This is 100% the same as PS4... Games also got back ported to lower fw etc... You ll start complaining already? They have backupa booting, achievement is already there! More to come, way more
well if a certain game needs features that were added in later firmwares then yea, backporting is not an option.
If they were smart they'd kinda incorporate something loosely so that the update is needed even if it's really not. Can probably even be a silly unique pr version dummy file. If the checksum is wrong then it's the wrong version.
I am mostly interested in hacked PS5 being able to run Linux or helping emulatioing this machine.
There is little point getting PS5 if you have good PC, Unless you really can't wait for Sony exclusives or want relatively cheap gaming machine that can run the latest games.
When it comes to the meaningful cracks, they all take the payouts from Sony these days. Can't blame them from a human, selfish point of view either. Why release stuff for nothing and have the risk of LE and Sony lawyers on your back, when you can still enjoy the challenge and get paid for it? Playing compromised games on old ass firmwares from years ago is about all that's on offer now.
Rather than wasting their time and resources trying to win a cat and mouse game with endless firmwares and hardware revisions, introducing these high value bounty payouts was the smartest decision Sony made in this area.
Because PS3 had private keys that got calculated. You are not supposed to be able to calculate private keys. There was a fail on the mathematical formula they used.
This allowed people to sign any binary like Sony would.
Since all PS4 exploits are based on userland (webkit mostly) and happen after bootup, you cannot escape this check on PS4.
The new exploit already has ps4 9.00 support to load goldhen. Just tested it with laptop and lan cable between it and the ps4, still needs the goldhen payload stting on usb stick though.
Guess its a matter of hours/days for sistro to update goldhen with fw 11 support (there is already a payload loader available).
And i guess month or two for the ps5 support.
AMD Ryzen 7 7800X3D / MSI Gaming X Slim GeForce RTX 4080 SUPER / ASRock B650 PRO RS / Arctic Liquid Freezer III 360 / G.Skill Trident Z5 Neo 2x16GB DDR5-6000 CL30 / Samsung 980 Pro 2 TB / SeaSonic VERTEX GX-850 850W Gold / Lian Li LANCOOL 216
golhen for 11 is out now and payload loader also copies the payload from the flashdrive to the ps4 hdd and reads if from there if no flashdrive inserted.
Tested again on 900 and its working, will wait a bit before moving to 11 though
AMD Ryzen 7 7800X3D / MSI Gaming X Slim GeForce RTX 4080 SUPER / ASRock B650 PRO RS / Arctic Liquid Freezer III 360 / G.Skill Trident Z5 Neo 2x16GB DDR5-6000 CL30 / Samsung 980 Pro 2 TB / SeaSonic VERTEX GX-850 850W Gold / Lian Li LANCOOL 216
Because PS3 had private keys that got calculated. You are not supposed to be able to calculate private keys. There was a fail on the mathematical formula they used.
This allowed people to sign any binary like Sony would.
Since all PS4 exploits are based on userland (webkit mostly) and happen after bootup, you cannot escape this check on PS4.
So you say there will never be another CFW for PS4 and PS5 like in the PS3 days?
I'm sure motherfuckers like Mathieulh and geohot know how to do it but they don't disclose it because they are fucking piece of shit elite people....
Yes that's what I'm saying.
Unless you find an exploit on the bootrom, like on the nintendo switch, it will never happen again because of signature checks. To disable these, you need to patch the firmware. How you do it if you cannot edit the firmware without killing the files signatures?
Also, if you look closely, even PS3 (new models, with the updated bootrom) still needs to launch an exploit through the web browser after every reboot.
But please let me ask you one more question - you think it will also NOT happen like in 10 years from now on? You think to think that way is unrealistic? Because it seems they keep finding new exploits all the time. Maybe my memory is wrong but didn't they find a new PS2 exploit lately?
I don't have a crystal ball but you know, I think AMD APUs on XBOX and PS4/5 are a lot more secured than whatever was in the PS2 don't you think. Also, PS5 added a new security layer PS4 didn't have. And it's a bit more complicated because if my memory is not wrong, it's not just 1 chip that handles security, but multiples ones on the new consoles.
Also mind you, PS2 didn't have any signature check. First console that did have that was the OG XBOX, that's why you had to flash the bios, so you can disable it at boot.
Now, do you think in the next 10 years we will manage to exploit the AMD APUs that are on these consoles ? We did after all for the first Nintendo Switch models but they used NVIDIA.
If you read the news completely, it's not a new exploit.
"Utility wise, it’s great, but it’s not a huge change if you already use a HW device/caching, don’t make this seem like something bigger than it is. It’s not some bootchain code exec so much as doing some tricky stuff to make things seem like they persist through a reboot.
That’s about all I’ll say for now."
As usual, it's a smoke screen from Zecoxao. I'm sure you all noticed that all his announcements were either crap, or never released. What I said previously is still valid, now whether or not there is a device that automatically boot the web browser and automatically triggers the exploit for you, that's something else.
Also, I should have mentionned : while there are signature checks on every binary, there is no signature check on text files, html, and all on either PS4 or PS5. Once the exploit is launched, you can write files to the filesystem, and replace some of these files.
That could help automating the process (it already does on PS4 & PS5).
Signature/Avatar nuking: none (can be changed in your profile)
You cannot post new topics in this forum You cannot reply to topics in this forum You cannot edit your posts in this forum You cannot delete your posts in this forum You cannot vote in polls in this forum