Sponsored Links

Sponsored Links

Page 2 of 4 FirstFirst 1234 LastLast
Results 11 to 20 of 36



  1. #11
    Contributor evilak's Avatar
    Join Date
    Sep 2010
    Posts
    23
    Sponsored Links
    Sponsored Links
    Yeah, in service mode, you can do so much, you can ID swap motherboard and BD-drive and much more. but then again it's a locked mode and you need to be connected a to a server. It's more limited also than it looks so what people are using is not even close to a copy of a JIG.

  2. #12
    Senior Member SwordOfWar's Avatar
    Join Date
    Jul 2009
    Posts
    343
    Sponsored Links
    Sponsored Links
    looks like it also allows for recovery of flash and HDD contents.

  3. #13
    Contributor xUb3rn00dlEx's Avatar
    Join Date
    Dec 2009
    Posts
    174
    Sponsored Links
    Sponsored Links
    Well this exploit wouldn't have been possible without the jig method by Sony, which leads to bad news for the future Sony console. They will no doubt either discontinue this method of servicing the PS4 (most likely) or will figure out how to prevent this from happening again with more security (less likely).

  4. #14
    Contributor kez's Avatar
    Join Date
    Oct 2005
    Posts
    13
    psjailbreak and psgroove are not exploit based? are "sony backdoor" based? it's better read more about working method (usb hub, multi devices, connect/disconnect order, device ids, payloads, etc).

    it's not so easy to clone an original sony jig adapter.

  5. #15
    Contributor PARDES's Avatar
    Join Date
    Jan 2010
    Posts
    36
    Nice indeed, this means the exploit of Egohot is only a copy of the jig we are use now. The only diffrerence is we must not open the console any more, and use the old copy to make diffrent apps.

    When you see back, the old exploit(copy) we use a trigger on the board, now we use the eject boutton .This means without the SCE Server, can the ps3 not 100% unlockabele because the mastercode ?

    The ps3 is than 50% unlockabele, with differnt apps. The ps3 is than now not 100% hacked, right ?

  6. #16
    Contributor tjay17's Avatar
    Join Date
    Apr 2010
    Posts
    421
    Hopefully more new things can from this.

  7. #17
    Senior Member SwordOfWar's Avatar
    Join Date
    Jul 2009
    Posts
    343
    Did anyone notice on the diagrams in the PDF, they always connect the jig device into the 4th port instead of the 1st one?

  8. #18
    Senior Member PSPSwampy's Avatar
    Join Date
    Jun 2005
    Posts
    795
    PDF = very interesting reading, appears to show the flow sony service centers take.

    Indicates that when you send in a failing/dead PS3 they have the ability to provide a clone of your original PS3 by ID Swapping with a referbished unit.

    This is all kinda expected - the interesting thing is that they seem to log specific information about every PS3 on their servers (not really that unexpected) - but this PDF gives some indication as to what they actually log.

    Not sure what exactly this brings to the table, but it clearly indicates a comms channel via the ethernet port as well as via USB.

    Of course this could all be fake info - The PDF isn't anything special in the eye candy stakes - but the why would it be! If it's for internal use only (hehe) there isn't any need to produce a nice glossy manual is there!

    Interesting reading anyway!

    PSPSwampy.

  9. #19
    Contributor SatanX2112's Avatar
    Join Date
    Sep 2010
    Posts
    6
    I wouldn't say 100%. Find something that Sony can't block and it's 100%.

    But this hole opened the PS3 to start really spilling it's 'gut's' so to say.

  10. #20
    Registered User aby081's Avatar
    Join Date
    Sep 2010
    Posts
    1

    Wink

    sounds really cool, looking at it now..

 

Sponsored Links
Page 2 of 4 FirstFirst 1234 LastLast
Advertising - Affiliates - Contact Us - PS3 Downloads - Privacy Statement - Site Rules - Top - © 2014 PlayStation 3 News