To quote: This morning we got informed from our hacking stuff supplier that is Matrix Team is going to announce a new PS3 dongle in few days. It is named “Infinity USB” and runs existing and new v3.6+ games from HDD in conjunction with standard backup managers.
Unfortunately, their official site hasn’t updated...
82w ago - Although PlayStation 3 developers have already commented on DRM-infected dongles, following in the shadows of JB-King and JB2USB today we have a third PS3 JailBreak 2 (JB2) True Blue (TB) dongle clone dubbed PB2 entering the market.
To quote from the official site (linked above): PB2 (PS3Break2) is the latest product from PS3Break Team who ever made a tremendous splash in the PS3 scene.
PB2 can break your own PS3 console and enjoy the latest and most popular PS3 games which require 3.6+ or 3.7+ PS3 firmware. The PS3Break team are focused on enhancing the user experience of our customers, play games with it easily!
Their official site (linked above) appears to be a simple template design similar to the others, while the DRM dongle is currently being peddled for $19.99 with the JB2USB PS3 JailBreak 2 (True Blue) clone details below, as follows:
JB2USB PS3 Features:
Booting of games designed for PS3 system software v3.6 and above
Runs your existing games and new v3.6+ games from HDD in conjunction with standard backup managers
Does not require the power/eject trick
Custom v3.55 Dongle firmware behaves like OFW when JB2USB is not inserted
Manufactured from highest grade components and Actel based
94w ago - Following up on the previous True Blue (TB) PS3 JailBreak 2 (JB2) DRM-infected dongle news comes a WIP update from Shadoxi on dumping and decrypting the TB and Cobra payloads below, as follows:
I have figured out where the payload is located of the TB and Cobra dongles. You can find it at offset @360000 in lv2_kernel and 7f0000 in PS3 memory. According to the PS3 Developer Wiki (ps3devwiki.com/index.php/ReDRM_/_Piracy_dongles) the LV2 dump payload at 0x7f0000 has also been decrypted @ LV2 dump 0x7f0000 (pastebin.com/3VG76HQs)
Drag and drop payload in IDA and load it in Binary file mode, Processor type PPC.Press...
97w ago - As a follow-up on our previous article with the spirit of Operation: Mongoose in mind, we are continuing to examine both the Cobra and True Blue PS3 DRM-infected dongles and TB EBOOT files, and welcome any help with this project from other PlayStation 3 developers in the scene!
First let me tell you the following explanation is not a theory or any rumors, it's actually how the USB dongles work to allow different things.
We heard many rumors / theories about the process of the Cobra / True Blue but I didn't see anyone give any big answer about that (I'm not saying I would give you the big answer but the explanation how it works and how to make this possible)
Cobra / True Blue Part 1
Both dongle use syscall / payload (after a big investigation, both dongle also follow the work of graf_chokolo and the functionality of the dongle can be ported into a CFW (not a good idea from some devs I guess)
Cobra / True Blue use a lv1_wrapper (syscall implementation) that can allow to use subroutine function into kernel mode call....