132w ago - Today Killzone 3 PS3 patch version 1.09 has been released, and although the changelog (below) contains many fixes the update's EBOOT.BIN game executable is also encrypted with 3.60 Firmware PS3 Keys meaning those who update won't be able to run it on PlayStation 3 Custom Firmware.
If you are running PS3 CFW and remain on the Killzone (BCES-01007) 1.08 patch or below you will still be able to play the game fine though.
Below is the Killzone 3 PS3 Patch 1.09 changelog from Guerrilla Games PlayStation 3 Developer LevTrin12, to quote:
• Added Colour blind support - When turned 'On' all enemy players and objects will be underlined. This is the case for the minimap and in-game, such as player names.
• Frozen Dam - Operations - The first mission in is now 6 minutes again
• Move - Fixed continuous rumble when the PlayStation Eye camera connected
• Move - When interacting with a Search &...
139w ago - Today Portal 2 has been confirmed as the first PS3 3.60 Firmware encrypted game, however, as it spreads on torrent sites PlayStation 3 hackers are already examining potential work-arounds to get the game running for PS3 Custom Firmware users.
To quote: We all knew this day would be coming, just like before with the v3.50!
Yep, all the rumors were right! -- Portal 2 would be the first game that was pressed using the currently unreleased APP v3.60 keys!
If you are looking to enjoy the sequel to the acclaimed Valve's puzzle-action hybrid, the Portal 2, then you need to learn to setup your own portal, because playing it on a 3.55 CFW console right now is not possible.
You are looking at different sets of method being tested such as the famous PARAM.SFO editing, EBOOT decrypting, it's just useless without the 3.60 keys. To say that the upcoming L.A. Noire is on the same ride will be my heartbreaking May moment.
So, I hope someone will find the solution for this or just roll on the 3.60 CFW already! But remember to eat some cheese with all that wine!
Something always unfolds in the scene, to get you back into the 'gaming'!
302w ago - A bit of unexpected news on this LEAP YEAR DAY indeed.. a nice guy has leaked PS3 Debug Firmware 2.15 today! A picture of it on my TEST console is below, and also there is an unpacked FileList of it for those interested. It adds a new "vm" folder to the PS3 HDD among other things, but we have yet to thoroughly look through it.
This is VERY cool news mainly because (as we all know) even the retail PS3 Firmware 2.15 isn't available yet from Sony!
For other PS3 Devs to examine, we will be adding the 2.15 Firmware to our PS3 Downloads this weekend as it's a bit sizeable weighing in RAR'd at 103 MB (108,852,452 bytes).
304w ago - Mainman has updated his PS3 NAND Extractor/UnPacker to v0.4 recently! Changes to the latest revision include support for multiple dumps. The NAND Tool now scans for files, versus using a fixed position making it much more robust with extracting files.
It includes BETA support for the 40gb PlayStation 3 flash, however, we are still working out a few major bugs prior to a public release.
As mentioned above, extraction now dumps the files, plus additional data including the IDL section. It extracts the MAC Address, and also dumps the asecure loader section. More on this soon..
In other news, we are waiting for the InFeCtuS Team to update their program to support the new Samsung Flash revision, so we can experiment more with our recently discovered PS3 downgrading technique. Until then, not much new to report on this area yet.
Finally, we have been successful with running PS3 Retail game back-ups on a PS3 Test from both Internal and USB HDD (along with DVD). Unlike PS2 and PS1 development systems, a PS3 Test won't play a 1:1 copy/scene release.
It only plays development copies, so the executables (EBOOT.BIN) had to be decrypted and rebuilt for them to load. However, as mentioned previously,...
It comes with a Windows and Linux binary as well as source code, and those without an Infectus Mod can still experiment with it using the following 'dumpable dumps' files (via PS3 Infectus) available in iRC EFnet #PS3News when merged:
From the ReadMe file: This tool is used to interleave, then byteswaps both dumps of the PS3 NAND. Upon completion, it creates a 'user readable' file.
This file is then scanned by the tool, and the flash files are extracted to a folder. This folder is named PS3Nand-XXX.XXXX, where XXX.XXXX is the SDK Version magic in the flash (usually the version number of the firmware)
.B .A usually works, however in some cases .A .B order is required.