Le titre de l'interview est "Le firmware 3.56, des inconvénients mineurs pour les hackeurs".
Il indique que tout ce que Sony pouvait corriger a été corrigé.
Ainsi le bug présent de base qui fait qu'on pouvait deviner les clés de la PS3 à été partiellement corrigé via l'ajout d'une nouvelle couche.
Heureusement, il y a certaines parties matérielles qui ne peuvent pas être remplacées sauf avec une nouvelle version de PS3 et une nouvelle clé.
Ainsi, pour toutes les PS3 vendues jusque maintenant, si vous avez fait la mise à jour 3.56, il faut reprogrammer la puce NOR ou NAND pour y inclure le firmware modifié. A moins de la découverte d'une nouvelle faille, ceux ayant mis à jour devront ainsi démonter leur console et faire des manipulations sensibles.
Voici l'interview entière:
Hacker says PS3 can never be fully re-secured due to “kindergarten mistakes” in system security.
Sony’s recently-released PlayStation 3 system software 3.56, which was solely intended to stop hackers and pirates in their tracks, only presents a “minor drawback” to the scene.
The new firmware, released last week, was quickly decrypted, but Sony has done enough to prevent installation of custom firmware, homebrew and piracy on PS3s that have updated to 3.56. Mathieu Hervais, a respected voice in the homebrew scene who prefers the term “reverse engineer” to “hacker”, told us that while Sony has done all it could in response, it can never fully re-secure its system.
“3.56 was more of a patch to save what’s left to be saved,” he says. “Indeed Sony fixed everything that could have been fixed. The reality though is that this is only a minor drawback.”
The new firmware update includes updated security keys, including the random element that was absent from the original keys, which lead to the system being hacked. New games will be signed with these keys, and Sony has produced a whitelist of approved software – essentially PS3’s existing games library – that is allowed to run with only the original keys. Sony evidently believes this will re-secure its console, but Hervais believes the opposite.
“New keys were introduced in the 3.56 Firmware and code that is not whitelisted is now forced to use those keys,” he continues. “However, since the boot chain integrity is compromised it’s always possible to reprogram externally the NAND/NOR chips (where the firmware code is written to) to run unsigned code again." While Sony can include the new keys in consoles at the manufacturing stage going forward, it is essentially powerless to re-secure the millions of systems it has already sold.
“No matter what they do, a 3.56 (and onward) custom firmware is possible on all PlayStation 3 consoles manufactured so far," says Hervais. "The people Sony hired made several kindergarten mistakes while implementing their security.”
The new firmware release is Sony’s first response in what it told us was to be a “series of network updates” aimed at re-securing the console. Its legal department has been busy too, taking legal action against the hackers, and securing a temporary restraining order against Geohot, the man who published the console’s root keys online.
Source : http://www.next-gen.biz/news/ps3-356-firmware-%E2%80%9Ca-minor-drawback%E2%80%9D-to-hackers