Hello,
Around 1.5 years ago i stopped following the hacking scene, the last big thing i remember was the ck3 lite was about to come out and so was rgh 2.0 for 14X19(I don't remember the exact kernel was). So what i have figured out is that rgh 2.0 was replaced with r-jtag. What i haven't figured out yet is what is the highest exploitable kernel is. I am currently running a falcon on 16537. I remember that all that had to be done to jtag was that you had to was dump your nand then modify it then reupload it. Then with with rgh the process was similar but you had to install a glitch chip and program that, at least i think... So can someone give a basic idea of what is required in terms of hardware, software, and post codes.
Please excuse my ignorance in advance
Brad
Around 1.5 years ago i stopped following the hacking scene, the last big thing i remember was the ck3 lite was about to come out and so was rgh 2.0 for 14X19(I don't remember the exact kernel was). So what i have figured out is that rgh 2.0 was replaced with r-jtag. What i haven't figured out yet is what is the highest exploitable kernel is. I am currently running a falcon on 16537. I remember that all that had to be done to jtag was that you had to was dump your nand then modify it then reupload it. Then with with rgh the process was similar but you had to install a glitch chip and program that, at least i think... So can someone give a basic idea of what is required in terms of hardware, software, and post codes.
Please excuse my ignorance in advance
Brad