Buchanan walks through his process of experimenting with low-cost fault-injection attacks as an alternative when typical software bugs aren’t available to exploit.

  • WorkingClassCorpse [comrade/them, any]@hexbear.net
    link
    fedilink
    English
    arrow-up
    1
    ·
    11 hours ago

    The modder in the article mentioned that the method could be used to break copyright protections on game consoles, can someone explain that?

    I assume this doesn’t apply to consoles or harware that verify keys over the network, since the decryption key isn’t stored on the device itself? This is more for things like Blu-ray players or consoles that read physical media, right?

    I’m a hobbyist so sorry if that’s a dumb question