Lost cause/ failed PS3 hack
Posted: Mon Nov 27, 2017 8:28 pm
Okay, so let's say, hypothetically, someone had a PS3 slim. This poor soul decided that the new hack for 4.82 sounded neat and wanted to use it on a CECH 2501A system. He thinks that surely this is compatible as he has seen 2501B systems that have been hacked (and "A" comes before "B", after all
)...
So he throws caution to the wind and skips the "Checking if you can hack your PS3" step.
All goes well at first, and the nor is flashed.
Then the system turns off (as expected)... and that's the last it ever successfully works. It will not turn on and recovery menu is no longer accessible.
This guy is obviously an idiot, but after a few web searches, he has written off the system as a complete loss. Without the original nor backup, even an E3 flasher would be useless right?
What would someone do to mitigate this tragedy of utter stupidity? Would this system be useful for anything other than parts for another system?
I realize there are better forums to ask this, but I know a lot of people here have some good understanding of how systems work (I thought I was one of them, but I don't know what to tell the guy in this instance).
--EDIT--
Let's assume this guide was used
http://wololo.net/2017/11/27/tutorial-u ... -friendly/
and went foul after the "3. Running the exploit" step was completed.

So he throws caution to the wind and skips the "Checking if you can hack your PS3" step.
All goes well at first, and the nor is flashed.
Then the system turns off (as expected)... and that's the last it ever successfully works. It will not turn on and recovery menu is no longer accessible.
This guy is obviously an idiot, but after a few web searches, he has written off the system as a complete loss. Without the original nor backup, even an E3 flasher would be useless right?
What would someone do to mitigate this tragedy of utter stupidity? Would this system be useful for anything other than parts for another system?
I realize there are better forums to ask this, but I know a lot of people here have some good understanding of how systems work (I thought I was one of them, but I don't know what to tell the guy in this instance).
--EDIT--
Let's assume this guide was used
http://wololo.net/2017/11/27/tutorial-u ... -friendly/
and went foul after the "3. Running the exploit" step was completed.