We use the browser as an entry point for unhacked consoles, but with enough reversing couldn't we after using the browser entry point find a buffer overflow or some other exploit in say something like a config file that PS4 reads to load up it's user interface or a theme file, to establish a persistent hack that survives through power on/off?
>WebKit exploit
>Kernel exploit
>Modify previously untouchable config/theme file to install persistent exploit
Just curious, it might help with the hack stability as well, considering that it seems the userland exploit in webkit is the unstable part.
>WebKit exploit
>Kernel exploit
>Modify previously untouchable config/theme file to install persistent exploit
Just curious, it might help with the hack stability as well, considering that it seems the userland exploit in webkit is the unstable part.