News via http://www.eurasia.nu/modules.php?na...ticle&sid=2603

modrobert writes: "Descrambler over at ps3hax.net has sniffed the USB traffic during a PS Jailbreak session and posted the dumps, after that it has spread to several sites and been disassembled along the way. Since interesting data (and even whole sites) have a nasty way of disappearing on the net I pasted it all up in a text file (ASCII) you can find here. After a quick look at the stuff released it seems as if the first USB session prepares a 'landing zone' with PPC exploit code and the second session trigger some kind of overflow bug which throws execution to land somewhere within the exploit code (maybe in a buffer or stack). "