Alright, I've watched development of the exploit pretty closely in so far as someone outside the "scene" can, and while I have very limited programming experience (I've written some Python and very basic C++) I can't help but feel like those porting the current exploit to new devices like the PSP and Android / PC are making this far, far
harder than it needs to be, at least in the short term.
Also please note I'm just trying to be helpful here, not cheap.
I ordered my Teensy++ 2.0 on the 30th and should have it shortly, so homebrew will be mine soon enough no matter how the rest of this goes, and that little dongle is a lot more convenient for me than finding and connecting the PSP to my PS3 every time I boot it for homebrew.
What we have currently is an emulated USB hub, correct?
What's going on is at the most basic level nothing more than a set of challenges and a corresponding set of responses.
Rather than try to port USB host emulation to the new devices, why not simply look at the entire challenge / response series, ignoring what each step is doing
, and focus solely on the raw data that needs to be sent and the timing with which to send it.
So far as I know it's all static data, there's no variability in what the dongle sends. Correct me if I'm wrong here -- again, I've never done anything even close to this low level.
If that's true, it should be as simple as sniffing the stream, which I'm fairly sure already happened, leading to all the current development, and using the relevant bits at the correct times, much like what can be done with packet capture to compromise WiFi networks.
Any thoughts from the real developers here? Any idea where else I should post this, if it's relevant?