154w ago - Today sabrax from XBoxHacker.org (linked above) has shared a video demonstrating a way to trigger 'Manufacturing Mode' using a Memory Card on unmodified Microsoft XBox 360 consoles, followed by receiving an 0x81DA07FF error.
Shortly after, rupal has posted both the extracted XEX & INI file along with a raw dump for examination by other devs.
171w ago - Update: Flyer has found a savedata crash exploit (pictured below) that may also work with PSP Firmware v6.20.
A few months after the Mercury PSP Exploit was released comes the next discovery, specifically pspjoke of LAN.st (linked above) has found a new PSP exploit that should work on PSP Firmware 6.20 and the PSPgo!
While it isn't released yet, SilverSpring is examining it and if possible stated he would make an exploit from the game save crash... which may even be useful for eLoader fans.
To quote: "If this looks exploitable I would like to speak to one of the pros via pm to further the development of the exploit and to learn more about exploits in general.
The overrun string was just a ton of A's or 0x61.. as you see I managed to overwrite ra so I think I'm on to something.. changed to 0xEE and it is for sure."
195w ago - Yesterday tmbinc has reported on XBoxHacker.net (linked above) that user "jc" in #free60 found that his XBox 360 Jasper, built June-30th 2009, already contained the new bootloader (but with a 7363 Kernel).
To quote: We don't know when Microsoft switched it in production, but this discovery means that they did this at least over a month before the update.
So far, we don't know what Boxes are safe to buy. If you want to check your box, dump the flash, at look at the "CB" Version (offset 0x8202, the two hex bytes after "CB"). For Jasper, CB Versions 6750 (and up) are bad, CB Version 6723 is still good (at least we think so), CB Version 6712 is good for sure.
If you find that your jasper is still either "good" or "bad", please post the mfg date (and CB version) here so we can determine the cutoff date.
Let me remind your that we are not completely done with the adaptation of the hack to jasper yet. We've sorted out most things now, so we'll release it soon.
The recent build.py changes will make an adaptation easily possible, and nandpro already supports jasper. Remaining things are the SMC and the J1F1-replacement points. We're working on this, don't worry.
My Jasper, built 2008-10-10, is "good" (CB version 6712).
196w ago - Today SKFU (linked above) is reporting that he has ran across what he believes to be an unencrypted SPU binary found in the Def Jam: Icon demo for PS3.
To quote: When I was bored yesterday I dealed with HDD decryption again and looked through the game folders on the decrypted HDD.
The Def Jam: Icon USA Demo seemed interesting as it only works on US consoles. While looking for the answer I noticed a folder dj3-ps3-opt in /USRDIR/spu/.
In there are several files like elf_sputhreads_apply.bin. I opened some files in a simple HEX editor and noticed that the files are not encrypted.
As well it looks like a binary. It does not have the default binary header used by SPU .self files compiled with the SONY PS3 SDK. It may be compiled with a third party compiler or with the IBM Cell SDK.
I did not check that, yet. Well, come back to check for updates regarding the research!
205w ago - Apparently, a picture (below) of what appears to be a movie poster advertising the new Metal Gear Solid movie has just sneaked onto the Internet today.
To quote: The poster, which is believed to have been taken at Sony Pictures in Culver City, CA, shows Christian Bale (most likely Solid Snake) and Daniel Craig (most likely Liquid Snake) along with a scheduled release for July 2011 and Hideo Kojima's name at the top.
This would undoubtedly be awesome news if we could confirm it as being 100% legit, but until then it'll remain a rumor as there are plenty of individuals out there with decent Photoshop skills.