Separate names with a comma.
Discussion in 'PS4 - Hacking & Homebrew' started by TheGreek Boy, May 23, 2016.
Is There Any Tutorial For 3.50 WebKit Exploit? Or we can't do that yet?
I don't think its very useful to the average person as of right now, we'll have to wait until the exploit is developed for before we can do anything with it.
Tutorial for what exactly? Just proving the exploit works? For right now, I think its not practical to use the exploit just to see if it works, I think its easier to take someone else's word for it until there is something tangible we can do with the exploit. That should be coming soon, I'd expect
Well to be fair, some exploit may require someone to do something. For example, the 3ds slider hacks on the web browser app required people to click the slider before the exploit loads.
I think you should consider re-reading what he said because your reply makes absolutely no sense whatsoever.
I do realize that it is not the main point of his message
(At least the way I understand it, he said) The exploit is not practical to demonstrate in if there is nothing to benefit from it. Let's wait until someone has a usable example.
However, this was the main part I was replying to. Some exploits are not obvious to use when you first try to do it. For example, this video demonstrates what you need to do in order to use sliderhax. Also this is true for some games too, Bathaxx requires a multistep process in game:
To quote Wiibrew:
You are right though in the fact that I am replying to the irrelevant main point of the message. I just wanted to state that having a tutorial does more than just show that a hack works. But I probably should of been more clear about my reply.
Very well then. I shall explain, since i have nothing better to do anyhow.
He said: "until there is something tangible we can do with the exploit"
You said "Well to be fair, some exploit may require someone to do something. For example, the 3ds slider hacks on the web browser app required people to click the slider before the exploit loads."
He however was NOT referring to the methods used to actually initiate the exploit to work, he was referring to someone else breaking secondary or tertiary security-levels and making the exploit actually function in a way that is beneficial to us.
A simple flaw in a security system is nothing more than an entry-point and of no actual use until someone finds a way to make it do something, which in itself is a lengthy and complicated process.
He was NOT referring to clicking around on things and looking at some program fail and glitch. You completely missed the point.
Thats all i wanted you to notice.
Okay, I see what you are saying. What is the point is providing a tutorial if there is no workable exploit to demonstrate.Thank you for explaining.
I understand what you are saying. But it was about as relevant as saying the sky is blue. Your comment, while true, is a statement, and not a response. I think thats why there is confusion.
any news about exploit?
doesn't look like it, I'd like this to be done faster but I guess we just have to wait.