The arguments already been had. If you've read all that, and still think hackers just randomly overlooked PS3 whereas they targeted every toher console, and then the moment they targetted PS3 blew it wide open in a matter months, there'll be no convincing you otherwise.
There was one particular colossal implementation error the made everything else accesible, From a security design POV, PS3 would still be as secure as it was if they had used the security algorithm properly. So from a design POV, even if the implementation failed, PS3 is looking like a very strong model. Even moreso if 3.60 was a complete repair.
You just integrate the same security features in other processors.
PS3's model. Every company who's ever released hardware has seen it cracked. They try different preventative measures, learning from their mistakes, with some measure of success or failure. PS3 shows Sony (along with IBM) evaluated the system and came up with a solution that so far has prevented open software piracy. Or are you going to say that because PS2 and PSP security was weak, no-one should ever look at Sony for a better solution? Wouldn't that mean we'd never look at any hardware vendor ever, because they all release hardware that gets cracked?
That has become PS3's biggest weakness, and shows another area of hardware security that it's harder to lock down. So a system that can be patched after such leaks is even more impressive.You forgot the apparent leak of NDA info on the USB key
Same here. There finally seems to be some good media related CFW stuff coming out so I'm holding 3.55 for now also. Just add region free BR support with 1080i50 support along with burning to HDD and I'll be one happy camper.
@davidkont 3.60 isn't "hardcore security" anyway, it's just sony thinking they are safe hiding everything inside lv0...
@Ps3WeOwnYoU You can't decrypt lv0 without the bootloader keys. Your best bet is to look at 3.56, decrypt loaders, look for exploits, profit
@Ps3WeOwnYoU You need to either decrypt or dump lv0, then you can get the encrypted loaders and decrypt them with the metldr key. Good luck.
v3.60 might not be unhackable after all according to Mathieulh...
In what should be the biggest surprise since the sun rising in the east this morning...
Note sure why people took one statement from one hacker that Sony had completely resecured the system and ran with it. Even from the very little I can follow this thread, that seemed out of the question. Kind of reminds me of everybody claiming there was some internal Sony leak of a USB drive that started all this hacking when there's no evidence I know of of such or any other leak from Sony.
That the PS3 isn't uncrackable isn't a surprise, nor what any sane contributor to this thread expects. That it's resistant enough to not be cracked for a good while yet, after these hackers had reported that PS3 was blown wide open and there was nothing Sony could do about it, is the remarkable feat in Sony's recovery.In what should be the biggest surprise since the sun rising in the east this morning...
Possible workaround for people that want both OFW and CFW
http://psgroove.com/content.php?943-Kmeaw-CFW-that-Allows-Dual-Boot-of-CFW-and-OFW-Coming-Soon
It's probably for CFW + Linux, not for CFW + OFW. I don't see how this could be done on 16MB (NAND Flash) consoles
It's probably for CFW + Linux, not for CFW + OFW. I don't see how this could be done on 16MB (NAND Flash) consoles
Nope, the link clearly states OFW and CFW.
There is a different developer that is working on Linux and CFW though.