The above video goes away if you are a member and logged in, so log in now!
Thanks for the clear explanation
Originally Posted by yoshi314
Wont having information like this on the internet just help Sony to close the hole shut permanently?
it has already been shut with 3.42.
obviously psgroove helped sony a lot to fix the problem. if it weren't done, sony would simply get their hands on jailbreak dongle and analyze the problem. it would probably take a bit longer, but end result would be the same.
can someone compile this for me so I can use my keyboard to jailbreak my ps3? It has a ps2 connector, if that matters.
where can I has ps3 torrents for dowloads?
how do I use this to host modded COD MW2 lobbies?
but seriously, nice work. What architecture is this assembly? I am pretty decent with x86 assembly, but there are a number of commands here I don't recognize.
So does this mean that it's pretty much impossible for anyone to bypass the requirement to have a disc in the drive when running Backup Manager?
The PS3 never thinks that it is connected to a real jig, it rejects it.
Originally Posted by medi01
However due to some clever buffer overflows, the process of the ps3 looking for the jig allows uploaded code to be run.
Well, that's exactly how I got it.
Originally Posted by smf
Except I also thought that the code that looks for jig is not part of the firmware, but is located in BIOS. So either it's not, or Sony can also update BIOS, or the hole is still there.
This whole thing is amusing. The exploit isn't even a month old yet and it's already been patched by Sony. All PSJailbreaks and clones have been rendered useless and what's even funnier is that clones still keep popping up even though their target market is most likely on 3.42 already.
Oh well, it was fun while it lasted. Wake me up when someone comes up with a hack that actually lasts as long as its iXtreme counterpart.