>or is this a consequence of Nintendo's/Japanese company culture?
Now this makes me wonder, because Sony went after George Hotz with guns blazing for his 'OtherOS' efforts on PS3 until he settled the lawsuit on the condition to 'never hack Sony products'!
At the same time, Sony has been very welcoming about aftermarket OS efforts on their Android smartphones, they had their official AOSP portal, Jolla support etc.
I guess, the bottomline is would it affect the business?
Your timeline is a little mixed up, and I think fixing it will clear up what happened:
- Sony shipped the PS3 with "Other OS" functionality that provided limited hardware support to a guest Linux OS.
- Sony removed that "Other OS" feature without providing a reason why. At that point, the main system's protection was still in place.
- Hotz, after seeing the spotlight on Sony for removing "Other OS", was able to breach the main system's protection without any hardware modification.
- Sony went after Hotz for breaching their OS.
The bottom line was business -- providing full hardware support of "Other OS" would let you distribute Linux games without Sony's blessing (and cut of revenues or developer kits), which ultimately wouldn't be as successful without the absolutely massive marketing and deal-making abilities of one of these platform holders. On the other hand, breaking the main system OS allowed things like pirated games and unsigned code (game hacks) to run on the system, which is hugely problematic for a console that had most of its security on the client machines. The big PSN hack in 2011 followed shortly after Hotz broke the system, and while I've never seen it 100% confirmed, there were rumors at the time that the hack revealed enough of a vector inside the network that the hackers were basically unstoppable.
> January 22, 2010, he announced that he had successfully hacked the machine by enabling himself read and write access to the machine's system memory and having hypervisor level access to the machine's processor
> On January 26, 2010, Hotz released the exploit to the public. It was done on the original firmware (OFW) 3.15, then using his codes he made it into a 3.15 CFW, or Custom Firmware. It requires the OtherOS function of the machine, and consists of a Linux kernel module and gaining control of the machine's hypervisor via bus glitching
> On March 28, 2010, Sony responded by announcing their intention to release a PlayStation 3 firmware update that would remove the OtherOS feature from all models,[17] a feature that was already absent on the newer Slim revisions of the machine.
The entire reason for Other OS was so it would be taxed differently in the EU, which taxes computers less than game consoles. Once the BOM was low enough (and they transitioned to the slim), the difference wasn't important and they nixed Other OS. Geohotz' hack was merely a further impetus to get rid of it on the early "phat" versions.
That is NOT the claim. The claim was that OtherOS was removed from the fat PS3s. How else would Sony have undertaken a lawsuit about OtherOS being removed as an advertised feature from the Fats?
I’m not entirely sure to the validity of that (re: hacking). Unsure of how much I can fully diverge, it started in a dev system and moved laterally so it is possible some endpoint was found that enabled it.
- Nobody cared to hack the PS3 because it had Linux. There was an air of mythos about the security being top notch, but nobody skilled tried. Linux was restricted to not having 3D accel, and there was a short-lived Linux side exploit that granted you that capability, but Sony patched it as expected.
- Sony released the PS3 slim without OtherOS. They claimed they didn't have the resources/interest in developing Linux for it (this was later proven to be bullshit, the patches required were trivial).
- Some folks started staring a bit more seriously at PS3 security at this point.
- geohot developed a hilariously unreliable physical RAM glitching attack to escalate from OtherOS to the hypervisor on the Fat (note: this does not grant access to the secure SPE where all the crypto/DRM is done). I guess he was aiming for the slim, but this was his first target.
- Sony got scared and illegally pulled OtherOS on the Fat in an update, violating consumer protection law (they got sued for this and lost)
- Everyone started looking into PS3 security at this point.
- "Someone" (I have my suspicions) developed and sold a USB dongle which exploited GameOS to gain access at that level, and which included code directly and solely intended for game piracy in its payload. This only broke GameOS security (not hypervisor nor secure element), but Sony's actually-terrible system design meant that was enough to pirate games.
- I and others reverse engineered that and I wrote a Linux loader (AsbestOS) that could be used with clone exploit devices, and worked on both the PS3 Fat and Slim. These payloads didn't include any piracy-related code, just a Linux loader. This is Linux running in GameOS mode, which gives you 3D access (though no drivers were ever written...) and required some kernel patches due to VM configuration differences. I worked on those patches and they are now upstream.
- Research continued, and I and others at fail0verflow eventually discovered that Sony had completely borked their crypto and we could calculate their private signing keys. Due to a technicality, doing that calculation required having access to the symmetric crypto key beforehand, which meant that for any given secureboot chain level, you first needed a (one-off) exploit at that level to dump the AES key, then you could calculate the ECDSA signing key.
- We gave a talk detailing both an exploit at a certain level and the crypto flaw, without disclosing any keys.
- A week or two later geohot used an exploit he had stashed at the metldr level (that's the second highest level, after the bootldr cold boot code) and our method to calculate and publish the keys for that level on his blog. Initially without crediting us (this is a common geohot theme) until I asked him to. metldr cannot be updated, so this is close to a complete hack (Sony found a cute platform recovery trick later, wrapping things with bootldr, until finally someone exploited that and it was all over)
- Sony sued geohot and me and a bunch of others. They probably thought we were cooperating or something. That was a stressful few months.
- geohot settled with them and promised to never hack their stuff again, and they dropped the other defendants (myself included) from the lawsuit, but not before causing personal and legal trouble to some of us.
I use to be in the console scene in the late 90's. I had homebrew n64 & psx dev kits, and there were leaks of libraries, docs for both consoles. Perhaps because PSX was new, they were more tolerating back then, as a matter of fact, some of the ideas and tools from the scene made it into their toolkit and a few of the console hackers ended up working for Sony. Strangely, I recall never been too concerned about Sony but terrified about Nintendo to not discuss what I had with strangers on IRC. So Nintendo has always been mean. Hell, if you hacked and made your own cart without going through them, they would sue you back then. If anything threatened Sony, it was once emulators started working and catching up, but by then I had left the scene.
Manuals where PDF that was shared in private circles. Both consoles were MIPS, so built with gnu cross compilers. All we really had was the gcc compilers & libraries. All other tools were custom built.
Now this makes me wonder, because Sony went after George Hotz with guns blazing for his 'OtherOS' efforts on PS3 until he settled the lawsuit on the condition to 'never hack Sony products'!
At the same time, Sony has been very welcoming about aftermarket OS efforts on their Android smartphones, they had their official AOSP portal, Jolla support etc.
I guess, the bottomline is would it affect the business?