Feeds

Hacker pledges to re-enable Linux on PS3

Sony anti-hack firmware to be hacked

Top three mobile application threats

Hacker George Hotz, the guy who opened up the Sony PlayStation 3 earlier this year, has vowed to find a way to allow Linux buffs to install their favourite OS on the console after an upcoming firmware update renders this impossible.

Hotz wrote on his blog this week that he will devise a "custom version of 3.21 that doesn't lose Other OS support".

His reference to "Other OS support" is the option in the current PS3 firmware which allows older versions of the console - all those released before the introduction of the PS3 Slim in September 2009 - to be loaded and booted with Linux.

Sony announced this week that tomorrow's Firmware 3.21 will remove this option for security reasons.

Ironically, it's Hotz' hack that may have led Sony to decide to remove Linux support. The PS3 Slim - reviewed here - has never had this option. Undoubtedly, Sony fears the hack being used to play ripped off games.

Hotz, however, says putting Other OS support back "isn't about getting what you didn't pay for, it's about making sure you do get what you did.

"This is about more than this feature right now," he writes. "It's about whether these companies have the right to take away advertised features from a product you purchased. Imagine if an exploit were found in Safari on the iPhone, but instead of fixing it, Apple decides to pull web browsing altogether. Legally, they may be within their right to do so, but we have to show them it's the wrong move for the future of the product and the company." ®

Combat fraud and increase customer satisfaction

More from The Register

next story
Samsung Galaxy S5 fingerprint scanner hacked in just 4 DAYS
Sammy's newbie cooked slower than iPhone, also costs more to build
Feast your PUNY eyes on highest resolution phone display EVER
Too much pixel dust for your strained eyeballs to handle
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Leaked pics show EMBIGGENED iPhone 6 screen
Fat-fingered fanbois rejoice over Chinternet snaps
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
US mobile firms cave on kill switch, agree to install anti-theft code
Slow and kludgy rollout will protect corporate profits
Rounded corners? Pah! Amazon's '3D phone has eye-tracking tech'
Now THAT'S what we call a proper new feature
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
NORKS' own smartmobe pegged as Chinese landfill Android
Fake kit in the hermit kingdom? That's just Kim Jong-un-believable!
prev story

Whitepapers

Designing a defence for mobile apps
In this whitepaper learn the various considerations for defending mobile applications; from the mobile application architecture itself to the myriad testing technologies needed to properly assess mobile applications risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.