Feeds

Sony threatens to ban PS3 jailbreakers from network

For your own protection

HP ProLiant Gen8: Integrated lifecycle automation

Sony has threatened to permanently banish all PlayStation 3 users from the its online game network if they use jailbroken consoles.

Customers who don't want to lose access to the PlayStation Network “must immediately cease use and remove all circumvention devices,” Sony Social Media Manager Jeff Rubenstein blogged on Wednesday. “By identifying PlayStation 3 systems that breach our guidelines and terminating their ability to connect to PlayStation Network, we are protecting our business and preserving the honest gameplay experiences that you expect and deserve.

Wednesday's ultimatum comes five weeks after Sony accused more than 100 hackers of copyright infringement for publishing the means to unlock the game consoles. Although Sony claims the legal action was necessary to prevent pirated games and software from running on the PS3, the company has yet to provide evidence that any of the defendants did so, or advocated doing so.

Sony's lawsuit alleges violations of the Digital Millennium Copyright Act, which makes it illegal to circumvent technology intended to prevent access to copyrighted material. Three weeks ago, the federal judge hearing the case tentatively ruled that Sony was likely to prevail on those claims and ordered well-known jailbreaker George Hotz, aka, GeoHot, to turn over all code and computers used to develop his hack.

More recently, Sony has expanded its legal offensive to other PS3 hackers by requesting subpoenas that, among other things, would force Google to identify people who viewed videos posted to GeoHot's private YouTube channel.

The PlayStation Network is the sole source of bug fixes and firmware updates for the consoles. ®

The Essential Guide to IT Transformation

More from The Register

next story
Say goodbye to the noughties: Yesterday’s hi-fi biz is BUSTED, bro
Are the days of floorstanders and separates numbered?
It's finally happened: Bloke builds BOFH-style goofing-off cattle prod
BZZZT: Slapper man seeks funds for jolt-a-slacker device
'Ribbed' for your pleasure: Jony Ive unveils NAKED IPHONE
All-glass mobe could herald the END of traditional cases
iWatch watch: Apple tags sales bod from luxury Swiss watch firm
TAG Heuer retail man pinched for wearables division
The final score: Gramophones 1 – Glassholes 0
My life according to a Google Arse
IBM's $3bn bet on next-gen computers: Carbon nanotubes, neuro chips
Big Blue exec tells El Reg what to keep an eye on
Military-grade bruiser: Getac F110 rugged tablet... is no iPad
Intel Core i5, 11.6 inches, tough as old boots Windows slab
Acer cranks Chromebooks with Core i3 models
Two 1.7GHz cores should make running ThinApps rather easier
prev story

Whitepapers

Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Eight steps to building an HP BladeSystem
Building your ideal BladeSystem infrastructure solution begins with eight simple steps, outlined in this whitepaper.
Securing Web Applications Made Simple and Scalable
Learn how automated security testing can provide a simple and scalable way to protect your web applications.
Build a Business Case: Developing Custom Apps
In this whitepaper learn how to maximize the value of custom applications by accelerating and simplifying their development.