70w ago - Following up on the previous news that the PS3 v3.60+ keys were incoming, today the PS3 3.60 keys appear to have been leaked from fckyoudh on Spanish site Elotrolado (linked above) which has lead to new decrypted PlayStation 3 EBOOT fixes for CFW users.
84w ago - Following up on the recent rumor of PSOne game emulation support for PS Vita, today PlayStation Vita hacker The_Zett has made available a decrypted Flash0 dump of the PSP emulator for PS Vita which includes the kernel / user keys.
An unknown VITA developer shared some interesting files, a little hint - PSP emulator and f0
From The Z on PlayStation Vita developer wololo's forum (linked above) on the release, to quote:
An unknown Vita developer has shared an interesting link some hours ago, which contains a full dump of the flash0 of the vita psp emulator - Including the kermit modules and the psvita kernel keys!
This dump can lead some professional Vita developers to kernel access, which will give us the ability to play nearly every homebrew. Backup launcher could be possible as well, but for these ones a high rank developer would be needed for programming it.
The developer says that he shared the files because...
96w ago - Following up on the previous update, this weekend Spanish PlayStation 3 developer Calantra has released a homebrew application to find PS3 Keys dubbed Lv0 Assault followed by updated versions below.
110w ago - PlayStation 3 developers have been busy recently working on payloads for dumping the PS3 per console keys, as once the per_console_key_0 is obtained with full EID decryption dongles and burned BR-D's may be a thing of the past.
Below are details from sphinxkoma and the PS3 Wiki (ps3devwiki.com/index.php?title=Talk:Per_Console_Keys) on dumping the per_console_key_1 via Kaz... it's only a matter of time for per_console_key_0 which unlocks everything we need.
To quote: PS3 Per Console Keys
EID crypto is very complicated, it is done so on purpose. first of all EID0 isn't decrypted with one key, and one algorithm alone. it is decrypted in several parts which use different algos and keys. the keys are all derivations of a per console key (per_console_key_1) which is stored inside metldr and copied by it to sector 0 and never leaves isolation. that same key is a derivation of the per console key (per_console_key_0) used to encrypt metldr and the bl in the first place as well.
isoldr clears that key from sector 0 before jumping to the isolated module. but before doing so it encrypts it with another keyset and stores it in a buffer so that the isolated module can use the new crafted key. since the operation is AES, if you know that keyset you can decrypt...