To quote: Yep, we are still alive guys! To proove that, today our public release of our newest creation.
The PSN Tool Feature list:
• Patchscan in 45(!) PSN environments
• Range & scan
• Direct PKG file download
• PSN Registration
• Store Collection
• User Info
• User Trophy Info
User Info & Trophy Info Details:
To use those features you require keyfiles. For doubts about the legal situation we won't include those in the download package.
To get information/trophies about the user of your choice, enter his/her nickname in the "Input nickname here..." field, choose the region he lives in via the table next to it (USA/EU/JAP) and press "User Info" or "Trophy Info".
If we find the time we may release an update as there still a lot on the TODO-list:
174w ago - Below is iQD's statement regarding the recent GeoHot PS3 Hack news, partly it really seems as if he does not read any docs :P
The most he claims to be surprising is mentioned in the IBM docs hehe^^
To quote: "So the PS3 is hacked ? Well that's nothing more than an urban legend.
Altough it's nice to capture all these HV calls and stuff from a plain (not encrypted) lv1 binary, but this will never lead to a hacked PS3.
Let's have a look. The major security architecture on the PS3 is called the "Secure Processing Vault" and is the most important thing regarding "hacking" the PS3.
There is NO WAY for the PPU or even the HV to gain access to the SPU, which is an application running inside of an isolated SPU.
Well you can kick out the isolated SPU, like geohot mentioned, but this gives you nothing, as ALL the encryption and execution of applications (HDD encryption, app encryption, decryption, executing, signature checking, root key extraction) happens inside the isolated SPU.
To run homebrew on the PS3 you would have to reassemble the whole functionality from the SPU inside a binary running on the PPU. For this you will need the root key....