Although no proof has been given at this point, CTurt is a trusted source of information on this, as he has released lots of his work on the 1.76 Webkit exploit already: the PS4 Playground tools and PS4 SDK come to mind.
There are not much details on the vulnerabilities used at this point, but it is fair to assume the exploit relies on the 1.76 webkit exploit as the launch vector. As such, although that Kernel exploit might be available on later PS4 firmwares (and, we might dream, up to the latest firmware), it is probably only going to be useful for the handful of people who have stayed on 1.76.
PS4 kernel exploit finally working! Thanks to everyone involved!
— CTurt (@CTurtE) December 6, 2015
It is also a bit early at this point to understand what Kernel access truly means here, and if it’s a “full” PS4 Jailbreak. I can picture clueless gamers already calling out piracy as a dangerous conclusion of this game, but kernel access does not necessarily mean that hackers have found a way (or intend to) break the applications and games encryption. It probably means, however, better access to the console hardware and ways to run unsigned code (think homebrews and emulators at this point).Posted:
Related Forum: PlayStation Forum
"PS4 Kernel Exploit confirmed by CTurt" :: Login/Create an Account :: 39 comments