The iPhone Wiki is no longer updated. Visit this article on The Apple Wiki for current information. |
Difference between revisions of "Nuit du hack 2010"
(initial page) |
(updated old links) |
||
Line 9: | Line 9: | ||
==Links== |
==Links== |
||
* [http://nuitduhack.com/ Official website] |
* [http://nuitduhack.com/ Official website] |
||
− | * [http:// |
+ | * [http://2010.nuitduhack.com/slides/2010/night_da_hack_talk.pdf PDF Slides] |
− | * [http://www.nuitduhack.com/slides/2010/night_da_hack_talk.pdf PDF Slides] |
||
* [http://www.dailymotion.com/video/xdsqmy_pcgen-fr-conference-geohot-nuit-du_videogames/ Video on DailyMotion] |
* [http://www.dailymotion.com/video/xdsqmy_pcgen-fr-conference-geohot-nuit-du_videogames/ Video on DailyMotion] |
||
* [http://www.youtube.com/watch?v=0NValNoW5Rc Another video on YouTube] |
* [http://www.youtube.com/watch?v=0NValNoW5Rc Another video on YouTube] |
Revision as of 11:48, 12 August 2011
"Night da Hack" comes from a rough translation from French "Nuit du Hack". Started in 2003 by Hackerz Voice team, and inspired by world famous DEF CON, "Nuit du Hack" is one of the oldest French underground hacking conference. (from its homepage)
At the conference 2010, which took place the 19 June 2010, geohot held a speech about embedded security and told some things about the iPhone, although this speech was more general about embedded systems and mainly for the PS3 hacking. One interesting thing is a mathematical approach to crack the RSA signing using the Bleichenbacher attack (used for unlocking a Nokia phone). At the conference geohot mentioned the term "pwned 4 life", which got famous afterwards.
English description of the presentation
The PS3 has been considered unbreakable for 3 years, during which it has not been affected by piracy. On 23 January 2010, and after 5 weeks of research, George Hotz claimed on his blog: "I have read/write access to the entire system memory, and HV level access to the processor. In other words, I have hacked the PS3." In this conference, the author will explain security mechanisms enforced by Sony to protect the console, and how to bypass them.
Links
- Official website
- PDF Slides
- Video on DailyMotion
- Another video on YouTube
- Another YouTube video part 1 and part 2
- Another (or same?) video on a chinese site
Transcript
(not done yet)