Feeds

iPhone/PS3 hacker Hotz arrested in pot bust

Texas police roadblock SXSW talk

Beginner's guide to SSL certificates

George Hotz, aka geohot, has been arrested by Texas police on drugs charges while on his way to give a talk to the annual SXSW festival in Austin.

Hotz, who shot to fame when he was sued by Sony for cracking his PS3 gaming console, was arrested at a notorious police checkpoint in the West Texas town of Sierra Blanca, and found to have a small amount of marijuana in his car. The Sierra Blanca police have claimed a number of similar high-profile busts for pot possession at the same checkpoint, including Snoop (Doggy) Dog and Willie Nelson.

According to the Abovethelaw blog, Hotz and a friend were stopped at the checkpoint after a drug-sniffing dog took an interest in them. Police found a 1/4 oz of dope and edibles containing a further 1/8 oz, but the police booked him for the entire weight of the stash, valuing it at $800 and earning Hotz a felony rap.

Hacker Hotz gets busted in Texas

Hacker Hotz joins Snoop Dog and Willie Nelson

Hotz is now out of jail on $1,500 bail, and may not make his SXSW speaking spot. He is reported to be a medical marijuana card holder, but since Texas doesn't recognize that there is any medical reason to be packing pot, that's not going to help him much.

In 2007, while he was still just 17, Hotz was one of the first people to successfully hack an iPhone, and continued to do so with every following upgrade. He was the first person to crack Sony's PS3 to allow it to run whatever version of Linux he wanted, and released the exploit into the wild.

Sony was less than overjoyed at the news, and promptly took legal action against Hotz under the Digital Millennium Copyright Act for releasing details of how to hack the PS3, and confiscated his systems. The company eventually settled the case, with Hotz promising not to do it again and donating $10,000 to the Electronic Frontier Foundation.

Hotz did take a job at Facebook following his legal troubles, but has reportedly quit after less than a year. Facebook did not respond to requests for information on his current employment status.®

Protecting users from Firesheep and other Sidejacking attacks with SSL

More from The Register

next story
Spies would need SUPER POWERS to tap undersea cables
Why mess with armoured 10kV cables when land-based, and legal, snoop tools are easier?
Early result from Scots indyref vote? NAW, Jimmy - it's a SCAM
Anyone claiming to know before tomorrow is telling porkies
Apple Pay is a tidy payday for Apple with 0.15% cut, sources say
Cupertino slurps 15 cents from every $100 purchase
Israeli spies rebel over mass-snooping on innocent Palestinians
'Disciplinary treatment will be sharp and clear' vow spy-chiefs
Hackers pop Brazil newspaper to root home routers
Step One: try default passwords. Step Two: Repeat Step One until success
China hacked US Army transport orgs TWENTY TIMES in ONE YEAR
FBI et al knew of nine hacks - but didn't tell TRANSCOM
Microsoft to patch ASP.NET mess even if you don't
We know what's good for you, because we made the mess says Redmond
NORKS ban Wi-Fi and satellite internet at embassies
Crackdown on tardy diplomatic sysadmins providing accidental unfiltered internet access
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Protecting users from Firesheep and other Sidejacking attacks with SSL
Discussing the vulnerabilities inherent in Wi-Fi networks, and how using TLS/SSL for your entire site will assure security.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.