Hello, On 07/12/05, Brice Collins <[EMAIL PROTECTED]> wrote: > i found this link full of info on the hardware and security. It has ram > dumps and everything.
Truly interesting information. The things I could decipher from the post were: - Only physical memory is encrypted, seems logical - apps don't have to worry about encryption. Basically this only prevents physical memory snooping. - Access fuses, burn fuses (syscall 22): retail boxes out of debug boxes? Sounds more like "permanently burn a per-box key onto CPU". - Recovery CD seems to contain all the stuff people are trying to pry out of their Xboxes. - Kernel updates probably come as non-Xbox-specific - the Xbox is probably capable of encrypting the updated kernel for itself. - Serial port is most likely a debug box feature. - Don't really understand his hypervisor attack possibility - I guess he's trying to place some code to dump the hypervisor memory space into the memory and then corrupt the physical memory randomly trying to produce a jump instruction into his attack code. But if hypervisor can only do physical memory in its privilege level, I guess the exploit code would need to be encrypted as well (if you store it in the kernel context, your code would be enrcypted and the hypervisor would see it as encrypted as well). -smo ------------------------------------------------------- This SF.net email is sponsored by: Splunk Inc. Do you grep through log files for problems? Stop! Download the new AJAX search engine that makes searching your log files as easy as surfing the web. DOWNLOAD SPLUNK! http://ads.osdn.com/?ad_idv37&alloc_id865&op=click _______________________________________________ free60-devel mailing list free60-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/free60-devel