Microsoft's 'unhackable' Xbox One has been hacked by 'Bliss'

(tomshardware.com)

249 points | by crtasm 3 hours ago

16 comments

  • autoexec 1 hour ago
    > Whether PC users, our core readership, will be interested in actually emulating Xbox One, looks unlikely. The 2013 system’s game library is largely overlapped in better quality on the PC platform.

    And this explains why it's stayed unhacked so long. There was very little incentive to hack the system when the games are all playable on a PC. Pirates, cheaters, archivists, and hackers could just go there. Microsoft's best security measure was making something nobody cared enough about to hack in the first place

    • glenstein 0 minutes ago
      >The 2013 system’s game library is largely overlapped in better quality on the PC platform.

      I get what this essentially means, but for those of us with a certain amount of love of language (or pedantry), it's fascinating to try and parse this literally because I don't quite think it works as intended.

      Clearly the intended meaning is something like eclipsed in quality. And it may be overlapped in the sense that the same games are separately available on PC. But overlap isn't a relation of quality; quality is generally better or worse when it's comparative. So it's like a smushed together way simultaneously saying the selection of games on Xbone overlaps with what's available on PC and is also better quality on PC.

    • giobox 48 minutes ago
      The other major incentive for hacking the console Microsoft removed was for the first time on a modern mainstream home console to allow side loading of homebrew code/emulators etc. The console supported a developer mode that allowed side loading of third party applications, so folks could get emulators and other traditionally "banned" content on the console through an officially supported route.

      There's a great presentation by Tony Chen on the Xbox One's security features:

      > https://www.platformsecuritysummit.com/2019/speaker/chen/

      Examples of the kinda software you can put on the Xbox One in developer mode:

      > https://xboxdevstore.github.io/

      • philistine 40 minutes ago
        You are 100% correct but they started clamping down on people using Dev mode strictly for emulators and homebrew. So here we are.
      • gjsman-1000 10 minutes ago
        I've seen this argument, but I strongly suspect that it's a cope argument. "We couldn't get in... because... we didn't care to! Even though we've hacked literally every other object on the planet just because."

        The proof in the pudding of this will be when the Nintendo Switch 2 reaches 2035 with no cracks. That's my prophecy; that this time around the cat actually will catch the mouse. Between NVIDIA's heavily revised glitch-resistant RISC-V security architecture and Nintendo's impeccable microkernel, there's nowhere left to hide.

    • Retr0id 21 minutes ago
      This is true, but it is also true that the Xbox One's security architecture and mitigations were ahead of its time. It would've taken a while to hack even with stronger incentives to hack it.
    • bombcar 55 minutes ago
      There was a time when it would have been a hot target, but everything the original modded Xbox could do could be done easier elsewhere.
      • jerf 25 minutes ago
        I know that's been dropping my level of interest for hacking consoles farther and farther. Why hack a console when it has almost no exclusives, even fewer of which I personally care about, and having a real computer hooked to a TV is no longer weird or difficult? I could fight to put an emulator on some locked down console or I can just install an emulator for almost everything ever made in like 10 minutes on my Steam Deck, so the choice is pretty obvious.
      • chocochunks 47 minutes ago
        Most of what was done on an original modded Xbox can be done on a retail stock Xbox One/Xbox Series with the exception of pirated Xbox games. Kodi (formerly known as XBMC) is just in the Xbox store, emulators and homebrew can be setup through dev mode with a little effort and $20. It's really just pirated versions of Halo 5 and a few others missing.
    • Forgeties79 29 minutes ago
      Also getting a dev account and loading up RetroArch/emulators in general is trivial. Best use of an Xbox one for sure. Well documented and exploited at this point.

      Not the same as emulating its titles, but a lot of interest in the Xbone/series line (outside of actual console users) is the dev accounts. So I imagine a lot more effort went there first.

      • genthree 22 minutes ago
        How is this the first I’m hearing of it? Looks like I finally have a reason to own an x-box, aside from the best version of Perfect Dark (the HD release of the original with modern controls, I mean) being on the 360.
  • Jerrrrrrrry 2 hours ago
    Created a voltage drop that exactly occurred to be timed to the key comparison, then a spike at the continuation.

    Irl noop and forced execution control flow to effectively return true.

    B e a utiful

    • Retr0id 58 minutes ago
      No? It is crowbar voltage glitching, but you're significantly underselling it here. The glitching does not affect key comparisons.

      It's a double-glitch. The second glitch takes control of PC during a memcpy. The first glitch effectively disables the MMU by skipping initialization (allowing the second glitch to gain shellcode exec).

    • btown 1 hour ago
      It's fascinating - how does one defend against an attacker or red-team who controls the CPU voltage rails with enough precision to bypass any instruction one writes? It's an entirely new class of vulnerability, as far as I can tell.

      This talk https://www.youtube.com/watch?v=BBXKhrHi2eY indicates that others have had success doing this on Intel microcode as well - only in the past few months. Going to be some really exciting exploits coming out here!

      • PUSH_AX 1 hour ago
        > how does one defend against an attacker or red-team who controls the CPU voltage rails

        The xbox does have defences against this, the talk explicitly mentions rail monitoring defences intended to detect that kind of attack. It had a lot of them, and he had to build around them. The exploit succeeds because he found two glitch points that bypassed the timing randomisation and containment model.

        • poemxo 27 minutes ago
          I hope Apple is paying attention, since their first gen AirTags are vulnerable to voltage glitching to disable the speaker and the tracking warning.
          • Vexs 20 minutes ago
            They're also, as it turns out, vulnerable to a drillbit
      • bri3d 29 minutes ago
        It's not new - fault injection as a vulnerability class has existed since the beginning of computing, as a security bypass mechanism (clock glitching) since at least the 1990s, and crowbar voltage glitching like this has been widespread since at least the early 2000s. It's extraordinarily hard to defend against but mitigations are also improving rapidly; for example this attack only works on early Xbox One revisions where more advanced glitch protection wasn't enabled (although the author speculates that since the glitch protection can be disabled via software / a fuse state, one could glitch out the glitch protection).
      • sabas123 1 hour ago
        > It's an entirely new class of vulnerability, as far as I can tell.

        It is know as voltage glitching. If you're interested our research group applies to Intel CPUs. https://download.vusec.net/papers/microspark_uasc26.pdf

      • phantom784 1 hour ago
        Could a chip detect this and reset?
        • mkipper 45 minutes ago
          I'm not at all familiar with the Xbox One, but this is a feature that's generally available if you're designing "closed" hardware like a console. Most SoC these days have some sort of security processor that runs in its own little sandbox and can monitor different things that suggest tampering (e.g. temperatures, rail voltages, discrete tamper I/O) and take a corrective action. That might be as simple as resetting the chip, but often you can do more dramatic things like wiping security keys.

          But this exploit shows that it's still almost impossible to protect yourself from motivated attackers with local access. All of that security stuff needs to get initialized by code that the SoC vendor puts in ROM, and if there's an exploit in that, you're hooped.

        • johncolanduoni 59 minutes ago
          Yes, and the Xbox One has mechanisms to do just that. But they turned out to not be fully sufficient.
          • jolan 54 minutes ago
            This attack is on the early models that didn't have those protections enabled. The researcher surmised that later models do indeed have anti-glitching mechanisms enabled.
      • _kidlike 39 minutes ago
        not a new vulnerability class.

        Extremely impressive feat nonetheless!

      • msla 1 hour ago
        You can't. Console makers have these locked-down little systems with all the security they can economically justify... embedded in an arbitrarily-hostile environment created by people who have no need to economically justify anything. It's completely asymmetrical and the individual hackers hold most of the cards. There's no "this exploit is too bizarre" for people whose hobby is breaking consoles, and if even one of those bizarre exploits wins it's game over.

        And if you predict the next dozen bizarre things someone might try, you both miss the thirteenth thing that's going to work and you make a console so over-engineered Sony can kick your ass just by mentioning the purchase price of their next console. ("$299", the number that echoed across E3.)

        • xnyan 38 minutes ago
          > You can't

          It's a moot point, they are not trying to prevent it. They only need to buy enough time to sell games in the lifespan of the hardware, which they did.

          > all the security they can economically justify...

          It seems like they did a perfect job, it lasted long enough to protect Microsoft game profits.

      • ActorNightly 43 minutes ago
        Basically if someone has physical access to device, its game over.

        You can do things like efuses that basically brick devices if something gets accessed, but that becomes a matter of whether the attacker falls for the trap.

        • tverbeure 9 minutes ago
          > Basically if someone has physical access to device, its game over.

          It took more than a decade to exploit this vulnerability and even then there are fairly trivial countermeasures that could have been used to prevent it (and that are implemented in other platforms.)

          Nothing is unhackable, but it requires a very peculiar definition of "game over".

        • beachy 36 minutes ago
          Only if they leave a door open, which they did here.

          If your argument is that you can't hope to close every door, then AI will make it easier to close all the doors in the future.

    • braunshedd 1 hour ago
      The Xbox 360 was hacked in a simpler but nearly identical way [1]! Amazing that despite the various mitigations, the same process was enough to crack the Xbox One.

      [1] https://consolemods.org/wiki/Xbox_360:RGH/RGH3

    • hedora 1 hour ago
      The earliest example I know of for this is CLKSCREW, but security hardware (like for holding root CA private keys) was hardened against this stuff way before that attack.

      Has anyone heard of notable earlier examples?

      • bri3d 32 minutes ago
        In terms of fault injection as a security attack vector (vs. just a test vector, where it of course dates back to the beginning of computing) in general, satellite TV cards were attacked with clock glitching at least dating back into the 1990s, like the "unlooper" (1997). There were also numerous attacks against various software RSA implementations that relied on brownout or crowbar glitching like this - I found https://ieeexplore.ieee.org/document/5412860 right off the bat but I remember using these techniques before then.
  • nxc18 2 hours ago
    I think it counts as effectively unhackable since it remained unhacked until five and a half years after its successor went on the market.

    I wonder if, assuming they continue making Xbox, they find a way to mitigate this in the next generation.

    • fredoralive 2 hours ago
      The presentation notes that this hack currently only works with the first revision of silicon. Later variants have more protections, like some anti-glitching tech that wasn’t quite debugged for the early units being enabled for later runs, and further changes with the security / reset subsystems being split into two separate cores with revised consoles like the the One X. So these would be more of a challenge, even if there’s now an angle of attack to investigate.
    • darknavi 1 hour ago
      > assuming they continue making Xbox

      It sounds like that's the plan:

      https://news.xbox.com/en-us/2026/03/11/project-helix-buildin...

      • babypuncher 1 hour ago
        The new Xbox is going to be a specialized PC running Windows with full access to third party game stores (Steam, Epic, etc). It won't need to be "hacked" because anyone will already be able to run any software they want on it.
        • SteveNuts 57 minutes ago
          What is the point of a device like this if the only difference is form factor? Why wouldn't someone just buy a pre-configured gaming PC?
          • genthree 11 minutes ago
            Every PC I’ve ever tried to repurpose as a gaming console of any sort has had way more jank to it than I’d ever tolerate in a console, in the 25ish years I’ve been hooking computers up to TVs. Even the Bazzite box I’ve got is pretty bad by comparison. Hell, my actual Steam Deck has a lot more undesirable “enthusiast” behavior to it, let’s say, than I’d want out of a Nintendo product for example, even though it’s just about the best I’ve seen (the actual best is Retroarch with a skin mimicking the PS3’s menu, on a dedicated distro that could take it from cold boot to interactive in like three seconds flat even on an rpi2… but that won’t play actual modern PC games, just emulated consoles and such, so it’s not a fair comparison)

            A common failure is the controllers. It’s hard to get a combo of OS stack, Bluetooth chip, and controller that Just Works like they do on consoles. Something always needs fiddling-with.

            Video or audio out are also often a problem. Glitched audio or audio mode-switching, trouble switching video modes, screwed-up HDR, all kinds of stuff. Maybe fine on your monitor with headphones. Not fine on a TV or projector with 5.1+ audio receiver.

            The UIs also bug out or crash more often, and usually aren’t that great at being a TV UI in the first place (even Steam IMO is worse than most consoles, as far as the Big Picture UI)

            It also gives devs a stable target with a known market, which is nice for both the devs and the owners of the devices.

          • mitkebes 43 minutes ago
            The main goal is money, an Xbox branded windows PC has potential to drive sales.

            Microsoft can also hopefully target a smoother user experience than a typical windows PC provides. They want this to be a valid console competitor, but just slapping xbox brand on a windows PC isn't enough to do that.

            Having a first party hardware device to target for PC games can also help devs with having a clear performance target for PCs, similar to how the Steam Deck is currently a minimum spec performance target for a lot of games.

          • ziml77 16 minutes ago
            If this is true then the reason that a console would be better than a custom PC is that it would also be designed to work better for that purpose. Turning on the device when the controller turns on and sending CEC commands are two huge things that aren't well supported outside of the console space. Also it would likely run a trimmed down version of Windows and would be set up to "just work" in a way that a system that can have any arbitrary set of hardware will never be able to do.

            But the really nice thing about the concept of treating a PC and console as the same platform is that you don't have to worry about why people might prefer to go the route of buying the console. You can go with a regular gaming PC if that's what you prefer and your library will have all the same options.

          • hbn 33 minutes ago
            There's something to be said for having a standard, known SKU, both as something for developers to target if enough people own it, and for users to troubleshoot if they're e.g. having an issue running X game.

            This kind of already exists with the "Deck Verified" label on Steam games.

            That said, this sounds similar to Valve's upcoming Steam Machine and I'd much prefer that to be the standard console/PC hybrid to keep the Linux gaming momentum going, and perhaps one day I can ditch Windows for good.

          • ThrowawayB7 39 minutes ago
            It's a device with a fixed, known-good set of hardware for developers to target, which is all that any of the major consoles is. Your question applies just as much to the Steam Deck and upcoming Steam Machine.
          • axus 36 minutes ago
            Let's speculate that they need a carrot for Windows developers when they attempt to use a monopoly stick on the Steam Deck.
          • babypuncher 25 minutes ago
            There are a few points I can see

            1. Console-like living room ready experience. It's surprisingly hard to get a PC made with off-the-shelf parts to integrate cleanly with a home theater system (think features like HDMI CEC, One Touch Play, etc). A custom SoC can solve this, something we are seeing Valve also do with the Steam Machine.

            2. As the target hardware for basically all Xbox games, end-users who don't want to fret over system specs can easily just buy this and know they are getting the intended experience.

            Whether that's enough to move units remains to be seen.

          • delecti 49 minutes ago
            I mean, at that point it is a pre-configured gaming PC. Hardware that's uniform across millions of units provides advantages, both for developers and users. IMO that's a big part of why the Steam Deck outsells more powerful competitors: there are so many of them that it gets targeted by developers, so more people buy them, in a virtuous cycle.
  • echelon_musk 45 minutes ago
  • tetrisgm 2 hours ago
    This is great news. Hopefully this opens the floodgates towards emulation and homebrew. Not that there are really any exclusives, but it would be interesting.
    • jamesgeck0 1 hour ago
      Xbox One homebrew has effectively always been supported. Anyone can register a development account and boot the system into dev mode. IIRC in a talk about console security, a Microsoft developer noted that this was an intentional deterrent against hacking. An effort to split the community so that pirates and homebrew enthusiasts wouldn't have a reason to collaborate.
      • protimewaster 59 minutes ago
        They did dumb things like limit memory availability in dev mode, though. Also they require a government ID to enable dev mode (but at least the quit charging $100 for it!). And they made it so you can't enable dev mode on consoles that are banned from Xbox services.

        I understand it's still more than most console makers do, having dev mode at all, but it's maddening to me that Microsoft made dev mode so annoying and limited. I'd honestly just rather a hack be available so we have the option of using the entire memory or repurposing banned consoles.

    • mike_hearn 56 minutes ago
      Seems unlikely. Someone would have to turn this into a modchip, set up physical distribution networks (all very illegal under the DMCA), and it'd only work on the 2013 machines - Chen's team clearly anticipated this type of attack and were already working on mitigations around the time the Phat released. So as he says at the end, later silicon already has more glitch mitigations built in and has done for a long time. Current gen Xbox isn't even investigated but we can assume it's even harder. They were clearly paying for red teaming. Remember: ZERO software bugs in the boot rom.
      • cortesoft 44 minutes ago
        I had a friend who ran a side business installing mod chips on the original Xbox in the early 2000s. There was a robust community around it, and you could buy chips easily.

        This was all after the DMCA was in effect. I don’t think that will stop this sort of activity.

    • qingcharles 1 hour ago
      Very few exclusives. Couple of Forzas? Halo 5? Practically everything else available elsewhere in similar quality.
    • whalesalad 2 hours ago
      I'm just excited at the opportunity to re-purpose my old launch day XBone as some kind of little homelab linux box.
  • JoeAltmaier 1 hour ago
    Physical possession of a machine is pretty hard to make secure. It's a different level of secure, an order of magnitude less secure than remote attackers. This is expected?
    • jolan 46 minutes ago
      Tony Chen from Microsoft gave a talk called "Guarding Against Physical Attacks: The Xbox One Story" and he explains that they want any sort of physical attack to cost at least the price of 10 games ($600 at the time).

      https://www.youtube.com/watch?v=U7VwtOrwceo&t=715s

  • tencentshill 2 hours ago
    Note this only affects the very first original 2013 "VCR" hardware. Newer revisions and variants are still unaffected.
    • dlcarrier 41 minutes ago
      They're pretty common and cheap on the used market, though. I bought mine from a thrifts store for $30, and the console itself regularly goes for ~$50 on eBay.
  • aservus 12 minutes ago
    xbox is always trying to limit the users, when a person buys something, he clearly gets the ownership of the thing yet companies nowadays are trying really hard to sell some subscription while giving the illusion that the owner of the product is in control all the while keeping him in control. is there anyone else who feels the same way?
  • mike_hearn 32 minutes ago
    Amazing talk. Here's a quick writeup if you don't want to watch the full hour or don't have enough hardware knowledge to follow what Markus is talking about, as he goes very fast, in some cases too fast to even let you read the text on his slides. It's mandatory to use the pause key to understand the full details even if you have a deep understanding of every relevant technology, of which he explains none.

    The Xbox uses a very advanced variant of the same technologies that also exist on smartphones, tablets and Secure Boot enabled PCs. When fully operational the Xbox security system prevents any unsigned code from running, keeps all code encrypted, proves to remote servers (Xbox Live) that it's a genuine device running in a secure state, and on this base you can build strong anti-piracy checks and block cheating.

    The Xbox has several processors and what follows applies to the Platform Security Processor. When a computer starts up (any computer), the CPU begins execution in a state in which basically nothing works, including external communication and even RAM. Executions starts at a 'reset vector' mapped to a boot ROM i.e. the bytes are hard-wired into the silicon itself and can't be changed. The boot ROM then executes instructions to progressively enable more and more hardware, including things like activating RAM. Until that point the whole CPU executes out of its cache lines and can't use more memory than exists on-die.

    Getting to the state where the Xbox can achieve all its security goals thus requires it to boot through a series of chained steps which incrementally bring the hardware online, and each step must verify the integrity of the next. The boot ROM is only 19kb of code and a few more kb of data, and can't do much beyond just activating RAM, the memory mapping unit (called MPU on the Xbox), and reading some more code out of writeable flash RAM. The code it reads from flash RAM is the second stage bootloader where much more work gets done, but from this second stage on it can be patched remotely by Microsoft. So if bugs are found there or in any later stage, it hardly matters because MS can issue a software update and detect remotely on Xbox Live servers if that upgrade was applied, so kicking out cheaters and pirates. The second stage boot loader in turn loads more code from disk, signature checks and decrypts it, sets up lots of software security schemes like hypervisors and so on, all the way up to the OS and the games.

    Therefore to break Xbox security permanently you have to attack the boot ROM, because that's the only part that can't be changed via a software update. It's the keys to the kingdom and this is what Markus attacked. Attacking the boot ROM is very, very hard. The Xbox team were highly competent:

    • Normally the bringup code would be written by the CPU or BIOS vendors but MS wrote it all in house themselves from scratch.

    • The code isn't public and has never leaked. To obtain it, someone had to decode it visually by looking at the chip under a scanning electron microscope and map the atomic pictures to bits and then to bytes.

    • Having the code barely helps because there are no bugs in it whatsoever.

    So, the only way to manipulate it is to actually screw with the internals of the CPU itself by "glitching", meaning tampering with the power supply to the chip at exactly the right moment to corrupt the state of the internal electronics. Glitching a processor has semi-random effects and you don't control what happens exactly, but sometimes you can get lucky and the CPU will skip instructions. By creating a device that reboots the machine over and over again, glitching each time, you can wait until one of those attempts gets lucky and makes a tiny mistake in the execution process.

    Glitching attacks predate the Xbox and were mostly used on smartcards until the Xbox 360, which was successfully attacked this way. So Microsoft knew all about them and added many mitigations, beyond "just" writing bug free code:

    1. The boot ROM is full of randomized loops that do nothing but which are designed to make it hard to know where in the program the CPU has got to. Glitching requires near perfect timing and this makes it harder.

    2. They hardware-disabled the usual status readouts that can be used to know where the program got up to and debug the boot process.

    3. They hash-chain execution to catch cases where steps were skipped, even though that's impossible according to program logic.

    4. They effectively use a little 'kernel' and run parts of the boot sequence as 'user mode' programs, so that if sensitive parts of the code are glitched they are limited in how badly they can tamper with the boot process.

    And apparently there are even more mitigations added post-2013. Markus managed to bypass these by chaining two glitch attacks together, one which skipped past the code that turned on the MMU, which made it possible to break out of one of the the usermode 'processes' (not really a process) and into the 'kernel', and one which then was able to corrupt the CPU state during a memcpy operation, allowing him to take control of the CPU as it was copying the next stage from flash RAM.

    If you can take control of the boot ROM execution then you can proceed to decrypt the next stage, skip the signature checks and from there do whatever you want in ways that can't be detected remotely - however, the fact that you're using a 2013 Phat device still can be.

    • nerdsniper 22 minutes ago
      Thank you, sincerely. My main question now is, what degree of repeatability has Markus achieved so far?
      • mike_hearn 17 minutes ago
        On Phat consoles? You could turn it into a modchip, if for some reason you wanted to. It'd be repeatable on every boot but might take a while.

        The hard work comes after this though. There are lots of software level mitigations MS could use to keep the old devices usable with Xbox Live if they really wanted to. Just because you can boot anything you want doesn't mean you can't be detected remotely, it just makes it harder for MS to do so reliably. You'd be in a constant game of catch-up.

  • stinmpy 2 hours ago
    Marcus used to work for Microsoft, in the MSRC. I wonder if he used insider knowledge for this hack.
    • Scaevolus 2 hours ago
      Microsoft released a video that covers effectively all of the Xbox One security system, and it's referred to extensively in the talk. The specific methods of glitching don't require any insider knowledge.
      • ZiiS 1 hour ago
        They also told everyone they added more anti glitching to later hardware revisions; which by the process of elimination tells everyone they thought this was possible. The whole initiative was a success when it gave them a year; an unqualified triumph when it gave them the whole generation; they really are not going to be to sad after 12 years.
        • mike_hearn 54 minutes ago
          Right, as Markus says - even gods can bleed. And he's right: Tony Chen's team did god-level work with the Xbox One security system, so what must have followed in the Xbox Series S is truly unknowable. I don't think there's even a tech talk on it. This talk is probably the most elite hacking talk I've ever watched. Everyone who worked on this stuff at MS can and obviously should be very proud of what it took - especially as this probably won't have any commercial impact on Xbox game devs or multiplayers.
  • jvillegasd 47 minutes ago
    Don't ever call a thing "unhackable", because every single human creation is imperfect
  • lionkor 2 hours ago
    Is there any better format article or writeup? I couldn't find anything.
  • everyone 36 minutes ago
    It had those e-fuses in it right? *Seriously* it should be illegal to sell anything with those.
  • charcircuit 2 hours ago
    It wasn't unhackable and decrypted versions of games already have been dumped. There was even a public exploit published years ago.

    https://github.com/exploits-forsale/collateral-damage

    What's new here is that this compromises the entire system security giving access to the highest privilege level.

    • landr0id 1 hour ago
      Thanks for the mention! I helped with the collateral damage exploit (wrote the PE loader).

      I didn't ask but Emma -- who wrote the kernel-mode exploit -- and I would probably agree that Collat is not really what we would consider a proper hack of the console since it didn't compromise HostOS. Neither of us really expected game plaintext to be accessible from SRA mode though.

  • Simulacra 2 hours ago
    One should never call something "unhackable" ...
    • Arainach 2 hours ago
      Given that it held up against 13 years of dedicated efforts by people with physical access to the device, many years after its successor was launched, it seems merited in this case.

      This talk about some of what went into it is fascinating: https://youtu.be/quLa6kzzra0

      • WJW 2 hours ago
        It literally got hacked, that's what the article is about. It is NOT unhackable.
        • ralfd 2 hours ago
          Microsoft stopped manufacturing in 2020. It was not hacked in its lifetime.
          • lokar 2 hours ago
            I agree, but also find it funny that by that standard the DRM in the original Google video streaming product was not hacked before the service was shutdown, after about 2 years :)
            • leoc 57 minutes ago
              And to think that sometimes people doubt the wisdom of Google’s product-lifecycle decisions!
        • max-m 2 hours ago
          To the community it was unhackable, until very recently. It's security measures held up so long that it appeared to be unshakable. There were no obvious flaws. In hindsight it was hackable, but keep in mind how long it took. This console has long been obsoleted.
        • Brian_K_White 1 hour ago
          It was unhackable while it mattered. It was hacked 5 years after it no longer mattered. And all but the effectively beta release remain unhacked even now.
      • devmor 2 hours ago
        "Extremely hard to hack" or "Hackable only after it's retired" don't exactly roll off the tongue, but they are not synonymous with "Unhackable".

        In many cases the truth is simply that its not worth the time/effort to hack it, so only the most dedicated perverts(with a positive connotation) keep trying.

    • close04 2 hours ago
      In the very strict interpretation probably nothing is unhackable, just not hacked yet. But one should also be pragmatic about what "unhackable" means in context. Without the power of hindsight, a consumer device that stayed unhacked for ~13 years can be reasonably called unhackable during this time.
      • replooda 2 hours ago
        We don't need to contribute to word inflation. There's "really hard," there's "nearly impossible," there's even "impossible – as far as we know." I don't think it shows a lack of pragmatism to assume a technological claim, made by a technology company, should't be taken at face value. On the contrary, I'd advise more pragmatism to anyone failing to disregard an "unhackable" claim made by Microsoft specially even after fixnum years without known exploits.
      • mikkupikku 2 hours ago
        I think it's like calling a ship "unsinkable". Yes, you engineered it to not sink, in accordance with strict maritime standards no doubt, but just don't call it unsinkable. If you call it unsinkable you're just begging for a century of snickering at your hubris.
        • applfanboysbgon 2 hours ago
          It has no relation to hubris whatsoever if the "unhackable" label is not something self-proclaimed at launch but something descriptively applied by other people who were unable to hack it. Nobody would have snickered if the Titanic were described as unsinkable by people who had been trying to sink it for 10 years.
          • inetknght 1 hour ago
            > Nobody would have snickered if the Titanic were described as unsinkable by people who had been trying to sink it for 10 years.

            Pedantic: I'm sure somebody would have snickered about "unsinkable" if the Titanic sank after 10 years. Pragmatic: if the "unsinkable" Titanic lasted 10 years (or at least to profitability) before being sunk by people intending to sink it, that might certainly count as being "unsinkable" for the time it hadn't sunk.

            Hubris: Titanic was claimed to be unsinkable before it was launched.

    • joe_mamba 2 hours ago
      I wish people would take statements in relative terms along with the whole context before attempting to refute them with a quick gotcha in absolute terms.

      Obviously nothing is ever unhackable, not even Fort Knox, given infinite time and resources, and Microsoft never made such claims, this is just media editorializing for clicks and HN eating the bait, but Xbox One was definitely the most unhackable console of its generation. Case in point, it took 13 years of constant community effort to hack a 499$ consumer device from 2013. PS4 and iPhones of 2013 have also been jailbroken long ago.

      Therefore, even the click-bait statement with context in relative terms is 100% correct, it truly was unhackable during the time it was sold and relative to its peers of the time.

      • scottyah 1 hour ago
        This goes against information theory as a whole, and the point of words. How are you going to convey all this extra context to people who don't follow the space, and what word(s) do we use for something that is actually unhackable?

        Literally unhackable? XD

        • joe_mamba 48 minutes ago
          Firstly, who made the claim that it was guaranteed to be "unhackable"? Was it Microsoft themselves when they sold it, or slop journalists looking to create false contrarianism in order to legitimize their own PoV and drive traffic to their articles?

          Secondly, this is HN, not some generic town corner shop newspaper. It's assumed the readers who come here often and comment with no green profiles, have at least some basic technical know-how that nothing is ever unbackable, least of all a console from 2103, and therefore process information through that context lens, instead of feigning complete ignorance and arguing from the false pretext they gobbled up from editorialized titles created by slop journalists.

      • devmor 2 hours ago
        > Case in point, it took 13 years of constant community effort to hack it.

        Can you attempt to quantify this effort in comparison to other game consoles? I'm not very familiar with the Xbox scene, but I would assume that there was a lot less drive to achieve this given that Xbox has never really had many big exclusive titles and remains the least popular major console (with an abysmally tiny market presence outside of the US).

        As an aside, I wonder if Microsoft's extra effort into securing the platform comes from their tighter partnership with media distributors/streaming platforms and their off-and-on demonstrated desire to position the Xbox as a home media center more than just a gaming console.

        • deadbeef7f 1 hour ago
          > Can you attempt to quantify this effort in comparison to other game consoles?

          The person who hacked the original Xbox wrote a book on the topic, which they've since made free: https://bunniefoo.com/nostarch/HackingTheXbox_Free.pdf

        • debugnik 1 hour ago
          I too forget sometimes that Wii U existed.
        • joe_mamba 2 hours ago
          >and remains the least popular major console (with an abysmally tiny market presence outside of the US).

          TF are you on about? The xbox one of 2013(competitor of the PS4 who got hacked long before) had a ~46% market share in the US and ~35% globally. Hardly insignificant. And any Microsoft Product, even those with much lower market share, attracts significant attention from hackers since it's worth a lot in street-cred, plus the case of reusing cheap consoles as general PCs for compute since HW used to be subsidized. And of course for piracy, game preservation and homebrew reasons.

          I again tap the sign of my previous comment, of uring people to stop jumping the gun to talk out of their ass, without knowing and considering the full context.

  • au8er 2 hours ago
    This just again shows that given enough time skill, and resources, any security is pointless if the attacker has physical access to the device.
    • Waterluvian 1 hour ago
      I think this might be a good example of the fundamental misunderstanding of what "security" even is. It is never a binary state. Never was. And I think a lot of people don't really grok that and think that if a security block can be overcome in some manner then the thing is not secure.

      Eventually Fort Knox will succumb to the unrelenting arrow of time and some future visitors will simply step over the crumbling wall and into the supposedly "secure" area.

      • tosti 50 minutes ago
        I see security as a stopgap measure when there's no peace. The best "security" is not to need any in the first place.
    • john_strinlai 1 hour ago
      i find this statement is often used as an excuse to not think about security at all. which is probably not what you intended here (i hope, although you did say "pointless"...), but some people parrot it for that purpose.

      a) this was a security win. millions and millions of people had physical access to the device for over a decade

      b) as others have said, security is not all-or-nothing. the xbox one is extremely secure, despite not being perfectly secure.

      c) just because something eventually gets hacked does not mean security was pointless. delaying access is a perfectly reasonable security goal. delaying access until the product is retired and the successor is already out on the market is a huge win.

    • jamesgeck0 1 hour ago
      One of the DRM circumvention methods for the Xbox 360 involved precision drilling a specific depth into one of the chips on the board. Microsoft was very aware of the nature of physical access while designing this, haha.
      • echelon_musk 1 hour ago
        I had many Xbox 360s with flashed DVD drive firmware back in the day. But as I never owned a slim console I had no idea the drill/Kamikaze hack was a thing until now.
    • recursive 1 hour ago
      This seems like an unqualified win for the security measure. The future value of Xbox One DRM is probably close to zero. They already got what they wanted out of it.
      • leoc 1 hour ago
        At this point the blip of free media coverage possibly makes this a net positive for XBox.
    • jamesnorden 49 minutes ago
      Better stop locking your doors, then.
    • cocoto 1 hour ago
      I can give you a piece of paper with a one time pad encoded secret, where the one time is physically destroyed. You can take all the time you want but you will not crack anything…
      • TobTobXX 1 hour ago
        You don't need to attack the math, if you can attack the sender or thr receiver ['s hardware].
    • wat10000 2 hours ago
      I’m pretty skeptical of that lesson. This took 13 years and it’s cheap mass-market hardware.
    • babypuncher 53 minutes ago
      'pointless' is doing a lot of heavy lifting there.

      This console went completely unhacked for 12 years, with this coming a solid 4 years after the hardware was discontinued. They kept piracy off the console for its whole lifespan, which was the entire point of these security measures. This is a massive success for the Xbox security team.

    • dist-epoch 1 hour ago
      You do have a credit card, right?