Sponsored Links

Sponsored Links

 

PS3 Hacker KaKaRoToKS Interviewed, Says 3.60 Solution Coming

1350°
178w ago - Today Myce.com (linked above) interviewed PS3 hacker KaKaRoToKS, who states that a PS3 Firmware 3.60 solution is indeed coming after reports and videos of a 3.60 JailBreak running code circulated last week.

Below is the the KaKaRoToKS interview in full, to quote:

What are your thoughts on the recent PS3 3.60 firmware cracking video that was uploaded and removed over the course of a day last week? Many dubbed it fake and said it was a debug PS3, but when we chatted with the guy who uploaded it he defended it as real and said it was a retail unit.

I’ve seen the videos, and I also talked to the people who did it. Whether it’s fake or not, I cannot tell as I have not been authorized by the authors to divulge what they did. All I can say is that they said they would never release it, so whether it’s fake or not has no importance, since in the end no one will have access to it.

However, as I’ve said to a few people on Twitter, the hack that was used on 3.55 and lower was unique and Sony fixed it. So, that’s...
 

Sony Finds GeoHot PSN Account, PS3 Hacker in South America

1350°
178w ago - Update: Some more legal doc updates have now surfaced, which include GeoHot's laywers response refuting Sony's claims (via [Register or Login to view links]) that the "blickmaniac" PSN account belongs to him.

[Register or Login to view links] is also reproting that GeoHot's PS3 SCEJ manuals remained sealed, that he couldn't have known of SCEA to set up a PSN account and that the PlayStation 3 serial numbers don't match.

Today many sites are reporting that Sony has allegedly found George Hotz's PSN account under the nickname of blickmanic which would subject him to their TOS, that the PS3 hacker is currently [Register or Login to view links] or [Register or Login to view links] in South America, and finally that GeoHot may have intentionally removed integral components of his impounded hard drives prior to delivery.

To quote from [Register or Login to view links]:...[/B]
 

SoftLayer to Quash Sony Subpoena, GeoHot on Protective Order

1350°
179w ago - Today [Register or Login to view links] reports that PS3 hacker GeoHot is now accusing Sony of "false representations" to the court and petitioning for a protective order while [Register or Login to view links] confirmed that SoftLayer is moving to quash Sony's subpoena on George Hotz Forum account details in the pending PlayStation 3 hacking case despite their recent PayPal victory.

To quote from Groklaw: "Specifically, Hotz says that Sony Computer Entertainment America falsely claimed at a recent hearing that the Software Developer Kit at issue in this litigation referenced SCEA being in California. The SDK, Hotz says, is owned by Sony Computer Entertainment in Japan, and the installation procedures reference Sony Japan, not SCEA.

This is relevant, Sony argued, because if they found any of the SDK tools on his computer, it would "establish contacts between SCEA and Mr. Hotz" in that they claimed SCEA is the only entity distributing the SDKs. The discovery that the court ordered was based on SCEA's representations. Now what? Should the discovery...
 

Video: PS3 3.60 JailBreak Rumor, Mathieulh Claims Running Code

1350°
179w ago - Just over a week ago PlayStation 3 hacker Mathieulh confirmed finding a PS3 3.56 Exploit, and today [Register or Login to view links] tweeted part of an IRC chat log where Mathieulh stated the following regarding PS3 Firmware 3.60 running homebrew code, as follows:

"[03:15] while you are insulting me like morons, I already have code running on 3.60, and I am laughing, and guess what ? I am happy I stopped sharing, you can hate me for it, I don't care."

He followed up with the following Tweets: To those planning on building a 3.56+ pup for whatever reason, the files attributes changed, the group and user ids for the files as well. The new 3.56+ values for tarballs are the following: owner_id, “0000764″ group_id, “0000764″ owner, “tetsu” group, “tetsu” ustar, “ustar”

You can use fix_tar to use those new values. Use with caution. By comparison, those are the pre-3.56 values. owner_id, “0001752″ group_id, “0001274″ owner, “pup_tool” group, “psnes” ustar, “ustar”

3.60 isn’t “hardcore...
 

PS3 Hacker Mathieulh Finds PlayStation 3 Firmware 3.56 Exploit

1350°
181w ago - Today PS3 hacker Mathieulh reports finding a PlayStation 3 Firmware 3.56 exploit, although he states he has no plans to give any further details about it.

To quote from PSX-Scene (linked above): Well-known hacker Mathieu Hervais has reportedly found a bug that allows exploiting metldr, the bootloader and firmware version 3.56. Unfortunately, he refuses to release it.

Originally Posted by Mathieulh (via [Register or Login to view links]):

I hesitated a lot before tweeting about it, but a bug allows exploiting metldr, the bootloader and 3.56+. I don't intent to ever unveil it.

So much for "unhackable" PS3s though... I am not giving any further details about it. Sorry.

Actually the revocation list exploit doesn't allow you to exploit isoldr, you could however sign a revoke list if you had the revocation list keys and knew the sign fail, and use that to dump isoldr. Metldr does not load revocation lists.

This has been tested, how do you think I could release the lv2ldr and appldr keys ? (about 24hrs before Geohot showed up with metldr keys) This has been tested, how do you think I could release the lv2ldr and appldr keys ? (about 24hrs before Geohot showed up with metldr keys)

You can...
 
Sponsored Links

Sponsored Links
Sponsored Links

Sponsored Links






Affiliates - Contact Us - PS3 Downloads - Privacy Statement - Site Rules - Top - © 2014 PlayStation 3 News

Sponsored Links