Sony is not going to be happy about this. According to the product name, PSJailBreak, they have created a USB key that allows users to copy games their PS3 games their hard drive then play the game. Anyone want to go to blockbuster and rent some games? If this is true and works correctly, this is what the PS3 scene has been waiting for. And unlike Xbox 360 modding, no screwdrivers are required for this to work.

PSJailbreak claims to work on all PS3 models and can be updated to work with future PS3 firmware releases. I guess we’ll just have to wait and see if any of this is true.

No word on the price yet.



So as you may already know, Geo took everyone by suprise when he started working on hacking/exploiting the PS3. Some would say he was pretty sucesful, in what he accomplished. Being able to gain control over the Isolated PPE’s, etc, no easy job. But if you head over to his blog, you’ll notice that it’s been quiet for some time now, well, expcept for the mass spam comments. But what I wan’t to ask, what happend?

Why did Geo just fall off the face of the earth, in regards to the PS3. He never posted an update or anything. Honestly, I know he’s a talented kid, but excuse me for saying this, just a little pussy when things got hot. He defiantly got his fare share of hate comments on his blog, but seriously, cmon Geo, Man up. Don’t run off like a little bitch, if you can’t figure it out, just say it. You’ll gain more respect that way.

{ 1 comment }

Sounds like Sony cant keep Geo down. On this popular blog, Geo shows a proof of concept video where his custom firmware enables the OtherOS support. [Read More]


If you’re affected by the PS3 Time bug error, let’s just see how many that really is. Vote on the twtpoll below.


If you have a PS3 slim, then you’re considered one of the lucky ones. All Sony PS3 users other than the slim owners, can’t connect to the PSN network. All consoles are getting a 8001050F error. Which is stopping them from playing on the network, both local and on the PSN.

Update from the PlayStation.Blog [Read More]


According to the PlayStation senior VP, Peter Dille, the oportunity of PlayStation 2 games joining the “PS One Classics” line comes just a bit closer to reality. In an interview with IGN< Dille says the folks at PlayStation are “working really hard on” bringing more PlayStation and PlayStation 2 games to the PlayStation Store, not quite an official announcement, but another glimmer of hope.


So what happens when the Air Force connects 2,000 PS3′s? You get a massive supercomputer, or, a kickass LAN Party, either way.

The Air Force Research Laboratory has been given a $2 million to build a Playstation 3 cluster out of about 2,000 PS3s. Their goal? To create a Neuromorphic system designed to find examples of images stored in a massive database using systems that ?mimic human nervous systems.?

Keeping with the off-the-shelf mentality, the Air Force is using metal shelves found at most department stores to house the PS3 cluster. They are also using Linux, which is a free, open source operating system.

The system will use 300 to 320 kilowatts at full bore and about 10 percent to 30 percent of that in standby, when most supercomputers are using 5 megawatts, Linderman said. However, much of the time the cluster will only be running the nodes it needs and it will be turned off when not in use.

via CrunchGear


GTA IV - Episodes from liberty city coming to the PS3 and PC

If you feel left out that Rockstar Games hasn’t been so good to you, rejoice my friends. GTA IV: Episodes from Liberty City will be coming to the PS3 and PC beginning March 30th. While some are happy about this news, some in the community are still upset that it’s taken so long for the extra episodes in GTA IV to come to other consoles other than the Xbox 360. [Read More]

{ 1 comment }

If you’ve been waiting to get your hands on the exploit for the PS3, will, here you go. You now are able to download the exploit, and start finding out what the PS3 can really do.

He titles his post, “Here’s your silver platter.”

In the interest of openness, I’ve decided to release the exploit. Hopefully, this will ignite the PS3 scene, and you will organize and figure out how to use this to do practical things, like the iPhone when jailbreaks were first released. I have a life to get back to and can’t keep working on this all day and night.

Download the PS3 exploit here.

Read his post in detail here.


We’ll, should be no surpise here, George Hotz just updated his blog again, this time, going more into detail about the code he’s using. To download the snipped used by George Hotz, click the following link.

He starts his post of by saying “A level playing field.”

Right now, I’m playing with the isolated SPEs, trying to get metldr to load from OtherOS. Interesting thing, I am not using the exploit. I always assumed the enable isolation mode register was hypervisor privileged. It’s not, it’s kernel privileged, which means using hypervisor calls you can all get to it. So, get to hacking. Here is the code I am playing with.

Read his full post here.

volatile int init_module() {
unsigned long priv2_addr, problem_phys, local_store_phys, context_addr, shadow_addr, spe_id, vas;

lv1_get_virtual_address_space_id_of_ppe(0, &vas);

printk(KERN_ERR "die kernel %d\n", lv1_destruct_logical_spe(0xb));

printk(KERN_ERR "construct SPE: %d\n", lv1_construct_logical_spe(0x10,0x10,0x10,0x10,0x10, vas, 0, &priv2_addr, &problem_phys, &local_store_phys, &context_addr, &shadow_addr, &spe_id));
printk(KERN_ERR "make SPE id: %d\n", spe_id);
printk(KERN_ERR "enable SPE: %d\n", lv1_enable_logical_spe(spe_id, 0));

unsigned long *problem_mapped, *privileged_mapped, *local_mapped;

problem_mapped =__ioremap((unsigned long)problem_phys, 0x20000, PAGE_SHARED_X);
privileged_mapped =__ioremap((unsigned long)priv2_addr, 0x20000, PAGE_SHARED_X);
local_mapped =__ioremap((unsigned long)local_store_phys, 0x40000, PAGE_SHARED_X);

printk(KERN_ERR "status: %lx\n", problem_mapped[0x4020/8]);
printk(KERN_ERR "privileged control: %lx\n", privileged_mapped[0x4040/8]);
privileged_mapped[0x4040/8] |= 4;
printk(KERN_ERR "privileged control: %lx\n", privileged_mapped[0x4040/8]);

struct file* fd;
mm_segment_t old_fs = get_fs();
fd = filp_open("/work/pwned/metldr", O_RDONLY, 0);
if(!IS_ERR(fd)) {
printk(KERN_ERR "file is open\n");
printk(KERN_ERR "read %d\n", fd->f_op->read(fd, local_mapped, 0x40000, &fd->f_pos));
filp_close(fd, NULL);
} else {
printk(KERN_ERR "file open failed!!!!\n");
printk(KERN_ERR "read in metldr\n");

problem_mapped[0x4018/8] |= 3;

int i;
for(i=0;i<0x20;i++) {
printk(KERN_ERR "status: %lx\n", problem_mapped[0x4020/8]);
printk(KERN_ERR "destruct SPE: %d\n", lv1_destruct_logical_spe(spe_id));

return 0;