Feeds

iPhone/PS3 hacker Hotz arrested in pot bust

Texas police roadblock SXSW talk

5 things you didn’t know about cloud backup

George Hotz, aka geohot, has been arrested by Texas police on drugs charges while on his way to give a talk to the annual SXSW festival in Austin.

Hotz, who shot to fame when he was sued by Sony for cracking his PS3 gaming console, was arrested at a notorious police checkpoint in the West Texas town of Sierra Blanca, and found to have a small amount of marijuana in his car. The Sierra Blanca police have claimed a number of similar high-profile busts for pot possession at the same checkpoint, including Snoop (Doggy) Dog and Willie Nelson.

According to the Abovethelaw blog, Hotz and a friend were stopped at the checkpoint after a drug-sniffing dog took an interest in them. Police found a 1/4 oz of dope and edibles containing a further 1/8 oz, but the police booked him for the entire weight of the stash, valuing it at $800 and earning Hotz a felony rap.

Hacker Hotz gets busted in Texas

Hacker Hotz joins Snoop Dog and Willie Nelson

Hotz is now out of jail on $1,500 bail, and may not make his SXSW speaking spot. He is reported to be a medical marijuana card holder, but since Texas doesn't recognize that there is any medical reason to be packing pot, that's not going to help him much.

In 2007, while he was still just 17, Hotz was one of the first people to successfully hack an iPhone, and continued to do so with every following upgrade. He was the first person to crack Sony's PS3 to allow it to run whatever version of Linux he wanted, and released the exploit into the wild.

Sony was less than overjoyed at the news, and promptly took legal action against Hotz under the Digital Millennium Copyright Act for releasing details of how to hack the PS3, and confiscated his systems. The company eventually settled the case, with Hotz promising not to do it again and donating $10,000 to the Electronic Frontier Foundation.

Hotz did take a job at Facebook following his legal troubles, but has reportedly quit after less than a year. Facebook did not respond to requests for information on his current employment status.®

Secure remote control for conventional and virtual desktops

More from The Register

next story
Ice cream headache as black hat hacks sack Dairy Queen
I scream, you scream, we all scream 'DATA BREACH'!
Goog says patch⁵⁰ your Chrome
64-bit browser loads cat vids FIFTEEN PERCENT faster!
JLaw, Kate Upton exposed in celeb nude pics hack
100 women victimised as Apple iCloud accounts reportedly popped
NIST to sysadmins: clean up your SSH mess
Too many keys, too badly managed
Scratched PC-dispatch patch patched, hatched in batch rematch
Windows security update fixed after triggering blue screens (and screams) of death
Researchers camouflage haxxor traps with fake application traffic
Honeypots sweetened to resemble actual workloads, complete with 'secure' logins
Attack flogged through shiny-clicky social media buttons
66,000 users popped by malicious Flash fudging add-on
New Snowden leak: How NSA shared 850-billion-plus metadata records
'Federated search' spaffed info all over Five Eyes chums
Three quarters of South Korea popped in online gaming raids
Records used to plunder game items, sold off to low lifes
Oz fed police in PDF redaction SNAFU
Give us your metadata, we'll publish your data
prev story

Whitepapers

Endpoint data privacy in the cloud is easier than you think
Innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look for in a solution.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Advanced data protection for your virtualized environments
Find a natural fit for optimizing protection for the often resource-constrained data protection process found in virtual environments.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.