247w ago - Recently, through reconstructing the PS3 HDD, sonyk has added some new details to the PS3 HDD Map we posted early last year.
Normally the infoboard files reside in the flash, and although it's still missing the subdirecties of user (as well as data, drm, mms, and vsh), those interested can check out the partial user directory available below:
Stay tuned for more PS3 Hacks and PS3 CFW news, follow us on Twitter and be sure to drop by the PS3 Hacks and PS3 Custom Firmware Forums for the latest PlayStation 3 scene updates and homebrew releases!
Hi. I don't presume to know to much about anything, but, it it possible to find the encrypted key pair just using brute strength attack using a WHOLE bunch of computers connected with distributed computing? Like seti at home or that PS at home protein software?
I know this question is probably completely obviously unreasonable to most of you. but I don't understand why not.
Thanks for taking the time to help/inform/deal with me and other non-devs like me.
Another problem is that built in firmware creates virtual partitions for both ps3 os and otheros on the hdd. The main partition is in firmware memory , after that the OS in the main memory controls all other partitions and a rule for hardware lvl`s for os`s.
And for my personal opinion, I really think the way to go would be the killing of the hypervisor process (AFAIK it runs on a SPU). That thing can't be perfect, I've done my cracks, others have done them, Steam was supposed to be impossible to crack, so this process, because it's nothing more then that, can be killed or fooled someway. The problem is that "someway"
For this HDD info, it's cool to know what is in the HDD and this kind of information can ultimatly be used to code, for example, a linux filesystem driver to read the hdd directly. Not that this can be used to exploits or something like that, but it can make our lifes easier in some way, like copying files into the ps3.
Anyway, good to know there is progress being made. Keep up the good work guys!