It was released by the Spanish dev Deviante. Don't know much about him, only that he's supposedly having issues with the connect_port() command I believe.
I am trying to understand why the psp can't do this, does the hack specifically need those device id's or can it be any id's? if so why does it specifically need those id's, I have come to understand its a simple usb buffer overflow meaning that if you simulate say 6 psp's connecting through a hub sending the required information it should work.
I'm getting a bit antsy about this and after Whinis post (above), I have to wonder if it'll even happen?
Should I hold my breath or look into doing something else?
I feel the same way. I would buy a teensy or the like but most stuff seems to be sold out atm...
Also, some more progress from eol today (google translate):
Not exactly sure what that all means as far as the project goes overall, but it's good to at least see something being done.Fixed some definitions, which were short rather than char.
Added switch_to_port (0) when power is in the 6 ports
Fixed sizeof send the proceedings which did not send their packages
Changed time to send a response to the GET STATE 0ms, it is not necessary
wait, just have to wait to send the value = 4, before exiting the
function can not be expected to send the package.
Werid that one most hackable device, sonys psp, can't be used to hack the "unhackable" system also made by Sony, the ps3. But you can use a calculator lol.
brandonwilson: ''Did some digging into PSP port, I don't think address code floating around is right. Address != endpoint. Maybe still do-able with research.''
Bad news about PSP port by spanish team EOL. Project is closed: code.google.com/p/psp3jb/
Discontinued. Everything indicates that this port cannot be made, even if it could, it would take too long to develop something, as well as Hermes says, leave the project unfeasible, not impossible.