198w ago - Sony PSP Marketing Manager Kristin Neirinckx has announced that PSPgo in-game promotion codes are available as of today, to quote:
For those of you who still have yet to pick up your very own PSPgo system, there's no better time than now. As most of you already know, PSPgo is the first all-digital, full-game handheld entertainment system on the market to date.
Since its launch last October, we've seen a tremendous response to the newest member of the PSP family. If you're ready to take the next step in portable entertainment, you're in luck!
For a limited time, we're offering an incredible value to all of you PSP newbies. Now through Sunday, March 21, 2010, U.S. and Canadian consumers who purchase a new PSPgo system can download one of our top PSP titles from the PlayStation Store at no additional cost.
How you ask? In short, this limited-time offer combines the PSPgo system with a PSPgo In-game Promotion Code, which entitles you to a digital download of either LittleBigPlanet (PSP) or Assassin's Creed: Bloodlines.
The PSPgo In-game Promotion Code redemption process is simple:
• You must purchase a new PSPgo unit between Thursday, February 18, 2010 and Sunday, March 21, 2010.
• To redeem code, you must create a PlayStation...
199w ago - A few weeks back GeoHot Hacked PS3, and now a new patent has surfaced from Kanna Shimizu of IBM for a method to protect secrets against encrypted section attacks.
SKFU writes: It seems it is SONY's answer for GeoHot's progress.
Take a look here, to quote: "A method, system, and computer-usable medium are disclosed for controlling unauthorized access to encrypted application program code. Predetermined program code is encrypted with a first key.
The hash value of an application verification certificate associated with a second key is calculated by performing a one-way hash function. Binding operations are then performed with the first key and the calculated hash value to generate a third key, which is a binding key.
The binding key is encrypted with a fourth key to generate an encrypted binding key, which is then embedded in the application. The application is digitally signed with a fifth key to generate an encrypted and signed program code image.
To decrypt the encrypted program code, the application verification key certificate is verified and in turn is used to verify the authenticity of the...
To quote: As I'm sure everybody heard, the memory access exploit for the PS3 hypervisor was released recently by geohotz. I was finally able to replicate his hack so I thought I'd take the time to help out others who may also have trouble due to being linux n00bs like me.
If I were to post everything at once it would be too much work and I'd never get around to it, so I'll post bits at a time to ensure I actually do post it heh. Today's post will talk about the software side of the exploit.
Please note that the geohotz exploit software was hardcoded for the v2.42 firmware, I have made a small fix that attempts to dynamically support all firmware versions. I have only tested and used it on v3.15 however.
The first step is to install Linux on your PS3 which means of course that this will not work on a slim PS3. I tried a few different Linux distros and after various different issues I settled on using...