
The hacking of consumer electronics is an increasingly common practice which users perform in order to customize and modify their devices beyond what is typically possible. This activity has a long history, dating from the days of early computer, programming, and electronics hobbyists.
A notable case of the hacking of consumer electronics is
jailbreaking of
Apple iOS
iOS (formerly iPhone OS) is a mobile operating system created and developed by Apple Inc. exclusively for its hardware. It is the operating system that powers many of the company's mobile devices, including the iPhone; the term also include ...
devices or the
rooting of
Android
Android may refer to:
Science and technology
* Android (robot), a humanoid robot or synthetic organism designed to imitate a human
* Android (operating system), Google's mobile operating system
** Bugdroid, a Google mascot sometimes referred to ...
phones, although many other electronics such as
video game console
A video game console is an electronic device that outputs a video signal or image to display a video game that can be played with a game controller. These may be home consoles, which are generally placed in a permanent location connected to ...
s are regularly hacked. While these methods allow unrestricted modification of an existing operating system installation, some third-party operating systems have been developed as a replacement to a device's default OS, such as
Replicant
A replicant is a fictional bioengineered humanoid featured in the 1982 film ''Blade Runner'' and the 2017 sequel ''Blade Runner 2049'' which is physically indistinguishable from an adult human and often possesses superhuman strength and intellig ...
and
postmarketOS
postmarketOS (abbreviated as pmOS) is an operating system primarily for smartphones, based on the Alpine Linux distribution.
postmarketOS was launched on 26 May 2017 with the source code available on GitHub before migrating to GitLab in 2018. I ...
on cellphones, or
DD-WRT
DD-WRT is Linux-based firmware for wireless routers and Wireless access point, access points. Originally designed for the Linksys WRT54G series, it now runs on a wide variety of models. DD-WRT is one of a handful of List of router firmware proj ...
and
tomato
The tomato is the edible berry of the plant ''Solanum lycopersicum'', commonly known as the tomato plant. The species originated in western South America, Mexico, and Central America. The Mexican Nahuatl word gave rise to the Spanish word , ...
on routers.
The process of consumer electronics hacking is usually accomplished through modification of the system software, either an
operating system
An operating system (OS) is system software that manages computer hardware, software resources, and provides common daemon (computing), services for computer programs.
Time-sharing operating systems scheduler (computing), schedule tasks for ef ...
or
firmware
In computing, firmware is a specific class of computer software that provides the low-level control for a device's specific hardware. Firmware, such as the BIOS of a personal computer, may contain basic functions of a device, and may provide ...
, but
hardware
Hardware may refer to:
Technology Computing and electronics
* Electronic hardware, interconnected electronic components which perform analog or logic operations
** Digital electronics, electronics that operate on digital signals
*** Computer hard ...
modifications are not uncommon.
The legality of hacking consumer electronics has been challenged over the years, with an example of this being the cracking of
encryption key
A key in cryptography is a piece of information, usually a string of numbers or letters that are stored in a file, which, when processed through a cryptographic algorithm, can encode or decode cryptographic data. Based on the used method, the key ...
s used in
High-bandwidth Digital Content Protection
High-bandwidth Digital Content Protection (HDCP) is a form of digital copy protection developed by Intel Corporation to prevent copying of digital audio and video content as it travels across connections. Types of connections include DisplayPort ...
, where detractors have been threatened under the basis of legal action. However, some companies have encouraged hardware hacking, such as Google's
Nexus
NEXUS is a joint Canada Border Services Agency and U.S. Customs and Border Protection-operated Trusted Traveler and expedited border control program designed for pre-approved, low-risk travelers. Members of the program can avoid waits at border ...
and
Pixel
In digital imaging, a pixel (abbreviated px), pel, or picture element is the smallest addressable element in a raster image, or the smallest point in an all points addressable display device.
In most digital display devices, pixels are the s ...
series of smartphones.
Overview
Many modern consumer electronics run either an
operating system
An operating system (OS) is system software that manages computer hardware, software resources, and provides common daemon (computing), services for computer programs.
Time-sharing operating systems scheduler (computing), schedule tasks for ef ...
or
firmware
In computing, firmware is a specific class of computer software that provides the low-level control for a device's specific hardware. Firmware, such as the BIOS of a personal computer, may contain basic functions of a device, and may provide ...
. When this is stored in a mutable storage device, these files can be modified to add functionality to the operating system, or to replace it entirely.
Method
Multiple methods are used in order to successfully hack the target device, such as gaining
shell
Shell may refer to:
Architecture and design
* Shell (structure), a thin structure
** Concrete shell, a thin shell of concrete, usually with no interior columns or exterior buttresses
** Thin-shell structure
Science Biology
* Seashell, a hard o ...
access, gathering information about the device hardware and software, before using the obtained information to manipulate the operating system.
Shell access
Getting access to a shell allows the user to run
commands
Command may refer to:
Computing
* Command (computing), a statement in a computer language
* COMMAND.COM, the default operating system shell and command-line interpreter for DOS
* Command key, a modifier key on Apple Macintosh computer keyboards
* ...
to interact with the operating system. Typically, a root shell is aimed for, which grants
administrative privileges
In computing, the superuser is a special user account used for system administration. Depending on the operating system (OS), the actual name of this account might be root, administrator, admin or supervisor. In some cases, the actual name of th ...
, to let the user modify operating system files.
Root access can be obtained through the use of
software exploit
An exploit (from the English verb ''to exploit'', meaning "to use something to one’s own advantage") is a piece of software, a chunk of data, or a sequence of commands that takes advantage of a bug or vulnerability to cause unintended or unanti ...
s (i.e. bugs), through the
bootloader
A bootloader, also spelled as boot loader or called boot manager and bootstrap loader, is a computer program that is responsible for booting a computer.
When a computer is turned off, its softwareincluding operating systems, application code, an ...
console, or over a
serial port embedded in the device, such as a
JTAG
JTAG (named after the Joint Test Action Group which codified it) is an industry standard for verifying designs and testing printed circuit boards after manufacture.
JTAG implements standards for on-chip instrumentation in electronic design autom ...
or
UART
A universal asynchronous receiver-transmitter (UART ) is a computer hardware device for asynchronous serial communication in which the data format and transmission speeds are configurable. It sends data bits one by one, from the least signific ...
interface.
In the case of gaining root privileges on an Android device, the process is known as
rooting.
Unlocking the bootloader

On some Android devices, the bootloader is locked for security to prevent installation of other operating systems. Unlocking it is required before another OS can be installed.
On Android devices,
Fastboot
Fastboot is a protocol and a tool of the same name. It is included with the Android SDK package used primarily to modify the flash filesystem
In computing, file system or filesystem (often abbreviated to fs) is a method and data structure t ...
(
Odin mode
Odin is a utility software program developed and used by Samsung internally which is used to communicate with Samsung devices in Odin mode (also called download mode). It can be used to flash a custom recovery firmware image (as opposed to the st ...
on Samsung devices) allows
flashing of operating systems onto storage.
Das U-Boot
Das U-Boot (subtitled "the Universal Boot Loader" and often shortened to U-Boot; see ''#History, History'' for more about the name) is an open-source software, open-source, primary Bootloader, boot loader used in Embedded system, embedded device ...
is a bootloader commonly used in embedded devices such as routers and Chromebooks.
Getting information
Getting information on the device's hardware and software is vital because exploits can be identified, which is subsequently used to either gain shell access, port an operating system to the device, etc.
Manufacturer use of open source software
A lot of device manufacturers include open source software in their products.
When the software used is licensed under a copyleft license, a manufacturer is obliged to provide the source code of the open source components. An instance of this was when
Naomi Wu
Naomi Wu, also known as Sexy Cyborg ( zh, s=机械妖姬, t=機械妖姬, p=Jīxiè Yāojī, l=Machinery Enchantress), is a Chinese DIY maker and internet personality. As an advocate of women in STEM, transhumanism, open source hardware, a ...
requested the
GPLv2
The GNU General Public License (GNU GPL or simply GPL) is a series of widely used free software licenses that guarantee end users the four freedoms to run, study, share, and modify the software. The license was the first copyleft for general u ...
licensed source code of the Linux Kernel branch of a smartphone vendor.
A good share of consumer devices run on a modified
Linux kernel
The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel. It was originally authored in 1991 by Linus Torvalds for his i386-based PC, and it was soon adopted as the kernel for the GNU ...
,
which is
forked before applying device-specific changes. Android is an example of OS which makes use of the Linux kernel.
Countermeasures
Device manufacturers often include countermeasures to hinder hardware hacking, one of which is the use of
cryptography
Cryptography, or cryptology (from grc, , translit=kryptós "hidden, secret"; and ''graphein'', "to write", or ''-logia'', "study", respectively), is the practice and study of techniques for secure communication in the presence of adve ...
to prevent unauthorized code from being executed. For example,
Nvidia
Nvidia CorporationOfficially written as NVIDIA and stylized in its logo as VIDIA with the lowercase "n" the same height as the uppercase "VIDIA"; formerly stylized as VIDIA with a large italicized lowercase "n" on products from the mid 1990s to ...
graphics cards have
signed firmware to prevent tampering or hacking.
Devices
Smartphones
Hardware device removal
Whistleblower
A whistleblower (also written as whistle-blower or whistle blower) is a person, often an employee, who reveals information about activity within a private or public organization that is deemed illegal, immoral, illicit, unsafe or fraudulent. Whi ...
Edward Snowden
Edward Joseph Snowden (born June 21, 1983) is an American and naturalized Russian former computer intelligence consultant who leaked highly classified information from the National Security Agency (NSA) in 2013, when he was an employee and s ...
showed
''Wired'' correspondent
Shane Smith how to remove the
cameras
A camera is an optical instrument that can capture an image. Most cameras can capture 2D images, with some more advanced models being able to capture 3D images. At a basic level, most cameras consist of sealed boxes (the camera body), with a ...
and microphones from a smartphone.
Modifying default operating systems
One of the reasons hacking is done is to add or unlock features in an operating system.
Examples include:
* Windows Phone
*
Apple iOS
iOS (formerly iPhone OS) is a mobile operating system created and developed by Apple Inc. exclusively for its hardware. It is the operating system that powers many of the company's mobile devices, including the iPhone; the term also include ...
(
jailbreaking)
* Google Android (
rooting)
* Palm webOS (developer mode)
* Symbian OS (executing unsigned code)
*
Jio
Reliance Jio Infocomm Limited, doing business as Jio, is an Indian telecommunications company and a subsidiary of Jio Platforms, headquartered in Navi Mumbai, Maharashtra, India. It operates a national LTE network with coverage across all 2 ...
phone (Enabling
WhatsApp
WhatsApp (also called WhatsApp Messenger) is an internationally available freeware, cross-platform, centralized instant messaging (IM) and voice-over-IP (VoIP) service owned by American company Meta Platforms (formerly Facebook). It allows user ...
to be installed)
Installing a third-party operating system
Another reason hacking is done is to allow unsupported operating systems to be installed.
*
Replicant
A replicant is a fictional bioengineered humanoid featured in the 1982 film ''Blade Runner'' and the 2017 sequel ''Blade Runner 2049'' which is physically indistinguishable from an adult human and often possesses superhuman strength and intellig ...
*
postmarketOS
postmarketOS (abbreviated as pmOS) is an operating system primarily for smartphones, based on the Alpine Linux distribution.
postmarketOS was launched on 26 May 2017 with the source code available on GitHub before migrating to GitLab in 2018. I ...
*
Firefox OS
Firefox OS (project name: ''Boot to Gecko'', also known as ''B2G'') is a discontinued open-source operating system made for smartphones, tablet computers, smart TVs, and dongles designed by Mozilla and external contributors. It is based on the ...
(defunct)
General purpose computers
A
general purpose computer
A computer is a machine that can be programmed to automatically carry out sequences of arithmetic or logical operations (computation). Modern digital electronic computers can perform generic sets of operations known as programs. These progr ...
has historically been open by design.
However,
Apple
An apple is an edible fruit produced by an apple tree (''Malus domestica''). Apple trees are cultivated worldwide and are the most widely grown species in the genus '' Malus''. The tree originated in Central Asia, where its wild ances ...
's
Apple silicon
Apple silicon is a series of system on a chip (SoC) and system in a package (SiP) processors designed by Apple Inc., mainly using the ARM architecture. It is the basis of most new Mac computers as well as iPhone, iPad, iPod Touch, Apple ...
based
Mac
Mac or MAC most commonly refers to:
* Mac (computer), a family of personal computers made by Apple Inc.
* Mackintosh, a raincoat made of rubberized cloth
* A variant of the word macaroni, mostly used in the name of the dish mac and cheese
* Mac, ...
hardware is based on the
ARM architecture
ARM (stylised in lowercase as arm, formerly an acronym for Advanced RISC Machines and originally Acorn RISC Machine) is a family of reduced instruction set computer (RISC) instruction set architectures for computer processors, configure ...
, making it difficult to install a third-party operating system.
*
Asahi Linux
Asahi Linux is a porting project to develop support for Linux on Apple hardware, specifically Apple silicon-powered Macs, allowing them to run alternative operating systems in addition to macOS. The software design project was started and is l ...
allows a Linux-based operating system to be installed on M1-based Macs.
Multimedia devices and video game systems
There are many reasons
video game consoles
A video game console is an electronic device that outputs a video signal or image to display a video game that can be played with a game controller. These may be home consoles, which are generally placed in a permanent location connected to a ...
may be hacked.
Game consoles are often restricted in a way that may disallow unofficial games to be run on it (see
Video game console#Licensing), and hacking is undertaken to allow unlicensed games to run on it, including
pirated games.
Another reason is to allow features to be added, such as using the console as a multimedia player. An example of this is
Xbox Media Player
Xbox Media Player (or XBMP for short), now obsolete, was the predecessor to XBMC and XBMC4Xbox, a feature-rich free and open source media player for the Xbox (console). With an audio/video-player-core based on MPlayer, it allowed owners of a mod ...
, which was made to allow pictures and movies to be shown on an
Xbox
Xbox is a video gaming brand created and owned by Microsoft. The brand consists of five video game consoles, as well as applications (games), streaming services, an online service by the name of Xbox network, and the development arm by th ...
.
* Microsoft
**
Xbox
Xbox is a video gaming brand created and owned by Microsoft. The brand consists of five video game consoles, as well as applications (games), streaming services, an online service by the name of Xbox network, and the development arm by th ...
**
Xbox 360
The Xbox 360 is a home video game console developed by Microsoft. As the successor to the original Xbox, it is the second console in the Xbox series. It competed with Sony's PlayStation 3 and Nintendo's Wii as part of the seventh generati ...
**
Xbox One
The Xbox One is a home video game console developed by Microsoft. Announced in May 2013, it is the successor to Xbox 360 and the third base console in the Xbox series of video game consoles. It was first released in North America, parts of ...
**
Xbox Series X/S
The Xbox Series X/S are home video game consoles developed by Microsoft. They were both released on November 10, 2020, as the fourth generation Xbox, succeeding the Xbox One. Along with Sony's PlayStation 5, also released in November 2020 ...
* Nintendo
**
GameCube
The is a home video game console developed and released by Nintendo in Japan on September 14, 2001, in North America on November 18, 2001, and in PAL territories in 2002. It is the successor to the Nintendo 64 (1996), and predecessor of the W ...
**
Game Boy Advance
The (GBA) is a 32-bit handheld game console developed, manufactured and marketed by Nintendo as the successor to the Game Boy Color. It was released in Japan on March 21, 2001, in North America on June 11, 2001, in the PAL region on June 22, 2 ...
**
Nintendo DS
**
Nintendo 3DS
The is a handheld game console produced by Nintendo. It was announced in March 2010 and unveiled at E3 2010 as the successor to the Nintendo DS. The system features backward compatibility with Nintendo DS video games. As an eighth-generati ...
(
Homebrew
Homebrewing mainly refers to small-scale, non-commercial manufacture of a drink, typically beer.
Homebrew or home brew may also refer to:
Computing
* Homebrew Computer Club
* Homebrew (package manager), for macOS and Linux
* Homebrew (video game ...
)
**
Wii
The Wii ( ) is a home video game console developed and marketed by Nintendo. It was released on November 19, 2006, in North America and in December 2006 for most other regions of the world. It is Nintendo's fifth major home game console, ...
***
Wii homebrew
Homebrew, when applied to video games, refers to games produced by hobbyists for proprietary video game consoles which are not intended to be user-programmable. The official documentation is often only available to licensed developers, and the ...
**
Wii U
The Wii U ( ) is a home video game console developed by Nintendo as the successor to the Wii. Released in late 2012, it is the first eighth-generation video game console and competed with Microsoft's Xbox One and Sony's PlayStation 4.
Th ...
**
Nintendo Switch
The is a hybrid video game console developed by Nintendo and released worldwide in most regions on March 3, 2017. The console itself is a tablet that can either be docked for use as a home console or used as a portable device, making it a ...
* Sony
**
PlayStation Portable
The PlayStation Portable (PSP) is a handheld game console developed and marketed by Sony Computer Entertainment. It was first released in Japan on December 12, 2004, in North America on March 24, 2005, and in PAL regions on September 1, 200 ...
**
PlayStation 2
**
PlayStation 3
The PlayStation 3 (PS3) is a home video game console developed by Sony Interactive Entertainment, Sony Computer Entertainment. The successor to the PlayStation 2, it is part of the PlayStation brand of consoles. It was first released on Novemb ...
**
PlayStation Vita
The PlayStation Vita (PS Vita, or Vita) is a handheld video game console developed and marketed by Sony Interactive Entertainment. It was first released in Japan on December 17, 2011, and in North America, Europe, and other international terri ...
* Others
**
TiVo
TiVo ( ) is a digital video recorder (DVR) developed and marketed by Xperi (previously by TiVo Corporation and TiVo Inc.) and introduced in 1999. TiVo provides an on-screen guide of scheduled broadcast programming television programs, whose fe ...
**
DVD player
A DVD player is a device that plays DVDs produced under both the DVD-Video and DVD-Audio technical standards, two different and incompatible standards. Some DVD players will also play audio CDs. DVD players are connected to a television to ...
- to remove
regional restrictions,
user operation prohibition
The user operation prohibition (abbreviated UOP) is a form of use restriction used on video DVD discs and Blu-ray discs. Most DVD players and Blu-ray players prohibit the viewer from performing a large majority of actions during sections of a DVD ...
flag (fast forward disabled in advertising clip etc.) and
Macrovision
TiVo Corporation, formerly known as the Rovi Corporation and Macrovision Solutions Corporation, was an American technology company. Headquartered in San Jose, California, the company is primarily involved in licensing its intellectual property ...
(video copy is flashing after copying to protect
analog hole
The analog hole (also known as the analog loophole or analog gap) is a perceived fundamental and inevitable vulnerability in copy protection schemes for noninteractive works in digital formats which can be exploited to duplicate copy-protected wor ...
)
**
Blu-ray
The Blu-ray Disc (BD), often known simply as Blu-ray, is a digital optical disc data storage format. It was invented and developed in 2005 and released on June 20, 2006 worldwide. It is designed to supersede the DVD format, and capable of s ...
players - to remove regional restrictions
** Any non-smart mobile phone. To remove operator lock or
SIM lock
SIM lock, simlock, network lock, carrier lock or (master) subsidy lock is a technical restriction built into GSM and CDMA mobile phones by mobile phone manufacturers for use by service providers to restrict the use of these phones to specific co ...
restriction.
Other devices
*
Graphing calculator
A graphing calculator (also graphics calculator or graphic display calculator) is a handheld computer that is capable of plotting graphs, solving simultaneous equations, and performing other tasks with variables. Most popular graphing calcu ...
s
**
Texas Instruments signing key controversy
*
Video card
A graphics card (also called a video card, display card, graphics adapter, VGA card/VGA, video adapter, display adapter, or mistakenly GPU) is an expansion card which generates a feed of output images to a display device, such as a computer mo ...
s
*
Routers
**
DD-WRT
DD-WRT is Linux-based firmware for wireless routers and Wireless access point, access points. Originally designed for the Linksys WRT54G series, it now runs on a wide variety of models. DD-WRT is one of a handful of List of router firmware proj ...
**
OpenWRT
OpenWrt (from ''open wireless router'') is an open-source project for embedded operating systems based on Linux, primarily used on embedded devices to route network traffic. The main components are Linux, util-linux, musl, and BusyBox. A ...
*
Oscilloscopes
*
Thermographic camera
Infrared thermography (IRT), thermal video and/or thermal imaging, is a process where a thermal camera captures and creates an image of an object by using infrared radiation emitted from the object in a process, which are examples of infrared ...
s
*
GPS
The Global Positioning System (GPS), originally Navstar GPS, is a satellite-based radionavigation system owned by the United States government and operated by the United States Space Force. It is one of the global navigation satellite sy ...
devices
*
Canon
Canon or Canons may refer to:
Arts and entertainment
* Canon (fiction), the conceptual material accepted as official in a fictional universe by its fan base
* Literary canon, an accepted body of works considered as high culture
** Western can ...
Digital camera
A digital camera is a camera that captures photographs in digital memory. Most cameras produced today are digital, largely replacing those that capture images on photographic film. Digital cameras are now widely incorporated into mobile devic ...
s
*
Nikon
(, ; ), also known just as Nikon, is a Japanese multinational corporation headquartered in Tokyo, Japan, specializing in optics and imaging products. The companies held by Nikon form the Nikon Group.
Nikon's products include cameras, camera ...
Digital cameras
A digital camera is a camera that captures photographs in digital memory. Most cameras produced today are digital, largely replacing those that capture images on photographic film. Digital cameras are now widely incorporated into mobile device ...
.
Devices allowing for hacking

Some devices—most commonly open source—are built for
homebrew
Homebrewing mainly refers to small-scale, non-commercial manufacture of a drink, typically beer.
Homebrew or home brew may also refer to:
Computing
* Homebrew Computer Club
* Homebrew (package manager), for macOS and Linux
* Homebrew (video game ...
purposes, and encourage hacking as an integral part of their existence.
*
Pandora (console)
The Pandora is an operating system, handheld game console and mobile personal computer originally released in 2010. It is designed to take advantage of existing free and open-source software and to be a target for homebrew development. It in ...
*Samsung
*Tekno
*
*
Chumby
The Chumby was a consumer electronics product formerly made by Chumby Industries, Inc. It is an embedded computer which provides Internet and LAN access via a Wi-Fi connection. Through this connection, the Chumby runs various software widgets. I ...
*
Ouya
The Ouya ( ), stylized as OUYA, is an Android-based microconsole developed by Ouya Inc. Julie Uhrman founded the project in 2012, bringing in designer Yves Béhar to collaborate on its design and Muffi Ghadiali as VP of Product Management to ...
*
Nokia N900
The Nokia N900 is a smartphone made by Nokia. It supersedes the Nokia N810. Its default operating system, Maemo 5, is a Linux-based OS originally developed for the Nokia 770 Internet Tablet. It is the first Nokia device based upon the Texas In ...
*
Android Dev Phone
The Android Dev Phone (ADP) is a Subscriber Identity Module, SIM-unlocked and bootloader unlocked Android (operating system), Android device that is designed for advanced developers. While developers can use regular consumer devices purchased at re ...
**
Nexus One
The Nexus One (codenamed HTC Passion) is an Android smartphone designed and manufactured by HTC as Google's first Nexus smartphone. The Nexus became available on January 5, 2010, and features the ability to transcribe voice to text, an additio ...
**
Nexus S
The Nexus S 4G is a smartphone co-developed by Google and Samsung and manufactured by Samsung Electronics for release in 2010. It was the first smartphone to use the Android 2.3 "Gingerbread" operating system, and the first Android device to su ...
**
Galaxy Nexus
The Galaxy Nexus (GT-I9250) is a touchscreen Android smartphone co-developed by Google and Samsung Electronics. It is the third smartphone in the Google Nexus series, a family of Android consumer devices built by an original equipment manufactu ...
, currently one of the phones recommended by the ''
Android Open Source Project
Android is a mobile operating system based on a modified version of the Linux kernel and other open-source software, designed primarily for touchscreen mobile devices such as smartphones and tablets. Android is developed by a consortium of deve ...
'' for software development
*
ZTE Open
The ZTE Open is an entry-level smartphone released by ZTE in July 2013. It is intended for software developers wanting to build and test mobile applications on Firefox OS, though it was sold commercially in Spain.
ZTE Open was launched in India ...
* Many
wireless routers'
firmware
In computing, firmware is a specific class of computer software that provides the low-level control for a device's specific hardware. Firmware, such as the BIOS of a personal computer, may contain basic functions of a device, and may provide ...
upgrade functions are not limited to accepting updates that have been signed by the device's manufacturer. As a result, open-source firmware replacements have been created for many devices, such as
OpenWrt
OpenWrt (from ''open wireless router'') is an open-source project for embedded operating systems based on Linux, primarily used on embedded devices to route network traffic. The main components are Linux, util-linux, musl, and BusyBox. A ...
and
DD-WRT
DD-WRT is Linux-based firmware for wireless routers and Wireless access point, access points. Originally designed for the Linksys WRT54G series, it now runs on a wide variety of models. DD-WRT is one of a handful of List of router firmware proj ...
.
Legality
iOS jailbreaking was often considered illegal in the United States until a recent ruling by the
U.S. Copyright Office
The United States Copyright Office (USCO), a part of the Library of Congress, is a United States government body that maintains records of copyright registration, including a copyright catalog. It is used by copyright title searchers who are ...
declaring that jailbreaking an iPhone or other mobile device would no longer violate copyright law. However, simultaneously, there is ongoing prosecution against hackers of videogame consoles under
anti-circumvention
Anti-circumvention refers to laws which prohibit the circumvention of technological barriers for using a digital good in certain ways which the rightsholders do not wish to allow. The requirement for anti-circumvention laws was globalized in 1996 ...
violations of the
DMCA
The Digital Millennium Copyright Act (DMCA) is a 1998 United States copyright law that implements two 1996 treaties of the World Intellectual Property Organization (WIPO). It criminalizes production and dissemination of technology, devices, or ...
. A main complication, in many cases, is the profiting from selling jailbroken or rooted equipment as a value-added service. At least some accused deny these charges and claim only to be making back-ups of legally purchased games.
In around 2010, the
High-bandwidth Digital Content Protection
High-bandwidth Digital Content Protection (HDCP) is a form of digital copy protection developed by Intel Corporation to prevent copying of digital audio and video content as it travels across connections. Types of connections include DisplayPort ...
encryption system, which encrypts data running between cable boxes,
Blu-ray
The Blu-ray Disc (BD), often known simply as Blu-ray, is a digital optical disc data storage format. It was invented and developed in 2005 and released on June 20, 2006 worldwide. It is designed to supersede the DVD format, and capable of s ...
players, and other similar devices and displays was cracked, and a copy of the master key needed to decrypt HDCP protected streams was posted on the internet.
Intel
Intel Corporation is an American multinational corporation and technology company headquartered in Santa Clara, California, Santa Clara, California. It is the world's largest semiconductor chip manufacturer by revenue, and is one of the devel ...
, which created and now licenses HDCP technology, has stated that HDCP is sufficient to keep most users from circumventing it, but indicated that it may threaten legal action against more determined users under the
DMCA
The Digital Millennium Copyright Act (DMCA) is a 1998 United States copyright law that implements two 1996 treaties of the World Intellectual Property Organization (WIPO). It criminalizes production and dissemination of technology, devices, or ...
.
Also in around 2010, on the issue of the hacking of its then new interactive game controller the
Kinect
Kinect is a line of motion sensing input devices produced by Microsoft and first released in 2010. The devices generally contain RGB cameras, and infrared projectors and detectors that map depth through either structured light or time of fl ...
, Microsoft initially condemned and threatened legal action against those who hacked it, but soon after, it reversed this position and instead stated that it had intentionally left the device open, and would in fact not prosecute those who modified it.
See also
*
Electronics right to repair
Electronics right to repair is proposed legislation that would provide the practical means for electronics equipment owners to repair their devices. Repair is legal under copyright law and patent law. However, owners and independent technicians ...
*
iOS jailbreaking
*
Rooting (Android OS)
Rooting is the process by which users of Android devices can attain privileged control (known as root access) over various subsystems of the device, usually smartphones. Because Android is based on a modified version of the Linux kernel, rooting ...
*
Symbian OS Security
bypass
*
List of open source hardware projects
This is a list of open-source hardware projects, including computer systems and components, cameras, radio, telephony, science education, machines and tools, robotics, renewable energy, home automation, medical and biotech, automotive, prototyp ...
*
Privilege escalation
Privilege escalation is the act of exploiting a bug, a design flaw, or a configuration oversight in an operating system or software application to gain elevated access to resources that are normally protected from an application or user. The re ...
*
Unsigned code
Code signing is the process of digitally signing executables and scripts to confirm the software author and guarantee that the code has not been altered or corrupted since it was signed. The process employs the use of a cryptographic hash to val ...
References
External links
Hardware Hacking No Starch Press
Hardware Hacking First Steps OpenWRT Wiki
{{DEFAULTSORT:Hacking Of Consumer Electronics
Hacker culture
Hardware restrictions
Proprietary hardware