Difference between revisions of "Nuit du hack 2010"

From The iPhone Wiki
Jump to: navigation, search
(removed invalid links)
m (remove ignored DISPLAYTITLE)
 
(3 intermediate revisions by one other user not shown)
Line 1: Line 1:
{{DISPLAYTITLE:Nuit du Hack 2010}}
 
 
"Night da Hack" comes from a rough translation from French "Nuit du Hack". Started in 2003 by Hackerz Voice team, and inspired by world famous [[DEF CON]], "Nuit du Hack" is one of the oldest French underground hacking conference. (from its homepage)
 
"Night da Hack" comes from a rough translation from French "Nuit du Hack". Started in 2003 by Hackerz Voice team, and inspired by world famous [[DEF CON]], "Nuit du Hack" is one of the oldest French underground hacking conference. (from its homepage)
   
At the conference 2010, which took place the [[Timeline#June|19 June 2010]], [[User:Geohot|geohot]] held a speech about embedded security and told some things about the iPhone, although this speech was more general about embedded systems and mainly for the PS3 hacking. One interesting thing is a mathematical approach to crack the RSA signing using the [http://en.wikipedia.org/wiki/Daniel_Bleichenbacher Bleichenbacher attack] (used for unlocking a Nokia phone). At the conference [[User:Geohot|geohot]] mentioned the term "[[pwned 4 life]]", which got famous afterwards.
+
At the conference 2010, which took place the [[Timeline#June_12|{{date|2010|06|19}}]], [[User:Geohot|geohot]] held a speech about embedded security and told some things about the iPhone, although this speech was more general about embedded systems and mainly for the PS3 hacking. One interesting thing is a mathematical approach to crack the RSA signing using the [http://en.wikipedia.org/wiki/Daniel_Bleichenbacher Bleichenbacher attack] (used for unlocking a Nokia phone). At the conference [[User:Geohot|geohot]] mentioned the term "pwned 4 life", which got famous afterwards.
   
 
==English description of the presentation==
 
==English description of the presentation==
The PS3 has been considered unbreakable for 3 years, during which it has not been affected by piracy. On 23 January 2010, and after 5 weeks of research, George Hotz claimed on his blog: "I have read/write access to the entire system memory, and HV level access to the processor. In other words, I have hacked the PS3." In this conference, the author will explain security mechanisms enforced by Sony to protect the console, and how to bypass them.
+
The PS3 has been considered unbreakable for 3 years, during which it has not been affected by piracy. On {{date|2010|01|23}}, and after 5 weeks of research, George Hotz claimed on his blog: "I have read/write access to the entire system memory, and HV level access to the processor. In other words, I have hacked the PS3." In this conference, the author will explain security mechanisms enforced by Sony to protect the console, and how to bypass them.
   
 
==Links==
 
==Links==

Latest revision as of 04:48, 27 February 2022

"Night da Hack" comes from a rough translation from French "Nuit du Hack". Started in 2003 by Hackerz Voice team, and inspired by world famous DEF CON, "Nuit du Hack" is one of the oldest French underground hacking conference. (from its homepage)

At the conference 2010, which took place the 19 June 2010, geohot held a speech about embedded security and told some things about the iPhone, although this speech was more general about embedded systems and mainly for the PS3 hacking. One interesting thing is a mathematical approach to crack the RSA signing using the Bleichenbacher attack (used for unlocking a Nokia phone). At the conference geohot mentioned the term "pwned 4 life", which got famous afterwards.

English description of the presentation

The PS3 has been considered unbreakable for 3 years, during which it has not been affected by piracy. On 23 January 2010, and after 5 weeks of research, George Hotz claimed on his blog: "I have read/write access to the entire system memory, and HV level access to the processor. In other words, I have hacked the PS3." In this conference, the author will explain security mechanisms enforced by Sony to protect the console, and how to bypass them.

Links

Transcript

(not done yet)