Feeds

Hacker unshackles Kinect from Xbox

Microsoft not amused

Gartner critical capabilities for enterprise endpoint backup

An amateur hacker claims to have freed Microsoft's Kinect from the Xbox, a feat that allows him to control the the just-released motion-tracking game device from his Windows PC.

The claim was documented in two videos released over the weekend by a member of the Natural User Interface Group. In one, Kinect's motorized-tilt is shown being controlled with the moveup and movedown buttons of his Windows 7 PC. Normally, the movements can only be tracked when Kinect is connected to an Xbox 360 game console.

A second video shows the Kinect outputting color and depth data to the hacker's PC.

By themselves, the videos don't prove that the Kinect has been completely rooted, but they suggest that the NUI Group member AlexP is well on his way. The videos surfaced a few days after Adafruit Industries, a seller of DIY electronics kits, offered a $2,000 bounty to the first person who published open-source drivers for the Kinect.

The company's website has yet to say whether the hack satisfies the requirements. But according to Engadget, AlexP wasn't motivated by the Adafruit contest anyway. Instead, he hopes to integrate it into his company's CL Studio Live.

Microsoft is none too amused by the tinkering of a device that it has spent years to ensure isn't easily tampered with. On Thursday, shortly after Adafruit offered a paltry $1,000 for the hack, a Redmond spokesman told CNET that the company would “continue to make advances in these types of safeguards and work closely with law enforcement and product safety groups to keep Kinect tamper-resistant.” Adafruit responded by upping the reward to $2,000.

Users may recall the the US Copyright Office's Librarian of Congress earlier this year exempted the jailbreaking of smartphones from the Digital Millennium Copyright Act. The exception applies only to anti-circumvention prohibitions included in the statute, but Microsoft may have other provisions at its disposal.

AlexP has successfully removed digital shackles from other heavily locked-down hardware, hacking the PlayStation Eye in 2008, according to Engadget. ®

Boost IT visibility and business value

More from The Register

next story
Apple takes blade to 13-inch MacBook Pro with Retina display
Shaves price, not screen on mid-2014 model
iPhone 6 flip tip slips in Aussie's clip: Apple's 'reversible USB' leaks
New plug not compatible with official Type-C, according to fresh rumors
FEAST YOUR EYES: Samsung's Galaxy Alpha has an 'entirely new appearance'
Wow, it looks like nothing else on the market, for sure
YES YES YES! Apple patents mousy, pressure-sensing iVibrator
Fanbois prepare to experience the great Cupertin-O
Steve Jobs had BETTER BALLS than Atari, says Apple mouse designer
Xerox? Pff, not even in the same league as His Jobsiness
TV transport tech, part 1: From server to sofa at the touch of a button
You won't believe how much goes into today's telly tech
Apple analyst: fruity firm set to shift 75 million iPhones
We'll have some of whatever he's having please
Things are looking up in Flappy Bird sequel
'Swing Copters' offers the same gameplay but in a different direction
prev story

Whitepapers

5 things you didn’t know about cloud backup
IT departments are embracing cloud backup, but there’s a lot you need to know before choosing a service provider. Learn all the critical things you need to know.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Rethinking backup and recovery in the modern data center
Combining intelligence, operational analytics, and automation to enable efficient, data-driven IT organizations using the HP ABR approach.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.