Gjurovski |
27.01.2010. 00:25 |
Kao prvo oni njemu nemogu nista, ono cega se on zeli docepati su ROOT KEYEVI unutar izoliranog SPU-a, ako se toga docepa PS3 pada a komotno to moze to staviti objaviti na blogu, sve sto se iz toga izrodi nije na njemu jer to nije niti chip, niti loader nekakav za pokretanje piratskih kopija itd, Sony onda moze poceti skupljati vojsku za ganjanje ekipe koja ce se okoristiti time, mislim da je sve jasno :)
E sad PS3 kao sistem ima vise slojeva\nivoa zastite:
1. Hypervisor
Citiraj:
The HV in question is the so-called Hypervisor - low-level code that no-one outside of IBM and Sony should have access to. It controls access to the hardware and monitors the operating system running on it. It's also a key component of the security of both PlayStation 3 and Xbox 360. In theory, during run-time it can detect hacker attacks on the system - for example, the TIFF image exploits that have brought down some firmware revisions of the PSP. These typically worked by overrunning memory buffers, allowing hackers to implant code in memory where it really shouldn't be, where it would then be executed. The implementation of the Hypervisor makes such attacks almost certain to fail.
|
On je probio taj prvi dio i "preuzeo" (dramaticno) nadzor nad tim Hypervisorom tj hardverom:
Citiraj:
More than that, he can create his own calls designed to access the system at the very lowest levels. He claims to have created two new calls so far, one to read from any point in system memory (Peek) and the other to write (Poke). As the code injection is happening at pretty much the lowest level, the only way Sony can effectively defeat it is to redesign the hardware
|
2. Isolated SPU: Cell se sastoji od jedne PowerPC " PPE" jezgre i 8 zasebnih co-procesora " SPU", na PS-u je jedan od tih 8 spu-ova defektan zbog yieldova (ujedno da se smanji trosak proizvodnje PS-a), drugi je pak upotpunosti izoliran i iskljucivo sluzi kao protekcija:
Citiraj:
Another SPU handles security, processing encrypted code, leaving six purely for game developer usage. While the hack gives access to the entire system memory, the all-important decryption keys are held entirely in the SPU and can't be read by Hotz's new Hypervisor calls.
ALL the encryption and execution of applications (HDD encryption, app encryption, decryption, executing, signature checking, root key extraction) happens inside the isolated SPU.
|
I preostalih 6 SPU-ova kao sto se gore navodi je za developere...
Sad on pokusava trenutacno upasti u taj izolirani SPU da pokusa izvuci root keyeve iako tvrdi da se taj moze taj SPU izignorirati te da je dovoljno zahomebrew, full linux i backupove....
3. BluRay
Citiraj:
PlayStation 3's security on the Blu-ray drive itself is (was?) pretty much untouchable and was designed to foil the kinds of attack seen on competing systems. Xbox 360 was compromised owing to the unencrypted nature of the firmware on the original DVD drives. Wii was hacked because the system itself was so similar to the GameCube that when the old hardware was cracked, the new revision fell with it. PlayStation 3 is far smarter. Not only is the drive software itself encrypted, but it's widely believed that the mandatory firmware updates can also reflash the Blu-ray drive too - even if the drive was hacked (it never has been) it would be re-secured next time you updated your PS3.
|
Stoga ovo sto je on napravio je pocetak, da je hackirao PS3 tesko :) to je vise baklja da privuce pozornost ekipe pa mozda netko od ekipe napravi kakav veci pomak, jer solo milslim da je napravio sve sto je mogao :)
IZVOR: http://www.eurogamer.net/articles/di...hacked-article
@Buljo bus jos malo pricekao sa kupovinom izgleda :D
|