The first few minutes of the conference were spent explaining the state of security on other consoles (Wii, 360, etc). Following this, the group went on to explain the current state of affairs on the PS3. First, explaining Geohot's memory line glitching exploit from earlier this year. The team then went on to explain the current PS3 security bypasses, such as jailbreaking and service mode/downgrading. Approximately a half hour in, the team revealed their new PS3 secrets, the moment we all were waiting for. One of the major highlights here was, dongle-less jailbreaking by breaking the PS3 loaders, giving complete control over the system. The other major feat, was calculating the public private keys (due to botched security), giving users the ability to sign their own SELFs Following this, the team declared Sony's security to be EPIC FAIL! The recent advent of these new exploits means current firmware is vulnerable, v3.55 and possibly beyond. It will be very difficult for Sony to fix the described exploits.The team then displayed the website http://fail0verflow.com/ were we assume will host examples of the new exploits and further details. They stated that easy to use tools would be coming next month.Stay tuned to this article and PSGroove.com we will be updating it as more info is availble. Also for those that missed the stream we will be posting links for you to download the entire stream
Look how Nanan comin back in business.
lol @ nanans. I feel Arc does be baiting me to find facepalm pics.You think this will fast track plans to bring a PS4 to market?
Ammm...wtf JC have to do wit dis? JC is yuh padna or wha?
Ammm...wtf JC have to do wit dis? JC is yuh padna or wha?Very interesting developments. Especially love their interpretation of Sony's random number generator int getRandomNumber(){return 4; //chosen by fair dice roll. guaranteed to be random.}bahahahahha