Sony Meets With Famous PS3 Hacker GeoHot

People might not remember, but around this time last year there was a massive news story breaking involving Sony and this person who went by the handle of GeoHot (real name George Hotz).  Long story short, George managed to hack the Sony system to give people direct root access to the system—something that basically means that it can emulate whatever the user wants.  There was a lawsuit, some additional hacking to the network in protest, and it all ended up with George getting a great job at Facebook to try and make sure the same thing didn’t happen there.

Well just this week Mr. Hotz sat down with a large group of engineers to talk about what they could do to make Sony, their network, and future products even safer.  Interestingly enough GeoHot has received enough notoriety since the lawsuit that this meeting alone warranted an interview with some rather important newspapers (namely The New York Post).  Directly after this case broke Hotz was quoted repeatedly saying that he would be more than happy to go and work with Sony to try and prevent this kind of thing from happening, and as odd as that sounds that kind of thing is what ends up happening 9 times out of 10 with these kinds of events.

Source: The New Yorker (via gamezone)

US Government Pays Company to Hack Game Consoles

The US Navy is paying big bucks to find out how to hack game consoles.  How much?  How about $177,237.50, to be exact.  This is the payout the Navy is handing to a company called “Obscure Technologies”, in order to find a method to monitor several different kinds of game consoles.

The Navy claims they are doing this to find “sensitive” information that may be communicated using game consoles.  They also claim that they will only do this overseas, because the current laws do not allow monitoring of “US persons.”  Does the military really think that terrorists are using in game chat to plan attacks against America?  Do terrorists even play video games?  Either way, US tax dollars have already been spent on those questions.


5% Chance on Hacking a System Due to Common Password

Good news for people looking into hacking into any system that there is, out of a ton of people polled over 5% of them all chose the same password.  The best part of the entire experience, the erroneous code was simply Password1.  Granted, it is easy to remember, is long enough to pass most filters, and has a capital letter and number.  Thankfully the place I work for wouldn’t allow it simply because there is two of the same letter in it.  I just want to know how not clever 5% of the population feel right now.

What I really want to know is who takes a survey that asks for your user password.  I don’t know about most people out there, but almost everything that I have that even requires a password flat out says that tech support will never ask for the password to my account—giving it to someone who claims to be doing a “survey” just sounds like a straight up scam.  All I need to do now is assemble a crack team of hackers and break into that company to gather the world’s largest supply of passwords and usernames.