Pues señores que esto empieza, y como no con un proyecto de portar linux a XBOX360. Mas informacion en la web
http://www.free60.org/
Datos interesantes:
* The flash is encrypted with a per-box key
* The key is stored inside the CPU
* The boot ROM is stored inside the CPU
* Also inside the CPU is a hypervisor that verifies the running state of the kernel, making sure there is no modification (RAM checksums), else the Xbox360 panics and blows up!
* The CPU contains RAM inside of it to store the checksums
* All interrupt/exception handling is done by the hypervisor
* All code runs in kernel mode
* The emulator for first generation games can be updated via an official Microsoft download burned to CD by the user, though the CDs' content will be encrypted and signed with public key cryptography.
* The Xbox 360's Hard Disk appears to connect to the Xbox 360 via 7-pin SATA, internally the drive connects to the external connector through standard SATA data and power connectors. This should be of some help.
EDITADO CON NUEVA INFORMACION
NUEVOS DATOS POR UN USUARIO DE XBOX-SCENE QUE HA ESPIADO EL TRAFICO VIA LIVE
Gprime on our forums sniffed the network traffic to/from the Xbox 360 and noticed that everything downloaded from xbox live arcade is done as a (encrypted) .xcp file. It's done so over an HTTP (unencrypted) protocol on port 3074.
A whitepaper about xCP is available
here(pdf) and the Free60 Project also posted some details about these files:
[QUOTE]
It's
been found that Xbox360 Live Arcade downloads files with the extension .xcp over unencrypted http on port 3074 for content distribution.
* They appear to have no headers and be symmetrically encrypted. (This information from conversation in #free60)
* It may be possible to use the avatar downloads to glean more info about the file format.
The IBM Connection: In 2003 IBM Released information on their new DRM scheme xCP
Possibly Unrelated: Wikipedia has information on the Sony DRM from the latest rootkit debacle, apparently First 4 Internet also calls it XCP