотрите :-)
добавлено спустя 1 минуту: ЗЫ
Копим на God of War и Heavy Rain далее... =)
добавлено спустя 2 минуты: Figure 3. The application inside an isolated SPE cannot be observed or modified
hacker who has gained root or hypervisor privileges is not a threat to an application executing on an isolated SPE. The supervisory privileges will not enable him to control the application, nor will it allow him to read or write the memory used by it. The execution flow and the data of the isolated application are safe
http://www.ibm.com/developerworks/po...-cellsecurity/ The Cell BE processor addresses this problem with its Runtime Secure Boot feature. It lets an application secure boot from the hardware an arbitrary number of times during runtime. Thus, even if other software in the system has been compromised in the past, a single application thread can still be robustly checked independently. In essence, the application can renew its trustworthiness as many times as needed even as the system stays running longer and gets more stale. Specifically, a hardware implemented authentication mechanism uses a hardware key to verify that the application has not been modified, and the authentication is based on a cryptographic algorithm.
This runtime secure boot, in fact, is tightly coupled with an SPE entering isolation mode