228w ago - Recently some PS3 Service Mode JIG set-up files have been leaked, and we're told by someone close that the actual source of the leak is infact the leaker who goes by the nickname of hackerpointer. Apparently he is the same source of THIS leaked screenshot back in November of last year.
In any case, those who want to grab them can do so below, however, don't expect it to lead anywhere (remember: they are "old" files to PS3 Devs, meaning this is indeed "old news" just new to the general public).
As it's already making it's rounds on the Internet, we hesitantly decided to post on it... even though those who can actually utilize the files (and attempt to replicate the required hardware) have had them for quite some time.
Here is some background on what the included files are for those new to the PS3 Dev world...
Lv2diag.self: crashes on a Debug console, likely used for lv2 diagnostics.
PS3UPDAT.PUP: a very tiny updater PUP, enough for just a 'base' system. It doesn't run on any system the resident PS3 Devs currently have access to.
UPDATER_LOG.TXT: simply a service mode updater log.
That being said, in general such leaks are frowned upon as they put the source in jeopardy... however, since the source happens to be the leaker in this case there isn't much that can be done unfortunately. If they choose to leak such files taking any associated risk, that is their own perogative... even though it defies rational logic, unless the leaker removed all traces/watermarks of course.
Feel free to discuss the files below, but without the hardware, additional files with complete documentation, and the required software this leak is deemed as no legitimate use to date.
Stay tuned for more PS3 Hacks and PS3 CFW news, follow us on Twitter and be sure to drop by the PS3 Hacks and PS3 Custom Firmware Forums for the latest PlayStation 3 scene updates and homebrew releases!
ok, for basic, the system file of usb dongle is knowledge ? (FAT, NTFS, EXT, ...) and maybe files leaked contains some protocol but not complete, to complete it, the usb may be insert to a retail console to work. maybe a special eprom is used in this jig, maybe... thanks RMX for precisions
with many search, i think to a possibility: a usb key programmable where someone can put some file in a eprom maybe a good possibility. i have see a product called goldkey and i think i can check this possibility later. before, i see if other usb key programmable exist and choose one closer of my idea.
Edit: after see the leaked file, i'm now sure about something: one condition is to know exactly the file structure but impossible to know who is it. the leaked jig is not complet (but not sure about it).. if the team who have make the leak can send a message of full list txt to know better about this
Reliable USB dongles don't send just a single packet of data to make an application sure the dongle is sane. There are special custom protocols to validate such dongles by sending an arbitrary data and receiving proper responses. But it's still possible the JIG dongle isn't so secure.
It looks like it's impossible to make this kit run on a retail machine since a special USB dongle is required to boot the update file. However the dongle is probably just a flash drive with some specific feature(s). PS3 is so secure system so I can expect it will be difficult to clone the dongle while I remember those USB dongle for PS2 demo stands which are apparently just a dummy devices with the specific Vendor ID & Product ID.