Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×
XBox (Games) Software Linux

Xbox Linux Made Possible Without a Modchip 996

An anonymous reader writes "Free-X have released an exploit for the Xbox that will let you get Linux on the machine without any hardware mods at all... Microsoft is already threatening them with legal action. Here's the Free-X statement. Free-X say they had been trying to contact MS for a month but were ignored, which is why they've released the exploit. Should be interesting to watch this one."
This discussion has been archived. No new comments can be posted.

Xbox Linux Made Possible Without a Modchip

Comments Filter:
  • by Anonymous Coward on Friday July 04, 2003 @01:47AM (#6365244)
    Official statement from Free-X regarding exploits.
    Dear Public,

    Today is a very said day for Microsoft.

    One month ago, we began an attempt to make contact with Microsoft, we did this because the first software only mod-chip solution was developed and proved working. This solution meant that there was no need to open the XBox anymore.

    The modification only needs to be installed once and all existing XBox consoles are able to be modified to use this exploit, only new consoles with an updated Firmware could lock out this exploit.

    After discovering this exploit a Team was formed known as the "Free-X (box)" team.

    Members of this team have made many attempts to initiate discussions with Microsoft by various means including:

    1. Contacting certified XBox game developers requesting that they contact Microsoft to facilitate discussions about our discoveries.
    2. Contacting major web-based news sources requesting that they contact Microsoft on our behalf.
    3. Direct contact with various Microsoft departments globally.
    4. Direct contact with Authorised XBox distributors globally.

    Since our attempts to contact Microsoft have become public knowledge our team has been accused of attempting to extort or blackmail Microsoft, this is not true as we have made every attempt possible to make contact with Microsoft to offer the following:

    - A complete summary of all hacking technologies (many of these technologies have not been released).
    - Source Codes.
    - All attacks which have been developed but not yet released.
    - To sign a Non-disclosure Agreement regarding our discoveries.
    - Further research on exploits, which would be exclusive to Microsoft.
    - Full names of all hackers involved upon agreement of legal protection from Microsoft.
    - Assistance in the development of future security for the XBox by working with Microsoft.

    For the exchange, we were requesting but not demanding the following:

    - Complete access to all documentation (chipsets, video etc.) to assist in developing a better Linux for the XBox.
    - A signed Linux loader.
    - Protection from Microsoft or support if any organisation/government attempted to prosecute members of our team.
    - Refunding of the cost occured during the agreement period.

    To prove our discoveries we offered to make available an exploited dashboard for Microsoft to validate our claims.

    Our team was more than willing to co-operate with Microsoft and would have most likely accepted most of the terms of agreement coming from our discussions.

    If Microsoft had agreed to sign Linux then it would have been possible to generate a signature for the Linux, which would only work on current XBox consoles and able to be stopped in future revisions. It would also be possible to prevent the illegal use of pirated software.

    Our team was of the belief that our attempts to initiate discussions with Microsoft would have been welcomed.

    Members of our team contacted Microsoft quickly, but then suddenly Microsoft ceased responding to our enquiries. Third parties contacting Microsoft on our behalf also proved to lead to a dead end, is the giant Microsoft's reaction just incompetence or intentional??

    Following the public release of this request for communication on the ZDNet/CNet network, Microsoft promised a formal response and as yet we have not seen one.

    Is it possible that Microsoft's lack of co-operation in this matter could be because they believe that:

    1. Mod-chips are good for business as they increase the sales of the console hardware and that they see them as an important part of there business model.
    2. The Exploit can be fixed in future software updates.
    3. This is purely a hoax.

    A team member called a Microsoft representative again (Mr. Thomas Kritsch of Austria) and offered a presentation.

    This presentation was scheduled for 20th June, but Microsoft cancelled it on 19th June. During a phone discussion on this day Mr Kritsch a
  • by Anonymous Coward on Friday July 04, 2003 @01:51AM (#6365269)
    I wonder if it is the same exploit posted here:

    http://archives.neohapsis.com/archives/vulnwatch /2 003-q3/0008.html

    This is also an exploit dealing with the X-Box dashboard.

    This was initially posted in replies to another story in the gaming section by another AC.

    XBOX Security

    -= Security Advisory =-

    Advisory: XBOX Dashboard local vulnerability
    Release Date: 2003/07/04
    Last Modified: 2003/07/04
    Author: Stefan Esser [senopiracy.de]

    Application: Microsoft XBOX Dashboard (up to today)
    Severity: A vulnerability within the XBOX Dashboard allows to
    totally compromise the security features of the XBOX.
    Risk: Critical
    Vendor Status: Vendor is not willing to talk about XBOX vulnerabilities.

    Overview:

    The XBOX Dashboard is what appears when you turn the XBOX on without a
    disc in the DVD drive. It will let you adjust system settings, manage
    your save games, play and rip audio CDs and configure your XBOX Live
    account. It is the heart of the XBOX and its most vulnerable point,
    because it lacks several security restrictions which are enforced on
    games. This includes the lack of the reboot-on-eject-button "feature",
    which is obligatory for all games.

    The existance of an exploitable vulnerability within the dashboard could
    totally compromises the XBOX security system. It will make the box
    independent from Microsoft signed code and therefore this information is
    released to the public now on the 4th of July 2003, the day of the XBOX
    Independence.

    They provide what they claim is working code to exploit the vulnerability.
  • by Student_Tech ( 66719 ) on Friday July 04, 2003 @01:52AM (#6365273) Journal
    Actually, they update the dashboard (what the exploit plays with) when you install the Xbox Live stuff, they could just set it up to do that when someone connects to Live, or on major game release have it auto-check and offer to update it.

    At least this is my understanding (and yes the Live stuff does play around with the dir structure on the Xboxes I have seen.)
  • by Michael Hunt ( 585391 ) on Friday July 04, 2003 @01:59AM (#6365314) Homepage
    007 Agent Under Fire contains an exploit in the save-game loading routine which can lead to a local-root compromise on your X-box with a specially corrupted save game file.

    This can be used, for example, to boot Linux, or flash the BIOS.

    The reason that this didn't win Mike Robertson's 100 large is because you still need to rip the lid off the box and solder a pair of jumpers (or use conductive pen) in order to enable 'write' on the flash rom.
  • by Farrell ( 564771 ) on Friday July 04, 2003 @01:59AM (#6365316) Homepage
    because Microsoft feers it.... Actually, the reason Linux is on the PS2 is for development reasons, originally. The software running the PS2 is based on linux iirc, so they put out a whole distro or something to work on PS2. Only problem with this is, it's a specialized distro, and I don't think there are any others that boot on PS2(some proprietery program used during boot or something so they didn't have to release the source to it) As for why no XBox.... well, it's Microsoft, I mean, come ON, would you let people change the operating system on your video game system to one that causes problems?
  • Re:Just wondering... (Score:5, Informative)

    by randyest ( 589159 ) on Friday July 04, 2003 @01:59AM (#6365319) Homepage
    It's a base-64 encoded proof-of-concept font and loader program. Base-64 is sort of like uuencode -- it's just a reversible way to represent a binary file as ascii code. The line "begin-base64 644 dayX.tgz" is the header that includes the encoded filename (dayX.tgz). Ask google about it for more info. Google knows all.
  • Integer Underflow: (Score:5, Informative)

    by Kelmenson ( 592104 ) <kelmenson.yahoo@com> on Friday July 04, 2003 @02:01AM (#6365326)
    You understand overflow, right? There is a maximum integer that can be stored in a variable, and if you "overflow" this maximum amount, the number wraps around. So 0xffff + 0x0003 = 0x0002.

    Underflow is the same, but opposite, making it so you wrap from near zero to a very big number... You say the font size is 0x0003, and the X-Box subtracts 0x0004, and ends up thinking it needs to read in 0xffff more data from the font file...

    Both just involved wrapping around the maximum/minimum values a variable can hold.

  • by shird ( 566377 ) on Friday July 04, 2003 @02:11AM (#6365368) Homepage Journal
    Yeah it did, and it would also be the case for this exploit as well. But thats only if you want to actually write to the bios. If you just want to load linux then it shouldn't be necessary - it just means you have to load up 007 and exploit it every time you want to boot linux, rather than exploiting the default dashboard.

    The ability to write to the bios is a physical restriction which is very unlikley to ever be overcome without some solder. The compononents simply _can't_ write to the bios without the wired connection.
  • Re:What the.. ? (Score:4, Informative)

    by E-prospero ( 30242 ) on Friday July 04, 2003 @02:20AM (#6365402) Homepage
    These guys seem european, however, as there's no references to shrimps on barbies, or Fosters.

    Three minor problems:

    1) What the US calls a shrimp, Australians call a prawn.

    2) Australians, on the whole, don't put prawns on a barbie. Barbies are Snaggers and Chop territory.

    3) Nobody - and I mean Nobody - drinks Fosters. Seriously. An Australian psycopath wanting to perform torture wouldn't force his victim to drink Fosters.

    So, the only role played by the phrase "Pass the fosters, throw a shrimp on the barbie" is to identify an american who wants to sound Aw-stralian.

    Russ %-)
  • by Anonymous Coward on Friday July 04, 2003 @02:22AM (#6365415)
    Select and copy the uuencoded bit of the message in your browser, then pop open an xterm.
    $ uudecode
    (shift-insert or third mouse button)
    (return)
    ^D
    This will give you dayX.tgz

    You don't know when someone will laywer their way into taking this thing offline. Make it as available as you can.
  • No DMCA in Austria (Score:5, Informative)

    by janolder ( 536297 ) on Friday July 04, 2003 @02:33AM (#6365449) Homepage
    Fortunately, the DMCA has no teeth in Austria where these guys seem to live. Note the reference to a Mr Kritsch working for MS Austria and the somewhat awkward choice of words, mediocre grammar and poor spelling.

    If the DMCA continues to be used to shut down what used to be considered fair use, we'll see more and more open source endeavors moving out of the US. Here's to fervently hoping the MPAA/RIAA doesn't manage to implement DMCA clones in all countries on this planet. They seem to be doing a pretty good job at it in Europe.

  • by Argonath ( 679076 ) on Friday July 04, 2003 @02:36AM (#6365456)
    ..all xbox hackers should use freenet [freenetproject.org] to publish their discoveries. That would give them total anonymity and good night sleep without getting burdened by possible lawsuits.
  • by Eyston ( 462981 ) on Friday July 04, 2003 @02:40AM (#6365468)
    why their exploit would work (integer underflow..?)

    It looks at the file. The first four bytes are how big the file is, including its own size. So if the file is 16 bytes long, that is 4 bytes of the header and 12 bytes of data. That first four bytes reads 16.

    So the XBox reads in the first four bytes (16), takes 4 away and then knows to look for 12 more bytes (16-4).

    Apparently it uses those first four bytes (16) to allocate the memory. It then takes 4 away from that value (4 from 16 is 12) and reads those bytes (next 12) into memory.

    Well, if you feed it 0..3 instead of 16 in that example, you get an underflow. It sees those first 0..3, takes away 4, and gets a very large number (whatever the maximum is, assume 8^4). So it then writes large amounts of YOUR data to memory even when only 0..3 bytes are allocated (or it is smart and will only do 4). So now you have YOUR own code/data in memory that isn't for that file.

    I think. Fuck if I really know.

    -Eyston
  • by smashr ( 307484 ) on Friday July 04, 2003 @02:42AM (#6365473)

    It's too bad they probably won't get the 100k. In order to get the files onto the xbox, you need to use a prior exploit that DOES require something(007 save, swapping HDD etc)


    Not at all. You do not need to make any modifications to the hardware to use the 007 hack. If you have a memory card with the savegame on it, then you can simply copy that to the HD and load the game. This boots linux with an ftp server. You do NOT need to open the box or solder the pins; you only need to do that if you want to flash the TSOP and effectively mod the bios. Once you use the 007 trick you have temporary ftp access to the box - you can ftp over and replace the font files. Now the box is as good as modded and no one will know the difference. In addition this is safer than flashing the TSOP because the BIOS is simply intercepted in hardware.

    So in short - you can have a completley modded xbox without ever opening the cover.
  • by Babbster ( 107076 ) <aaronbabb&gmail,com> on Friday July 04, 2003 @02:43AM (#6365476) Homepage
    You're right about the Xbox Live changes to the dashboard, and there are more coming with Xbox Live "2.0" that's been announced. Then, you've got their music visualization/media player program (Music Mixer [xbox.com]) which is very likely going to make some changes to the dashboard.

    Of course, even beyond all that is the fact that every time you activate a connection to Xbox Live, it checks the XBL software and updates it if there have been any changes. It would be a trivial matter for them to use this feature to either incorporate a check to detect/disable the hack and /or implement a security fix to do the same even if the hack isn't already in use.

    The moral of the story? Probably not a good idea to use Xbox Live if you intend on using this particular exploit.

    The secondary moral? Microsoft really was thinking ahead when they decided to go with their own closed service for "all" (quotes added to acknowledge XBConnect, Gamespy Tunnel and the rest which use the system link functionality to get people hooked up over the net) online games.

  • by Nucleon500 ( 628631 ) <tcfelker@example.com> on Friday July 04, 2003 @02:44AM (#6365482) Homepage
    You either need 007 or a screwdriver. You just replace some files, which you can do either by using the 007 hack or switching HDs. Once the files are replaced, put the XBox back together, and it'll load whatever you want.
  • by Anonymous Coward on Friday July 04, 2003 @02:52AM (#6365510)
    It's not uuencoded, it's base64. But the uudecode tool will still know how to decode it.
  • Re:What the.. ? (Score:3, Informative)

    by Michael Hunt ( 585391 ) on Friday July 04, 2003 @03:05AM (#6365553) Homepage
    Yeah, note heavy sarcasm :) - I'm from Melbourne.

    I agree with your sentiments about local Fosters; it's shite. VB is likewise shite, however; most of the people I know drink either Boags or Cascade, as it is plentiful and relatively cheap (3 bucks odd for a pot, about 5 for a stubbie, bar prices.)

    Apparently export fosters is quite good. I'll have to go to america one day just to try it.

    I've barbequeued prawns before, the result is not worth the expense. I have no idea how prawns are meant to be cooked, but barbequeueing em just made black, crispy, carcinogenous prawns that tasted like arse.
  • by cyborch ( 524661 ) on Friday July 04, 2003 @03:07AM (#6365561) Homepage Journal

    As seen before [slashdot.org] microsoft does not like people who publish exploits. So I have made an off-US mirror [deck.dk] in a country where releasing exploits to the public is still legal [slashdot.org]...

  • by Anonymous Coward on Friday July 04, 2003 @03:08AM (#6365564)
    Habibi was the nick of the guy that originally discovered/publicized it.
  • Geography anyone? (Score:4, Informative)

    by Lispy ( 136512 ) on Friday July 04, 2003 @03:13AM (#6365585) Homepage
    For your Information:
    Austria [austria.gv.at]

    Australia [australia.com]

  • by wiggles ( 30088 ) on Friday July 04, 2003 @03:37AM (#6365668)
    Also from the DMCA:

    (f) Reverse Engineering. -

    (1)

    Notwithstanding the provisions of subsection (a)(1)(A), a person who has lawfully obtained the right to use a copy of a computer program may circumvent a technological measure that effectively controls access to a particular portion of that program for the sole purpose of identifying and analyzing those elements of the program that are necessary to achieve interoperability of an independently created computer program with other programs, and that have not previously been readily available to the person engaging in the circumvention, to the extent any such acts of identification and analysis do not constitute infringement under this title.
  • by rpresser ( 610529 ) <rpresser&gmail,com> on Friday July 04, 2003 @03:38AM (#6365669)
    1. You don't need to flash the rom to use the habibi 007 exploit. You can use the savegame, plus a USB memory card, plus a USB-to-xbox cable, to run linux on your xbox whenever you like. You have to boot 007 first in order to load linux, but that's merely an annoyance.
    2. Once you're in linux, IF you've soldered the motherboard, you can use a utility to flash the ROM. This is logically equivalent to installing a mod chip and flashing that; it just requires one less piece of hardware.
    3. The new hack's purpose is to have linux load instead of the dashboard when the xbox starts up, thus removing 007 from the step. Logically, however, we're still using a hack as a linux bootloader; the difference being that the dashboard itself loads the hack, rather than the 007 game.
    4. The 007 hack is one of a few possible springboards to implement the new hack; it happens to be one that does not require opening the case.
    5. Footnote: there is actually another game besides 007 Agent Under Fire -- MechAssault -- which has a similar vulnerability. So you have a choice of 3 linux bootloaders.
  • by Alsee ( 515537 ) on Friday July 04, 2003 @04:09AM (#6365780) Homepage
    integer underflow..?

    Here's a completely non-technical explanation:

    Think of it like a clock. The XBOX loads a number expecting it to be something like 10 minutes. It then subtracts 5 minutes and uses the number. But instead of giving it a number like 10 minutes you give it a number like 2 minutes. Then when the XBOX subtracts 5 from 2 it gets an underflow. It doesn't know about negative numbers. So what is does is it wraps around like a clock. If you look at the 2 minute mark on a clock, then count backwards 5 minutes where do you end up? You end up 3 minuts before the 12. That's 11 hours and 57 minutes. So XBOX thinks that 2 minus 5 equals 11 hours and 57 minutes.

    So by giving the XBOX a smaller number than it expects, and letting the XBOX make the number even smaller, it underflows - wraps around - to a really big number. That really big number tells the XBOX to load a HUGE amount of information. More than it's supposed to load. That means you can feed the XBOX any program you want and the XBOX will suck it up and run it.

    -
  • by smithwis ( 577119 ) on Friday July 04, 2003 @04:38AM (#6365842) Journal
    execute uudecode like such:

    $uudecode
    ouch, again, not double checking enough has bit me again. That should read
    $uudecode < xbox.64
  • by jwilson ( 38486 ) on Friday July 04, 2003 @05:17AM (#6365944)
    Mirrored all three links:

    full-disclosure [scrubbybubbles.com]

    zdnet [scrubbybubbles.com]

    statement [scrubbybubbles.com]

    Be kind. Rewind.

    Laren
  • by whaley ( 6071 ) <slashdot@hilvaren b e e k .net> on Friday July 04, 2003 @05:34AM (#6365991) Homepage
    That's buffer overflow. A buffer is some storage in memory with limited space. Overflow occurs when the program (is forced to) write data after the actual buffer. An integer is a number, and in computers numbers are represented by a limited amount of space (e.g. a byte, or a few bytes) so they can also overflow and underflow. Say the highest possible number is 65535, then adding one more will get you back to 0. Similarly, subtracting one from 0 will then get you 65535.
  • by KAMiKAZOW ( 455500 ) <kamikazow@hotmail.com> on Friday July 04, 2003 @05:57AM (#6366045)
    Sadly this is not funny, it's true. There's the new Copyright Directive in the European Union and the USA is ''exporting'' the DMCA to other countries like Singapore. [zdnet.co.uk]
  • Re:Woops, too late (Score:4, Informative)

    by gclef ( 96311 ) on Friday July 04, 2003 @06:44AM (#6366169)
    At some point Microsoft has got to get tired of all the stuff they go through and deploy some hackers themselves, to protect their interests.

    Microsoft is already doing this. One of the guys I used to work with in the security realm is now at Microsoft, checking for exploitable code & paths in Palladium. I expect he'll to see this & prevent it in any Trusted system release.
  • by Imperator ( 17614 ) <slashdot2 AT omershenker DOT net> on Friday July 04, 2003 @06:50AM (#6366186)
    That's a lie they love to tell. The US negotiates with terrorists all the time. Right now the Bush administration is engaged in intensive negotiations with several Palestinian terrorist groups. (And I'm not calling them terrorists because it's the US-Israeli line, but rather because they detonate bombs in places crowded with civilians.) We negotiate hostage exchanges, "disarmament" (cease fire) agreements, and much more. It all depends on how much we want the terrorists to cooperate. The US (and most other countries) have never had serious policies against negotiating with terrorists, no matter what their propaganda campaigns would like you to believe.
  • Re:honestly... (Score:4, Informative)

    by Avakado ( 520285 ) on Friday July 04, 2003 @08:34AM (#6366460)
    In many countries, and I believe in USA too, you don't have to accept a license you haven't signed. If you don't sign the license, you only have the rights copyright provides you, which for closed source software for home use usually is better than what the license provides you. These rights includes installing the software on every computer in your home, but not every one in your company. This means you're "owning" your copy of the product. I attended the trial against Jon Johansen (co-author and distributor of DeCSS), where he explained they had used an uncompression program rather than the installation program to install the Xing DVD tool, in order to avoid accepting the click-through license. The prosecutor accepted this reasoning. The defender later stated that restrictions printed on the outside of DVD covers were invalid as long as the buyer didn't sign an agreement in the store. This was also undisputed by the prosecutor.
  • by Hast ( 24833 ) on Friday July 04, 2003 @08:57AM (#6366540)
    To clarify the parent (which was completely correct AFAIK).

    The first hack allowed you to run unsigned code. You do this by loading a comprimised save game in one of the vulnerable games. ("007 Nightfire" or "Mechassult") This requires a memory card which has been altered on a PC, or that you have removed the HDD of the XBox which you want to compromise. (Obviously the memory card is easier, but they cost a few bucks.)

    In the compromised save game you put code you want to execute. In this case you could have it open an FTP server on the XBox. (This is the old hack.) After this you hook up the box to a PC and copy the files over using the FTP server. (This is the new hack.)

    Now reboot and you have a compromised XBox. (The first hack would require you to redo the hack each time you wanted access to the "backdoor".)
  • by k-hell ( 458178 ) on Friday July 04, 2003 @09:09AM (#6366580)
    See here [sourceforge.net]. ZDnet is also running a story here [zdnet.com.au]
  • Re:Woops, too late (Score:5, Informative)

    by Famatra ( 669740 ) on Friday July 04, 2003 @11:01AM (#6367163) Journal
    Up the Mod of the parent since it is entirely correct.

    They did not "blackmail", as the last Slashdot article ad-libbed in its summary, Microsoft but gave them every opportunity to cooperate in creating a signed Linux loader.

    As well the released code by X-Free does not allow you to pirate games. (Although by modifying their release and using their same technique it could be.)

    As well it must be remembered that there is no EULA for hardware, we are freely able to use hardware we bought anyway we choose to. As well, people are legally able to reverse engineer the hardware, much the same way that other game consoles (NES, SNES, N64, PSX) were reverse engineered to create emulators like BLEEM.

    P.S. Remember that it is likely the computer you are using now (IBM-CLONE) would not be here without the work of people reverse engineering the original IBM desktop computers.
  • now they respond (Score:2, Informative)

    by gotem ( 678274 ) on Friday July 04, 2003 @12:50PM (#6367838) Homepage Journal
    this has just arrived to the bugtraq mailing list:

    Periodically we hear people say they tried to contact Microsoft about a product or service vulnerability and that Microsoft didn't respond.
    We are concerned that people may not know how to report security vulnerabilities to Microsoft.

    The Microsoft Security Response Center investigates all reports of security vulnerabilities affecting Microsoft products. If you believe you have found a security vulnerability affecting a Microsoft product, we'd like to work with you to investigate it.

    You can contact the Microsoft Security Response Center by emailing secure@microsoft.com directly, or you can submit your report via our web-based vulnerability reporting form located at https://www.microsoft.com/technet/treeview/default .asp?url=/technet/se curity/bulletin/alertus.asp.

    Sincerely, Microsoft Security Response Center
  • by yerricde ( 125198 ) on Friday July 04, 2003 @01:40PM (#6368139) Homepage Journal

    And even if you are convicted of some sort of made up IP crime, you can always take the matter to the European Court of Human Rights, which pretty much always finds for the individual, because the EU Convention on Human Rights is a very broad and generous document.

    If the EU Convention on Human Rights is anything like the UN Universal Declaration of Human Rights [un.org], it includes something about copyright. Article 27 of the UDHR guarantees at least some semblance of copyright to adhering nations.

    Article 17 of the Charter of Fundamental Rights of the European Union [eu.int] states bluntly: "Intellectual property shall be protected."

  • by istartedi ( 132515 ) on Friday July 04, 2003 @01:48PM (#6368180) Journal

    The XBox isn't the only product with issues like this. Remember the EV-1 electric car? They wouldn't sell them to people, even though people wanted to buy them. They would only lease them, and they insisted on taking them back.

    Remember when Ma Bell owned your phone?

    Surely there are other examples of "lease only" hardware too.

    The real question is, "to what extent should lease-only hardware be permitted"? not "how do we stop this one company from releasing lease-only hardware?".

    Personally, I think there should be no such thing as lease-only hardware at the consumer level. It probably makes more sense at the corporate level, like, if you're leasing a drilling rig or something.

    OTOH, there are other less clear-cut cases. For example, is your credit card "hardware"? Not in the traditional sense, but the card is owned by the bank, and they can take it from you any time they like. How is that different from, for example... MS disabling your XBox remotely if you violate their TOS?

    We could make lease-only illegal by default and carve out exceptions for things like credit card issuers. Or, we could make lease-only legal by default and carve out exceptions for companies like MS.

    Actually, a more effective, and less ad-hoc reform might be to prohibit *any* legally declared monopoly from selling *any* product at a loss or under lease-only terms.

  • by Elm Tree ( 17570 ) on Friday July 04, 2003 @03:13PM (#6368585) Homepage
    But the beauty of this hack is that it exploits the fact that microsoft *did't* use encrytion on this one section of the machine. They check the SHA hash for everything except .wav and .ttf files, and by using a malformed font you can exploit a buffer trickyness to gain control of the machine.

He has not acquired a fortune; the fortune has acquired him. -- Bion

Working...