Do you own a PlayStation 3
console? If so, shut up, sit down, and do what you're told! Before you fire off an angry email, understand that directive's not coming from us -- we're just the messenger here, so please don't shoot -- but Sony
, who admittedly didn't word things that way. What the company did
do, however, was threaten PS3 hackers with a lifetime ban.
"Violation of the System Software License Agreement for the PlayStation 3 System invalidates the consumer guarantee for that system. In addition, copying or playing pirated software is a violation of International Copyright Laws. Consumers using circumvention devices or running unauthorized or pirated software will have access to the PlayStation Network and access to Qriocity services through PlayStation 3 system terminated permanently," Sony posted on its official blog.
To avoid this from happening, PS3 owners must "immediately cease use and remove all circumvention devices and delete all unauthorized or pirated software from their PlayStation 3 systems." Or toss it up on CraigsList and get an Xbox 360.
It's not clear when exactly Sony plans to start bringing down the ban hammer, only that it will. And if you see error 0x8002A227 on your console, then you've been banned, says Twitter user @Mathieulh
This move is the latest in Sony's crusade against hackers. Sony recently won a temporary restraining order against George Hotz, or Geohot, who's jailbreak software makes it possible for PS3 owners to run unauthorized software on their console, such as backed up games and pirated copies. Prior to all this, Gotz was best known for making it easy to jailbreak the iPhone. Sony's case against Hotz is ongoing.
Awesome Image Credit: evilavatar.com forum member "gzsfrk"
If you think Sony's going to far, don't be surprised. This is same company which in 2005 thought it was a brilliant idea to install rootkits on people's PCs who tried to play certain Sony CDs. Not only was the software silently installed before the EULA ever showed up, but it didn't come with an installer and could be exploited by malicious software.