143w ago - A few days ago PSJailBreak Reverse-Engineering work began, and today German site GamerFreax.de (linked above) has posted a breakdown of the PSJailBreak, how it was reverse engineered and notes that it requires additional hardware to update.
Below is the rough translation of the PS JailBreak reverse-engineering details, to quote:
"We have the PSJailbreak dongle yet again brought out of retirement to put it more precisely Herbs to take a closer look. We tell you here in brief the main steps of the internal process of PSJailbreak.
We can confirm that it can not confirm that PSJailbreak a clone of Sony's "Jig" is module. PSJailbrak is an exploit honest self-developed. The chip is not but a PIC18F444 ATMega with software USB.
This means the chip is internally capable of USB to emulate. PSJailbreak mainly be emulated 6Port a USB hub connected to a specific end USB devices and then disconnected. One of these devices has the ID of Sony's "Jig" module, which means that played in the development of PSJailbreaks the "Jig" module, a certain role.
But let's start at the front: When the PS3 is clamped in the USB emulation device, which has a much too big Configuration Descriptor. This Descriptor überschriebt the stack with a PowerPC contained code that is executed. Now, various USB devices are connected in the emulation. A device has a large 0xAD Descriptor, which is part of the exploit and contains static data.
A short time later (we are moving here in Milisekundenbereich) the jig module is connected, and encrypted data are transmitted to the module jig. A (in Milisekundenbereich) eternity later, the answers Jig 64Byte module with static data, all USB devices are disconnected, a new USB device is connected and the PS3 launches with a new look.
64Byte static data that is emulated by the PS3 64Byte Jig sent to the static data that is emulated by Jig sent to the PS3
Extract from the USB stream Extract from the USB stream (pictured below).
Incidentally PSJailbreak is NOT updateable. The Update feature can be mentioned, if realized at all, only with additional hardware."
Stay tuned for more PS3 Hacks and PS3 CFW news, follow us on Twitter and be sure to drop by the PS3 Hacks and PS3 Custom Firmware Forums for the latest PlayStation 3 scene updates and homebrew releases!
well, finally some real reverse engineering begin with data sniffing... though it's not confirmed yet, the ATMEGA soft USB seems to be a good "guess"... if the usb simulation and the 64 bytes "static" response are only things we need, then of course there will be a way to duplicate it with low cost.
There are many USB micron solutions. all we need is coding.. as for the "it need extra hardware for update" speculation, I would doubt that for a while. with a good coding, the chip could accept data from USB and then perform a in system program. I am not sure whether PSJB's code has this function or not.
But hardware wise, it shouldn't be impossible. but we need to know the actual micron used in PSJB before we can conclude more things.... remember, all we are seeing now are data sniffing, not final truth.. I wonder the 64 bytes "static" response is really static or not. in most cases, the challenge response sequences requires different responses corresponding to the random challenges.. or maybe the stack overflow caused by the oversized descriptor (again, this is only a speculation) makes the challenge/response routine accepts a "static" response...
I don't know how the real jig responses to the challenges.. I don't have the jig, and nor the PSJB... I am simply summarizing the facts with my working experiences in reverse engineering....
well hopefully we can get a free version soon even so as it seems stick is NOT upgradeable but the backup loader is? Maybe the dev gurus can turn a normal usb stick into one. Don't know if that's even possible..