Sponsored Links

Sponsored Links

Page 5 of 25 FirstFirst ... 3456715 ... LastLast
Results 41 to 50 of 245



  1. #41
    Senior Member Transient's Avatar
    Join Date
    Apr 2007
    Posts
    334
    Sponsored Links
    Sponsored Links
    Quote Originally Posted by technodon View Post
    thats not true, all keys are inside lv0 also he wont calulate the private key since sony fixed the sign fail bug in 3.60, guess he was trolling
    lv0 key can't be inside lv0 though, can it? How would the PS3 decrypt it in the first place? It has to be available before then.

  2. #42
    Senior Member technodon's Avatar
    Join Date
    Sep 2010
    Posts
    410
    Sponsored Links
    Sponsored Links
    no, the key to decrypt lv0 is found in bootloader, then inside lv0 you will find apploader keys and all other loader keys for lv1 and lv2 etc.. ask him to upload a decrypted lv0.elf and we can have a look our ourselves

  3. #43
    Registered User geoduk's Avatar
    Join Date
    Jun 2007
    Posts
    1
    Sponsored Links
    Sponsored Links
    Don't waste your time ... It's fake

    Just look at encrypted ps3swu.self ofw4.25, offset 0x0020401C

  4. #44
    Senior Member jabberosx's Avatar
    Join Date
    Dec 2006
    Posts
    198
    so i'm going to guess this is a bummer too. oh well.. back to gangnam style!

  5. #45
    Member boxbundy's Avatar
    Join Date
    Aug 2012
    Posts
    43
    really makes me wonder what pleasure some get from making fake cfw on youtube and talking rubbish on ps3 websites. there's so many of them out there. it's pretty childish really. just amazes me. Why would you do it? I don't get it

  6. #46
    Senior Member JOshISPoser's Avatar
    Join Date
    Jan 2011
    Posts
    297
    you said it. they're children. it gives them their jollies from other people's misery. i get poking fun every now and then with buddies, but as you grow up, you realize the world is much nicer when everyone is nicer.

  7. #47
    Forum Moderator PS3 News's Avatar
    Join Date
    Apr 2005
    Posts
    27,395
    Agreed, on that until "anonymous" replies back with new information (if he ever does, that is) we will close this up as from the sound of things the key doesn't appear valid anyway. Back to the waiting game it seems

  8. #48
    Banned User randomstuff's Avatar
    Join Date
    Oct 2012
    Posts
    1

    PS3 LV0 Keys Leaked: 4.21, 4.25 and 4.30 CFW Updates Incoming!

    Following up on the PS3 3.60 Keys leak comes a bright light at the end of the PlayStation 3 tunnel, as today an anonymous user has leaked the PS3 LV0 Keys meaning 4.21, 4.25 and 4.30 CFW updates are incoming!

    Download: [Register or Login to view links] (125.2 KB)
    Code:
    .----==[22-10-2012]=======================================================----.
    [_ As this was a group effort, we wouldn't normally have lost a word about it |
    |ever, but as we're done with PS3 now anyways, we think it doesn't matter     |
    |anymore [http://pastie.org/4462324]. Congratulations to the guy that leaked  |
    |stuff, you, sir, are a 1337 haxx0r, jk, you're an ahole.                    _]
    |                                                                             |
    |                               Try this bytes...                             |
    | - [erk=CA7A24EC38BDB45B98CCD7D363EA2AF0C326E65081E0630CB9AB2D215865878A]    |
    | - [riv=F9205F46F6021697E670F13DFA726212]                                    |
    | - [pub=A8FD6DB24532D094EFA08CB41C9A72287D905C6B27B42BE4AB925AAF4AFFF34D     |
    |        41EEB54DD128700D]                                                    |
    | - [priv=001AD976FCDE86F5B8FF3E63EF3A7F94E861975BA3]                         |
    | - [ctype=33]                                                                |
    |                              ...and be amazed.                              |
    |                                                                             |
    [_ People should know that crooked personalities are widespread in this so    |
    |called 'scene'. Some people try to achive something for fun together and make|
    |the wrong decision to trust others and share their results with them, but ofc|
    |there got to be the attention seeking fame wh*** that has to leak stuff to   |
    |feel a little bit better about him-/herself.                                _]
    |                                                                             |
    [_ Now the catch is that it works like this in every 'scene', just that in    |
    |others it usually doesn't come to light.                                   _]
    |                                                                             |
    [_ The only sad thing is, that the others who worked on this won't get the    |
    |attention they deserve because they probably want to remain anonymous (also  |
    |they don't care about E-fame <3).                                           _]
    |                                                                             |
    [_ PS: This is neither about drama nor E-fame nor 'OMG WE HAZ BEEN FIRST', we |
    |just thought you should know that we're disappointed in certain people. You  |
    |can be sure that if it wouldn't have been for this leak, this key would never|
    |have seen the light of day, only the fear of our work being used by others to|
    |make money out of it has forced us to release this now.                     _]
    '----===========================================[- The Three Musketeers]==----'
    To recap, below are the confirmed legit and working PlayStation 3 LV0 Keys:

    ERK = CA7A24EC38BDB45B98CCD7D363EA2AF0C326E65081E0630CB9 AB2D215865878A
    RIV = F9205F46F6021697E670F13DFA726212
    PUBLIC = A8FD6DB24532D094EFA08CB41C9A72287D905C6B27B42BE4AB 925AAF4AFFF34D41EEB54DD128700D
    PRIVATE = 001AD976FCDE86F5B8FF3E63EF3A7F94E861975BA3
    CURVE_TYPE = 0x33

    PS3 Key dump from appldr 4.25 in SCETool format:
    Code:
    [appldr]
    type=SELF
    revision=????
    version=000?00??00000000
    self_type=?????
    erk=5019FEF491F2031AC2564E560EFDA3D79887F4CFFEAD371B0564EC4EE2CA8951
    riv=E763C7970A7D7F9AD3B365AD804B759F
    pub=6F8DF8EBD0A1D1DB08B30DD3A951E3F1F27E34030B42C729C55555232D61B834B8BDFFB07E54B343
    priv=
    ctype=21
    
    [appldr]
    type=SELF
    revision=????
    version=000?00??00000000
    self_type=?????
    erk=DC64F26E860217ACEB70BE89E479DB8B93F29C78D2BB29C5CB45726BB7EE1387
    riv=2600D2DA9DA6519D283117563F552B80
    pub=94D1B7378BAFF5DFED269240A7A364ED68446741622E50BC6079B6E606A2F8E0A4C56E5CFF836526
    priv=
    ctype=11
    
    [appldr]
    type=SELF
    revision=????
    version=000?00??00000000
    self_type=?????
    erk=8FCD13089C6499D584D93DA5C39795C0BB5BC6BB6F5B6E8BFECC7A1D879332B7
    riv=04017C8421443E5FCA95DC3A6E9F0BD9
    pub=8CA6905F46148D7D8D84D2AFCEAE61B41E6750FC22EA435DFA61FCE6F4F860EE4F54D9196CA5290E
    priv=
    ctype=13
    
    [appldr]
    type=SELF
    revision=????
    version=000?00??00000000
    self_type=?????
    erk=D98D6AC6B0F76E2F08E46F78A5FFB6BB8FB8B26430980701A254022AAA11D0D5
    riv=B56CFA40EC86FD1AD2EF6A578F81BBAE
    pub=1F140E8EF887DAB52F079A06E6915A6460B75CD256834A43FA7AF90C23067AF412EDAFE2C1778D69
    priv=
    ctype=14
    
    [appldr]
    type=SELF
    revision=????
    version=000?00??00000000
    self_type=?????
    erk=36486F69A3C6682DB3851CFD68614FA5B1CC636AAB3E8FC4F8D150BAE62AA276
    riv=D686E30097952A605DB15744645570EE
    pub=B6BB0A84C649A90D97EBA55B555366F52381BB38A84C8BB71DA5A5A0949043C6DB249029A43156F7
    priv=
    ctype=15
    
    [appldr]
    type=SELF
    revision=????
    version=000?00??00000000
    self_type=?????
    erk=E2F9C174FBCEA739CBF2BE1567133F0035D0C9D1D70237122D2A8D6C9E0E9123
    riv=C11B1AC4EFF80D6D2275F4FC8B4EAEC6
    pub=AB284CA549B2DE9AA5C903B75652F78D192F8F4A8F3CD99209415C0A84C5C9FD6BF3095C1C18FFCD
    priv=
    ctype=15
    
    [appldr]
    type=SELF
    revision=????
    version=000?00??00000000
    self_type=?????
    erk=877757BE18C759E2DEF34B34617A54A2C7F7A0657B68D70CBFC89FE1C0B59F57
    riv=242A2FF7DD72554239450A424DD38AA6
    pub=6E82F6B54A0E9DEBE4A8B3043EE3B24CD9BBB62B4416B0482582E419A2552E29AB4BEA0A4D7FA2D5
    priv=
    ctype=16
    
    [appldr]
    type=SELF
    revision=????
    version=000?00??00000000
    self_type=?????
    erk=388F751542E8B245C6757ABC03B3D31B62D40030E09BE5A4A48F95FC436DBBA0
    riv=6B976709CCD408718FF3CDF03CFB2E21
    pub=09301B6436C85B53CB1585300A3F1AF9FB14DB7C30088C4642AD66D5C148B8995BB1A698A8C71827
    priv=
    ctype=25
    
    [appldr]
    type=SELF
    revision=????
    version=000?00??00000000
    self_type=?????
    erk=C13D6AD58434080D3947EAC965A999CA909B36EE8689AC46FC27C409889878E0
    riv=66D51260B5CD33E3772DFA2531218EC6
    pub=2733C889D289550FE00EAA5A47A34CEF0C1AF187610EB07BA35D2C09BB73C80B244EB4147700D1BF
    priv=
    ctype=26
    
    [appldr]
    type=SELF
    revision=????
    version=000?00??00000000
    self_type=?????
    erk=E24420003D554C14C4838DD43CA995781B350E8D360E8B014247609693C77A2F
    riv=2265BA1E66FA4BD573F3D837CAF27B20
    pub=71502ADB5783583AB88B2D5F23F419AF01C8B1E72FCA1E694AD49FE3266F1F9C61EFC6F29B351142
    priv=
    ctype=12
    
    [appldr]
    type=SELF
    revision=????
    version=000?00??00000000
    self_type=?????
    erk=9F1C2C07C228AB8A6562DD27B8DB4D0D62A9AF3E000E0B8579D205ABFABEA622
    riv=1BB69374A1E157D3C74DAC8FB784754E
    pub=84DE5692809848E5ACBE25BE548F6981E3DB14735A5DDE1A0FD1F475866532B862B1AB6A004B7255
    priv=
    ctype=27
    
    [appldr]
    type=SELF
    revision=????
    version=000?00??00000000
    self_type=?????
    erk=F239349F6472817C6251713DFA2F6A05164B7B37514C660ECDB83B96E6CF2991
    riv=29E4B2179AC9DD72A66A1886205751F9
    pub=50597B7F680DD89F6594D9BDC0CBEE03666AB53647D0487F7F452FE2DD02694631EA755548C9E934
    priv=
    ctype=25
    
    [appldr]
    type=SELF
    revision=????
    version=000?00??00000000
    self_type=?????
    erk=632CCFBB2B4D1BE84C3FC15BE22B4839FEFD82953E86C075232817B6FF5E6818
    riv=16E914D782054347F252715833AB3C51
    pub=2FDA7A56AAEA65921C0284FF1942C6DE137370093D106034B59191951A5201B422D462F8726F852D
    priv=
    ctype=26
    
    [appldr]
    type=SELF
    revision=????
    version=000?00??00000000
    self_type=?????
    erk=E2B22D94972650B4FD9BADD7C29F43C14D0ED3375AA42DD233A1D4A4E16322DC
    riv=933B0784C58A44EAAD4D7846CA70B573
    pub=B26FE6D3E3A1E766FAE79A8E6A7F48998E7FC1E4B0AD8745FF54C018C2A6CC7A0DD7525FAFEA4917
    priv=
    ctype=12
    
    [appldr]
    type=SELF
    revision=????
    version=000?00??00000000
    self_type=?????
    erk=6DCE9AC4EFF461FE542FC543B7EF2F2AD9C98379C4DCBD3CB2BD58576861C7D2
    riv=56835229635DE782F6001600DD4219EA
    pub=04275E8838EF95BD013B223C3DF674540932F21B534C7ED2944B9104D938FEB03B824DDB866AB26E
    priv=
    ctype=27
    
    [appldr]
    type=SELF
    revision=????
    version=000?00??00000000
    self_type=?????
    erk=C5F0DF6C72A61DFCD591D22E100ECBEB04A82831C6A90CB82DCFC852605C1433
    riv=83947AB81813B4EFEDBEFB967E533DFB
    pub=566635D3E1DCEC47243AAD1628AE6B2CEB33463FC155E4635846CE33899C5E353DDFA47FEF5694AF
    priv=
    ctype=30
    
    [appldr]
    type=SELF
    revision=????
    version=000?00??00000000
    self_type=?????
    erk=04CD534825102487891B8E264D859587017BC8993EA10B0F8B0CAED2CD1DA207
    riv=188A2108137A9E874D72A79E4D3A8E94
    pub=3B7B04C71CAE2B1199D57453C038BB1B541A05AD1B94167B0AB47A9B24CAECB9000CB21407009666
    priv=
    ctype=08
    
    [appldr]
    type=SELF
    revision=????
    version=000?00??00000000
    self_type=?????
    erk=7092ED26CDA962F6879776B1C390E9D9E5904F76DB5928B1789F05D79763B0E3
    riv=6CCF6A03E7962F488F5043AEFDFDEE93
    pub=148DCA961E2738BAF84B2D1B6E2DA2ABD6A95F2C9571E54C6922F9ED9674F062B7F1BE5BD6FA5268
    priv=
    ctype=31
    
    [appldr]
    type=SELF
    revision=????
    version=000?00??00000000
    self_type=?????
    erk=4EAC8511C61C8459FDA903C6EB2B94A80E81C02495920FD2333257674A1701EF
    riv=4D9860CB27D15E8A31A6874F602215A8
    pub=BE4B1B513536960618BFEF12A713F6673881B02F9DC616191E823FC8337CCF99ADAA6172019C0C23
    priv=
    ctype=17
    
    [appldr]
    type=SELF
    revision=????
    version=000?00??00000000
    self_type=?????
    erk=408B4CCF0D620A0EA7DB1C60706935CAE6DFC5BEF0FE7AF46DCFA97AA2A2C2E5
    riv=514AD3E676E281D94825AC7609D62236
    pub=36C1ACE6DD5CCC0006FDF3424750FAC515FC5CFA2C93EC53C6EC2BC421708D154E91F2E7EA54A893
    priv=
    ctype=09
    
    [appldr]
    type=SELF
    revision=????
    version=000?00??00000000
    self_type=?????
    erk=0FA315D068EAF4EC96EB835253BF8E8AFEAC4D700A098D22B6ADAAB7E76B28ED
    riv=64233F38F482D391C901E7F9DAAEBF58
    pub=430322887503CF52928FAAA410FD623C7321281C8825D95F5B47EF078EFCFC44454C3AB4F00BB879
    priv=
    ctype=1A
    
    [appldr]
    type=SELF
    revision=????
    version=000?00??00000000
    self_type=?????
    erk=5019FEF491F2031AC2564E560EFDA3D79887F4CFFEAD371B0564EC4EE2CA8951
    riv=E763C7970A7D7F9AD3B365AD804B759F
    pub=6F8DF8EBD0A1D1DB08B30DD3A951E3F1F27E34030B42C729C55555232D61B834B8BDFFB07E54B343
    priv=
    ctype=21
    
    [appldr]
    type=SELF
    revision=????
    version=000?00??00000000
    self_type=?????
    erk=DC64F26E860217ACEB70BE89E479DB8B93F29C78D2BB29C5CB45726BB7EE1387
    riv=2600D2DA9DA6519D283117563F552B80
    pub=94D1B7378BAFF5DFED269240A7A364ED68446741622E50BC6079B6E606A2F8E0A4C56E5CFF836526
    priv=
    ctype=11
    
    [appldr]
    type=SELF
    revision=????
    version=000?00??00000000
    self_type=?????
    erk=8FCD13089C6499D584D93DA5C39795C0BB5BC6BB6F5B6E8BFECC7A1D879332B7
    riv=04017C8421443E5FCA95DC3A6E9F0BD9
    pub=8CA6905F46148D7D8D84D2AFCEAE61B41E6750FC22EA435DFA61FCE6F4F860EE4F54D9196CA5290E
    priv=
    ctype=13
    
    [appldr]
    type=SELF
    revision=????
    version=000?00??00000000
    self_type=?????
    erk=D98D6AC6B0F76E2F08E46F78A5FFB6BB8FB8B26430980701A254022AAA11D0D5
    riv=B56CFA40EC86FD1AD2EF6A578F81BBAE
    pub=1F140E8EF887DAB52F079A06E6915A6460B75CD256834A43FA7AF90C23067AF412EDAFE2C1778D69
    priv=
    ctype=14
    
    [appldr]
    type=SELF
    revision=????
    version=000?00??00000000
    self_type=?????
    erk=36486F69A3C6682DB3851CFD68614FA5B1CC636AAB3E8FC4F8D150BAE62AA276
    riv=D686E30097952A605DB15744645570EE
    pub=B6BB0A84C649A90D97EBA55B555366F52381BB38A84C8BB71DA5A5A0949043C6DB249029A43156F7
    priv=
    ctype=15
    
    [appldr]
    type=SELF
    revision=????
    version=000?00??00000000
    self_type=?????
    erk=E2F9C174FBCEA739CBF2BE1567133F0035D0C9D1D70237122D2A8D6C9E0E9123
    riv=C11B1AC4EFF80D6D2275F4FC8B4EAEC6
    pub=AB284CA549B2DE9AA5C903B75652F78D192F8F4A8F3CD99209415C0A84C5C9FD6BF3095C1C18FFCD
    priv=
    ctype=15
    
    [appldr]
    type=SELF
    revision=????
    version=000?00??00000000
    self_type=?????
    erk=877757BE18C759E2DEF34B34617A54A2C7F7A0657B68D70CBFC89FE1C0B59F57
    riv=242A2FF7DD72554239450A424DD38AA6
    pub=6E82F6B54A0E9DEBE4A8B3043EE3B24CD9BBB62B4416B0482582E419A2552E29AB4BEA0A4D7FA2D5
    priv=
    ctype=16
    
    [appldr]
    type=SELF
    revision=????
    version=000?00??00000000
    self_type=?????
    erk=388F751542E8B245C6757ABC03B3D31B62D40030E09BE5A4A48F95FC436DBBA0
    riv=6B976709CCD408718FF3CDF03CFB2E21
    pub=09301B6436C85B53CB1585300A3F1AF9FB14DB7C30088C4642AD66D5C148B8995BB1A698A8C71827
    priv=
    ctype=25
    
    [appldr]
    type=SELF
    revision=????
    version=000?00??00000000
    self_type=?????
    erk=C13D6AD58434080D3947EAC965A999CA909B36EE8689AC46FC27C409889878E0
    riv=66D51260B5CD33E3772DFA2531218EC6
    pub=2733C889D289550FE00EAA5A47A34CEF0C1AF187610EB07BA35D2C09BB73C80B244EB4147700D1BF
    priv=
    ctype=26
    
    [appldr]
    type=SELF
    revision=????
    version=000?00??00000000
    self_type=?????
    erk=E24420003D554C14C4838DD43CA995781B350E8D360E8B014247609693C77A2F
    riv=2265BA1E66FA4BD573F3D837CAF27B20
    pub=71502ADB5783583AB88B2D5F23F419AF01C8B1E72FCA1E694AD49FE3266F1F9C61EFC6F29B351142
    priv=
    ctype=12
    
    [appldr]
    type=SELF
    revision=????
    version=000?00??00000000
    self_type=?????
    erk=9F1C2C07C228AB8A6562DD27B8DB4D0D62A9AF3E000E0B8579D205ABFABEA622
    riv=1BB69374A1E157D3C74DAC8FB784754E
    pub=84DE5692809848E5ACBE25BE548F6981E3DB14735A5DDE1A0FD1F475866532B862B1AB6A004B7255
    priv=
    ctype=27
    
    [appldr]
    type=SELF
    revision=????
    version=000?00??00000000
    self_type=?????
    erk=F239349F6472817C6251713DFA2F6A05164B7B37514C660ECDB83B96E6CF2991
    riv=29E4B2179AC9DD72A66A1886205751F9
    pub=50597B7F680DD89F6594D9BDC0CBEE03666AB53647D0487F7F452FE2DD02694631EA755548C9E934
    priv=
    ctype=25
    
    [appldr]
    type=SELF
    revision=????
    version=000?00??00000000
    self_type=?????
    erk=632CCFBB2B4D1BE84C3FC15BE22B4839FEFD82953E86C075232817B6FF5E6818
    riv=16E914D782054347F252715833AB3C51
    pub=2FDA7A56AAEA65921C0284FF1942C6DE137370093D106034B59191951A5201B422D462F8726F852D
    priv=
    ctype=26
    
    [appldr]
    type=SELF
    revision=????
    version=000?00??00000000
    self_type=?????
    erk=E2B22D94972650B4FD9BADD7C29F43C14D0ED3375AA42DD233A1D4A4E16322DC
    riv=933B0784C58A44EAAD4D7846CA70B573
    pub=B26FE6D3E3A1E766FAE79A8E6A7F48998E7FC1E4B0AD8745FF54C018C2A6CC7A0DD7525FAFEA4917
    priv=
    ctype=12
    
    [appldr]
    type=SELF
    revision=????
    version=000?00??00000000
    self_type=?????
    erk=6DCE9AC4EFF461FE542FC543B7EF2F2AD9C98379C4DCBD3CB2BD58576861C7D2
    riv=56835229635DE782F6001600DD4219EA
    pub=04275E8838EF95BD013B223C3DF674540932F21B534C7ED2944B9104D938FEB03B824DDB866AB26E
    priv=
    ctype=27
    
    [appldr]
    type=SELF
    revision=????
    version=000?00??00000000
    self_type=?????
    erk=C5F0DF6C72A61DFCD591D22E100ECBEB04A82831C6A90CB82DCFC852605C1433
    riv=83947AB81813B4EFEDBEFB967E533DFB
    pub=566635D3E1DCEC47243AAD1628AE6B2CEB33463FC155E4635846CE33899C5E353DDFA47FEF5694AF
    priv=
    ctype=30
    
    [appldr]
    type=SELF
    revision=????
    version=000?00??00000000
    self_type=?????
    erk=04CD534825102487891B8E264D859587017BC8993EA10B0F8B0CAED2CD1DA207
    riv=188A2108137A9E874D72A79E4D3A8E94
    pub=3B7B04C71CAE2B1199D57453C038BB1B541A05AD1B94167B0AB47A9B24CAECB9000CB21407009666
    priv=
    ctype=08
    
    [appldr]
    type=SELF
    revision=????
    version=000?00??00000000
    self_type=?????
    erk=7092ED26CDA962F6879776B1C390E9D9E5904F76DB5928B1789F05D79763B0E3
    riv=6CCF6A03E7962F488F5043AEFDFDEE93
    pub=148DCA961E2738BAF84B2D1B6E2DA2ABD6A95F2C9571E54C6922F9ED9674F062B7F1BE5BD6FA5268
    priv=
    ctype=31
    
    [appldr]
    type=SELF
    revision=????
    version=000?00??00000000
    self_type=?????
    erk=4EAC8511C61C8459FDA903C6EB2B94A80E81C02495920FD2333257674A1701EF
    riv=4D9860CB27D15E8A31A6874F602215A8
    pub=BE4B1B513536960618BFEF12A713F6673881B02F9DC616191E823FC8337CCF99ADAA6172019C0C23
    priv=
    ctype=17
    
    [appldr]
    type=SELF
    revision=????
    version=000?00??00000000
    self_type=?????
    erk=408B4CCF0D620A0EA7DB1C60706935CAE6DFC5BEF0FE7AF46DCFA97AA2A2C2E5
    riv=514AD3E676E281D94825AC7609D62236
    pub=36C1ACE6DD5CCC0006FDF3424750FAC515FC5CFA2C93EC53C6EC2BC421708D154E91F2E7EA54A893
    priv=
    ctype=09
    
    [appldr]
    type=SELF
    revision=????
    version=000?00??00000000
    self_type=?????
    erk=0FA315D068EAF4EC96EB835253BF8E8AFEAC4D700A098D22B6ADAAB7E76B28ED
    riv=64233F38F482D391C901E7F9DAAEBF58
    pub=430322887503CF52928FAAA410FD623C7321281C8825D95F5B47EF078EFCFC44454C3AB4F00BB879
    priv=
    ctype=1A
    
    [appldr]
    type=SELF
    revision=????
    version=000?00??00000000
    self_type=?????
    erk=ED11AF0A3040E823E676244B3F79113AF4C858AD79997959386B5F48537EC1C2
    riv=CB9E901D0466EFE8427AD65C8EFB85F6
    pub=A14F6D5F9AD7EBB3B7A39A7C32F13E5DC3B0BA16BDC33D39FDDF88F4AEEA6CFEEB0C0796C917A952
    priv=
    ctype=0F
    
    [appldr]
    type=SELF
    revision=????
    version=000?00??00000000
    self_type=?????
    erk=9DB0954784CEA7F2FF59192EFD04A60F0250B9D4A32AE6AD2A446F3A34F9212B
    riv=BFA08178E4EB5A2CA41A336BE4CF5603
    pub=05BF09CB6FD78050C78DE69CC316FF27C9F1ED66A45BFCE0A1E5A6749B19BD546BBB4602CF373440
    priv=
    ctype=0A
    
    [appldr]
    type=SELF
    revision=????
    version=000?00??00000000
    self_type=?????
    erk=668716115A3B1F9F98F247769104E58E01AF6472571F257523865A53E8620C05
    riv=564174ABF22C32D1102EAAF47E60F08A
    pub=B05F9DA5F9121EE4031467E74C505C29A8E29D1022379EDFF0500B9AE480B5DAB4578A4C61C5D6BF
    priv=
    ctype=11
    
    [appldr]
    type=SELF
    revision=????
    version=000?00??00000000
    self_type=?????
    erk=546B2FF3FE216ED2BA865C79368109A15F2B0D23C2031354B1F6F36B0FDB4D46
    riv=9B871D6414B8AACE542C18100AC21893
    pub=9C327471BAFF1F877AE4FE29F4501AF5AD6A2C459F8622697F583EFCA2CA30ABB5CD45D1131CAB30
    priv=
    ctype=16
    
    [appldr]
    type=SELF
    revision=????
    version=000?00??00000000
    self_type=?????
    erk=68E8261E31115665F2FED48EB12C6E4A3722A93E46D3BAF41A71D0802CA2A1F6
    riv=D882EF46F57E12FE4D44681FA4F7F805
    pub=A13AFE8B63F897DA2D3DC3987B39389DC10BAD99DFB703838C4A0BC4E8BB44659C726CFD0CE60D0E
    priv=
    ctype=17
    
    [appldr]
    type=SELF
    revision=????
    version=000?00??00000000
    self_type=?????
    erk=1DCBE29DC2B2730F084B55012BFCE82B40BEBDC2D92E6277C2118ED0CACE441F
    riv=275F8D432055BE85199261963796D220
    pub=3995C390C9F7FBBAB124A1C14E70F9741A5E6BDF17A605D88239652C8EA7D5FC9F24B30546C1E44B
    priv=
    ctype=27
    
    [appldr]
    type=SELF
    revision=????
    version=000?00??00000000
    self_type=?????
    erk=E4F2C93F93BF636014E9F8AD36D9BAD0F835ABE16A5788E082A7001E39E30C1D
    riv=E5F37DDC3E0BA3E3298DA91130133CF5
    pub=9BFF1CC7118D2393DE50D5CF44909860683411A532767BFDAC78622DB9E5456753FE422CBAFA1DA1
    priv=
    ctype=18
    
    [appldr]
    type=SELF
    revision=????
    version=000?00??00000000
    self_type=?????
    erk=C5AE4C11A373495DA250BC8A3A7B571415A38C381D3EA99202A9E8753644A813
    riv=F407E9FD67E45D9A527234A083790CEB
    pub=64A5C60BC2AD18B8A237E4AA690647E12BF7A081523FAD4F29BE89ACAC72F7AB43C74EC9AFFDA213
    priv=
    ctype=27
    
    [appldr]
    type=SELF
    revision=????
    version=000?00??00000000
    self_type=?????
    erk=EE3B468FC5F29081588B7C816E6EFD1959FAFE5E3DF83ABADA9158CAB91362BE
    riv=C62E683903BAB3018438621EFAB55A10
    pub=9D8DB5A880608DC69717991AFC3AD5C0215A5EE413328C2ABC8F35589E04432373DB2E2339EEF7C8
    priv=
    ctype=18
    
    [appldr]
    type=SELF
    revision=????
    version=000?00??00000000
    self_type=?????
    erk=8198BBF29F8F216CAA2EB1834F38E9490C155E767880346712BD6167C652D04E
    riv=023E758FB9684EA99264249A5523BC53
    pub=62DFE488E410B1B6B2F559E4CB932BCB78845AB623CC59FDF65168400FD76FA82ED1DC60E091D1D1
    priv=
    ctype=25
    
    [appldr]
    type=SELF
    revision=????
    version=000?00??00000000
    self_type=?????
    erk=BE21A922FA6307DFEA78CB7617A51816145CE8D9A70A2DD14278A866BE65FDC8
    riv=42994B6602F8E33781BA1281EF186FBF
    pub=637EAD34E7B85C723C627E68ABDD0419914EBED4008311731DD87FDDA2DAF71F856A70E14DA17B42
    priv=
    ctype=24
    
    [appldr]
    type=SELF
    revision=????
    version=000?00??00000000
    self_type=?????
    erk=4CEBFC1D3DCE650DE71F73B78EB4A37DEACFBE57231FDEDCDC568AEB49CEE377
    riv=BD9A81284BBB019D3D2741AA3BAA5096
    pub=503172C9551308A87621ECEE90362D14889BFED2CF32B0B3E32A4F9FE527A41464B735E1ADBC6762
    priv=
    ctype=30
    
    [appldr]
    type=SELF
    revision=????
    version=000?00??00000000
    self_type=?????
    erk=9DB0954784CEA7F2FF59192EFD04A60F0250B9D4A32AE6AD2A446F3A34F9212B
    riv=BFA08178E4EB5A2CA41A336BE4CF5603
    pub=05BF09CB6FD78050C78DE69CC316FF27C9F1ED66A45BFCE0A1E5A6749B19BD546BBB4602CF373440
    priv=
    ctype=0A
    
    [appldr]
    type=SELF
    revision=????
    version=000?00??00000000
    self_type=?????
    erk=668716115A3B1F9F98F247769104E58E01AF6472571F257523865A53E8620C05
    riv=564174ABF22C32D1102EAAF47E60F08A
    pub=B05F9DA5F9121EE4031467E74C505C29A8E29D1022379EDFF0500B9AE480B5DAB4578A4C61C5D6BF
    priv=
    ctype=11
    
    [appldr]
    type=SELF
    revision=????
    version=000?00??00000000
    self_type=?????
    erk=546B2FF3FE216ED2BA865C79368109A15F2B0D23C2031354B1F6F36B0FDB4D46
    riv=9B871D6414B8AACE542C18100AC21893
    pub=9C327471BAFF1F877AE4FE29F4501AF5AD6A2C459F8622697F583EFCA2CA30ABB5CD45D1131CAB30
    priv=
    ctype=16
    
    [appldr]
    type=SELF
    revision=????
    version=000?00??00000000
    self_type=?????
    erk=68E8261E31115665F2FED48EB12C6E4A3722A93E46D3BAF41A71D0802CA2A1F6
    riv=D882EF46F57E12FE4D44681FA4F7F805
    pub=A13AFE8B63F897DA2D3DC3987B39389DC10BAD99DFB703838C4A0BC4E8BB44659C726CFD0CE60D0E
    priv=
    ctype=17
    
    [appldr]
    type=SELF
    revision=????
    version=000?00??00000000
    self_type=?????
    erk=1DCBE29DC2B2730F084B55012BFCE82B40BEBDC2D92E6277C2118ED0CACE441F
    riv=275F8D432055BE85199261963796D220
    pub=3995C390C9F7FBBAB124A1C14E70F9741A5E6BDF17A605D88239652C8EA7D5FC9F24B30546C1E44B
    priv=
    ctype=27
    
    [appldr]
    type=SELF
    revision=????
    version=000?00??00000000
    self_type=?????
    erk=E4F2C93F93BF636014E9F8AD36D9BAD0F835ABE16A5788E082A7001E39E30C1D
    riv=E5F37DDC3E0BA3E3298DA91130133CF5
    pub=9BFF1CC7118D2393DE50D5CF44909860683411A532767BFDAC78622DB9E5456753FE422CBAFA1DA1
    priv=
    ctype=18
    
    [appldr]
    type=SELF
    revision=????
    version=000?00??00000000
    self_type=?????
    erk=C5AE4C11A373495DA250BC8A3A7B571415A38C381D3EA99202A9E8753644A813
    riv=F407E9FD67E45D9A527234A083790CEB
    pub=64A5C60BC2AD18B8A237E4AA690647E12BF7A081523FAD4F29BE89ACAC72F7AB43C74EC9AFFDA213
    priv=
    ctype=27
    
    [appldr]
    type=SELF
    revision=????
    version=000?00??00000000
    self_type=?????
    erk=EE3B468FC5F29081588B7C816E6EFD1959FAFE5E3DF83ABADA9158CAB91362BE
    riv=C62E683903BAB3018438621EFAB55A10
    pub=9D8DB5A880608DC69717991AFC3AD5C0215A5EE413328C2ABC8F35589E04432373DB2E2339EEF7C8
    priv=
    ctype=18
    
    [appldr]
    type=SELF
    revision=????
    version=000?00??00000000
    self_type=?????
    erk=8198BBF29F8F216CAA2EB1834F38E9490C155E767880346712BD6167C652D04E
    riv=023E758FB9684EA99264249A5523BC53
    pub=62DFE488E410B1B6B2F559E4CB932BCB78845AB623CC59FDF65168400FD76FA82ED1DC60E091D1D1
    priv=
    ctype=25
    
    [appldr]
    type=SELF
    revision=????
    version=000?00??00000000
    self_type=?????
    erk=BE21A922FA6307DFEA78CB7617A51816145CE8D9A70A2DD14278A866BE65FDC8
    riv=42994B6602F8E33781BA1281EF186FBF
    pub=637EAD34E7B85C723C627E68ABDD0419914EBED4008311731DD87FDDA2DAF71F856A70E14DA17B42
    priv=
    ctype=24
    
    [appldr]
    type=SELF
    revision=????
    version=000?00??00000000
    self_type=?????
    erk=4CEBFC1D3DCE650DE71F73B78EB4A37DEACFBE57231FDEDCDC568AEB49CEE377
    riv=BD9A81284BBB019D3D2741AA3BAA5096
    pub=503172C9551308A87621ECEE90362D14889BFED2CF32B0B3E32A4F9FE527A41464B735E1ADBC6762
    priv=
    ctype=30
    From zadow28 comes lv0.elf: yep working: [Register or Login to view links] (4.21) / [Register or Login to view links] (4.25)

    I've extracted and decrypted some off the loaders, go search for keys: [Register or Login to view links] (the 4.elf I uploaded is the appldr.elf)
    Code:
    Key 28 06 59 43 5E EA 33 B1 BD 7A B4 D0 81 13 06 D1
    IV EA 0E 83 8B A5 90 57 7A 14 D1 3C 8E 09 FD D1 34[*] Application Info:
    Auth-ID [appldr]
    Vendor-ID [hv]
    SELF-Type [Secure Loader]
    Version 04.25
    Some files inside that could be not be decrypted: [Register or Login to view links]

    Going throw appldr 4.25 dosen't look like there are revision 1C keys in there for 4.25 eboots.

    One thing i found out thats interesting.. the lv0 had 6 files inside. 3 that could be decrypted = appldr/isoldr/lv2ldr. 3 that couldn't. But if you look in hex you would notice that the 3 unknown files is simply headers. I also noticed in the rest of the lv0 files there are encrypted hex sections.

    So my guts says that you should try match the headers with some of the encrypted data/hex there you would probably find the missing lv1ldr if you succeed.

    From haz367: added to scetool, decrypts fine

    scetool 0.2.9 <public build> (C) 2011-2012 by naehrwert
    NP local license handling (C) 2012 by flatz
    • Loaded keysets.
    • Loaded loader curves.
    • Loaded vsh curves.
    • Using keyset [lv0ldr 0x0000 04.25]
    • Header decrypted.
    • Data decrypted.
    • ELF written to C:\cygwin\home\xxx\425ofw\update_files\CORE_OS\lv0 .elf

    From zecoxao: [Register or Login to view links] this one is from 3.55, since i didn't have any other than this and the jig one. [Register or Login to view links] and updated keys file

    Usage: scetool -d lv0 lv0.elf

    From aldostools: add this to keys file:
    Code:
    [lv0ldr]
    type=SELF
    self_type=LV0
    erk=CA7A24EC38BDB45B98CCD7D363EA2AF0C326E65081E0630CB9AB2D215865878A
    riv=F9205F46F6021697E670F13DFA726212
    pub=A8FD6DB24532D094EFA08CB41C9A72287D905C6B27B42BE4AB925AAF4AFFF34D41EEB54DD128700D
    priv=001AD976FCDE86F5B8FF3E63EF3A7F94E861975BA3
    ctype=33
    Please the leaked keys in: home\username\.ps3

    Name them:
    • lv0-ctype
    • lv0-iv-key
    • lv0-key-key
    • lv0-priv-key
    • lv0-pub-key

    No version number required.

    From Cyberskunk: Just be patient people... WE HAVE 100% WORKING solutions with no brick risk or complications.. tested for the last month not just spat out as fast as possible. After OFW 4.30 release.. not long..

    From danixleet: Can we add these ([Register or Login to view links]) to SCETool to resign 4.x games for 3.55? Appldr needs to be reversed before us end user's get the updated keys file for SCETool...

    Anyway Lv0 now decrypted for ever but it still need a lot of RE work to be able to get decrypted loaders from it since Sony had changed a lot of security algorithms to protect this loaders inside Lv0. Also we will not find 4.xx appldr keys inside the decrypted Lv0 so it still need more work to figure out how Sony store this keys right now.

    1) Yes with the leak of lv0 keys we can decrypt lv0 > extract appldr > decrypt appldr with metldr keys > locate the keysets >> unicorns

    This then enables us to decrypt any eboot / sprx etc for games and resign them with 3.55 keys .. (That is what is what you're looking to do)

    2) fail0verfl0w exposed a flaw in sonys encryption ECSDA or whatever its called lol...
    • what does this mean? it means we can calculate the private keys
    • what are private keys ? there used to encrypt sony files.. aka SELF. SPRX etc, etc

    So up until 3.55 we can calculate every key sony used to SIGN there files, thus making valid application, thus enabling homebrew etcc or whatever. 3.56+ that has been fixed and we can no longer calculate the private key... but yes we can still grab the public keys, as they are within the FW..

    Public Keys Decryption / Private Keys Encryption

    3) geohot released hes NPDRM tools which had static private keys, sony apparently blocked them keys, once npdrm was worked out, new tools had been released to select different keys, aka dont use geohots tools, there flop, even math stated this..

    4) you can use any sony npdrm private key in scetool and produce homebrew with will execute on any OFW... aka 3.60++ .... sony can't block there own keys, cause then all there old psn games etc would not work unless updated and there not gonna back date the updates for extremely old games lol..

    5) yes we can decrypt all current games and resign them for 3.55 if needed..

    6) lv0 private key cant be changed as bootldr cant be updated, so for example, every new fw out can now become CFW... or for instance step 1)... aka you download 4.30 extract the pup or install and nor dump... decrypt lv0 etc etc (step 1) and add the new appldr keys to scetool... their chain of trust was "fixed" in 3.60 but once you pwn bootldr its game over, as bootldr would hold lv0 keys and lv0 signing cant be updated.. so pwnddd for lifeeee !!!

    From [Register or Login to view links] (via pastie.org/private/3np6uj6md1occbctdeir6a) comes an update on his previous exploit as well:

    Since the LV0 keys have now been leaked, I believe I can now share this info with you, to help out those who are trying to build their own 4.x CFW:

    The NPDRM ECDSA signature in the SELF footer is checked by lv2. It first asks appldr to tell it whether or not the signature is to be checked, and appldr will only set the flag if the SELF is a NPDRM with key revision from 3.56+ (the ones without private keys). This means that the SELF files signed with the new 3.56+ keys still don't have their ecdsa checked (probably to speed up file loading).

    If appldr says the ecdsa signature must be checked, then lv2 will verify it itself, and return an error if it's not correct. There are many ways to patch this check out.

    1 - Patch out the check for the key revision in appldr
    2 - Patch out the "set flag to 1" in appldr if the key revision is < 0xB
    3 - Patch out the code in lv2 that stores the result from appldr
    4 - Patch out the actual sigcheck function from lv2.
    5 - Ignore the result of the ecdsa from lv2.

    Here is one of the patches (the 4th one, patching out the check function from lv2) :
    In memory 0x800000000005A2A8, which corresponds to offset 0x6a2a8 in lv2_kernel.elf, replace :
    Code:
    e9 22 99 90 7c 08 02 a6
    With :
    Code:
    38 60 00 00 4e 80 00 20
    This is for the 4.21 kernel (that was the latest one when I investigated this), I will leave it as an exercise to the reader to find the right offsets for the 4.25 and upcoming 4.30 kernel files.

    And here's another bit of info... in 4.21 lv2, at memory address 0x800000000005AA98 (you figure out the file offset yourself), that's where lv2 loads the 'check_signature_flag' result from appldr, so if you prefer implementing method 3 above, just replace the 'ld %r0, flag_result_from_appldr' by 'ld %r0, 0' and you got another method of patching it out. Either solutions should work just the same though. Enjoy homebrew back on 4.x CFW....

    p.s: Thanks to flatz and glu0n who helped reversed this bit of info.

    From [Register or Login to view links] (a PS3 dongle developer): The correct name for the PS3 keys that were released is "bootldr keys", not "lv0 keys": named after the verifier, not what is verified. bootldr is the name of the code living at address 0 in Flash (which is loaded by the SPU isolated mode boot ROM). Keys are named after the verifier because we decided so originally, and everyone else stuck to it. No point in changing it now.

    To quote (via games.slashdot.org/comments.pl?sid=3205473&cid=41747075):

    "The first-stage bootloader is in ROM and has a per-console key which is effectively in tamper-resistant silicon. The second-stage bootloader (bootldr) is encrypted with the per-console key, but is not upgradable and is the same for all consoles (other than the encryption wrapper around it). This second-stage bootloader verifies lv0.

    Sony signed lv0 using the same broken process that they used for everything else, which leaks their private key. This means that the lv0 private key was doomed from the start, ever since we demonstrated the screwup at the Chaos Communication Congress two years ago.

    However, because lv0 is also encrypted, including its signature block, we need that decryption key (which is part of bootldr) before we can decrypt the signature and apply the algorithm to derive the private key. We did this for several later-stage loaders by using an exploit to dump them, and Geohot did it for metldr (the "second root" in the PS3's bizarre boot process) using a different exploit (we replicated this, although our exploit might be different).

    At the time, this was enough to break the security of all released firmware to date, since everything that mattered was rooted in metldr (which is bootldr's brother and is also decrypted by the per-console key). However, Sony took a last ditch effort after that hack and wrapped everything after metldr into lv0, effectively using the only security they had left (bootldr and lv0) to attempt to re-secure their platform.

    Bootldr suffers from the same exploit as metldr, so it was also doomed. However, because bootldr is designed to run from a cold boot, it cannot be loaded into a "sandboxed" SPU like metldr can from the comfort of OS-mode code execution (which we had via the USB lv2 exploit), so the exploit is harder to pull off because you don't have control over the rest of the software.

    For the exploit that we knew about, it would've required hardware assistance to repeatedly reboot the PS3 and some kind of flash emulator to set up the exploit with varying parameters each boot, and it probably would've taken several hours or days of automated attempts to hit the right combination (basically the exploit would work by executing random garbage as code, and hoping that it jumps to somewhere within a segment that we control - the probabilities are high enough that it would work out within a reasonable timeframe). We never bothered to do this after the whole lawsuit episode.

    Presumably, 18 months later, some other group has finally figured this out and either used our exploit and the hardware assistance, or some other equivalent trick/exploit, to dump bootldr. Once the lv0 decryption key is known, the signing private key can be computed (thanks to Sony's epic failure).

    The effect of this is essentially the same that the metldr key release had: all existing and future firmwares can be decrypted, except Sony no longer has the lv0 trick up their sleeve. What this means is that there is no way for Sony to wrap future firmware to hide it from anyone, because old PS3s must be able to use all future firmware (assuming Sony doesn't just decide to brick them all...), and those old PS3s now have no remaining seeds of security that aren't known. This means that all future firmwares and all future games are decryptable, and this time around they really can't do anything about it.

    By extension, this means that given the usual cat-and-mouse game of analyzing and patching firmware, every current user of vulnerable or hacked firmware should be able to maintain that state through all future updates, as all future firmwares can be decrypted and patched and resigned for old PS3s. From the homebrew side, it means that it should be possible to have hombrew/linux and current games at the same time. From the piracy side, it means that all future games can be pirated. Note that this doesn't mean that these things will be easy (Sony can obfuscate things to annoy people as much as their want), but from the fundamental security standpoint, Sony doesn't have any security leg to stand on now.

    It does not mean that current firmwares are exploitable. Firmware upgrades are still signed, so you need an exploit in your current firmware to downgrade. Also, newer PS3s presumably have fixed this (probably by using newer bootldr/metldrs as trust roots, and proper signing all along)."

    In summary, you can sign homebrew with old NPDRM keys which haven't been revoked. We don't have 3.60+ private keys for RETAIL signing (not NPDRM), but we don't need them as NPDRM keys can be used instead and the homebrew signed as NPDRM content.

    In conclusion, according to afiser while Sony can update lv0 they must use the same keys to encrypt it each time or else bootldr wouldn't be able to load it. PlayStation 3 3k+ consoles have LV0.2 so it's not the same key. For those interested in examining them some LV0 dumps can be found via ps3devwiki.com/wiki/Loaders#Loader_encapsulation_in_lv0 as well.

    Update: From woulph_alfa via Spanish site (ps3sos.com/showthread.php?29532-Keys-LV0-liberadas/page23) comes the following theory on the encryption, roughly translated:

    I bring you good info compiled by me. I've been throwing a couple of hours to file the 4.25 appldr good here's a short summary of what is the content of. Elf

    I will explain:

    [1] - WA (Writing and Assignment) is not interested in a lot ... But do not rule ...
    [2] - AX (allocation and execution) party quite important since it is the only part of "executable" You can look at the content from 100 to 01ba10 Possibly OFFSET is the one responsible for making the decryption of the RIV and ERK. Apart from checks ...
    [3] - A (Assignment) and finally the most interesting part of the file, in this section I think is where the KEY to decrypt the RIV and ERK (See the second image there is the structure)
    [4, 5, 6] - WA (Writing and Assignment) Here are the keys of the appldr from 4.25 up to the first keys appldr

    KEY SAMPLE
    Code:
    40 00 00 00 00 00 00 00 00 00 00 04 00 00 00 00 FLAG
    00 00 00 7B 00 00 00 01 00 11 60 00 48 CE C6 E6 INFO KEY + INICIO KEY
    B3 88 23 A6 84 30 26 44 52 D8 0B 14 03 BA 54 86 KEY
    
    40 00 00 00 00 00 00 00 00 00 00 04 00 00 00 00
    00 00 00 7B 00 00 00 01 00 11 60 00 F8 97 23 39
    75 67 AF 39 D3 B6 8E DC F8 07 CE F3 59 B8 D1 2C
    
    40 00 00 00 00 00 00 00 00 00 00 04 00 00 00 00
    00 00 00 7B 00 00 00 01 00 11 60 00 FD A1 2F 68
    C9 11 0E 61 67 D5 F5 07 A6 A0 ED D7 B0 B4 89 D8
    What is the encryption method that uses NO IDEA AS IF WE HAD A LONG AND THE ....

    Possibly a little further investigation, if anyone wants me to help out ... welcome! OJO not expect great progress on my part, because currently I have no means eager.

    PS3 LV0 Keys Leaked: 4.21, 4.25 and 4.30 CFW Updates Incoming!

    PS3 LV0 Keys Leaked: 4.21, 4.25 and 4.30 CFW Updates Incoming!

    PS3 LV0 Keys Leaked: 4.21, 4.25 and 4.30 CFW Updates Incoming!

    More PlayStation 3 News...
    Attached Files Attached Files

  9. #49
    Member kokotas's Avatar
    Join Date
    Sep 2011
    Posts
    56
    • Loaded keysets.
    • Loaded loader curves.
    • Loaded vsh curves.
    • Using keyset [lv0ldr 0x0000 04.25]
    • Header decrypted.
    • Data decrypted.
    • ELF written to C:\scetool\lv0.elf.

    Seems legit!
    Attached Images<br><br> Attached Images

    Attached Files Attached Files

  10. #50
    Junior Member garine's Avatar
    Join Date
    Dec 2010
    Posts
    19
    Nice news

 

Sponsored Links

Page 5 of 25 FirstFirst ... 3456715 ... LastLast

Tags for this Thread

Affiliates - Contact Us - PS3 Downloads - Privacy Statement - Site Rules - Top - © 2014 PlayStation 3 News