Hacksploits and custominating.
People want control of the devices they buy and be able to do whatever they want on it. That’s nothing new. It’s been evidenced time and time again, releases of new devices being followed by releases of exploits for them. I fondly remember Apple releasing their new mobile operating system, and “hackers” coming forth with a jailbreak exploit no more than two days later. Grand times. These days, those things tend to take a bit longer, and the average release-exploit time tends to be higher for more “special” pieces of equipment like gaming machines, but vulnerabilities are still discovered sooner or later.
Regardless of the morality of it all (I say it’s fairly okay, but that’s not the point right now), it’s very admirable work those “hackers” do. (I keep putting that term between quotes because, frankly, it has lost all (consistent) meaning.) They search a system for an exploit, a way to run unofficial programs on it. Once they’ve found a hole, they rip it wide open, frequently enabling them to do so much more than the system’s developer would allow them to.
And then they share it with the community! I got much more bang for my buck after jailbreaking that old iPod Touch of mine back in the day. I could run all kinds of software on it, had way easier access to many hidden functionalities, and was more in control over what my device did.
Isn’t that just the grandest thing?