Hacking the Xbox
Hacking the Xbox
Hacking the Xbox
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
206<br />
<strong>Hacking</strong> <strong>the</strong> <strong>Xbox</strong>: An Introduction to Reverse Engineering<br />
if billions of dollars were invested in trusted computing, only produce a<br />
net result of no greater safety or privacy for consumers, while severely<br />
curtailing consumers’ rights with poor content policy implementations.<br />
The good news for trusted PC proponents is that shrinking feature sizes<br />
in integrated circuits is driving greater integration throughout <strong>the</strong> PC.<br />
Within a decade, today’s PC will fit on a single piece of silicon. Once <strong>the</strong><br />
RAM and <strong>the</strong> BIOS are fully integrated into a single piece of silicon,<br />
hacking a system becomes much more difficult — but not impossible.<br />
Focused Ion Beam (FIB) machines, a tool used by chip designers and<br />
failure analysis labs, can cut and jumper nano-scale features. Ano<strong>the</strong>r<br />
upside for for trusted machine designers is that public key processors<br />
could become so small and cheap to integrate into a chip that individual<br />
chips, especially memory chips, could start using strong crypto to<br />
au<strong>the</strong>nticate and encrypt <strong>the</strong>ir I/O.<br />
Ano<strong>the</strong>r technology that could aid <strong>the</strong> implementation of trusted PCs is<br />
integrated tamper-resistant or tamper-detecting features. For example, a<br />
time-domain reflectometer (TDR) could be built into a chip’s I/O cells.<br />
A TDR can detect <strong>the</strong> presence of an eavesdropper on a wire by<br />
recognizing certain changes to <strong>the</strong> wire’s electrical properties. In addition<br />
to <strong>the</strong> ability to detect eavesdroppers, integrated TDR devices are<br />
desirable for high performance I/O since <strong>the</strong>y can be used to calibrate<br />
<strong>the</strong> drive impedance and equalization/pre-emphasis filters required for<br />
multi-gigabit speed communications.<br />
Concluding Thoughts<br />
This book has taken you through a whistle-stop tour of <strong>Xbox</strong> hardware<br />
hacking, from <strong>the</strong> basics of soldering and disassembling to <strong>the</strong> latest<br />
projects and techniques. It has also introduced you to <strong>the</strong> social aspects<br />
of <strong>Xbox</strong> hacking: <strong>the</strong> people who hack, and <strong>the</strong> interplay between<br />
society, law, and hacking.<br />
While <strong>the</strong> details of how to install a blue LED in an <strong>Xbox</strong> may be<br />
irrelevant in a few years, <strong>the</strong> skills you learn executing <strong>the</strong> installation will<br />
last a lifetime. Moreover, <strong>the</strong> social and legal issues confronting hackers<br />
and consumers will extend beyond <strong>the</strong> <strong>Xbox</strong> and into every part of our<br />
emerging information-centric way of life.<br />
The material in this book is just a starting point; <strong>the</strong>re is a world of<br />
hardware out <strong>the</strong>re waiting to be explored. I hope this book has provided<br />
<strong>the</strong> novice readers with a strong starting point for becoming an<br />
explorer, fixer, and innovator in a world increasingly filled with, controlled<br />
by, and dependent upon electronics.<br />
Happy hacking!<br />
— bunnie@xenatera.com