Palm webOS system upgrades mandatory; hacking scene forbidden from tethering

We’ve seen a tremendous explosion in the webOS hacking scene ever since the Pre’s firmware image leaked out — between the easily-accessible restore more, Linux foundations and the directly-accessible HTML / CSS / Javascript application code, we’ve already seen everything from minor tweaks to full on NES emulation to Sprint activation hacks. In short, things are wide open at the moment, and people (including us) are excited by the possibilities — but that doesn’t mean Palm has to play along. In fact, two recent developments have us worried for the future of this happy little scene — first, Palm’s apparently forbidding the Pre Dev Wiki from posting any information about data tethering during the Sprint exclusivity period, and apparently threatening to have the site shut down if it happens:

We have been politely cautioned by Palm that any discussion of tethering during the Sprint exclusivity period (and perhaps beyond-we don’t know yet) will probably cause Sprint to complain to Palm, and if that happened then Palm would be forced to react against the people running the IRC channel and this wiki.

Yeah, that’s pretty aggro for a company that needs to court all the developer support it can. We’re not sure what’ll happen after Sprint’s exclusivity runs out, but we can’t imagine any other carriers are going to be thrilled about hacked tethering options either, so we’d say Palm’s going to keep the pressure on until unlocked GSM webOS devices hit the scene — and we can almost guarantee that tethering hacks are going to make it into the wild regardless of Palm’s actions.

Even worse for hackers, Palm’s taking an unusually aggressive approach to webOS system updates — they’re mandatory. According to the support docs, webOS updates are automatically downloaded in the background within two days of being available, and they’re required to be installed within a week of the download — after seven days and four install prompts, the phone will give you a ten-minute countdown and then automatically begin installing the update. Sure, we can understand why Palm would want all of its devices to be updated, and we know that a lot of webOS system foundations are in flux while the Mojo SDK is being finalized, but forced updates seem extremely heavy-handed to us — it’s one thing to try and maintain control over a platform, it’s another to keep it with an iron fist. Of course, it’s probable that we’ll see a hack to bypass all of this extremely soon, so maybe it’ll all work itself out, but we’d really like to see Palm develop an official policy friendly towards hacking and homebrew and stick to it — the Pre and webOS have attracted a lot of talent in the past two weeks, and it’d be a shame to lose it.

[Via PreThinking; thanks, Justin]

Read – Pre Dev Wiki tethering policy
Read – Palm webOS updates support doc

Filed under:

Palm webOS system upgrades mandatory; hacking scene forbidden from tethering originally appeared on Engadget on Mon, 15 Jun 2009 11:48:00 EST. Please see our terms for use of feeds.

Permalink | Email this | Comments

Defense Department developing portable hacking device for soldiers

It’s not exactly news that the Department of Defense is looking at ways to make hacking a more practical weapon, but it looks to really be stepping up its game with its latest project, which promises to make complicated attacks as simple as a few button presses. That would apparently be possible thanks to a slightly mysterious device that’d be small enough to carry around in a backpack, but powerful enough to do everything from breaking into a wireless network to hacking into SCADA (or Supervisory Control and Data Acquisition) systems (used at power plants, nuclear facilities, and the like). While complete details are obviously a bit light, the system would apparently be able to, for instance, map out the nodes in a wireless network, cause them to disconnect, and watch them come back online to identify weak spots. It would then present the “hacker” with various attack attributes that could simply be adjusted using sliders on a touchscreen. No word if the soldiers will also be rewarded with Achievements.

[Via Softpedia]

Filed under: ,

Defense Department developing portable hacking device for soldiers originally appeared on Engadget on Tue, 26 May 2009 14:12:00 EST. Please see our terms for use of feeds.

Read | Permalink | Email this | Comments

PlayStation 3 used to hack SSL, Xbox used to play Boogie Bunnies


Between the juvenile delinquent hordes of PlayStation Home and some lackluster holiday figures, the PlayStation has been sort of a bummer lately, for reasons that have nothing to do with its raison d’etre — gaming. That doesn’t mean that the machine is anything less than a powerhouse — as was made clear today when a group of hackers announced that they’d beaten SSL, using a cluster of 200 PS3s. By exploiting a flaw in the MD5 cryptographic algorithm (used in certain digital signatures and certificates), the group managed to create a rogue Certification Authority (CA) which allows them to create their own SSL certificates — meaning those authenticated web sites you’re visiting could be counterfeit, and you’d have no way of knowing. Sure, this is all pretty obscure stuff, and the kids who managed the hack said it would take others at least six months to replicate the procedure, but eventually vendors are going to have to upgrade all their CAs to use a more robust algorithm. It is assumed that the Wii could perform the operation just as well, if the hackers had enough room to spread out all their Balance Boards.

[Via ZD Net]

Filed under:

PlayStation 3 used to hack SSL, Xbox used to play Boogie Bunnies originally appeared on Engadget on Tue, 30 Dec 2008 17:41:00 EST. Please see our terms for use of feeds.

Read | Permalink | Email this | Comments