When replying to the post I quoted though, they asked if any of the dev's understood how it could be done and then possibly recreate the process, where I wanted to point out that for dev's recreating the process would be unnecessary at this point unless they wish to try and experiment with other ways of finding an expolit but using this method of dumping the GameOS.
If people out there wish to recreate the process though, that is one of the bonus's of DemonHades and JaicraB sharing the method used
Also if someone does this on an older FW and discovers an exploit, then there's always the possibility of finding a way to downgrade and then use the exploit from there
Amazing progress guys !!!
From Rich's twitter:
So.... where's lv2 in the recently leaked dump? I didn't spot a single hypercall in the entire dump. 0x44000022 <-- machine code | sc 1
So is there hope for those that updated to 3.21?
really cool, is it any good results?
Is it a way to take "SPECIAL" USB and return to service mode?
wow, everyday a new dev progress, this was the ps3 scene i've dreamed about
keep up the great work!
Short of opening up the lv2 dump in a hex editor and looking at the strings, what is one supposed to do with it?