To quote: "Sony has finally succeeded in banning the selling of the modchip in Europe.
After releasing a security firmware update which made the PSJailbreak useless, Sony has gone 1up now and the Japanese manufacturer has cut the grass from under the feet of prospective hackers through an order which makes it illegal to sell the modchip and all its clones in Europe.
This news has been confirmed by ChipSpain, one of the leading modchip online retailers who have taken off their stock of the PSJailbreak from their website following this recent order.
Friday, October 8, 2010 · Prohibition to sell PS Jailbreak and its clones. PS jailbreak and similar products have been withdrawn from stock. All orders will continue to receive full support."
139w ago - Today garyopa at PSX-Scene.com (linked above) reports that Sony appears to be targeting the PS JailBreak, PSFreedom and PSGroove related PS3 hacks and has shared numerous court documents for those interested.
From one of the documents, to quote: "Similarly targeted document subpoenas or deposition notices to any other third party who SCEA learns may be involved in the distribution or sale of the PS Jailbreak software, known as, for example, PSGroove, OpenPSJailbreak, and PSFreedom, or who may have knowledge of the distribution or sale of this illicit software."
PS3 hacker Mathieulh is also mentioned in one of the documents as recently proclaiming to be one of 20 individuals behind PSGroove, to quote: "Mathieu Hervais told BBC News he was one of about 20 hackers involved in PSGroove's development."
Just under a month ago Sony was granted an injunction by Australian Courts on the sale of PSJailBreak PS3 modchips, followed by blocking PS JailBreak and PS3 proxy...
139w ago - Today Spanish PS3 developer Hermes at Elotrolado.net (linked above) has shared a modified payload version of PSGroove, which allows users to run PS3 backups without requiring a disc in the PlayStation 3 drive.
To quote, roughly translated: Taking advantage that I have my AT90USBKEY, I used the disassembly of the payload (made by me), the descriptions in ps3wiki.lan.st and part of AerialX source, with the following objective:
1) Have a damn once the source of the exploit, with amendments, etc, enough is enough for us to pass an array and pulling miles.
2) I used to make some changes, with a very interesting result.
The first thing to tell, is that the payload is loaded into a memory area (700 000) and ends up turning part of your code into an area that is too full. Just add four things we can and in fact, for my change I had to relocate a table with patches (do not think you are having problems in the position you are).
The second is that I managed to enable loading of backups with the amendment introduced AerialX by his side, in order to launch applications from a flash drive (HDD) attached on / dev_usb000 (of the four ports, which...
140w ago - A few weeks back we reported on the PS JailBreak PS3 exploit reverse engineering followed by the PSJailBreak PS3 exploit payload, and today naehrwert has focused on the PSJailBreak payload itself, as follows:
PSJailbreak Payload Reverse Engineering
Here's my understanding of what the exploit playload does:
1. it gets control at exploit_entry, which copies the rest of the payload to the fixed address 0x8000000000700000 and jumps to exploit_main.
2. exploit_main copies a resident part of the payload to another location, creates virutal usb device driver called "mod" with 3 functions, hooks some vsh functions via toc entry and does some permanent in-ram patching. when the work is done it zeroes itself out.
3. the resident part has basically 3 purposes: it manages virtual usb device, it does some on-the-fly patching and it hooks all the game disk file accesses from the vsh.
a. the virtual usb device is needed to make sure the original ps3jb device in plugged in. once the correct device is plugged (the one with the AAAAC0DE) device...