This article needs additional citations for verification .(March 2008) |
A softmod (short for software modification) is a method of using software to modify the intended behavior of hardware, such as computer hardware, or video game consoles in a way that can overcome restrictions of the firmware, or install custom firmware. [1]
Many softmods are exploits chained together. The first requirement is executing unsigned code, known as userland exploits. Internet Browsers are very common vectors for this, as WebKit is open-source and as a result, vulnerabilities are widely known. The second requirement is privilege escalation, known as kernel exploits, unlocking secure parts of the system. Depending on the security architecture, additional privilege escalation may be required, such as defeating a hypervisor.
Other examples of softmods are maliciously signed firmware, such as custom firmware on the PlayStation 3, which was made possible due to the master key being released, or gaining control of a process that is very early in the boot cycle, such as the Fusée Gelée Boot ROM vulnerability for the Nintendo Switch. This allowed for arbitrary code execution and also gaining control of every process on the system after it.
Softmods may be permanent (e.g. custom firmware) or temporary (e.g. homebrew enabler) that persist until reboot. Softmods are especially popular among video game consoles, in which they usually enable a homebrew environment that allow execution of unsigned code. Compared to installing a modchip, a softmod is usually preferred (if available) due to not requiring having to open up the device and perform soldering, which could damage the device hardware. However, attempting to softmod can still cause damage to the device especially if instructions are not followed correctly, potentially leading to bricking.
Softmods may be used to install an alternative operating system (e.g. a Linux distribution) on a device, as well as reinstate functionality that was removed from the official firmware, such as "OtherOS" on the PlayStation 3.
Softmods void warranty due to tampering with device function and as a result, vendors will not honour any existing warranty policy if sent in for repair.
Due to commonly being used to circumvent digital rights management, softmodding is seen as a tool to enable piracy, although the act of softmodding in itself may not be illegal.
In January 2011, security researcher Geohot and associates of the hacking group known as fail0verflow were sued by Sony for jailbreaking the PlayStation 3. [2] Sony and Geohot later settled the case out of court, with Geohot agreeing not to reverse engineer any Sony product in the future. [3]
In Japan, softmods were outlawed as part of new legislation in 2018 which made savegame editing and console modding illegal. [4]
The original PlayStation can be softmodded with the TonyHax exploit. [5] The exploit is compatible with all North American and European consoles except the launch model (SCPH-100x), but is not compatible with Japanese consoles. It is also compatible with early versions of the PlayStation 2 (SCPH-3900x or older), although only for booting PS1 discs. TonyHax can be booted either with a gamesave exploit (usually Tony Hawk's Pro Skater 2, 3, or 4, hence the name, but several other games are also supported), or except on the PS2, directly from a specially-flashed memory card. The exploit allows the console to boot homebrew, foreign-region games, and CD-R copies. Some PlayStation models are partially incompatible (slow load times, skipping audio and video) with phthalocyanine CD-Rs, preferring the older standard cyanine discs. TonyHax is not a permanent exploit; the drive is re-locked when the console is powered off or rebooted, requiring the user to re-load the exploit every time a CD-R or foreign game is booted.
An older method was to boot an original legitimate disc with the lid close sense button held down, quickly swap the disc with a CD-R copy or foreign disc, remove that disc and reinsert the original, and then swap for the CD-R or foreign disc again. This had to be carefully timed, and if done incorrectly could damage the drive or disc(s).
The PlayStation 2 has various methods of achieving a softmod.
Disc swapping was used early on to bypass the PlayStation 2 copy protection, by taking advantage of certain trigger discs such as 007: Agent Under Fire or Swap Magic, homebrew could be loaded. This was done by inserting the trigger disc, blocking the lid open sensor then hotswapping with a homebrew disc. Although difficult to execute correctly, the universality of the method was often used in order to softmod.
One of the earliest softmods developed — the Independence Exploit — allows the PlayStation 2 to run homebrew by exploiting a buffer overflow in the BIOS code responsible for loading original PlayStation games. This method, however, only works on models V10 and lower, excluding the PlayStation 2 slim, while still requiring a disc to be burned. [6]
FreeMcBoot is an exploit that works on all models except the SCPH-9000x series with BIOS v2.30 and up. [7] It requires no trigger disc and is able to directly load ELFs from the memory card.
Fortuna, Funtuna, and Opentuna are another form of memory card exploit. Unlike FreeMcBoot, they will work on the SCPH-9000x model, and they are compatible with third-party memory cards that do not support MagicGate.
HD Loader is an exploit for PS2 models with the hard drive peripheral.
FreeDVDBoot is an exploit discovered in 2020 that requires burning a disc image loaded with a payload onto a DVD-R. It is compatible with a range of PlayStation 2 models and works by exploiting a buffer overflow in the PS2's DVD video functionality. [8]
MechaPwn [9] is an exploit that permanently unlocks the DVD drive of the slim PS2 (and some later revisions of the fat PS2), allowing PS1 and PS2 discs from any region to be booted. PS1 CD-R copies can be booted directly from the PS2's built-in menu; PS2 CD-R/DVD-R copies require additional software to bypass the PlayStation 2 logo check.
In August 2024, a savegame exploit affecting multiple consoles and generations called TonyHawksProStrcpy [10] was released, which is present in multiple Tony Hawk's titles for the PlayStation 2. It can be used to execute unsigned code.
The PlayStation 3 has a couple of methods to achieve a softmod. All models of PS3 can be softmodded.
Consoles that have factory installed (minimum firmware) version 3.55 or lower can install CFW (custom firmware) which is unofficial firmware. This includes: all fat models, slim 20xx and 21xx models, and 25xx models - the latter only if the console was manufactured before December 2010 (date code 0D or less). These guidelines assume a console has not been taken to Sony to be serviced, as Sony may update the factory installed firmware. Slim 30xx and all super slim models cannot currently install CFW.
Installing CFW was made possible with code signing after the PS3's master key was leaked. [11] Sony changed the key with firmware 3.56. If a vulnerable console has official firmware above 3.55 installed, the flash can be patched via a WebKit exploit which enables a CFW install. Should the patching process be interrupted (e.g. power outage), it can brick the console.
CFW grants complete control over the console, having access to LV0 (bootloader), LV1 (hypervisor), and LV2 (kernel/GameOS). This allows the running of homebrew, load game backups, bypass region checks, enter Factory Service Mode, change fan and RSX (GPU) speeds, overclock the RSX, grant access to root keys, as well as run PS2 ISOs on unsupported backwards compatible models (via software emulation). Some CFW implementations reinstate features Sony removed such as "OtherOS".
The most supported PS3 CFW is Evilnat Cobra. [12]
The other softmod is PS3HEN [13] (HEN). HEN is supported by all PS3 models. In order to use HEN, it is required to install HFW (hybrid firmware), another kind of unofficial firmware. During the HEN setup process, a WebKit exploit is used to install a signed file through the PS3 Web Browser which sets up HEN on the PS3's storage. This adds a shortcut to enable HEN whenever the console is powered on, which leverages additional exploits to grant LV2 kernel/GameOS access. As such, this is a tether softmod, meaning HEN has to be activated every time the console is powered on. This softmod shares core CFW features - running homebrew, load backups of games, bypass region checks, change fan speeds, and play installed PS2 Classics PKGs. The unofficial PS2 backwards compatibility is diminished as users can only run PS2 Classics encrypted PKGs instead of ISOs.
With HEN, the hypervisor is still active and periodically checks if the current code being executed is unsigned; there is a small chance it can lead to the console becoming unresponsive or shutting down, making HEN less stable than CFW.
The PlayStation 4 has ways to achieve a softmod. Most rely on WebKit vulnerabilities in the PS4 Web Browser combined with a kernel exploit. All models of PS4 can be softmodded. They are all tether exploits meaning they have to be performed every time the console is powered on, although some exploits may be persisted using rest mode.
Softmodding a PS4 allows users to run homebrew, load game backups, bypass region checks, and change fan and CPU/GPU speeds. Some payloads can boot the PS4 into a Linux distribution, although this is not permanent and the console will revert to Orbis OS on reboot.
Notable firmware revisions that result in a softmod are: 1.76, [14] 4.05, [15] [16] 4.74, 5.05/5.07, [17] 6.72, [18] 7.02, [19] 7.55, [20] 9.00, [21] 11.00, [22] with 5.05/5.07 being the most stable and 9.00 the most stable after that. It is worth noting the 9.00 exploit requires inserting a specially crafted USB flash drive into the console, and the 11.00 exploit to connect to a malicious PPPoE server over the network.
The PlayStation 5 has ways to achieve a softmod. They rely on a userland exploit, which can be either WebKit vulnerabilities in the PS5 Web Browser, a specially crafted Blu-ray disc, or a savegame exploit, that is combined with a kernel (and optionally hypervisor) exploit. They are all tether exploits meaning they have to be performed every time the console is powered on, although some exploits may be persisted using rest mode.
Softmodding a PS5 allows running homebrew, load game backups, modify the PS4 backwards compatibility blacklist, install and run PS4 "FPKGs" (including PS4 homebrew and PS1/PS2/PS4 game backups), change fan speeds, and spoof firmware (which allows the install of games that require an update patch, and can also block updates). However, firmware spoofing will not allow games above the console's true firmware revision to load without the required update patch. The PS5 is also capable of playing patched PS4 titles above the PS4 frame rate cap of 60 FPS, such as Bloodborne, at higher frame rates e.g. 120 FPS.
Compared to its predecessor the PS4, a userland and kernel exploit would have been enough to accomplish what is generally regarded as a true jailbreak by patching the kernel, however the PS5 has added security measures in comparison, mainly a HV and XOM which do not allow kernel patching without a hypervisor (HV) exploit - not all kernel exploits on the PS5 can be leveraged due to these additional measures, and makes reverse engineering much more difficult. Despite this, several HENs (Homebrew ENablers) have been made that operate within the constraints of the HV and XOM to defeat enough security to enable a homebrew environment. After the first HV exploit became public in October 2024, HENs were adjusted to operate with the HV compromised (including the XOM being deactivated), providing better stability and functionality than HENs that don't leverage a HV exploit.
Firmware up to 2.50 [23] is vulnerable to a userland, kernel, and hypervisor exploit chain. Firmware up to 7.61 [24] [25] [26] is vulnerable to a userland and kernel exploit chain.
The IPv6 kernel exploit on the PS4 that led to the 6.72 jailbreak [18] was patched a few months prior to the release of the PS5, which was reintroduced on the PS5 with 3.00 firmware and affected up to 4.51 firmware. The exFAT filesystem kernel exploit that led to the 9.00 jailbreak [21] also affected PS5 firmware up to 4.03, however due to additional protections on the PS5 it is not possible to use this to softmod the PS5. The PPPoE kernel exploit that led to the PS4 11.00 jailbreak [22] also affected PS5 firmware up to 8.20, and is not known to softmod the PS5.
In June 2023, a payload called libhijacker [27] was disclosed, becoming a reliable method of running homebrew and partially circumvents the HV, which works by creating a new, separate process by interacting with the PS5's Daemon, effectively acting as a background ELF loader. This is notable over previous ELF loaders such as the WebKit or Blu-ray methods since those ELF loaders were terminated when the corresponding process was stopped. Another advantage of this new method is that the newly separate process is not confined to the fixed maximum resource allocation of the WebKit or BD-J processes.
In July 2023, security researcher Flat_z disclosed [28] that they had read access to the PS5's Platform Secure Processor (PSP) which is one of the most protected parts of the system and contains crucial keys for decryption. In addition, they also confirmed they had successfully exploited the HV via a save game exploit chain. Flat_z said he does not intend to disclose his findings publicly, however he is using these exploits to further reverse engineer the PS5 now that he is able to decrypt more parts of the system.
In November 2023, scene developer LightningMods disclosed [29] that they had managed to load and play a retail PS5 game backup.
In December 2023, scene developer LightningMods updated his Itemzflow [30] homebrew to support loading PS5 game backups.
In September 2024, a kernel exploit was disclosed for FreeBSD 11, which the PS5 software is based on. It can be leveraged on the PS5, which affects all firmware versions up to 7.61. [24] The bug is not present in FreeBSD 9 and as such the PS4 is unaffected.
In October 2024, security researcher SpecterDev disclosed [23] the first public exploit chain that compromises the hypervisor, which affects all firmware versions up to 2.50.
Much like the Xbox, it is possible to softmod almost any PSP. Using various exploits (such as the TIFF exploit or specially crafted savegames from games such as Grand Theft Auto: Liberty City Stories , Lumines , and later GripShift ) or original unprotected firmware, the user can run a modified version of the PSPs updater, that will install custom firmware. This newer firmware allows the booting of ISOs, as well as running unauthorized (homebrew) code. A popular way of running homebrew code to softmod the PSP is by using the Infinity method.
This section is empty. You can help by adding to it. (December 2023) |
The PlayStation Vita can also be softmodded, with the most notorious methods being using: HENkaku Web Exploit, h-encore and h-encore².
Xbox used to include a font exploit installed through exploits in savegame code for MechAssault , Splinter Cell , 007: Agent Under Fire , and Tony Hawk's Pro Skater 4 . Usage of the Splinter Cell or Tony Hawk's Pro Skater 4 disc is generally recommended as any version of the game will run the exploit, whereas certain production runs of Mechassault and Agent Under Fire are needed to use the exploit. Originally, via a piece of software called "MechInstaller" created by members of the Xbox-linux team, an additional option could be added to the Xbox Dashboard for booting Linux.
The font hack works by exploiting a buffer underflow in the Xbox font loader which is part of the dashboard. Unfortunately, since the Xbox requires the clock to be valid, and the dashboard itself is where one sets the clock, there is a problem if the RTC backup capacitor discharges. The Xbox will detect that the clock is not set and therefore force the dashboard to be loaded; the dashboard then reboots due to the buffer overflow exploit. Upon restarting, the Xbox detects the clock is invalid and the process repeats. This problem became known as the "clockloop". [31]
In August 2024, a savegame exploit affecting multiple consoles and generations called TonyHawksProStrcpy [10] was released, which is present in multiple Tony Hawk's titles for the Xbox. It can be used to execute unsigned code.
Shortly after the release of the Xbox 360, ways were found to modify the firmware of the DVD drive of the console. This allows the system to play games from "backup" (non-original) game discs. This requires opening of the console but no additional hardware such as a modchip is permanently installed into the system. Microsoft responded by introducing console ban system. If the data stream from the DVD drive indicated signs of unauthorized use, Microsoft would permanently ban the console from using Xbox Live service. The ban never expires and can only be fixed by purchasing another console. Other measures, such as introducing new hardware revisions to prevent modifications and checking/updating the drive firmware during dashboard updates, have been made too.
In August 2024, a savegame exploit affecting multiple consoles and generations called TonyHawksProStrcpy [10] was released, which is present in Tony Hawk's American Wasteland for the Xbox 360. It can be used to execute unsigned code. If used on a console with a dashboard version of 2.0.4548.0 or lower, it is possible to also chain a known hypervisor exploit and gain full control over the console. However, this is a very old update dating back to November 2006 and not readily available for most users, usually requiring downgrading which is not a simple process.
The Xbox One went through its lifecycle without having its security compromised. However, in June 2024, a userland exploit was disclosed for a Microsoft Store app called Game Script that had a bug which allowed for arbitrary code execution. Microsoft removed the app from the store a few days after disclosure, effectively patching the vulnerability for those who did not have it downloaded already.
A couple of weeks later, the same developer who published the userland exploit released a follow-up release which achieves kernel access while in Retail mode. This is roughly equivalent in functionality if the console was in Developer mode. Due to the Xbox One's security architecture, the console security is still mostly intact and further mitigations are necessary in order to become a HEN (homebrew enabler).
A payload exists that starts a reverse shell on the console over the network, which for example can be used to browse the console's filesystem and create directories.
The Xbox Series X and Series S are vulnerable to the same exploits for the Xbox One, and similarly have security measures where the console security is still mostly intact and further mitigations are necessary in order to become a HEN (homebrew enabler).
In August 2024, a savegame exploit affecting multiple consoles and generations called TonyHawksProStrcpy [10] was released, which is present in multiple Tony Hawk's titles for the GameCube. It can be used to execute unsigned code.
The first known softmod for the Wii is known as the Twilight hack, [32] a savegame exploit for the Wii version of The Legend of Zelda: Twilight Princess. This allowed users to run unsigned code .dol/.elf files.
The Twilight hack was superseded by the development of Bannerbomb, which allowed for executing unsigned code without relying on an exploit within a game. Bannerbomb worked by using a malformed banner to inject a loader program into the Wii Menu program in memory. As the Wii Menu crashed, an unsigned executable was executed.
Bannerbomb was superseded by Letterbomb, [33] which used a glitch in the Wii Message Board to crash the Wii Menu.
FlashHax [34] superseded Letterbomb, which used an exploit in the Wii's End-user license agreement to run unsigned code, requiring the Internet Channel to be installed.
str2hax [35] superseded FlashHax, which simplified the process even further. str2hax uses a custom DNS server to redirect the Wii's End-user license agreement page to a modified page that executes unsigned code, without the need for the Internet Channel.
BlueBomb [36] was later released that leveraged a Bluetooth exploit, in particular used to softmod the Wii Mini which could not use the Internet Browser as an exploit entry point.
Exploits typically allowed the install of the Homebrew Channel, an unofficial Wii channel which acted as a gateway to run unofficial Wii applications.
A large homebrew community emerged for the Wii, leading to developments such as the Homebrew Channel, third-party games, media players, and the loading of Wii and GameCube game backups.
The Wii U can be softmodded with various exploits. As of February 2024 the easiest way to softmod a Wii U is by using the DNSpresso exploit which leverages several bugs in the network stack, and achieves kernel access, in addition to having a specially crafted SD card inserted. This works on the latest firmware revisions. This in turn can be used to install CFW (custom firmware). Currently the most supported CFW is Aroma. Other choices of CFW are Mocha, Haxchi, and Tiramisu.
Softmodding a Wii U allows users to run homebrew, load game backups, bypass region checks, and change fan and CPU/GPU speeds. Notably, the Wii U is backwards compatible with Wii games (vWii), however softmodding also unlocks backwards compatibility with GameCube games like its predecessor, as the hardware required to emulate is present on the motherboard - despite this, Nintendo did not implement GameCube disc reading for the Wii U, effectively disabling this backwards compatibility.
USB storage can be used to store games; this is the only way to store and play Wii U games outside of the internal memory. Wii and GameCube games can be played if stored on the specially crafted SD card used to softmod the Wii U, or if they are stored on USB storage.
Previously, a few Virtual DS games could be exploited with specially crafted savegames to install a permanent CFW which is active as soon as the console powers on. However, after the eShop closure this method is now impossible to do unless the game was downloaded pre closure.
All versions of the Nintendo DS as well as the Nintendo DS Lite can be softmodded using FlashMe: an exploit that can be installed using any PassMe compatible flashcart. The exploit consists of shorting two pins with any metallic object to make the NAND containing the firmware writable. The custom firmware looks and acts exactly the same as the original DS firmware except for the fact you will not need a PassMe or Passcard to boot DS roms from Slot-2 flashcarts anymore. The standard version of FlashMe removes the DS intro screen (including the Warning screen) when booting up. [37]
This section is empty. You can help by adding to it. (September 2024) |
The Nintendo 3DS (and its Nintendo 2DS sibling) have become some of the most popular console platforms to softmod, as the procedure requires only the 2DS/3DS itself, and modifying its microSD card. All models of 3DS and 2DS can be softmodded, including the 'New' refresh models. Since the closure of the Nintendo eShop for the 2DS/3DS, softmodding has become popular in order to reinstate features that are now officially defunct.
The most well developed and commonly used CFW (Custom Firmware) is known as Luma3DS. It contains features such as EmuNAND (NAND redirection), running non-system menu payloads on boot, and installing homebrew titles to the main menu. A popular homebrew app used for piracy, known as Freeshop, [38] was shut down by Nintendo with firmware 11.8 by requiring a title key authorization on the Eshop download servers, thus making all NUS downloaders [39] for the 2DS/3DS to no longer function.
Early versions of the Nintendo Switch known as "V1 Unpatched" are vulnerable to a ReCovery Mode (RCM) hardware exploit [40] by holding the Volume Up button, Power button, and Tegra home button (not usually accessible to consumers), which boots the device into RCM, then connecting via USB to another device which is able to push payloads. Tegra refers to the chip the Nintendo Switch uses, the Tegra X1. This was an oversight as RCM was intended to be used by Nintendo to service consoles and not the consumer themselves. It was discovered the Tegra home button could be emulated by shorting pin 10 on the right JoyCon rail, initializing RCM. Once in this mode, an additional exploit in the Switch USB drivers can be leveraged to push payloads via USB to a Switch while in RCM to execute unsigned code, such as install CFW (custom firmware). The RCM exploit is hardware based and cannot be patched by software fixes.
Some firmware revisions have had a limited number of softmods emerge, although if updated the exploits will have been patched.
The softmods allow running homebrew, installing CFW (RCM exploit), bypass region checks, load game backups, and change fan and CPU/GPU speeds. With the RCM exploit it is also possible to install an Android distribution as an additional boot option, in which the device becomes much more versatile for cross platform play (such as the Xbox Game Pass), allowing games from other platforms to be played. The JoyCons are fully functional in an Android environment, making it a strong competitor for tablet gaming.
The most supported Nintendo Switch CFW is Atmosphère. [41]
Nintendo has put safeguards in place where if a console tries to connect to a Nintendo server with a modified bootloader, or an unauthorised copy of a game is currently loaded, the device will be either bricked instantly, or eventually bricked after sending telemetry data to Nintendo servers. Once bricked, the console will be fingerprinted by Nintendo and will never be able to access a Nintendo server again, blocking access to the eShop, online play, amongst other features.
In December 2023, a group of hackers unveiled the first flash cartridge for the Switch, dubbed the Mig Switch. This cartridge accepts a microSD card that contains game backups, and the user can alternate between the loaded game by re-inserting the cartridge. It is not currently known if backup games loaded via the cartridge will risk the console being banned if the user is online. Mig Switch works on all models and firmware, partially defeating some of the security in order to play game backups, and also run homebrew.
Some DVD drives, such as those made by Lite-on, can be softmodded to ignore region coding, allow clearing of the drive's learned media calibration data, and enable DVD+R to DVD-ROM book type coding that is persistent across reboots. This is distinct from cross-flashing the drive or installing unofficial firmware, and does not modify the drive's firmware. [42]
A modchip is a small electronic device used to alter or disable artificial restrictions of computers or entertainment devices. Modchips are mainly used in video game consoles, but also in some DVD or Blu-ray players. They introduce various modifications to its host system's function, including the circumvention of region coding, digital rights management, and copy protection checks for the purpose of using media intended for other markets, copied media, or unlicensed third-party (homebrew) software.
A regional lockout is a class of digital rights management preventing the use of a certain product or service, such as multimedia or a hardware device, outside a certain region or territory. A regional lockout may be enforced through physical means, through technological means such as detecting the user's IP address or using an identifying code, or through unintentional means introduced by devices only supporting certain regional technologies.
Action Replay is the brand name of a cheating device created by Datel. The Action Replay is available for many gaming systems including the Nintendo DS, Nintendo DSi, Nintendo 3DS, PlayStation Portable, PlayStation 2, GameCube, Game Boy Advance, and the Xbox. The name is derived from the first devices’ signature ability to pause the execution of the software and save the computer's state to disk or tape for future “replay”. The ability to manipulate the contents of memory in this paused state permitted the cheat functions for which the brand is now better known.
Privilege escalation is the act of exploiting a bug, a design flaw, or a configuration oversight in an operating system or software application to gain elevated access to resources that are normally protected from an application or user. The result is that an application or user with more privileges than intended by the application developer or system administrator can perform unauthorized actions.
Homebrew, when applied to video games, refers to software produced by hobbyists for proprietary video game consoles which are not intended to be user-programmable. The official documentation is often only available to licensed developers, and these systems may use storage formats that make distribution difficult, such as ROM cartridges or encrypted CD-ROMs. Many consoles have hardware restrictions to prevent unauthorized development.
HD Loader is a program for the PlayStation 2 video game console which allows users to play games installed on the optional hard drive peripheral via PlayStation 2 Network Adaptor. The games can be copied to the hard drive from within the program, or by using a computer with image dumping software that outputs to a specific custom format.
Xbox Linux was a project that ported the Linux operating system to the Xbox video game console. Because the Xbox uses a digital signature system to prevent the public from running unsigned code, one must either use a modchip, or a softmod. Originally, modchips were the only option; however, it was later demonstrated that the TSOP chip on which the Xbox's BIOS is held may be reflashed. This way, one may flash on the "Cromwell" BIOS, which was developed legally by the Xbox Linux project. Catalyzed by a large cash prize for the first team to provide the possibility of booting Linux on an Xbox without the need of a hardware hack, numerous software-only hacks were also found. For example, a buffer overflow was found in the game 007: Agent Under Fire that allowed the booting of a Linux loader ("xbeboot") straight from a save game.
PlayStation Portable homebrew refers to the process of using exploits and hacks to execute unsigned code on the PlayStation Portable (PSP).
Import gamers are a subset of the video game player community that take part in the practice of playing video games from another region, usually from Japan where the majority of games for certain systems originate.
Free60 is the successor to the Xbox Linux Project that aims to put Linux, BSD, or Darwin on the Microsoft Xbox 360 using a software or hardware based "hack". The Xbox 360 uses hardware encryption and will not run unsigned code out of the box.
The PlayStation 3 system software is the updatable firmware and operating system of the PlayStation 3. The base operating system used by Sony for the PlayStation 3 is a fork of both FreeBSD and NetBSD known internally as CellOS or GameOS. It uses XrossMediaBar as its graphical shell.
The PlayStation Portable system software is the official firmware for the PlayStation Portable (PSP). It uses the XrossMediaBar (XMB) as its user interface, similar to the PlayStation 3 console.
The Wii system software is a discontinued set of updatable firmware versions and a software frontend on the Wii home video game console. Updates, which could be downloaded over the Internet or read from a game disc, allowed Nintendo to add additional features and software, as well as to patch security vulnerabilities used by users to load homebrew software. When a new update became available, Nintendo sent a message to the Wii Message Board of Internet-connected systems notifying them of the available update.
A video game console emulator is a type of emulator that allows a computing device to emulate a video game console's hardware and play its games on the emulating platform. More often than not, emulators carry additional features that surpass limitations of the original hardware, such as broader controller compatibility, timescale control, easier access to memory modifications, and unlocking of gameplay features. Emulators are also a useful tool in the development process of homebrew demos and the creation of new games for older, discontinued, or rare consoles.
The hacking of consumer electronics is a common practice that users perform to customize and modify their devices beyond what is typically possible. This activity has a long history, dating from the days of early computer, programming, and electronics hobbyists.
The Nintendo 3DS system software is an updatable operating system used for the Nintendo 3DS handheld system. The Nintendo Switch system software is believed to have evolved from the Nintendo 3DS operating system.
The PlayStation 4 system software is the updatable firmware and operating system of the PlayStation 4. The operating system is Orbis OS, based on FreeBSD 9.
Homebrew software was first run on the PlayStation 3 by a group of hackers under the name "Team Ice" by exploiting a vulnerability in the game Resistance: Fall of Man. Following various other hacks executed from Linux, Sony removed the ability to install another operating system in the 3.21 firmware update. This event caused backlash among the hacker communities, and eventually the group Fail0verflow found a flaw in the generation of encryption keys which they leveraged to restore the ability to install Linux. George Hotz (Geohot), often misattributed as the genesis of homebrew on the PS3, later created the first homebrew signed using the private "metldr" encryption key which he leaked onto the internet. Leaking the key led to Hotz being sued by Sony. The court case was settled out of court, with the result of George Hotz not being able to further reverse engineer the PS3.
Custom firmware, also known as aftermarket firmware, is an unofficial new or modified version of firmware created by third parties on devices such as video game consoles, mobile phones, and various embedded device types to provide new features or to unlock hidden functionality. In the video game console community, the term is often written as custom firmware or simply CFW, referring to an altered version of the original system software inside a video game console such as the PlayStation Portable, PlayStation 3, PlayStation Vita/PlayStation TV, PlayStation 4, Nintendo 3DS, Wii U and Nintendo Switch. Installing custom firmware on some devices requires bootloader unlocking.
Game development kits (GDK) are specialized hardware and software used to create commercial video games for game consoles. They may be partnered with game development tools, special game engine licenses, and other middleware to aid video game development. GDKs are typically not available to the public, and require game developers to enter an agreement, partnership, or program with the hardware manufacturer to gain access to the hardware. As console generations pass, development kits often get sold through websites like eBay without repercussions. This is often because the console manufacturers discontinue certain development programs as time passes.
{{cite news}}
: CS1 maint: url-status (link){{cite news}}
: CS1 maint: url-status (link){{cite news}}
: CS1 maint: url-status (link){{cite news}}
: CS1 maint: url-status (link){{cite news}}
: CS1 maint: url-status (link){{cite news}}
: CS1 maint: url-status (link)