PlayStation 3 Jailbreak
PlayStation 3 Jailbreak was the first USB chipset that allowed unauthorized execution of code, similar to homebrew, on the PlayStation 3. It works by bypassing a system security check using a memory exploit which occurs with USB devices that allows the execution of unsigned code.
Exploit
The underlying exploit and inner workings of the PlayStation 3 Jailbreak have been entirely reverse engineered and reimplemented through the open source .Through analysis of USB traffic to and from the PS3 Jailbreak, it was found that the device induced a heap overflow in kernel-space memory to trigger execution of untrusted code.
Legality
Sony had taken a few steps to prevent the jailbreak of the PlayStation 3, and has associated the action as a form of copyright infringement. In eastern European countries, no action has ever been taken to condemn such cases.The cases listed below are lawsuits Sony filed in courts to prohibit the sales and imports of circumvention devices that would jailbreak the system.
- PS3 Jailbreak remains banned for importation, distribution, or sale in Australia under a permanent injunction by the Federal Court.
- Sony lost a lawsuit in December 2010 in Barcelona against the seller of PS Jailbreak. The sales and imports of the product were deemed legal within Spain, and Sony was ordered to pay damages for attempting to block them.
- In January 2011, Sony filed a lawsuit against George Hotz for leaking the encryption keys for the PlayStation 3. The case was settled in April 2011, with Hotz agreeing to a permanent injunction preventing him from circumventing any Sony product again. The court also approved that Sony’s lawyers could obtain the IP addresses of visitors to Hotz’s website.