The PSP Go has apparently been hacked to run unsigned code within only 2 days of its release, with “backup” enthusiasts rubbishing Sony’s efforts to secure the console, though as yet actually running pirated games on the device is a long way off.
The demonstration video:
The cracker responsible holds forth:
Sony always seems to be desperately fighting against the homebrew community, trying to block us out of the systems we spent lots of our own cash on. Sadly, these guys really can’t catch a break. I’ve already managed to update an exploit to work on the Go.
HERE’S THE BASICS:
Yes, there are unreleased PSP exploits out there for various games. Yes, they still work, even on the PSP Go.
No, I didn’t discover this exploit. It’s been floating around for a while; it was just never used.
NO, I *DO NOT* plan on sharing any useful details about this. I want to see how long this will fester before Sony finally figures out how to fix it. That means I won’t be sharing the files or even naming the game I used to do it.
Yes, it works on all systems and all firmwares.
No, it’s not going to lead to custom firmware, piracy, or a Pandora for the Go. It can’t write to the flash, and it even seems to be unable to overwrite the system settings, which was always unblocked before on the older systems. It’s user-mode only.
Oh, and if you think this is a hoax… look at the video, and notice the version.txt file from OFW 6.10.
Although the exploit only allows unsigned code to be run on the device, a long way from allowing the full scale piracy hoped for by most PSP hackers, it is hardly an auspicious start for a device Sony clearly hopes will help wean consumers off physical media and onto a DRMed retail system it controls completely.