PlayStation 3 Jailbreak

Last updated

A PS Jailbreak USB dongle PS Jailbreak usb.jpg
A PS Jailbreak USB dongle

PlayStation 3 Jailbreak was the first USB (Universal Serial Bus) chipset that allowed unauthorized execution of code, similar to homebrew, on the PlayStation 3. It works by bypassing a system security check using a memory exploit (heap overflow) which occurs with USB devices that allows the execution of unsigned code.

Contents

Exploit

The underlying exploit and inner workings of the PlayStation 3 Jailbreak have been entirely reverse engineered [1] and reimplemented through the open source PSGroove. [2]

Through analysis of USB traffic to and from the PS3 Jailbreak, it was found that the device induced a heap overflow in kernel-space memory to trigger execution of untrusted code. [1]

Legality

Sony had taken a few steps to prevent the jailbreak of the PlayStation 3, and has associated the action as a form of copyright infringement. In eastern European countries, no action has ever been taken to condemn such cases.

The cases listed below are lawsuits Sony filed in courts to prohibit the sales and imports of circumvention devices that would jailbreak the system.

See also

References

  1. 1 2 "PSJailbreak Exploit Payload Reverse Engineering - PS3 Developer wiki". www.psdevwiki.com. Retrieved August 8, 2023.
  2. "PSGroove - PS3 Developer wiki". www.psdevwiki.com. Retrieved August 8, 2023.
  3. "PSJailbreak banned in Australia". MCV. Retrieved November 30, 2025.
  4. Mark_Raby (December 18, 2010). "Powned: Sony ordered to pay restitution to PS Jailbreak seller in Spain". gamesradar. Retrieved November 14, 2021.
  5. "Sony and Hotz settle hacking case". BBC News. April 12, 2011. Retrieved November 14, 2021.
  6. Kravets, David. "Judge Lets Sony Unmask Visitors to PS3-Jailbreaking Site". Wired. ISSN   1059-1028 . Retrieved November 14, 2021.