Feeds

iPhone/PS3 hacker Hotz arrested in pot bust

Texas police roadblock SXSW talk

Protecting users from Firesheep and other Sidejacking attacks with SSL

George Hotz, aka geohot, has been arrested by Texas police on drugs charges while on his way to give a talk to the annual SXSW festival in Austin.

Hotz, who shot to fame when he was sued by Sony for cracking his PS3 gaming console, was arrested at a notorious police checkpoint in the West Texas town of Sierra Blanca, and found to have a small amount of marijuana in his car. The Sierra Blanca police have claimed a number of similar high-profile busts for pot possession at the same checkpoint, including Snoop (Doggy) Dog and Willie Nelson.

According to the Abovethelaw blog, Hotz and a friend were stopped at the checkpoint after a drug-sniffing dog took an interest in them. Police found a 1/4 oz of dope and edibles containing a further 1/8 oz, but the police booked him for the entire weight of the stash, valuing it at $800 and earning Hotz a felony rap.

Hacker Hotz gets busted in Texas

Hacker Hotz joins Snoop Dog and Willie Nelson

Hotz is now out of jail on $1,500 bail, and may not make his SXSW speaking spot. He is reported to be a medical marijuana card holder, but since Texas doesn't recognize that there is any medical reason to be packing pot, that's not going to help him much.

In 2007, while he was still just 17, Hotz was one of the first people to successfully hack an iPhone, and continued to do so with every following upgrade. He was the first person to crack Sony's PS3 to allow it to run whatever version of Linux he wanted, and released the exploit into the wild.

Sony was less than overjoyed at the news, and promptly took legal action against Hotz under the Digital Millennium Copyright Act for releasing details of how to hack the PS3, and confiscated his systems. The company eventually settled the case, with Hotz promising not to do it again and donating $10,000 to the Electronic Frontier Foundation.

Hotz did take a job at Facebook following his legal troubles, but has reportedly quit after less than a year. Facebook did not respond to requests for information on his current employment status.®

The next step in data security

More from The Register

next story
Israeli spies rebel over mass-snooping on innocent Palestinians
'Disciplinary treatment will be sharp and clear' vow spy-chiefs
Infosec geniuses hack a Canon PRINTER and install DOOM
Internet of Stuff securo-cockups strike yet again
THREE QUARTERS of Android mobes open to web page spy bug
Metasploit module gobbles KitKat SOP slop
'Speargun' program is fantasy, says cable operator
We just might notice if you cut our cables
Apple Pay is a tidy payday for Apple with 0.15% cut, sources say
Cupertino slurps 15 cents from every $100 purchase
YouTube, Amazon and Yahoo! caught in malvertising mess
Cisco says 'Kyle and Stan' attack is spreading through compromised ad networks
Hackers pop Brazil newspaper to root home routers
Step One: try default passwords. Step Two: Repeat Step One until success
Greater dev access to iOS 8 will put us AT RISK from HACKERS
Knocking holes in Apple's walled garden could backfire, says securo-chap
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Security and trust: The backbone of doing business over the internet
Explores the current state of website security and the contributions Symantec is making to help organizations protect critical data and build trust with customers.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.