This article needs to be updated. Please help update this article to reflect recent events or newly available information. (May 2023)
USB dongle for PlayStation to jailbreak the system.
A PS Jailbreak USB dongle

PlayStation 3 Jailbreak was the first USB (Universal Serial Bus) chipset that allowed unauthorized execution of code, similar to homebrew, on the PlayStation 3. It works by bypassing a system security check using a memory exploit (heap overflow) which occurs with USB devices that allows the execution of unsigned code.


Sony had taken a few steps to prevent the jailbreak of the PlayStation 3, and has associated the action as a form of copyright infringement. In eastern European countries, no action has ever been taken to condemn such cases.

The cases listed below are lawsuits Sony filed in courts to prohibit the sales and imports of circumvention devices that would jailbreak the system.


The underlying exploit and inner workings of the PS3 Jailbreak have been entirely reverse engineered[5] and reimplemented through the open source PSGroove.[6]

Through analysis of USB traffic to and from the PS3 Jailbreak, it was found that the device induced a heap overflow in kernel-space memory to trigger execution of untrusted code.[5]

See also


  1. ^ "PS3 Modchipserritories like the US, Europe, and Asia to block its sale. Suits are filed against retailers selling the device".
  2. ^ Mark_Raby (December 18, 2010). "Powned: Sony ordered to pay restitution to PS Jailbreak seller in Spain". gamesradar. Retrieved November 14, 2021.
  3. ^ "Sony and Hotz settle hacking case". BBC News. April 12, 2011. Retrieved November 14, 2021.
  4. ^ Kravets, David. "Judge Lets Sony Unmask Visitors to PS3-Jailbreaking Site". Wired. ISSN 1059-1028. Retrieved November 14, 2021.
  5. ^ a b "PSJailbreak Exploit Payload Reverse Engineering - PS3 Developer wiki". Retrieved August 8, 2023.
  6. ^ "PSGroove - PS3 Developer wiki". Retrieved August 8, 2023.