(adsbygoogle = window.adsbygoogle || []).push({});
So some think they are safe now with only using the cfw spoof in combination with either f...psn or charles.
Well you are not.
The only thing that is spoofed is the fw version reported to the authentication server, but your ps3 is not only connecting to that server.
Every other connection you make (http and https) will also reveal your real fw version witch is contained in the user-agent header.
Part from that, every time you launch any app on your ps3 it will request and xml from one of the Sony servers.
The file requested is the gameid-ver.xml
( eg:
You must login or register to view this content. )
Sony is not that stupid and they also created these xmls for all known homebrew like binddev, multiman, ...
(
You must login or register to view this content. for multiman )
You will also need to spoof that with for example an official game you have. The disadvantage is that if you launch an app, and request the wrong xml, you are logged off from psn.
This amongst several other connections and data requested and send need to be spoofed in order to be "hidden"
You will also need to replace several certificates on the ps3 before you can actually decrypt many of the ssl connections.
But still, in order to spoof correctly one will also need to know the information that is send from a OFW 3.56. As it is most likely not only the fw version is different but some headers may have another value, or even new headers exist.
I'm NOT going to make a full tutorial on how to do this, if you are smart enough google can help you.
In short: As long there is no decrypted version of ofw 3.56 or any following, you might be able to trick the logon server in order to logon to PSN, but you will never be able to trick Sony in thinking you have the correct FW.