98w ago - Today Egamer.co.za (linked above) reports that South African Police Service's Commercial Crime Unit, acting on behalf of complaints received from the South African Federation Against Copyright Theft (SAFACT), has raided and consequently arrested a PS3 JailBreaker residing in Parktown, Johannesburg, South Africa along with seizing the PlayStation 3 piracy devices used to circumvent Sony's system protection.
Below is the official Press Release, to quote: PS3 JAILBREAK RAID AND ARREST
South Africa, 2ND August 2011, Johannesburg: The first PlayStation 3 jailbreak raid took place earlier today at a residential property in Parktown, Johannesburg. Jailbreak devices are used to circumvent the security features on PS3 consoles to facilitate the playing of pirated PS3 games.
The raid was conducted by the South African Police Service's Commercial Crime Unit, Johannesburg after receiving criminal complaints from the South African Federation Against Copyright Theft (SAFACT). The Police were assisted by the SARS Computer Forensics Lab.
Various state of the art computers, circumvention software packages, jailbreak USB devices, PS3 consoles and hard drives were seized. In addition fake PS2 games, original PS3 games, believed to be used as masters...
To quote, roughly translated: The update method is just the same as the previous:
1. Place the "update.bin" into the root directory, pull out and then insert, the U disk will be popup, at this time, place the cheatlist.dat into the root directory of the U disk.
2. If need to update the cheatlist.dat, must insert a TF card to the P3GO, and then the computer can identify U disk of the P3GO. If insert into a PS3, the TF must by pulled out, otherwise the PS3 can not recognize it. (The unknown device appeared on PS3 is normal)
3. After completing the update, pls install the CODEUNIQUE_355_auto_detect. CU management software, "CHET11111_ONLY CHEAT_355.pkg" do not have the functions of game guide, can use with the 3rd management software
4.Very sorry, the dongle without this kind of IC chips can...
117w ago - Today Myce.com (linked above) interviewed PS3 hacker KaKaRoToKS, who states that a PS3 Firmware 3.60 solution is indeed coming after reports and videos of a 3.60 JailBreak running code circulated last week.
Below is the the KaKaRoToKS interview in full, to quote:
What are your thoughts on the recent PS3 3.60 firmware cracking video that was uploaded and removed over the course of a day last week? Many dubbed it fake and said it was a debug PS3, but when we chatted with the guy who uploaded it he defended it as real and said it was a retail unit.
I’ve seen the videos, and I also talked to the people who did it. Whether it’s fake or not, I cannot tell as I have not been authorized by the authors to divulge what they did. All I can say is that they said they would never release it, so whether it’s fake or not has no importance, since in the end no one will have access to it.
However, as I’ve said to a few people on Twitter, the hack that was used on 3.55 and lower was unique and Sony fixed it. So, that’s...
118w ago - Just over a week ago PlayStation 3 hacker Mathieulh confirmed finding a PS3 3.56 Exploit, and today drizzthacks tweeted part of an IRC chat log where Mathieulh stated the following regarding PS3 Firmware 3.60 running homebrew code, as follows:
"[03:15] while you are insulting me like morons, I already have code running on 3.60, and I am laughing, and guess what ? I am happy I stopped sharing, you can hate me for it, I don't care."
He followed up with the following Tweets: To those planning on building a 3.56+ pup for whatever reason, the files attributes changed, the group and user ids for the files as well. The new 3.56+ values for tarballs are the following: owner_id, “0000764″ group_id, “0000764″ owner, “tetsu” group, “tetsu” ustar, “ustar”
You can use fix_tar to use those new values. Use with caution. By comparison, those are the pre-3.56 values. owner_id, “0001752″ group_id, “0001274″ owner, “pup_tool” group, “psnes” ustar, “ustar”
123w ago - About as exciting as recycling the PSN bypass blocked again news, today Engadget reports that Kevin Butler has inadvertently retweeted (now removed) the PS3 METLDR Root Key- specifically the HMAC Dongle Master Key that GeoHot first posted before Sony took legal action for hacking the PlayStation 3 console.
To quote: "Oh, honey. Sony PlayStation's (entirely fictional) Kevin Butler holds many (also fictional) positions within the company, but apparently none of them require him to keep up with (very real) news events. Travis La Marr (aka @exiva) tweeted the now-infamous PS3 METLDR root key towards Butler with the challenge to "Come at me."
What's a spokeperson to do but confuse it for a Battleship reference and retweet the entire code? Obviously someone let him in on the joke, as the tweet's since been removed. At least Sony won't have to subpoena for his info here. Geohot, we hope you're laughing."