{"id":2067,"date":"2010-12-30T22:41:04","date_gmt":"2010-12-31T03:11:04","guid":{"rendered":"https:\/\/skatox.com\/blog\/?p=2067"},"modified":"2020-07-30T01:10:04","modified_gmt":"2020-07-30T05:10:04","slug":"explicacion-de-la-seguridad-del-playstation-3-y-demas-consolas","status":"publish","type":"post","link":"https:\/\/skatox.com\/blog\/2010\/12\/30\/explicacion-de-la-seguridad-del-playstation-3-y-demas-consolas\/","title":{"rendered":"Explicaci\u00f3n de la seguridad del Playstation 3 y dem\u00e1s consolas"},"content":{"rendered":"<p>El equipo de <a href=\"https:\/\/twitter.com\/fail0verflow\" target=\"_blank\" rel=\"noopener noreferrer\">fail0verflow<\/a> expuso en el pasado Chaos Communication Congress su charla 2010 Console Hacking, donde se explic\u00f3 en detalle como funciona todo el sistema de seguridad del Playstation 3, revelando sus fallas y dejando en r\u00eddiculo a Sony por cometer un error muy estupido en el algoritmo para firmar ejecutables. Si son fan\u00e1ticos de la criptograf\u00eda o hacking, es una presentaci\u00f3n que no se pueden perder por su genialidad para explicar el tema usando humor, hay algunas partes muy t\u00e9cnicas y requiere conocer de organizaci\u00f3n del computador pero el resto es entendible.<\/p>\n<p style=\"text-align: center;\"><!-- vimeo error: not a vimeo video --><\/p>\n<p style=\"text-align: left;\">Y una peque\u00f1a prueba de GNU\/Linux corriendo en un Playstation 3 Slim gracias a <a href=\"https:\/\/psgroove.com\">PSGroove.com<\/a><\/p>\n<p style=\"text-align: center;\"><span class=\"embed-youtube\" style=\"text-align:center; display: block;\"><div class=\"lyte-wrapper\" title=\"PSGroove.com - Console Hacking 2010 Lightening Talk - Chaos Communication Congress\" style=\"width:640px;max-width:100%;margin:5px auto;\"><div class=\"lyMe qsa_\\&amp;showinfo\\=1\" id=\"WYL_lGI0EnNQ5GE\" itemprop=\"video\" itemscope itemtype=\"https:\/\/schema.org\/VideoObject\"><div><meta itemprop=\"thumbnailUrl\" content=\"https:\/\/skatox.com\/blog\/wp-content\/plugins\/wp-youtube-lyte\/lyteCache.php?origThumbUrl=https%3A%2F%2Fi.ytimg.com%2Fvi%2FlGI0EnNQ5GE%2Fhqdefault.jpg\" \/><meta itemprop=\"embedURL\" content=\"https:\/\/www.youtube.com\/embed\/lGI0EnNQ5GE\" \/><meta itemprop=\"duration\" content=\"PT5M1S\" \/><meta itemprop=\"uploadDate\" content=\"2010-12-30T12:08:06Z\" \/><\/div><div id=\"lyte_lGI0EnNQ5GE\" data-src=\"https:\/\/skatox.com\/blog\/wp-content\/plugins\/wp-youtube-lyte\/lyteCache.php?origThumbUrl=https%3A%2F%2Fi.ytimg.com%2Fvi%2FlGI0EnNQ5GE%2Fhqdefault.jpg\" class=\"pL\"><div class=\"tC hidden\"><div class=\"tT\" itemprop=\"name\">PSGroove.com - Console Hacking 2010 Lightening Talk - Chaos Communication Congress<\/div><\/div><div class=\"play\"><\/div><div class=\"ctrl\"><div class=\"Lctrl\"><\/div><div class=\"Rctrl\"><\/div><\/div><\/div><noscript><a href=\"https:\/\/youtu.be\/lGI0EnNQ5GE\" rel=\"nofollow\"><img decoding=\"async\" src=\"https:\/\/skatox.com\/blog\/wp-content\/plugins\/wp-youtube-lyte\/lyteCache.php?origThumbUrl=https%3A%2F%2Fi.ytimg.com%2Fvi%2FlGI0EnNQ5GE%2F0.jpg\" alt=\"PSGroove.com - Console Hacking 2010 Lightening Talk - Chaos Communication Congress\" width=\"640\" height=\"340\" \/><br \/>Ver este v\u00eddeo en YouTube<\/a><\/noscript><meta itemprop=\"description\" content=\"PSGroove.com - Console Hacking 2010 Lightening Talk - Chaos Communication Congress\"><\/div><\/div><div class=\"lL\" style=\"max-width:100%;width:640px;margin:5px auto;\"><\/div><\/span><\/p>\n<p style=\"text-align: center;\">\n<p style=\"text-align: left;\">Con esto podemos concluir que ning\u00fan sistema de seguridad es perfecto, ya todas las consolas de la actual generaci\u00f3n han sido hackeadas para tener control de su hardware y por \u00faltimo:<strong> \u00abJam\u00e1s te metas con la comunidad hacker\u00bb<\/strong>. Si Sony no hubiese removido la opci\u00f3n de usar Linux en su consola, no hubiese necesidad de explotar el sistema para ejecutar nuestras propias aplicaciones, asi que para la pr\u00f3xima no le ofrezcan una caracter\u00edstica a los hackers y luego removerla.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>El equipo de fail0verflow expuso en el pasado Chaos Communication Congress su charla 2010 Console Hacking, donde se explic\u00f3 en detalle como funciona todo el&#8230;<\/p>\n<div class=\"more-link-wrapper\"><a class=\"more-link\" href=\"https:\/\/skatox.com\/blog\/2010\/12\/30\/explicacion-de-la-seguridad-del-playstation-3-y-demas-consolas\/\">Seguir leyendo<span class=\"screen-reader-text\">Explicaci\u00f3n de la seguridad del Playstation 3 y dem\u00e1s consolas<\/span><\/a><\/div>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[193,582,555],"tags":[692,947,694,733,735,734,22],"class_list":["post-2067","post","type-post","status-publish","format-standard","hentry","category-hacking-seguridad-informatica","category-planetas-linux","category-playstation-3-ps3","tag-chip","tag-hacking-seguridad-informatica","tag-homebrew","tag-jailbreak","tag-mod","tag-piratear","tag-ps3","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Explicaci\u00f3n de la seguridad del Playstation 3 y dem\u00e1s consolas - El blog de Skatox<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/skatox.com\/blog\/2010\/12\/30\/explicacion-de-la-seguridad-del-playstation-3-y-demas-consolas\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Explicaci\u00f3n de la seguridad del Playstation 3 y dem\u00e1s consolas - El blog de Skatox\" \/>\n<meta property=\"og:description\" content=\"El equipo de fail0verflow expuso en el pasado Chaos Communication Congress su charla 2010 Console Hacking, donde se explic\u00f3 en detalle como funciona todo el&#8230;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/skatox.com\/blog\/2010\/12\/30\/explicacion-de-la-seguridad-del-playstation-3-y-demas-consolas\/\" \/>\n<meta property=\"og:site_name\" content=\"El blog de Skatox\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ElWeblogdeSkatox\/\" \/>\n<meta property=\"article:published_time\" content=\"2010-12-31T03:11:04+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-07-30T05:10:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/skatox.com\/blog\/images\/2015\/12\/skatux.png\" \/>\n\t<meta property=\"og:image:width\" content=\"625\" \/>\n\t<meta property=\"og:image:height\" content=\"603\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Miguel Useche\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@skatox\" \/>\n<meta name=\"twitter:site\" content=\"@skatox\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Miguel Useche\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minuto\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/2010\\\/12\\\/30\\\/explicacion-de-la-seguridad-del-playstation-3-y-demas-consolas\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/2010\\\/12\\\/30\\\/explicacion-de-la-seguridad-del-playstation-3-y-demas-consolas\\\/\"},\"author\":{\"name\":\"Miguel Useche\",\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/#\\\/schema\\\/person\\\/e081bf33c5b0f1b0514e253cb578e1ba\"},\"headline\":\"Explicaci\u00f3n de la seguridad del Playstation 3 y dem\u00e1s consolas\",\"datePublished\":\"2010-12-31T03:11:04+00:00\",\"dateModified\":\"2020-07-30T05:10:04+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/2010\\\/12\\\/30\\\/explicacion-de-la-seguridad-del-playstation-3-y-demas-consolas\\\/\"},\"wordCount\":226,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/#organization\"},\"keywords\":[\"chip\",\"Hacking \\\/ Seguridad Inform\u00e1tica\",\"homebrew\",\"jailbreak\",\"mod\",\"piratear\",\"ps3\"],\"articleSection\":[\"Hacking \\\/ Seguridad Inform\u00e1tica\",\"Planetas\",\"Playstation 3 ( PS3 )\"],\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/skatox.com\\\/blog\\\/2010\\\/12\\\/30\\\/explicacion-de-la-seguridad-del-playstation-3-y-demas-consolas\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/2010\\\/12\\\/30\\\/explicacion-de-la-seguridad-del-playstation-3-y-demas-consolas\\\/\",\"url\":\"https:\\\/\\\/skatox.com\\\/blog\\\/2010\\\/12\\\/30\\\/explicacion-de-la-seguridad-del-playstation-3-y-demas-consolas\\\/\",\"name\":\"Explicaci\u00f3n de la seguridad del Playstation 3 y dem\u00e1s consolas - El blog de Skatox\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/#website\"},\"datePublished\":\"2010-12-31T03:11:04+00:00\",\"dateModified\":\"2020-07-30T05:10:04+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/2010\\\/12\\\/30\\\/explicacion-de-la-seguridad-del-playstation-3-y-demas-consolas\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/skatox.com\\\/blog\\\/2010\\\/12\\\/30\\\/explicacion-de-la-seguridad-del-playstation-3-y-demas-consolas\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/2010\\\/12\\\/30\\\/explicacion-de-la-seguridad-del-playstation-3-y-demas-consolas\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/skatox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Explicaci\u00f3n de la seguridad del Playstation 3 y dem\u00e1s consolas\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/skatox.com\\\/blog\\\/\",\"name\":\"El blog de Skatox\",\"description\":\"Compartiendo mis opiniones inform\u00e1ticas mas all\u00e1 de los 280 caracteres\",\"publisher\":{\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/skatox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/#organization\",\"name\":\"El blog de Skatox\",\"url\":\"https:\\\/\\\/skatox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/skatox.com\\\/blog\\\/images\\\/2022\\\/03\\\/tux.png\",\"contentUrl\":\"https:\\\/\\\/skatox.com\\\/blog\\\/images\\\/2022\\\/03\\\/tux.png\",\"width\":218,\"height\":218,\"caption\":\"El blog de Skatox\"},\"image\":{\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/ElWeblogdeSkatox\\\/\",\"https:\\\/\\\/x.com\\\/skatox\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/skatox\\\/\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/MiguelAngelUsecheCastro\",\"https:\\\/\\\/x.com\\\/skatox\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/#\\\/schema\\\/person\\\/e081bf33c5b0f1b0514e253cb578e1ba\",\"name\":\"Miguel Useche\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/wp-content\\\/litespeed\\\/avatar\\\/aec95b02408138cb9d08288435373552.jpg?ver=1777599971\",\"url\":\"https:\\\/\\\/skatox.com\\\/blog\\\/wp-content\\\/litespeed\\\/avatar\\\/aec95b02408138cb9d08288435373552.jpg?ver=1777599971\",\"contentUrl\":\"https:\\\/\\\/skatox.com\\\/blog\\\/wp-content\\\/litespeed\\\/avatar\\\/aec95b02408138cb9d08288435373552.jpg?ver=1777599971\",\"caption\":\"Miguel Useche\"},\"sameAs\":[\"https:\\\/\\\/skatox.com\",\"https:\\\/\\\/x.com\\\/skatox\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Explicaci\u00f3n de la seguridad del Playstation 3 y dem\u00e1s consolas - El blog de Skatox","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/skatox.com\/blog\/2010\/12\/30\/explicacion-de-la-seguridad-del-playstation-3-y-demas-consolas\/","og_locale":"es_ES","og_type":"article","og_title":"Explicaci\u00f3n de la seguridad del Playstation 3 y dem\u00e1s consolas - El blog de Skatox","og_description":"El equipo de fail0verflow expuso en el pasado Chaos Communication Congress su charla 2010 Console Hacking, donde se explic\u00f3 en detalle como funciona todo el&#8230;","og_url":"https:\/\/skatox.com\/blog\/2010\/12\/30\/explicacion-de-la-seguridad-del-playstation-3-y-demas-consolas\/","og_site_name":"El blog de Skatox","article_publisher":"https:\/\/www.facebook.com\/ElWeblogdeSkatox\/","article_published_time":"2010-12-31T03:11:04+00:00","article_modified_time":"2020-07-30T05:10:04+00:00","og_image":[{"width":625,"height":603,"url":"https:\/\/skatox.com\/blog\/images\/2015\/12\/skatux.png","type":"image\/png"}],"author":"Miguel Useche","twitter_card":"summary_large_image","twitter_creator":"@skatox","twitter_site":"@skatox","twitter_misc":{"Escrito por":"Miguel Useche","Tiempo de lectura":"1 minuto"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/skatox.com\/blog\/2010\/12\/30\/explicacion-de-la-seguridad-del-playstation-3-y-demas-consolas\/#article","isPartOf":{"@id":"https:\/\/skatox.com\/blog\/2010\/12\/30\/explicacion-de-la-seguridad-del-playstation-3-y-demas-consolas\/"},"author":{"name":"Miguel Useche","@id":"https:\/\/skatox.com\/blog\/#\/schema\/person\/e081bf33c5b0f1b0514e253cb578e1ba"},"headline":"Explicaci\u00f3n de la seguridad del Playstation 3 y dem\u00e1s consolas","datePublished":"2010-12-31T03:11:04+00:00","dateModified":"2020-07-30T05:10:04+00:00","mainEntityOfPage":{"@id":"https:\/\/skatox.com\/blog\/2010\/12\/30\/explicacion-de-la-seguridad-del-playstation-3-y-demas-consolas\/"},"wordCount":226,"commentCount":0,"publisher":{"@id":"https:\/\/skatox.com\/blog\/#organization"},"keywords":["chip","Hacking \/ Seguridad Inform\u00e1tica","homebrew","jailbreak","mod","piratear","ps3"],"articleSection":["Hacking \/ Seguridad Inform\u00e1tica","Planetas","Playstation 3 ( PS3 )"],"inLanguage":"es","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/skatox.com\/blog\/2010\/12\/30\/explicacion-de-la-seguridad-del-playstation-3-y-demas-consolas\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/skatox.com\/blog\/2010\/12\/30\/explicacion-de-la-seguridad-del-playstation-3-y-demas-consolas\/","url":"https:\/\/skatox.com\/blog\/2010\/12\/30\/explicacion-de-la-seguridad-del-playstation-3-y-demas-consolas\/","name":"Explicaci\u00f3n de la seguridad del Playstation 3 y dem\u00e1s consolas - El blog de Skatox","isPartOf":{"@id":"https:\/\/skatox.com\/blog\/#website"},"datePublished":"2010-12-31T03:11:04+00:00","dateModified":"2020-07-30T05:10:04+00:00","breadcrumb":{"@id":"https:\/\/skatox.com\/blog\/2010\/12\/30\/explicacion-de-la-seguridad-del-playstation-3-y-demas-consolas\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/skatox.com\/blog\/2010\/12\/30\/explicacion-de-la-seguridad-del-playstation-3-y-demas-consolas\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/skatox.com\/blog\/2010\/12\/30\/explicacion-de-la-seguridad-del-playstation-3-y-demas-consolas\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/skatox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Explicaci\u00f3n de la seguridad del Playstation 3 y dem\u00e1s consolas"}]},{"@type":"WebSite","@id":"https:\/\/skatox.com\/blog\/#website","url":"https:\/\/skatox.com\/blog\/","name":"El blog de Skatox","description":"Compartiendo mis opiniones inform\u00e1ticas mas all\u00e1 de los 280 caracteres","publisher":{"@id":"https:\/\/skatox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/skatox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/skatox.com\/blog\/#organization","name":"El blog de Skatox","url":"https:\/\/skatox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/skatox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/skatox.com\/blog\/images\/2022\/03\/tux.png","contentUrl":"https:\/\/skatox.com\/blog\/images\/2022\/03\/tux.png","width":218,"height":218,"caption":"El blog de Skatox"},"image":{"@id":"https:\/\/skatox.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ElWeblogdeSkatox\/","https:\/\/x.com\/skatox","https:\/\/www.linkedin.com\/in\/skatox\/","https:\/\/www.youtube.com\/c\/MiguelAngelUsecheCastro","https:\/\/x.com\/skatox\/"]},{"@type":"Person","@id":"https:\/\/skatox.com\/blog\/#\/schema\/person\/e081bf33c5b0f1b0514e253cb578e1ba","name":"Miguel Useche","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/skatox.com\/blog\/wp-content\/litespeed\/avatar\/aec95b02408138cb9d08288435373552.jpg?ver=1777599971","url":"https:\/\/skatox.com\/blog\/wp-content\/litespeed\/avatar\/aec95b02408138cb9d08288435373552.jpg?ver=1777599971","contentUrl":"https:\/\/skatox.com\/blog\/wp-content\/litespeed\/avatar\/aec95b02408138cb9d08288435373552.jpg?ver=1777599971","caption":"Miguel Useche"},"sameAs":["https:\/\/skatox.com","https:\/\/x.com\/skatox"]}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":2074,"url":"https:\/\/skatox.com\/blog\/2011\/01\/07\/geohot-corriendo-su-aplicacion-un-playstation-3-con-firmare-3-55\/","url_meta":{"origin":2067,"position":0},"title":"Geohot corriendo su aplicaci\u00f3n en un Playstation 3 con firmware 3.55","author":"Miguel Useche","date":"7 de enero de 2011","format":false,"excerpt":"Hace unas horas el famoso hacker Geohot ha logrado ejecutar su propia aplicaci\u00f3n en un Playstation con firmware 3.55, probando que al desarrollar una aplicaci\u00f3n y firmandola con la llave que \u00e9l mismo liber\u00f3, se puede ejecutar sin problemas. Adem\u00e1s, por la versi\u00f3n del firmware demuestra la posibilidad de hacerlo\u2026","rel":"","context":"En \u00abHacking \/ Seguridad Inform\u00e1tica\u00bb","block_context":{"text":"Hacking \/ Seguridad Inform\u00e1tica","link":"https:\/\/skatox.com\/blog\/category\/hacking-seguridad-informatica\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":1942,"url":"https:\/\/skatox.com\/blog\/2010\/06\/24\/geohot-explica-la-seguridad-del-playstation-3\/","url_meta":{"origin":2067,"position":1},"title":"Geohot explica la seguridad del Playstation 3","author":"Miguel Useche","date":"24 de junio de 2010","format":false,"excerpt":"Geohot es un conocido hacker famoso por desbloquear el iPhone y el Playstation 3, hace uno meses logr\u00f3 romper la seguridad de la consola, luego modificar el firmware para arrancar GNU\/Linux a pesar de estar bloqueado. Pues hace uno d\u00edas se present\u00f3 en el famoso evento de seguridad llamado Night\u2026","rel":"","context":"En \u00abHacking \/ Seguridad Inform\u00e1tica\u00bb","block_context":{"text":"Hacking \/ Seguridad Inform\u00e1tica","link":"https:\/\/skatox.com\/blog\/category\/hacking-seguridad-informatica\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":1994,"url":"https:\/\/skatox.com\/blog\/2010\/08\/20\/el-primer-modchip-usb-para-playstation-3\/","url_meta":{"origin":2067,"position":2},"title":"El primer modchip USB para Playstation 3","author":"Miguel Useche","date":"20 de agosto de 2010","format":false,"excerpt":"Hace 2 d\u00edas anunciaron por la p\u00e1gina PSX-SCENE el primer modchip (una modificaci\u00f3n del hardware, por asi decirlo, para ejecutar resplado de videojuegos), al parecer este si es el verdadero a diferencia de los videos anteriores, ya que es confirmado por una de las webs mas respetables en el mundo\u2026","rel":"","context":"En \u00abHacking \/ Seguridad Inform\u00e1tica\u00bb","block_context":{"text":"Hacking \/ Seguridad Inform\u00e1tica","link":"https:\/\/skatox.com\/blog\/category\/hacking-seguridad-informatica\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":3333,"url":"https:\/\/skatox.com\/blog\/2016\/01\/02\/playstation-4-hackeado-logran-ejecutar-linux-en-el\/","url_meta":{"origin":2067,"position":3},"title":"El Playstation 4 ha sido hackeado para correr Linux","author":"Miguel Useche","date":"2 de enero de 2016","format":false,"excerpt":"Para los amantes de la seguridad inform\u00e1tica y las consolas, tenemos una gran noticia para empezar el a\u00f1o. Pues el grupo de hackers denominado fail0verflow han realizado una presentaci\u00f3n en el pasado Chaos Communication Congress, donde muestran el Playstation 4 (PS4) hackeado para correr Linux en \u00e9l, inclusive, ejecutan un\u2026","rel":"","context":"En \u00abGnu\/Linux\u00bb","block_context":{"text":"Gnu\/Linux","link":"https:\/\/skatox.com\/blog\/category\/gnulinux\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/img.youtube.com\/vi\/2A7V3GLWF6U\/0.jpg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":1736,"url":"https:\/\/skatox.com\/blog\/2010\/01\/24\/al-fin-el-playstation-3-ha-sido-hackeado\/","url_meta":{"origin":2067,"position":4},"title":"Al fin el Playstation 3 ha sido hackeado","author":"Miguel Useche","date":"24 de enero de 2010","format":false,"excerpt":"Luego de 3 a\u00f1os y 2 meses de haber sido lanzado el Playstation 3, el famoso hacker George Hotz ha logrado sobrepasar la seguridad de la consola, teniendo acceso a la escritura de la memoria de todo el sistema, acceso al procesador y ejecuci\u00f3n de comandos a nivel de hardware\u2026","rel":"","context":"En \u00abHacking \/ Seguridad Inform\u00e1tica\u00bb","block_context":{"text":"Hacking \/ Seguridad Inform\u00e1tica","link":"https:\/\/skatox.com\/blog\/category\/hacking-seguridad-informatica\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":1999,"url":"https:\/\/skatox.com\/blog\/2010\/09\/07\/los-hacks-del-playstation-3-los-efectos-de-su-liberacion-libre-y-como-sony-contraataco\/","url_meta":{"origin":2067,"position":5},"title":"Los hacks del Playstation 3, los efectos de su liberaci\u00f3n libre y como Sony contraatac\u00f3","author":"Miguel Useche","date":"7 de septiembre de 2010","format":false,"excerpt":"Como nombr\u00e9 en un art\u00edculo anterior, ya existe manera de ejecutar homebrew (y juegos al parecer) en el Playstation 3, para ello era necesario una tarjeta USB con un chip AT90USB, las cuales se dispararon en todo el mundo pues todos quer\u00edan comprarlas para piratear su PS3. En Australia se\u2026","rel":"","context":"En \u00abHacking \/ Seguridad Inform\u00e1tica\u00bb","block_context":{"text":"Hacking \/ Seguridad Inform\u00e1tica","link":"https:\/\/skatox.com\/blog\/category\/hacking-seguridad-informatica\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"_links":{"self":[{"href":"https:\/\/skatox.com\/blog\/wp-json\/wp\/v2\/posts\/2067","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/skatox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/skatox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/skatox.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/skatox.com\/blog\/wp-json\/wp\/v2\/comments?post=2067"}],"version-history":[{"count":0,"href":"https:\/\/skatox.com\/blog\/wp-json\/wp\/v2\/posts\/2067\/revisions"}],"wp:attachment":[{"href":"https:\/\/skatox.com\/blog\/wp-json\/wp\/v2\/media?parent=2067"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/skatox.com\/blog\/wp-json\/wp\/v2\/categories?post=2067"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/skatox.com\/blog\/wp-json\/wp\/v2\/tags?post=2067"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}