142w ago - This weekend PlayStation 3 hacker Graf Chokolo has disabled the PS3 internal HDD encryption, opening the door to possibilities such as dual-boot PS3 Firmware and using the decrypted PS3 HDD in another console.
To quote: Even without having a PS3 to work with, graf_chokolo is really active in distributing updates and fixes to his PS3 Linux gits. The latest one comes with an interesting update as you can see from his post below. Maybe one step further to a dual boot PS3 FW?
Guys, take a look at "ps3dm_sm set_del_def_encdec_key" command. You can disable/enable virtual FLASH/internal HDD encryption with that And by patching HV process 9 (which sets ATA keys before loading GameOS) you can disable it permanently. It means you could swap your internal HDD and use it on another PS3. But you have to restore the content on it after disabling encryption because all data will be encrypted of course.
Soon i will implement ENCDEC device driver for PS3 Linux and you will be able to experiment with ATA encryption. ENCDEC device is responsible...
151w ago - Today Waninkoko mentioned he agrees with Hermes and Naima's recent views on the discussion of PS3 NPDRM SELFs, how their encryption differs, GeoHot and what PS3 Firmware 3.60 may bring to combat PlayStation 3 hackers.
Below is a rough translation from Elotrolado, to quote:
I like to play magic, astrology and / or fortune-telling, so what is written below is not from any of the three.
The first consequence that will bring the firmware 3.60 is that all applications signed with the utility in make_self_npdrm created by Geohot stop working.
Oh Wait! That's not what I had said 'sceners' by the mouth of all are phrases like 'are key signed with Sony, you can not do anything'
That would be true if they were well signed, but the truth is that they are not.
Without going into deep detail about how the Sony npdrm I will explain briefly, when Sony makes the process to generate an executable npdrm valid, generates a random key pair unique for each executable, those keys are encrypted...
170w ago - This weekend I heard from a good source (my guy in Oz Land) that Sony will be combatting the PSJailBreak with new PlayStation 3 models and PS3 HDD encryption.
This is what he said, to quote: "I heard Sony is holding back new supply of consoles, as they are removing dev and debug modes. This means you cannot get consoles easily fixed in repair centres so no more extended warranties.
THIS MEANS PSJB AND PSGROOVE WILL NO LONGER WORK ON NEW CONSOLES"
He went on to state the following, to quote: "Additionally, it is rumoured, the new 320GB PS3's will have firmware loaded onto the HDD and encrypted in a way that you cannot do a DD copy to a new HDD, so no longer can you load a heap of games to your HDD as you will be locked to the one that was loaded retail."
We have to wait and see now... M$ did the same with their consoles when we jtagged them, so I guess Sony can do the same with an update eh.
206w ago - Update: SKFU has now posted the following update: Ok guys, as Mathieulh is a lot more familiar with PSP related stories, thanks to him I can tell you now that my little idea won't work.
The reason is, that the Datel technique requires the application to run as UPDATE. The PSP runs the program in update mode which the PS3 won't be able to emulate at all. So sorry, no PSP homebrew on PS3, at least not via this way.
Today SKFU (linked above) shared a video of Datel's Action Replay running on official PSP Firmware 6.20, which leaves speculation as to whether the cracked PSP encryption process could lead to PSP homebrew on Sony's PS3 console.
Based on SKFU's idea below, we'll stick this in the PS3 Hacks section where PS3 hacks, exploits, mods, projects and ideas are discussed.
To quote: Datel may had success in cracking the PSP's encryption process and sign EBOOT's to run their own software on official firmwares, including the newest and the PSP Go hardware.
Why do I post it as I only focus on PS3 you may wonder, but hey the PS3 just got it's PSP...
308w ago - We have been revisiting the aspects of the Blu-Ray disc encryption today. As we know every executable is encrypted, and those executables that are placed on game discs are encrypted once more.
This second layer of encryption can be quite the bother, as it hinders our efforts to explore the console. So we have created a tool that runs on Dev machines that automatically dumps the main encrypted file (EBOOT.BIN) to a PC, or Memory Card.
The PS3News.com EBOOT.BIN dumper may be publically released in coming days, it is ready to go and is installable as a PKG, however it will only work on a Debug/Tool console!
This file is void of the Disc Based layer encryption, it is just a SELF. The SELF is encrypted as well, however we are much more familiar with the SELF file format, than with the randomness of an EBOOT.BIN.
Below is a picture of the utility, as well as screenshots of the following files, in their SELF form. The files were taken from Resistance: Fall Of Man: