Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

That's not that different. The PSP is basically AMD's ME.


Yes, but the way it boots and is hooked into the system is completely and totally different than ME.

It fulfills the same abstract purpose, but that's where the similarities end.


So there is a different piece that can be inspected for it's own vulnerabilities, that probably does not get as much scrutiny because the hardware isn't as popular.

That's not a criticism per se, I am sure it's hard to design these things securely and without bugs.


Totally, although it's under a ton of scrutiny from the PS4 folks where the Platform Security Processor is known as SAMU, and holds most of the decryption keys for the rest of the system including all executables.

Right now the only attacks I know of treat it as a decryption oracle, but it'd be nice to not have to pre decrypt programs on a real PS4 for cases like archiving and emulation.


> it'd be nice to not have to pre decrypt programs on a real PS4 for cases like archiving and emulation

I'm no expert, but that would be the only legal way of archiving these programs, no?


Eh, the legality is pretty orthogonal.

Using it as a decryption oracle involves enough circumvention in the first place that you might already be running afoul of the DMCA if that applies to you.

Meanwhile, institutions that are given more legal carte blanche like Archive.org would probably prefer to have the decryption keys in case there comes a point where they have access to encrypted binaries, but PS4s to decrypt with have become hard to find, or keys are rotated to the point where new applications exist that require a firmware version that aren't subject to the same decryption oracle attacks.

<And, not a lawyer>




Consider applying for YC's Summer 2026 batch! Applications are open till May 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: