
On-chip key storage memory (According to fail0verflow, while it is present, “it doesn't work very well.” This feature is further discussed later in this article.).An on-chip boot ROM to prevent easy compromise or replacement of the bootstrap firmware.The PS3 hack can teach designers much about how to approach and plan platform security. For example, one of the earliest initiatives was a physical attack that induced glitches on the memory bus, enabling the hackers to take control of the operating system and perform additional investigations. These kinds of attacks often take place over many days or weeks and use knowledge gained in each successful stage to advance to the next stage. The PS3 hack is similar to many attacks on security systems: It is not really one hack, but rather an incremental series of attacks made over a period of time, which successively defeat various security subsystem features via a variety of techniques.


This conquest, in turn, allowed group members to install any software of their choice on PS3 consoles, in effect obtaining total control of the platform. The settlement brings to a close the latest chapter in a lengthy process to completely break down the console's security system, which began with the announcement at 27C3 (the 27th Chaos Computing Congress) in December 2010 that the group had obtained the root code-signing keys on the platform.

The Sony lawsuit against George Hotz (aka “GeoHot”), one of the hackers from the “fail0verflow” team responsible for the hack that opened up the PS3 (PlayStation 3) gaming and media console, has been settled, but at this time, controversy continues to swirl around the incident and the hacker involved.
