This is much like the history of jailbreaking on Apple’s i OS, where hackers typically uncover a security vulnerability and exploit it, whereupon Apple patches the hole and suppresses the jailbreak. That’s because this hack isn’t giving you an exploit to use against a programming hole.
It’s giving you Sony’s so-called LV0 (level zero) cryptographic keys.
Try to set a system restore point before installing a device driver. Problems can arise when your hardware device is too old or not supported any longer.
• October 29, 2012 AM Some more info at , and a better article (I would say) at .
In that case, these people do not even understand basic statistics.
This includes both things that provably beat certain attack vectors & forms of obfuscation.As long as the LV0 loader remains the way Sony wants it, you get to run only what Sony wants you to.Pirated games won’t load, which is good for rights holders.What astounds me is that on something this important they do not have anybody that really understands cryptography and apparently are unable to even read and/or understand the preconditions for the used algorithm being secure.Maybe somebody thought "random" can also be the same fixed number every time.I do wonder whether it becomes possible to push malicious updates to all PS3s on the internet. • October 29, 2012 AM Anybody surprised by this obviously doesn't remember what happened back in 2010: Some hackers who were pissed at Sony for removing their Other OS functionality with a firmware update, decided to try and break the PS3's security, and it turned out that Sony had used the same "random" number in the key generation process for two unrelated keys.