PS3 hack rumor blitz: NAND Extractor updated, PS3 game backups successfully run?
‘Tis either a sad or great day for owners of Sony‘s PlayStation 3 – but no matter what your viewpoint, you may not be seeing an end to the developments aiming at a more open Sony next-generation platform. A recent report says that Mainman, developer of the PS3 NAND Extractor/UnPacker has just upped his application to version 0.4. What’s more is that there are claims of ‘successful’ backup execution on the PlayStation 3.
Half of the world may have stopped spinning when word spread of the apparent successful runs of PlayStation 3 backups – those ripped straight to the Sony PS3’s own hard drive and an external USB HDD. And close on its heels is the news that PS3 coder Mainman has also moved in unison with the recent exploits on Sony’s console and updated his PS3 NAND Extractor/UnPacker to version 0.4.
Backups of PS3 games have been successfully tested on PlayStation 3 test platforms (retail platforms), though it has been noted that only developmental copies of games may be used. This is due to the exclusivity of the EBOOT.BIN file on developmental copies which are key to the smooth execution of the copied games. The executable must be modified or recreated from the ground up to allow proper execution.
And Mainman’s application now allegedly includes Beta support for the 40GB PlayStation 3 SKU’s flash, and it comes with a scan mechanic to automatically search for files to extract and dump. These features, however, cannot be verified as the author withheld the release until the bugs could be formally sorted out.
There’s also talk about Team InFeCtuS (makers of one of the more popular Xbox 360 modchips) who aim to update their software to add support for the revision to the Samsung Flash. It has been claimed that the new release would give more leeway in the investigation of downgrading to lower PS3 firmwares.