An Exploit found to run PS3 backups
I found this thread on a Spanish site i guess...
http://www.elotrolado.net/hilo_ps3-c...cultan_1325496
Had read it after translating through Google Translate:
Quote:
DEMONH seen ....
was waiting for the right moment to break the news but good to say it and so we can finish with such nonsense condensed crellendo people who are still superior.
PS3 backups load thanks to an exploit discovered when it is considered necessary is to upload a video showing the event. My way of working will protect this exploit and not give details of how this occurs so that might not make the same mistakes of the past.
You have to patch both updates as other functions, the iso is not worth anyone ... It requires a different process than those generated in linux are not worth keeping the encryption layer.
The exploit creates a CheckStop that generates a reboot and does not load everything back into memory but the function of pre patched disk and run the new copy.
The models are tested 40/60/80.
The games tested are 3, Killzone 2, burnout paradise, pes2008.
And this is all for now I will not talk any more about it and I hope this thread remains to discuss the jtag, because if I opened this investigation was to help people who have my same problem ... broken plate reader pior testing.
It's stated there that demonhades found an exploit to run backups but is not gonna make it public soon...
The exploit is a checkstop and backups made from linux won't work...
I don't know what to make of it but have my fingers crossed...
Maybe BOSS or CJ could brief us...