Has anyone thought of creating or has created a backup RAW container image of their unexploited PS4 HDD prior to exploiting it? In effort to aid reverting to stock (against the same drive) in the future whilst keeping your previously accrued genuine games/data/saves from pre-exploit?
That way you just restore the image when you want to return to a non-exploited state at the same FW version without a re-initialisation of the HDD & FW.
I'm not sure if there are any non-volatile nand related areas on the PS4 that the exploit touches, that somehow get erased upon initialisation (from recovery) that aid in avoiding detection. Therefore not doing an initialisation would result in residual data being left, despite a full disk image restore, somehow giving your previously exploited state away - and thus, why it's not a recommended idea?
Also, is it considered safe to use a network connection whilst booted into any of our dev/community built PS4 linux distros?
...Perhaps I'm overlooking it; and it's simply attempting to sign-in to PSN and/or upgrading whilst exploited - that flags an account/console for ban.
From what I've read most people recommend not having a live internet connection at all, some do and only block known Sony update domains at their router, and others stay entirely unprotected dismissing update prompts feeling confident no harms comes from being connected providing they do not update or attempt a sign-in. I mean, what's the worst that can happen? Downloaded update firmware and a firmware nag-war? Right? ...Or wrong?
I'm currently on FW 5.01 atm. I can block domains via OpenWRT if needed, as I saw we had a list of known servers for blocking here on GBATemp.
Anyway, certainly curious about the network connectivity questions. I would definitely like to use an internet connection in Linux. I also wouldn't mind still using Netflix if there is an automatically built non-PSN package built like those found in PS3 repositories. Which will of course require you have an internet connection. What generally is the safe rule to follow?
Lastly, do people leave their PSN accounts associated to the PS4 on exploit? Or do you remove them prior to exploiting, and use local accounts?
Thanks all. I appreciate your time. Stay safe.
That way you just restore the image when you want to return to a non-exploited state at the same FW version without a re-initialisation of the HDD & FW.
I'm not sure if there are any non-volatile nand related areas on the PS4 that the exploit touches, that somehow get erased upon initialisation (from recovery) that aid in avoiding detection. Therefore not doing an initialisation would result in residual data being left, despite a full disk image restore, somehow giving your previously exploited state away - and thus, why it's not a recommended idea?
Also, is it considered safe to use a network connection whilst booted into any of our dev/community built PS4 linux distros?
...Perhaps I'm overlooking it; and it's simply attempting to sign-in to PSN and/or upgrading whilst exploited - that flags an account/console for ban.
From what I've read most people recommend not having a live internet connection at all, some do and only block known Sony update domains at their router, and others stay entirely unprotected dismissing update prompts feeling confident no harms comes from being connected providing they do not update or attempt a sign-in. I mean, what's the worst that can happen? Downloaded update firmware and a firmware nag-war? Right? ...Or wrong?
I'm currently on FW 5.01 atm. I can block domains via OpenWRT if needed, as I saw we had a list of known servers for blocking here on GBATemp.
Anyway, certainly curious about the network connectivity questions. I would definitely like to use an internet connection in Linux. I also wouldn't mind still using Netflix if there is an automatically built non-PSN package built like those found in PS3 repositories. Which will of course require you have an internet connection. What generally is the safe rule to follow?
Lastly, do people leave their PSN accounts associated to the PS4 on exploit? Or do you remove them prior to exploiting, and use local accounts?
Thanks all. I appreciate your time. Stay safe.
Last edited by zerox88,