Microsoft's 'unhackable' Xbox One has been hacked by 'Bliss'
Meaning of “Unhackable”
- Strong disagreement over the term:
- Some argue nothing is literally unhackable; the label invites ridicule (Titanic analogy, word inflation concerns).
- Others say “unhackable” is reasonable in context: 13 years without a full compromise, including its entire commercial life, and relative to peers (PS4, iPhones) that were hacked much earlier.
- Several note Microsoft never used that term; media and headlines did.
Difficulty, Timeframe, and Security Goals
- Attack affects only the first 2013 “VCR” hardware revision; later silicon added more anti‑glitch protections.
- Seen by many as a huge success:
- No full boot‑chain compromise during the product’s active life; piracy and cheating effectively blocked.
- Xbox security team explicitly aimed to make physical attacks cost more than ~10 games; by that metric they “won.”
- Some argue the long delay also reflects lower attacker incentive: few true exclusives, strong PC overlap, and official dev mode for homebrew.
How the Hack Works (Voltage Glitching)
- Uses power‑rail “voltage glitching”:
- Carefully timed double glitches during early boot to (1) skip MMU init, then (2) hijack control during a memcpy, gaining code execution in the immutable boot ROM path.
- Microsoft mitigations included:
- Randomized delay loops, disabled debug/status readouts, hash‑chained boot stages, user/kernel‑like separation, and rail monitoring.
- Commenters note fault injection is an old technique (smartcards, satellite TV, prior Xbox 360 “reset glitch”), but this is a particularly sophisticated application.
- Consensus: defending against precise hardware fault injection with full physical access is extremely hard; you can only raise cost and delay success.
Homebrew, Emulation, and Practical Impact
- Xbox One already had an official dev mode with side‑loaded apps (emulators, Kodi, homebrew).
- Criticisms: memory limits, ID requirements, bans blocking dev mode; some prefer an unrestricted hack.
- New exploit enables highest‑privilege unsigned code, opening:
- Potential modchips (though only for early units, with legal/distribution hurdles).
- Better game dumping, preservation, and perhaps improved emulation (including Xbox 360/OG titles enhanced on Xbox One).
- Several users plan to repurpose cheap used launch consoles as Linux/homelab boxes.
Security, Ownership, and Future Platforms
- Thread reiterates: security is not binary; delay and cost are valid goals.
- Debate over efuses and secure boot:
- One side: ubiquitous and needed to prevent dangerous firmware rollback.
- Other side: they lock owners out; secure boot that only the vendor controls “should be illegal.”
- Concern that techniques pioneered on consoles (secure elements, attestation) flow into phones, PCs, and cloud, potentially eroding general‑purpose computing.
- Comparison with Azure:
- Console is designed to survive hostile physical custody by users.
- Azure Government relies more on physical controls, tamper‑resistant hardware modules, and data‑center procedures; very different threat model.