PS4 News on Facebook! PS4 News on Twitter! PS4 News on YouTube! PS4 News RSS Feed!

Home PS4 News - Latest PlayStation 4 and PS3 News

September 27, 2010 // 4:50 pm - Today Spanish PS3 Dev DemonHades has leaked the Sony PS3 JIG ID Swapping Procedure Manual PDF file publicly for other scene developers to examine.

This news comes just over a month since the last Sony PS3 and Blu-ray Service Manuals leak surfaced.

Download: PS3 JIG ID Swapping Procedure Manual

To quote, roughly translated: Well I dedicate this information for some EOL aware of that are still believed themselves the lies that this is an exploit, when it really takes advantage of the technology of Sony and jigcard backdoor into the USB port and libusb.

Alert and has long behind it were several people including Mathieulh, Geohot and Richdevx and as you see all this coming out of their hands... this debate is what has led to the TeamHades was dissolved by doubting my statements and worst all that I crellesen my own colleagues and friends.

Here you have the PDF of JigCard so you can see with your own eyes have deceived you into believing it is an exploit, save data as the service mode to do this for chapters and no deliveries and so suspicious of them.

And since I already communicated that leaves DemonHades investigations; only engages me DHorg caring community (the people), help with problems and doubts keep the site up to date... but I withdraw from the research topic.

1saludo and thanks to that if I have believed and supported me and the rest to be happy with this BIG LIE."

PS3 JIG ID Swapping Procedure Manual Leaked By DemonHades

PlayStation Follow us on Twitter, Facebook and join us at our new site WWW.PSXHAX.COM!

#35 - SuperDre - September 28, 2010 // 6:52 pm
SuperDre's Avatar
WTF, I'm sorry but this google translation is just uncomprehensible..

#34 - p666 - September 28, 2010 // 11:26 am
p666's Avatar
Really ironic that Sony has been responsible for providing the method to hack their own console! now they want to sue people for their own f up..

The data transfer utility in the ps3 looks a bit similar to the jig process .. Using a direct net cable between 2 ps3 to clone one ps3 to another, except it removes the host data. The sony server sitting in the middle for the jig method however gives more control.

#33 - RexVF5 - September 28, 2010 // 8:43 am
RexVF5's Avatar
Original JIG in certain circumstances (described in leaked JIG manual) activates built-in functions in PS3 firmware. For it to work it has to be original JIG, uses challenge-response cryptography and needs to be connected to SCE server (at least it would seem so accoring to JIG manual).

Psjailbreak only uses original JIG's ID but it never able to activate those built-in functions in firmware directly - simply because it is unable to respond properly to cryptographic challenge PS3 sends it.

It however overwrites heap and is able to execute the payload. The payload seems to be original work of psjailbreak creators: it accomplishes things by patching stuff here and there whereas original JIG just turns them off properly.

Note also that psjailbreak does a totally different stuff then is described in JIG manual.

#32 - oVERSoLDiER - September 28, 2010 // 7:35 am
oVERSoLDiER's Avatar
The *.pdf is from 2007 but the architecture of the old models should be like that.

You think the slim has the same architecture that is shown in the *.pdf or did Sony changed it ?

#31 - plains203 - September 28, 2010 // 7:02 am
plains203's Avatar
The doc does not show that psjailbreak is the same as the sony jig! Read properly and investigate properly.

It is the entry point used but it is not the same as the jig function.

#30 - Warrorar - September 28, 2010 // 6:46 am
Warrorar's Avatar
Quote Originally Posted by humi View Post
that doc looks a bit fake for me...

that doc is from demonhades.... nothing more to say and now shhhhh...

nice that he shared this proof. nice to see that someone shows that those great exploit sharers are not the heros they realy are.

but sad that this won't help on finding a solution. but wayne next hack will come. and i hope this will take some time. there more time it need. there more money sony is wasting on more and more protection :-)

eat this sony

#29 - semitope - September 28, 2010 // 3:25 am
semitope's Avatar
Quote Originally Posted by whinis View Post
The files have moved every firmware, even if only 1 byte, by the updates unintentionally. We have just got to find the files, also the exploit was added in 2.01 supposedly.

How hard is it to find those files and are you sure that is the problem in 3.42? Is that what was changed in 3.50 as well?

#28 - WeOutHere - September 28, 2010 // 3:23 am
WeOutHere's Avatar
I heard there were more modified versions coming out for old Firmwares, especially to be able to use the OtherOS function.

#27 - whinis - September 28, 2010 // 2:19 am
whinis's Avatar
The files have moved every firmware, even if only 1 byte, by the updates unintentionally. We have just got to find the files, also the exploit was added in 2.01 supposedly.

#26 - dante489 - September 28, 2010 // 2:14 am
dante489's Avatar
Quote Originally Posted by whinis View Post
Because it uses the exploit to patch files, they changed to location of the files in 3.42 so the patches don't work.

i'm not talking about newer firmwares! i'm talking about the earlier ones..i mean it's gotta be an exploit! it's not completely a clone of the jig, otherwise it would work on the earlier firmwares.