[video=youtube;hcbaeKA2moE]http://www.youtube.com/watch?v=hcbaeKA2moE"[/video] middle guy's accent >__>
well for that question.... it wasn't on the hackers radar to hack it since you could put Linux on it and run your own stuff... but once they got rid of OtherOS they "Pissed Off" the hackers so once it became "Closed" it took about 12 months for hackers to get into the signed key files (same amount of time to get into the xbox 360)... long story short... they have ways to obtain signed keys to give commands to the underlying OS...