13.03.2013 Views

Hacking the Xbox

Hacking the Xbox

Hacking the Xbox

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

206<br />

<strong>Hacking</strong> <strong>the</strong> <strong>Xbox</strong>: An Introduction to Reverse Engineering<br />

if billions of dollars were invested in trusted computing, only produce a<br />

net result of no greater safety or privacy for consumers, while severely<br />

curtailing consumers’ rights with poor content policy implementations.<br />

The good news for trusted PC proponents is that shrinking feature sizes<br />

in integrated circuits is driving greater integration throughout <strong>the</strong> PC.<br />

Within a decade, today’s PC will fit on a single piece of silicon. Once <strong>the</strong><br />

RAM and <strong>the</strong> BIOS are fully integrated into a single piece of silicon,<br />

hacking a system becomes much more difficult — but not impossible.<br />

Focused Ion Beam (FIB) machines, a tool used by chip designers and<br />

failure analysis labs, can cut and jumper nano-scale features. Ano<strong>the</strong>r<br />

upside for for trusted machine designers is that public key processors<br />

could become so small and cheap to integrate into a chip that individual<br />

chips, especially memory chips, could start using strong crypto to<br />

au<strong>the</strong>nticate and encrypt <strong>the</strong>ir I/O.<br />

Ano<strong>the</strong>r technology that could aid <strong>the</strong> implementation of trusted PCs is<br />

integrated tamper-resistant or tamper-detecting features. For example, a<br />

time-domain reflectometer (TDR) could be built into a chip’s I/O cells.<br />

A TDR can detect <strong>the</strong> presence of an eavesdropper on a wire by<br />

recognizing certain changes to <strong>the</strong> wire’s electrical properties. In addition<br />

to <strong>the</strong> ability to detect eavesdroppers, integrated TDR devices are<br />

desirable for high performance I/O since <strong>the</strong>y can be used to calibrate<br />

<strong>the</strong> drive impedance and equalization/pre-emphasis filters required for<br />

multi-gigabit speed communications.<br />

Concluding Thoughts<br />

This book has taken you through a whistle-stop tour of <strong>Xbox</strong> hardware<br />

hacking, from <strong>the</strong> basics of soldering and disassembling to <strong>the</strong> latest<br />

projects and techniques. It has also introduced you to <strong>the</strong> social aspects<br />

of <strong>Xbox</strong> hacking: <strong>the</strong> people who hack, and <strong>the</strong> interplay between<br />

society, law, and hacking.<br />

While <strong>the</strong> details of how to install a blue LED in an <strong>Xbox</strong> may be<br />

irrelevant in a few years, <strong>the</strong> skills you learn executing <strong>the</strong> installation will<br />

last a lifetime. Moreover, <strong>the</strong> social and legal issues confronting hackers<br />

and consumers will extend beyond <strong>the</strong> <strong>Xbox</strong> and into every part of our<br />

emerging information-centric way of life.<br />

The material in this book is just a starting point; <strong>the</strong>re is a world of<br />

hardware out <strong>the</strong>re waiting to be explored. I hope this book has provided<br />

<strong>the</strong> novice readers with a strong starting point for becoming an<br />

explorer, fixer, and innovator in a world increasingly filled with, controlled<br />

by, and dependent upon electronics.<br />

Happy hacking!<br />

— bunnie@xenatera.com

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!