Wednesday 27 May 2015

regionFOUR the Region Free Loader for 3DS updated

Remember smealum’s regionFOUR, successor of Regionthree? Now it is updated to support all New3DS/New3DSXL/3DS/3DSXL/2DS models with firmwares 9.0 through 9.7 (including 9.1, 9.2, 9.3, 9.4, 9.5 and 9.6). Previous version only supported versions 9.2 and 9.7. Get your out of region cartridges ready.
regionFOUR lets you use your out of region cartridges on your 3DS and it bypasses any forced firmware updates on the cartridge if possible. The usage is similar to Ninjhax, you need to have a Cubic Ninja cartridge on the same region as your 3DS, you need to scan a QR code and have an internet connection ready. If you prefer to install the exploit to your cartridge, internet connection is a one-time-only requirement. After the exploit is triggered, you should eject the cubic ninja cartridge, plug your out of region game cartridge and press Start. That is all. Here is a video by smealum describing the process:
Let’s hope Nintendo understands region-locking is meaningless and makes Nintendo NX region free so we don’t have to jump through hoops.
Source and Download at smealum’s site.

Thursday 21 May 2015

Pasta CFW for Old and New 3DS (allows unsigned .cia installing)

Developer capito27 released “Pasta CFW” which relies on Ninjhax and works on both Old and New 3DS. Big news is, it allows unsigned .cia installing/loading.
We have Custom Firmwares on 3DS scene for sometime. The anti-piracy NTR CFW (both old and new 3DS), rxTools (old 3ds) and  Govanify leaked CFW (old 3ds, 4.x firmwares). There are also flashcarts like Gateway and Sky3DS. Pasta CFW is the first time you can install and boot unsigned .cia files without a flashcart for New 3DS. For old 3ds, the leaked CFW works but it is limited to 4.x firmwares and old games as new games require new keys. It also has a high unsuccessful boot rate.
Pasta CFW couldlead to more piracy
I know the question in your mind and yes, you guessed it right. Pasta CFW lets pirating as long as you have a Cubic Ninja cartridge and you are on the required firmware. Piracy is possible on 3DS for a long time, but this release will make it much easier and cheaper as it doesn’t depend on a flashcart. Also this CFW can boot DSiWare and GBA games which Gateway cannot.
Pasta CFW needs a retail Cubic Ninja cartridge on the same region as your 3DS, it works on N3DS 9.0-9.2 and O3DS 4.1-4.5 / 8.0-8.1 / 9.0-9.2. As Pasta CFW doesn’t use emuNAND, it installs stuff to your sysNAND so be careful about what you install. It would be wise to especially stay away from installing system .cia files.
Here are the two video instructions by author capito27:

Expect another price increase in Cubic Ninja cartridges and let’s see how flashcart companies (especially Gateway) will answer to this piracy solution.

Download Pasta CFW Loader

Source: GBATEMP

Meet “badBIOS,” the mysterious Mac and PC malware that jumps airgaps


.


Three years ago, security consultant Dragos Ruiu was in his lab when he noticed something highly unusual: his MacBook Air, on which he had just installed a fresh copy of OS X, spontaneously updated the firmware that helps it boot. Stranger still, when Ruiu then tried to boot the machine off a CD ROM, it refused. He also found that the machine could delete data and undo configuration changes with no prompting. He didn't know it then, but that odd firmware update would become a high-stakes malware mystery that would consume most of his waking hours.

In the following months, Ruiu observed more odd phenomena that seemed straight out of a science-fiction thriller. A computer running the Open BSD operating system also began to modify its settings and delete its data without explanation or prompting. His network transmitted data specific to the Internet's next-generation IPv6 networking protocol, even from computers that were supposed to have IPv6 completely disabled. Strangest of all was the ability of infected machines to transmit small amounts of network data with other infected machines even when their power cords and Ethernet cables were unplugged and their Wi-Fi and Bluetooth cards were removed. Further investigation soon showed that the list of affected operating systems also included multiple variants of Windows and Linux.
Dragos Ruiu.
"We were like, 'Okay, we're totally owned,'" Ruiu told Ars. "'We have to erase all our systems and start from scratch,' which we did. It was a very painful exercise. I've been suspicious of stuff around here ever since."
In the intervening three years, Ruiu said, the infections have persisted, almost like a strain of bacteria that's able to survive extreme antibiotic therapies. Within hours or weeks of wiping an infected computer clean, the odd behavior would return. The most visible sign of contamination is a machine's inability to boot off a CD, but other, more subtle behaviors can be observed when using tools such as Process Monitor, which is designed for troubleshooting and forensic investigations.
Another intriguing characteristic: in addition to jumping "airgaps" designed to isolate infected or sensitive machines from all other networked computers, the malware seems to have self-healing capabilities.
"We had an air-gapped computer that just had its [firmware] BIOS reflashed, a fresh disk drive installed, and zero data on it, installed from a Windows system CD," Ruiu said. "At one point, we were editing some of the components and our registry editor got disabled. It was like: wait a minute, how can that happen? How can the machine react and attack the software that we're using to attack it? This is an air-gapped machine and all of a sudden the search function in the registry editor stopped working when we were using it to search for their keys."
Over the past two weeks, Ruiu has taken to Twitter, Facebook, and Google Plus to document his investigative odyssey and share a theory that has captured the attention of some of the world's foremost security experts. The malware, Ruiu believes, is transmitted though USB drives to infect the lowest levels of computer hardware. With the ability to target a computer's Basic Input/Output System (BIOS)Unified Extensible Firmware Interface (UEFI), and possibly other firmware standards, the malware can attack a wide variety of platforms, escape common forms of detection, and survive most attempts to eradicate it.
But the story gets stranger still. In posts herehere, and here, Ruiu posited another theory that sounds like something from the screenplay of a post-apocalyptic movie: "badBIOS," as Ruiu dubbed the malware, has the ability to use high-frequency transmissions passed between computer speakers and microphones to bridge airgaps.

Bigfoot in the age of the advanced persistent threat

At times as I've reported this story, its outline has struck me as the stuff of urban legend, the advanced persistent threat equivalent of a Bigfoot sighting. Indeed, Ruiu has conceded that while several fellow security experts have assisted his investigation, none has peer reviewed his process or the tentative findings that he's beginning to draw. (A compilation of Ruiu's observations is here.)
Also unexplained is why Ruiu would be on the receiving end of such an advanced and exotic attack. As a security professional, the organizer of the internationally renowned CanSecWest and PacSecconferences, and the founder of the Pwn2Own hacking competition, he is no doubt an attractive target to state-sponsored spies and financially motivated hackers. But he's no more attractive a target than hundreds or thousands of his peers, who have so far not reported the kind of odd phenomena that has afflicted Ruiu's computers and networks.
In contrast to the skepticism that's common in the security and hacking cultures, Ruiu's peers have mostly responded with deep-seated concern and even fascination to his dispatches about badBIOS.
"Everybody in security needs to follow @dragosr and watch his analysis of #badBIOS," Alex Stamos, one of the more trusted and sober security researchers, wrote in a tweet last week. Jeff Moss—the founder of the Defcon and Blackhat security conferences who in 2009 began advising Department of Homeland Security Secretary Janet Napolitano on matters of computer security—retweeted the statement and added: "No joke it's really serious." Plenty of others agree.
"Dragos is definitely one of the good reliable guys, and I have never ever even remotely thought him dishonest," security researcher Arrigo Triulzi told Ars. "Nothing of what he describes is science fiction taken individually, but we have not seen it in the wild ever."

Been there, done that

Triulzi said he's seen plenty of firmware-targeting malware in the laboratory. A client of his once infected the UEFI-based BIOS of his Mac laptop as part of an experiment. Five years ago, Triulzi himself developed proof-of-concept malware that stealthily infected the network interface controllersthat sit on a computer motherboard and provide the Ethernet jack that connects the machine to a network. His research built off of work by John Heasman that demonstrated how to plant hard-to-detect malware known as a rootkit in a computer's peripheral component interconnect, the Intel-developed connection that attaches hardware devices to a CPU.
It's also possible to use high-frequency sounds broadcast over speakers to send network packets. Early networking standards used the technique, said security expert Rob Graham. Ultrasonic-based networking is also the subject of a great deal of research, including this project by scientists at MIT.
Of course, it's one thing for researchers in the lab to demonstrate viable firmware-infecting rootkits and ultra high-frequency networking techniques. But as Triulzi suggested, it's another thing entirely to seamlessly fuse the two together and use the weapon in the real world against a seasoned security consultant. What's more, use of a USB stick to infect an array of computer platforms at the BIOS level rivals the payload delivery system found in the state-sponsored Stuxnet worm unleashed to disrupt Iran's nuclear program. And the reported ability of badBIOS to bridge airgaps also has parallels to Flame, another state-sponsored piece of malware that used Bluetooth radio signals to communicate with devices not connected to the Internet.
"Really, everything Dragos reports is something that's easily within the capabilities of a lot of people," said Graham, who is CEO of penetration testing firm Errata Security. "I could, if I spent a year, write a BIOS that does everything Dragos said badBIOS is doing. To communicate over ultrahigh frequency sound waves between computers is really, really easy."
Coincidentally, Italian newspapers this week reported that Russian spies attempted to monitor attendees of last month's G20 economic summit by giving them memory sticks and recharging cables programmed to intercept their communications.

Eureka

For most of the three years that Ruiu has been wrestling with badBIOS, its infection mechanism remained a mystery. A month or two ago, after buying a new computer, he noticed that it was almost immediately infected as soon as he plugged one of his USB drives into it. He soon theorized that infected computers have the ability to contaminate USB devices and vice versa.
"The suspicion right now is there's some kind of buffer overflow in the way the BIOS is reading the drive itself, and they're reprogramming the flash controller to overflow the BIOS and then adding a section to the BIOS table," he explained.
He still doesn't know if a USB stick was the initial infection trigger for his MacBook Air three years ago, or if the USB devices were infected only after they came into contact with his compromised machines, which he said now number between one and two dozen. He said he has been able to identify a variety of USB sticks that infect any computer they are plugged into. At next month's PacSec conference, Ruiu said he plans to get access to expensive USB analysis hardware that he hopes will provide new clues behind the infection mechanism.
He said he suspects badBIOS is only the initial module of a multi-staged payload that has the ability to infect the Windows, Mac OS X, BSD, and Linux operating systems.
To put it another way, he said, badBIOS "is the tip of the warhead, as it were."
Ruiu said he arrived at the theory about badBIOS's high-frequency networking capability after observing encrypted data packets being sent to and from an infected laptop that had no obvious network connection with—but was in close proximity to—another badBIOS-infected computer. The packets were transmitted even when the laptop had its Wi-Fi and Bluetooth cards removed. Ruiu also disconnected the machine's power cord so it ran only on battery to rule out the possibility that it was receiving signals over the electrical connection. Even then, forensic tools showed the packets continued to flow over the airgapped machine. Then, when Ruiu removed the internal speaker and microphone connected to the airgapped machine, the packets suddenly stopped.
With the speakers and mic intact, Ruiu said, the isolated computer seemed to be using the high-frequency connection to maintain the integrity of the badBIOS infection as he worked to dismantle software components the malware relied on.
"The airgapped machine is acting like it's connected to the Internet," he said. "Most of the problems we were having is we were slightly disabling bits of the components of the system. It would not let us disable some things. Things kept getting fixed automatically as soon as we tried to break them. It was weird."
It's too early to say with confidence that what Ruiu has been observing is a USB-transmitted rootkit that can burrow into a computer's lowest levels and use it as a jumping off point to infect a variety of operating systems with malware that can't be detected. It's even harder to know for sure that infected systems are using high-frequency sounds to communicate with isolated machines. But after almost two weeks of online discussion, no one has been able to rule out these troubling scenarios, either.
"It looks like the state of the art in intrusion stuff is a lot more advanced than we assumed it was," Ruiu concluded in an interview. "The take-away from this is a lot of our forensic procedures are weak when faced with challenges like this. A lot of companies have to take a lot more care when they use forensic data if they're faced with sophisticated attackers."

Monday 18 May 2015

ExtremeTalk: Is virtual reality the next big thing in PC gaming?

                      Cardboard VR


Today’s ExtremeTalk is brought to you by the recent unveil of the Oculus Rift VR’s formal hardware requirements. Virtual reality is shaping up a bit like 3-D movies did in the late 2000s, albeit with very different players behind the controls. You’ve got hype, and you’ve got some killer demos, early hardware, and impressive capabilities. As with 3-D, you have a long history of research and experimentation stretching back decades, and at least a handful of product introductions that failed to live up to consumer or creator expectations.
No, the parallels aren’t exact, though I think you can make a strong argument that computing hardware has evolved far more in the 20-odd years since the Virtual Boy than the experience of going to a movie had evolved since the 3-D craze of the 50s and 60s. But there’s one big factor that ties 3D and VR together: Both of them depend not just on technology, but on the final crafted experience.
The future!
                                                                                                  The future!
I don’t think it’s an accident that 3-D’s initial debut was driven by a handful of movies that were painstakingly designed to maximize the experience of viewing in 3-D. Once it became clear that this would be at least a momentary trend, filmmakers fell over themselves to convert 2D movies into 3-D, often with vague, muddied results.
I’m not going to argue that poor 3D film conversions doomed 3-D films. Higher ticket prices and the fact that consumers generally didn’t want to pay more for movies and wear glasses at home undoubtedly played their part. Nonetheless, poor content conversions and nausea harmed the nascent film revolution and many of these are issues in VR, as well.

VR games require a different approach

Building games for VR clearly requires a very different consideration of the physical space around the player character. Recent research has found that gamers experience less nausea if the game world creates a physical nose within the model. This would look exceedingly odd in a traditional FPS, but works in VR.
Swooping cutscenes and blurred visuals that work perfectly when projected across a monitor or three may cause undue nausea or seem unrealistic in a VR simulator. Games that have relied on camera work to convey motion to a person sitting in a fixed point may have to dial back their reliance on such techniques to avoid making people sick when the VR window fills their entire field of vision. The bottom line is this: Making a great VR game is going to upend techniques that we’ve previously deployed to make great games for consumption on a 2D screen.
I think it’s an open question whether game designers are willing to put in the work to make this happen. That’s before we consider the cost of the headset and GPU themselves, both of which could be considerable. Maintaining high frame rates at high detail isn’t going to come cheap.
Just to make my own view clear: I really, really, want VR to work. I’ve always been wowed by the technology when I’ve tested it, and the ability to look down and see “yourself” adds an immersion to a title that nothing — not higher resolutions, not 3D, and not multi-monitor support — has ever remotely matched.
So what do you think? Do you think VR represents the Next Big Thing, the technology that could break open the gaming market and drive a new era of game design? Or is it a flash in the pan, a minor niche that a handful will appreciate, but that most will toss aside in favor of a 60-inch 4K TV and standard controller?

Saturday 16 May 2015

Release: Firmware 3.51 VHBL for PS Vita & Playstation TV! Exploited game is a free Demo! (JP Store)

Japanese developer 173210 has released an VHBL for the PS Vita (and PS TV) firmware 3.51.
The required exploit game is Toukiden: Kiwami (DEMO) and it is only available in the Japanese Playstation Store (as far as we know).
As the name of the game lets you assume, it is in fact a Demo version of the Toukiden: Kiwami (『討鬼伝 極 体験版』) game. This means the game is free!
As showcased in the video above, you can see that you can easily run the VHBL via this free exploit game, if you are capable of getting it onto your device, that is.
Keep in mind that the VHBL is still being improved (its version number indicates version 0.1), but the game is free of charge, so who are you to complain about this.
The demo version of Toukiden: Kiwami can be obtained via the Japanese Playstation Store, or simply via this Online-Store link (Still JP-Only).
ps_vita_2000CXMB
Advertising

Since firmware 3.51 has fixed the public kernel mode exploits, which are required to run the ARK-2 & TN-V11 eCFWs, you won’t be able to use those on firmware 3.51.
If you happen to be on firmware 3.50 (three point five zero!), then you are able to grab this exploit game and run TN-V & ARK-2 (theoretically).
Once again this Japanese exploit was found by Japanese developer 173210. He has released various Japanese exploits in the past, and has also improved the VHBL’s source by quite a lot!
Funnily enough, this exploit has been found by a few other developers as well, but they used the UMD Version(s) of the game for their exploits.

Download Vita Half Byte Loader for Firmware 3.51

Source via Gamegaz.com

Tuesday 12 May 2015

PS4 Jailbreak news – PS4 “games are easy to pirate” rumors keep pouring from Brazil and the scene

We recently reported about the growing rumors of a PS4 Jailbreak (or, rather, a technique to run pirated games rather than a way to install a PS4 CFW) coming from Brazil.
After we investigated the initial source of this PS4 Jailbreak news, the facebook page of a small Brazilian modchip store, several things happened: The store in question pulled all information off their facebook page, claiming the high level of publicity could lead them to trouble, and a bunch of people contacted me to let me know they either knew about the technique, or had seen it in action.

More PS4 Jailbreak news coming from Brazil and the hacking scene

Hackers from the PS3/PS Vita/PS4 scene have been in touch with me to describe to me a process that is being used on PS3s to copy licenses of a game. The trick involves activating a console for an account, making a copy of its NAND, deactivating it, then copying back the previously saved NAND.

ps4-jailbreak-news-hardware
A similar technique is also being used on the PS4, it seems. According to the hackers who have contacted me though, the tricks known for this have been patched by Sony on 2.51 and could brick the console, as mentioned recently by cfwprohpet on Playstationhax.it. The Brazilian modchip stores, however, seem to imply their technique works on 2.51.
Here’s what one commenter, Keko, from Brazil, had to say about this PS4 Jailbreak news in our comments section. The comment below aligns with most of the emails/tips I have received so far on this technique:
Hey bros! The hack is real, and it is not a real hack, but a real bypass, they are using a very simple and old technique from the MSX age, just simple rewrite eeprom, the quite and simple way to say GO. They arent decrypt or crypt anything. When sony tried to safe secure the PS4 they forgot to hardlock inside the CPU/APU the real hashcode for the bios, this is intent to not allow bios to be exchanged or rewrite, so, as they failure to do it, what the Hackers are doing is just simple running the real software inside one console, you can do it as psn/accounts, so the PS4 add $$$ game info inside the rom! So, they only need to stuff original games and matches run bios roms, so, the ROM/GAME will match and so will execute in the console. Remember that ROM can run a FOREVER SOFTWARE INSTALLED ON IT, so, all the games are REAL ORIGINAL and the PS4 arent hacked at all. The Hack is a bypass of ASM code for follow ROM/BIOS reading using a PI, YES SIMPLE AS BRAZILIAN WAY.
But all further games will depend on matches or DUMPS of BIOS/GAME, REMEMBER PS4 GAMES HAVE IT OWN HASH CODE! So, you cant decrypt it like in the PS3 default key, each game has it own key and it must match yo your BIOS coded hash, so, PS4-GAME tied forever! This only doesnt happen in a CD environment, where the hash authenticate the drive and return to PS$$$ that authenticate the BIOS and return with authenticate game, so, it is impossible to use a BYPASS in CD/SATA as no key extraction is possible in a 4 way schema.
BUT THE WAY BRAZILIAN DID IS POSSIBLE, SIMPLE AND WILL RUN!
They just simplified the way to do it!
PI is just to enable flashing/reflashing/ontimeflash/simulation of BIOS.

Only publicly know solution apparently dangerous, and patched in 2.51

Other people have contacted me with similar explanations, or to tell me they have seen the technique work on their own machine.
Cfwprophet’s explanation seems to confirm the technique. He however says that attempting this on the latest PS4 firmware (2.51) will brick your console:
  1. Buy a PSN Game on Master Console and download it
  2. Connect Slave Console to PSN, create Account from Master Console, activate Slave Console and download the game
  3. Dump the NOR Flash of Slave Console with Tools like Teensy++ or the Pi (let us call that dump from now on ActivatedDMP)
  4. Boot Slave Console, Connect to PSN and Deactivate the Console
  5. Write the ActivatedDMP back to the NOR of Slave Console
  6. Profit, the Process can now be repeated on any other PS4 without reaching the “three consoles max” official PSN Game Share limit

ps4-jailbreak-news

No public PS4 Jailbreak solution yet, stores in Brazil are keeping the secret to resell pirated games

Tiny electronics stores in Brazil charge somewhere between $100 and $150 to install about 10 recent games on a PS4 with their technique. They are, of course, keeping the technique a secret, in order for it to not get patched, but also so that they can run a profitable business reselling pirated games. If this is the same technique as the one described by sceners above, then it is dubious it would work on 2.51. Because of this, it is difficult to get a clear confirmation, or proof that this fully works. One can only rely on the reputation of these shops, which in general is quite high based on the reviews on the eBay-like sites where they operate.
After the “first” store to claim they had access to this PS4 jailbreak decided to keep quiet about it, a few others surfaced again in Brazil.Some stores are selling a bulk of 10 games for a fee on eBay-like marketplaces. Others are basically doing the same, and announcing they are in possession of the PS4 Jailbreak, showcasing the results for their clients. This was recently uncovered by maxconsole, who made a copy of the video on youtube to ensure it doesn’t magically disappear:

We recently reported about the growing rumors of a PS4 Jailbreak (or, rather, a technique to run pirated games rather than a way to install a PS4 CFW) coming from Brazil.
After we investigated the initial source of this PS4 Jailbreak news, the facebook page of a small Brazilian modchip store, several things happened: The store in question pulled all information off their facebook page, claiming the high level of publicity could lead them to trouble, and a bunch of people contacted me to let me know they either knew about the technique, or had seen it in action.

More PS4 Jailbreak news coming from Brazil and the hacking scene

Hackers from the PS3/PS Vita/PS4 scene have been in touch with me to describe to me a process that is being used on PS3s to copy licenses of a game. The trick involves activating a console for an account, making a copy of its NAND, deactivating it, then copying back the previously saved NAND.

ps4-jailbreak-news-hardware
A similar technique is also being used on the PS4, it seems. According to the hackers who have contacted me though, the tricks known for this have been patched by Sony on 2.51 and could brick the console, as mentioned recently by cfwprohpet on Playstationhax.it. The Brazilian modchip stores, however, seem to imply their technique works on 2.51.
Here’s what one commenter, Keko, from Brazil, had to say about this PS4 Jailbreak news in our comments section. The comment below aligns with most of the emails/tips I have received so far on this technique:
Hey bros! The hack is real, and it is not a real hack, but a real bypass, they are using a very simple and old technique from the MSX age, just simple rewrite eeprom, the quite and simple way to say GO. They arent decrypt or crypt anything. When sony tried to safe secure the PS4 they forgot to hardlock inside the CPU/APU the real hashcode for the bios, this is intent to not allow bios to be exchanged or rewrite, so, as they failure to do it, what the Hackers are doing is just simple running the real software inside one console, you can do it as psn/accounts, so the PS4 add $$$ game info inside the rom! So, they only need to stuff original games and matches run bios roms, so, the ROM/GAME will match and so will execute in the console. Remember that ROM can run a FOREVER SOFTWARE INSTALLED ON IT, so, all the games are REAL ORIGINAL and the PS4 arent hacked at all. The Hack is a bypass of ASM code for follow ROM/BIOS reading using a PI, YES SIMPLE AS BRAZILIAN WAY.
But all further games will depend on matches or DUMPS of BIOS/GAME, REMEMBER PS4 GAMES HAVE IT OWN HASH CODE! So, you cant decrypt it like in the PS3 default key, each game has it own key and it must match yo your BIOS coded hash, so, PS4-GAME tied forever! This only doesnt happen in a CD environment, where the hash authenticate the drive and return to PS$$$ that authenticate the BIOS and return with authenticate game, so, it is impossible to use a BYPASS in CD/SATA as no key extraction is possible in a 4 way schema.
BUT THE WAY BRAZILIAN DID IS POSSIBLE, SIMPLE AND WILL RUN!
They just simplified the way to do it!
PI is just to enable flashing/reflashing/ontimeflash/simulation of BIOS.

Only publicly know solution apparently dangerous, and patched in 2.51

Other people have contacted me with similar explanations, or to tell me they have seen the technique work on their own machine.
Cfwprophet’s explanation seems to confirm the technique. He however says that attempting this on the latest PS4 firmware (2.51) will brick your console:
  1. Buy a PSN Game on Master Console and download it
  2. Connect Slave Console to PSN, create Account from Master Console, activate Slave Console and download the game
  3. Dump the NOR Flash of Slave Console with Tools like Teensy++ or the Pi (let us call that dump from now on ActivatedDMP)
  4. Boot Slave Console, Connect to PSN and Deactivate the Console
  5. Write the ActivatedDMP back to the NOR of Slave Console
  6. Profit, the Process can now be repeated on any other PS4 without reaching the “three consoles max” official PSN Game Share limit

ps4-jailbreak-news

No public PS4 Jailbreak solution yet, stores in Brazil are keeping the secret to resell pirated games

Tiny electronics stores in Brazil charge somewhere between $100 and $150 to install about 10 recent games on a PS4 with their technique. They are, of course, keeping the technique a secret, in order for it to not get patched, but also so that they can run a profitable business reselling pirated games. If this is the same technique as the one described by sceners above, then it is dubious it would work on 2.51. Because of this, it is difficult to get a clear confirmation, or proof that this fully works. One can only rely on the reputation of these shops, which in general is quite high based on the reviews on the eBay-like sites where they operate.
After the “first” store to claim they had access to this PS4 jailbreak decided to keep quiet about it, a few others surfaced again in Brazil.Some stores are selling a bulk of 10 games for a fee on eBay-like marketplaces. Others are basically doing the same, and announcing they are in possession of the PS4 Jailbreak, showcasing the results for their clients. This was recently uncovered by maxconsole, who made a copy of the video on youtube to ensure it doesn’t magically disappear:
The video above is from a shop “Razer Extreme”, and the facebook comment basically states:
To Thiago Faria your PS4 is ready. I know that you not like football lol, but I added it anyway… Come this afternoon.
PS4 Jailbreak news happen on a regular basis, even if their often unclaimed or purely hoaxes. But this is not the first time we are seeing people selling pirated games on the PS4. Some of our members reported a few months ago that China has a booming market for PS4 games resellers. It seems their technique however is to buy games on a specific account, then share that account with as many people as possible, for a fee. Something that’s technically easy to understand, but also that Sony can spot and put to an end extremely easily.
It is still unclear if the technique actually works on 2.51, if it is different from the one that was described by cfwprophet and others, if it is even real, and how widespread it is. So far, most sources are coming directly from Brazil (whether they’re on facebook or other places). It’s difficult to know if this PS4 Jailbreak is really happening in Brazil, or if it’s just a bunch of pranksters capitalizing on the recent PS4 Jailbreak news from Brazil.
A
The video above is from a shop “Razer Extreme”, and the facebook comment basically states:
To Thiago Faria your PS4 is ready. I know that you not like football lol, but I added it anyway… Come this afternoon.
PS4 Jailbreak news happen on a regular basis, even if their often unclaimed or purely hoaxes. But this is not the first time we are seeing people selling pirated games on the PS4. Some of our members reported a few months ago that China has a booming market for PS4 games resellers. It seems their technique however is to buy games on a specific account, then share that account with as many people as possible, for a fee. Something that’s technically easy to understand, but also that Sony can spot and put to an end extremely easily.
It is still unclear if the technique actually works on 2.51, if it is different from the one that was described by cfwprophet and others, if it is even real, and how widespread it is. So far, most sources are coming directly from Brazil (whether they’re on facebook or other places). It’s difficult to know if this PS4 Jailbreak is really happening in Brazil, or if it’s just a bunch of pranksters capitalizing on the recent PS4 Jailbreak news from Brazil.
As it’s been stated a few times, even if the technique happens to work, it is not really a PS4 jailbreak, but apparently just a way to run pirated games.
As always, we will be keeping our PS4 Jailbreak page up to date with the latest PS4 Jailbreak news, so you can be aware as soon as a valid technique exists that doesn’t solely rely on the greed of a few pirates.