eros77 Posté(e) le 10 mars 2011 Posté(e) le 10 mars 2011 (modifié) Bonjour, 2 articles sur ce sujet: "While downloading the 3.60 update for my PS3 so I can play Killzone 3 again, I trolled the internets and certain PS3 hacking places, not because I use or condone custom firmware or hacking, but due to personal curiosity and interest. Besides, the PS3 being hacked affects all of us playing online, as I’m an avid Killzone 3 player these days and don’t want my free online experience to be ruined by cheaters. I came across the following tweets by Youness Alaoui, known as KakARoToKS: , in 3.60, Sony removed all the loaders, no more isoldr/lv1ldr/lv2ldr/appldr.. but they added lv0.2! Seems they found a way to secure ps3 we already have the metldr key, the thing is that they don’t use metldr anymore, at all! they can’t update or remove it (metldr), but very surprisingly, they just bypassed it, it’s there but unused.. A dumbed down explanation of the PS3 security is such that PS3 loads metldr at some point which than launches all the OS and game loaders, which the hackers were able to bypass. It was shown in fail0verfl0w presentations that metldr cannot be changed, so the PS3 would be vulnerable forever. It appears that Sony has found a way to bypass metldr, and if they properly signed their code this time, it should be secure once again." Source: http://www.casualcynic.com/ps3-firmware-3-60-unhackable/ "A leading PlayStation 3 hacker says that today's firmware 3.60 update re-secures the system from hackers and by extension, should lock out piracy. Youness Alaoui (hacker alias: KaKaRoToKS) knows what he's talking about. He developed PSFreedom - an open source Jailbreak alternative, and devised the PL3 payload for the USB dongles that attacked the PS3's security system on firmware 3.41 and lower. According to his swift analysis of the new system update posted on his Twitter feed, Sony has come up with an ingenious method of side-stepping its existing security protocols: "For now, it looks to me (at first glance) that the PS3 has been re-secured, but it doesn't mean it can't be broken again from scratch," he says, qualifying his findings by adding that he didn't spend more than a couple of minutes looking at the new update. The PS3's existing security system is based on a "chain of trust" - different layers of the console are protected by individual levels of encryption, one opening up access to the next. This chain of trust was annihilated when Geohot revealed the "mtldr" key, the root decryption cipher that can unlock all of the others. According to Alaoui's quick analysis, Sony simply doesn't use mtldr any more, opting for a new security system that could possibly require a completely new exploit to be uncovered - something hackers would be unlikely to take on bearing in mind the legal blitzkrieg Sony has unleashed in recent weeks. "The epic fail was epic," Alaoui says. "It doesn't mean they can't come [up] with an epic save."" Source: http://www.eurogamer.net/articles/digitalf...e-resecures-ps3 Modifié le 10 mars 2011 par eros77
Messages recommandés