![](/static/253f0d9b/assets/icons/icon-96x96.png)
![](https://fry.gs/pictrs/image/c6832070-8625-4688-b9e5-5d519541e092.png)
4·
7 months agoReminds me of the original PSP, on which homebrew hackers used a similar exploit using vulnerabilities in the image viewer by loading a corrupted TIFF, causing a buffer overflow that let the user load unverified code.
Reminds me of the original PSP, on which homebrew hackers used a similar exploit using vulnerabilities in the image viewer by loading a corrupted TIFF, causing a buffer overflow that let the user load unverified code.
ˋblkidˋ or take a look around /dev, devices are symlinked to their various attributes.
LIGHTSPEED BRIEFS!