One of our resident PS3 DEV's CouRieR extracted the flash of a PS3 Slim (CECH-2000) European console with Firmware 2.75 a few months back by removing the chip, and dumping it with an external reader along the lines of the [Register or Login to view links].
The chip, a Samsung K8Q2815UQB, is a 128 Megabit flash chip. The dump, which weighs in at 16.0 MB (16,777,728 bytes), is quite similiar to that of a later model PS3 with the smaller flash.
Earlier generation Fat PS3's, those that sported dual 1 Gigabit flashes, had two copies of the PS3 firmware along with a full AES filesystem (for /dev_flash) on the flash.
The PS3 Slims, like later generation Fat's, have the AES filesystem (/dev_flash) on the Hard Disk Drive, and mounted virtually (like a loopback) with only one copy of the firmware.
Both the Fat and Slim PS3 systems feature everything that one would expect: a bootloader, corresponding core operating system LV1/LV2 SELF's, along with corresponding isolated SPU code - all encrypted of course.
Since everything is encrypted, and tied per box, the Slim's flash is really no different from that of a Fat PS3 - makes you really wonder what the "hardware differences" that made OtherOS incompatible were.
Finally, for those who'd like to take a peek, here is the PlayStation 3 Slim's FileList Dump Log!
Next week we will share some exciting PS3 Service Mode information, specifically on what we got in the mail a few days back! Then we will take a tour of the PS3 TOOL XMB as promised last week.
Alas no, on both the flash, and HDD, the flash filesystem itself is stored as an encrypted file essentially, so even decrypting the HDD will get you a still encrypted file (for the flash filesystem). Multiple layers of encryption - secure, just not good for us!
Is there anyone who's bothered trying to decrypt these things for any period of time? I'd ask geohot to have a go, he doesn't seem to have a prob brute forcing... but he's a rude little... so ask nicely I would