The Hidden Boot Code of the Xbox 284
Device666 writes "In order to lock out both copied games as well as homebrew software, including the GNU/Linux operating system, Microsoft built a chain of trust on the Xbox reaching from the hardware to the execution of game code, in order to avoid the infiltration of code that has not been authorized by Microsoft. The link between hardware and software in this chain of trust is the hidden "MCPX" boot ROM. The principles, the implementations and the security vulnerabilities of this 512 bytes ROM will be discussed in this wikipedia article entitled
How to fit three bugs in 512 bytes of security code."
This is not a wikipedia article... (Score:3, Interesting)
You'd expect "editing" to catch something like that...
Re:Why?! (Score:5, Interesting)
Re:Why?! (Score:3, Interesting)
Re:Why?! (Score:5, Interesting)
What I have a problem with is the law that says I can't try to break the lock on something I own. I have a problem with the law that says I can't talk about this activity.
Now, I prefer to buy robust, user-modifiable devices. I will spend my dollars on my preference. I worry about the marketplace being dominated by TCPA devices, but I don't have a philosophical objection to those things existing.
The DMCA is just beginning to effect our lives. Give it another ten years to poison "intellectual property". If people own ideas, enforcement can only come in the form of thought control.
An actual on-topic comment (Score:5, Interesting)
So my question is, how did the hackers who reverse engineered this code conclude that it was supposed to trigger an exception? It seems hard for me to believe that the MS engineers would base their entire security mechanism on a feature of the CPU that didn't actually exist.