George Hotz

From Wikipedia, the free encyclopedia
  (Redirected from Geohot)
Jump to navigation Jump to search

George Hotz
George Hotz at TechCrunch Disrupt.jpg
George Francis Hotz Jr.

(1989-10-02) October 2, 1989 (age 30)
Other namesgeohot
EducationBergen County Academies
Alma materCarnegie Mellon University, RIT
Notable work

George Francis Hotz (born October 2, 1989), alias geohot, is an American hacker and creative consumer known for unlocking the iPhone, allowing the phone to be used with other wireless carriers, contrary to AT&T's and Apple's intentions.[1][2] He developed the limera1n exploit for iOS. He is also noted for his technical efforts and publicity with reverse engineering the PlayStation 3 video game console, and for subsequently being sued by and settling with Sony. As of September 2015, he is working on his vehicle automation machine learning company[3]

Personal life[edit]

He attended the Bergen County Academies, a magnet public high school in Hackensack, New Jersey. He attended Academy for Engineering and Design Technology.[4] Hotz is an alumnus of the Johns Hopkins Center for Talented Youth program.[5] Hotz also briefly attended Rochester Institute of Technology[6] and Carnegie Mellon University.

iOS device security[edit]

In August 2007, seventeen-year-old George Hotz became the first person reported to carrier-unlock an iPhone.[7][8][9][10] According to Hotz's blog, he traded his second unlocked 8 GB iPhone to Terry Daidone, the founder of Certicell, for a Nissan 350Z and three 8 GB iPhones.[11]

In September 2007, an anonymous group achieved a software-only unlocking method to complement Hotz's hardware-based unlocking method.[12]

On July 13, 2010, Hotz announced the discontinuation of his jailbreaking activities, citing demotivation over the technology and the unwanted personal attention.[13] Nevertheless, he continued to release new software-based jailbreak techniques until October 2010.[14]

PlayStation 3 security[edit]

In December 2009, Hotz announced his initial intentions to breach security on the Sony PlayStation 3. Five weeks later, on January 22, 2010, he announced that he had performed his first theoretical achievement. This consists of the initial read and write access to the machine's system memory as well as hypervisor level access to the machine's CPU.[15]

On January 26, 2010, Hotz released the exploit to the public. On March 28, 2010, Sony responded by announcing their intention to release a PlayStation 3 firmware update that would remove the OtherOS feature from all models,[16] a feature that was already absent on the newer Slim revisions of the machine.[citation needed]

On July 13, 2010, never having achieved any method of reading, installing, or modifying software on the PS3, Hotz posted a message on his Twitter account stating that he had abandoned his efforts of trying to crack the PS3 any further due to the system security's extreme difficulty.[17]

On December 29, 2010, notable hacking group fail0verflow, known for the reverse engineering of security models found in consumer electronics devices, performed an academic presentation at the 27th Chaos Communications Congress technical conference, of their accomplishments with the PlayStation 3. They presented the methods they'd devised for having successfully penetrated the device's security model, yielding the root signing and encryption keys. These keys are the essential element of a full (and even minimally usable) breach, capable of installing and running any new software on any PlayStation 3 unit.[18][19]

On January 2, 2011, Hotz posted a copy of the root keys of the PlayStation 3 on his website.[20] These keys were later removed from his website as a result of legal action by Sony against fail0verflow and Hotz. In response to his continued publication of PS3 exploit information, Sony filed on January 11, 2011 for an application for a temporary restraining order (TRO) against him in the US District Court of Northern California.[21] On January 14, 2011, Hotz appeared in an interview on G4's The Loop, where he explained his involvement with the PlayStation 3.[22][23]

Sony lawsuit[edit]

After the root keys of the console were published, Sony initiated litigation against George Hotz and predecessor PlayStation 3 hacking group known as fail0verflow. Hotz published his commentary on the case, including a song about the "disaster" of Sony.[24] Sony in turn has demanded social media sites, including YouTube, to hand over IP addresses of people who visited Geohot's social pages and videos; the latter being the case only for those who "watched the video and 'documents reproducing all records or usernames and IP addresses that have posted or published comments in response to the video".[25]

PayPal has granted Sony access to Geohot's PayPal account,[26] and the judge of the case granted Sony permission to view the IP addresses of everyone who visited In April 2011, it was revealed that Sony and Hotz had settled the lawsuit out of court, on the condition that Hotz would never again resume any hacking work on Sony products.[27]

At the end of April 2011, an anonymous hacker broke into the PlayStation Network and stole personal information of some 77 million users. Hotz denied any responsibility for the attack, and said "Running homebrew and exploring security on your devices is cool; hacking into someone else's server and stealing databases of user info is not cool".[25]

Rooting the AT&T and Verizon Galaxy S5[edit]

In June 2014, Hotz[28] published a root exploit software hack for Samsung Galaxy S5 devices used in the US market.[29] The exploit is itself built around Linux kernel CVE-2014-3153,[30][31] which was discovered by hacker Pinkie Pie, and it involves an issue in the Futex subsystem that in turn allows for privilege escalation. The exploit, known as towelroot, was designated a "one-click Android rooting tool"[31] by the hacking community because it was designed to be installed quickly like an App; other rooting hacks were typically uploaded from a nearby PC with a cable and necessitated rebooting the device with a special set of key presses.

Although originally released for the Verizon Galaxy S5, the root exploit was made compatible with most Android devices available at that time. For example, it was tested and found to work with the AT&T Galaxy S5, Nexus 5, and Galaxy S4 Active. Updates continued to be applied to the root exploit to increase its capabilities with other devices running Android.[32] Updates to the Android operating system closed the source of the exploit. Samsung officially responded to the towelroot exploit by releasing updated software designed to be immune from the exploit.[33]


In addition to having made a meaningful side income from public donations solicited for his exploits,[8] Hotz has been employed at Facebook and Google.

On June 27, 2011, ZDNet freelance reporter, Emil Protalinski reported that according to a Facebook spokesman, Hotz had been hired by the company in an unknown role.[34] However, according to a CNET article, he had actually been employed since May, which was confirmed by Facebook.[35] In January 2012, Hotz was no longer employed by Facebook.[8][36]

On July 16, 2014, Google hired Hotz to work in their software security auditing team called Project Zero, which "hopes to find zero-day vulnerabilities before the NSA".[37] Hotz worked in Project Zero for 5 months where he developed Qira – an open source program for dynamically analysing application binaries.[38]

In January 2015, hired Hotz to develop AI algorithms where he worked for 7 months.[citation needed][edit]

Hotz founded his AI startup,, in September 2015.[39] In an interview with Bloomberg, Hotz revealed that the company was building vehicular automation technology based on artificial intelligence algorithms. Hotz built a working self-driving 2016 Acura ILX, which he demonstrated on the I-280 in a video,[3] resulting in a cease and desist letter from the California Department of Motor Vehicles.[40]

Hotz wanted to sell his technology to Tesla Motors, meeting with CEO Elon Musk. [41][42] Hotz claims that Musk offered him $12 million (minus $1 million for every month it took Hotz to work on the task) to create a driving system that could replace the MobilEye solution that Tesla used at the time.[43] Tesla later released a statement on their website citing corrections to the Bloomberg article, stressing that their autopilot system was developed in-house, with a vision chip component from MobilEye, instead of one separate autopilot system manufactured by MobilEye, as suggested by Bloomberg reporter Ashlee Vance.[41] Tesla CEO Elon Musk offered advice on Hotz's self-driving car project in a December 2015 interview.[44]

On October 27, 2016, the NHTSA informed Hotz that the product was legally required to comply with Federal Motor Vehicle Safety Standards, and requested information that would confirm such compliance.[45] A day later, George Hotz tweeted from Shenzhen that the comma one was cancelled.[46][47] Kristen Lee stated on Jalopnik that the NHTSA was simply trying to open a dialog, and commented: "Instead, they got the worst attitude possible from Silicon Valley: try and regulate us, thought leaders, and we’ll take our ball and go home."[48] open sourced their self driving car software (called openpilot) on November 30, 2016, emphasizing its intended use for research without a warranty.[49][50]

On September 14, 2018, announced Hotz would become the Head of Research Team for the project, and appointed Riccardo Biasini as the new CEO of the company.[51] He left in March 2019, but returned in May 2019 to become President once again.[52]

In January 2020, debuted its $1000 Comma Two ADAS (driver-assist) device at the annual CES tech show in Las Vegas.[53][54]

Other activities and recognition[edit]

Hotz was a finalist at the 2004 ISEF competition in Portland, Oregon with his project "The Mapping Robot". Recognition included interviews on the Today Show and Larry King.[55] Hotz was a finalist at the 2005 ISEF competition, with his project "The Googler".[56] Continuing with robots, Hotz competed in his school's highly successful Titanium Knights battlebots team.

Hotz competed in the 2007 Intel International Science and Engineering Fair, a science competition for high school students, where his 3D imaging project, entitled "I want a Holodeck", received awards and prizes in several categories including a $20,000 Intel scholarship.[57] He travelled to Sweden to speak about the project at the Stockholm International Youth Science Seminar.[58]

Hotz has received considerable attention in mainstream media, including interviews on the Today Show, Fox, CNN, NBC, CBS, G4, ABC,[59] CNBC,[2] and articles in several magazines, newspapers, and websites, including Forbes,[60] and BBC.[61]

In March 2008, PC World magazine listed Hotz as one of the top 10 Overachievers under 21.[62]

In August 2013, Hotz attended DEF CON with Carnegie Mellon's Plaid Parliament of Pwning (PPP). PPP placed first in the DEF CON Capture the Flag (CTF) tournament.[63] Later in 2013, Hotz also competed in CSAW 2013. Working alone, Hotz took first place under the pseudonym tomcr00se.[64] In August 2014, Hotz once again competed as part of Carnegie Mellon's Plaid Parliament of Pwning to win the DEF CON CTF tournament for a second year in a row. The team also won the DEF CON "Crack Me If You Can" tournament.[65]

At South by Southwest 2019, Hotz discussed simulation theory and announced plans to create a church dedicated to helping society break out of the simulation.[66][67]

See also[edit]

  • blackra1n, an iPhone jailbreak application produced by George Hotz.


  1. ^ Stone, Brad; John Biggs (August 25, 2007). "With Software and Soldering, AT&T's Lock on iPhone Is Undone". The New York Times. p. C-1. Retrieved September 2, 2007.
  2. ^ a b "Interview with 17-year-old iPhone hacker". CNBC. September 30, 2007.
  3. ^ a b "The First Person to Hack the iPhone Built a Self-Driving Car. In His Garage". Bloomberg L.P. Retrieved December 16, 2015.
  4. ^ McKay, Martha (August 24, 2007). "Tech whiz cracks code tying it to AT&T network". Bergen County, New Jersey: The Record. Archived from the original on October 14, 2007. Retrieved October 20, 2011.
  5. ^ "GEORGE HOTZ". Retrieved March 24, 2014.
  6. ^
  7. ^ Unlocked iPhone on YouTube
  8. ^ a b c "Machine Politics: The man who started the hacker wars.","The New Yorker", May 7, 2012. Retrieved April 30, 2012
  9. ^ Kronfeld, Melissa Jane; Liddy, Tom (August 25, 2007). "IHACKED YOU! CODE-CRACKING N.J. KID 'FREES' APPLE CELL". New York Post. Post Wire Services. Retrieved October 20, 2011.
  10. ^ Unlocked iPhone. August 21, 2007. Retrieved January 4, 2016 – via YouTube.
  11. ^ On the iPhone: THE iPhone HAS BEEN TRADED. Retrieved May 3, 2008.
  12. ^ "Code to unlock iPhone cracked". CNN. September 1, 2007. Retrieved August 2, 2014.
  13. ^ "GeoHot says Goodbye to iPhone Community". July 13, 2010. Archived from the original on October 13, 2013. Retrieved April 15, 2011.
  14. ^ Hutchinson, Roland (October 10, 2010). "Limera1n iOS 4.1 Jailbreak Released By Geohot". Archived from the original on October 16, 2010. Retrieved February 26, 2018.
  15. ^ Fildes, Jonathan (January 25, 2010). "PlayStation 3 'hacked' by iPhone cracker". BBC News. Retrieved January 25, 2010.
  16. ^ PS3 Firmware (v3.21) Update – PlayStation Blog
  17. ^ The PS3 just too difficult to crack – Video Game News, Reviews, Previews and Blog. Retrieved February 16, 2011.
  18. ^ "Console Hacking 2010: PS3 Epic Fail". Chaos Communication Congress. fail0verflow. December 29, 2010. Retrieved October 29, 2017.
  19. ^ 27C3 – Chaos Communication Congress 2010 – fail0verflow on YouTube
  20. ^ "Geohot: Here is your PS3 Root Key! – Now with "HELLO WORLD" proof!". PSX-SCENE.
  21. ^ Motion for TRO. (January 12, 2011). Retrieved February 16, 2011.
  22. ^ Sony vs. GeoHot Hacker Lawsuit. G4. January 13, 2011. Retrieved August 3, 2014.
  23. ^ "GeoHot vs Sony – PS3 Jailbreak, Lawsuit and the Interview". Newsden. January 16, 2011. Archived from the original on July 24, 2012. Retrieved August 2, 2014.
  24. ^ The Light It Up Contest on YouTube
  25. ^ a b Kravets, David (March 4, 2011). "Judge Lets Sony Unmask Visitors to PS3-Jailbreaking Site". Wired. Condé Nast Digital. Retrieved December 6, 2011. A federal magistrate is granting Sony the right to acquire the internet IP addresses of anybody who has visited PlayStation 3 hacker George Hotz's website from January 2009 to the present. Thursday's decision by Magistrate Joseph Spero to allow Sony to subpoena Hotz's web provider (.pdf) raises a host of web-privacy concerns. Respected for his iPhone hacks and now the PlayStation 3 jailbreak, Hotz is accused of breaching the Digital Millennium Copyright Act and other laws after he published an encryption key and software tools on his website that allow Playstation owners to gain complete control of their consoles from the firmware on up. Sony also won subpoenas (.pdf) for data from YouTube and Google, as part of its lawsuit against the 21-year-old New Jersey hacker, as well as Twitter account data linked to Hotz, who goes by the handle GeoHot.
  26. ^ "George Hotz PayPal Subpoena Limited to California, Court Docs Reveal".
  27. ^ Gilbert, Ben (April 11, 2011). "Sony and PlayStation 3 jailbreaker George Hotz settle out of court". Joystiq. AOL, Inc. Retrieved December 6, 2011. After a short but rather storied history, infamous PlayStation 3 jailbreaker George "GeoHot" Hotz and Sony Computer Entertainment of America have settled their legal dispute, with a statement on the PlayStation Blog stating the two parties "reached an agreement in principle" around 10 days ago. According to said agreement, Hotz has "consented to a permanent injunction," meaning he super swears he won't do it again (legally speaking, of course), though no other terms are given. We were told by an SCEA rep that the terms of the settlement (beyond what was disclosed) are confidential.
  28. ^ "geohot". Retrieved January 4, 2016.
  29. ^ Luke Villapaz (June 16, 2014). "Geohot Towelroot Exploit Roots Galaxy S5 Devices On AT&T And Verizon". International Business Times. Retrieved January 4, 2016.
  30. ^ "[SECURITY] [DSA 2949-1] linux security update". Retrieved January 4, 2016.
  31. ^ a b Towelroot: One-Click Android Rooting Tool Released By Geohot, The Hacker News, June 1, 2015.
  32. ^ "I'm throwing a party and you should come **G... – Verizon Samsung Galaxy S 5". XDA Developers. Retrieved January 4, 2016.
  33. ^ Samsung's official response to "Towelroot" Archived March 16, 2015, at the Wayback Machine Announcements: July 7, 2014, Samsung KNOX News
  34. ^ Protalinski, Emil (June 27, 2011). "Geohot reportedly now works for Facebook (update: Facebook confirms)". News & Blogs / Friending Facebook. ZDNet. Retrieved October 20, 2011.
  35. ^ Reisinger, Don (June 28, 2011). "Geohot now a Facebook employee". The Digital Home. c|net. Archived from the original on October 20, 2011. Retrieved October 20, 2011.
  36. ^ Famous iPhone Hacker George Hotz Has Left Facebook Archived January 28, 2012, at the Wayback Machine
  37. ^ Bright, Peter. "Google 'Project Zero' hopes to find zero-day vulnerabilities before the NSA". Ars Technica. Retrieved July 16, 2014.
  38. ^ "qira". Retrieved August 17, 2018.
  39. ^ George Hotz's LinkedIn Profile
  40. ^
  41. ^ a b "Correction to article: "The First Person to Hack the iPhone Built a Self-Driving Car"". Tesla, Inc. Retrieved October 29, 2017.
  42. ^ "Tesla Motors & Mobileye Announce Breakup Ahead of Gigafactory Opening". International Business Times. Retrieved October 29, 2017.
  43. ^ "George Hotz promised to end capitalism in a manic sermon at SXSW". The Verge. March 15, 2016. Then he met with Elon Musk, who asked him to make a vision solution for self-driving cars that would rival the MobileEye tech Tesla was already working with. Then Musk offered him $12 million (minus $1 million for every month it took Hotz to work on the task).
  44. ^ Kirsten Korosec (December 21, 2015). "Elon Musk Says Tesla Vehicles Will Drive Themselves in Two Years". Fortune. Retrieved January 4, 2016.
  45. ^ "Special order directed to". Retrieved October 28, 2016.
  46. ^ Etherington, Darrell (October 28, 2018). " cancels the Comma One following NHTSA letter". TechCrunch. Retrieved January 19, 2020.
  47. ^ "The comma one is cancelled..." Retrieved October 28, 2016.[non-primary source needed]
  48. ^ Lee, Kristen. "The Feds Were Right To Question The Safety Of The $999 Self-Driving Kit". Retrieved October 29, 2016.
  49. ^ "George Hotz is giving away the code behind his self-driving car project". Retrieved May 13, 2017.
  50. ^ "Openpilot github site".
  51. ^ ai, comma (September 14, 2018). "A message from the new CEO of". comma ai. Retrieved September 23, 2018.
  52. ^ "George Hotz". LinkedIn.
  53. ^ Hall, Emme (January 9, 2020). "We hit the road with's assisted-driving tech at CES 2020". Roadshow. Retrieved January 19, 2020.
  54. ^ Baldwin, Roberto (January 13, 2020). "Comma Ai continues to impress with its aftermarket driver assistance tech". Engadget. Retrieved January 19, 2020.
  55. ^ Society for Science & the Public – Intel ISEF – 2004 Portland SAO Award Winners Archived July 29, 2014, at the Wayback Machine. Retrieved February 16, 2011.
  56. ^ Photos – Intel Science and Engineering Fair 2005. Retrieved April 15, 2011.
  57. ^ Grand Awards Ceremony of the Intel International Science and Engineering Fair 2007. Intel Education. Retrieved August 24, 2007.
  58. ^ (in Swedish) Participants / SIYSS / Verksamhet / Förbundet Unga Forskare – Förbundet Unga Forskare. (April 23, 2008). Retrieved April 15, 2011.
  59. ^ YouTube. Retrieved January 4, 2016.
  60. ^ Junior R&D – Forbes. Retrieved April 15, 2011.
  61. ^ Fildes, Jonathan (January 25, 2010). "PlayStation 3 'hacked' by iPhone cracker". BBC News. Retrieved January 25, 2009.
  62. ^ Tynan, Dan. (March 9, 2008) Meet the Whiz Kids: 10 Overachievers Under 21 – Page 10. PC World. Retrieved April 15, 2011.
  63. ^ Cyberteams duke it out in the World Series of hacking – CNBC. Retrieved November 8, 2013.
  64. ^ NYU-Poly Cyber Security Awareness Week Announces Winners of World's Biggest Student Contests – Retrieved November 18, 2013.
  65. ^ NYU-Poly CMU CyLab PPP and CUPS teams win “Capture the Flag” and “Crack Me If You Can" contests at DEFCON 22 – Retrieved August 20, 2014.
  66. ^ Jailbreaking the Simulation with George Hotz | SXSW 2019
  67. ^ "Famous hacker thinks we're living in simulation, wants to escape". Futurism. Retrieved August 20, 2019.

External links[edit]