Over the weekend placa shared with us in THIS Forum thread news of a potential PS3 exploit discovery. Many of the resident PS3Dev'ers experimented with it throughout the weekend, and several (including both CJPC and subdub among others) were able to successfully reproduce and confirm it as working! Pictured to your left is a screenshot taken from under GAME... the "Warhawk" logo can be modified as well. Although the actual PS3 exploit itself requires no (c) files from the recent PS3 $DK leak, at this time only those with access to it can copy/upload .SELF (encrypted; standard ELF files currently don't work) files to the PS3 HDD (EBOOT.BIN on the HDD) in order to test them. Initially it was thought this method would work with v1.60+ PS3 Firmware, however, at the time of this writing it appears to only work with v1.70+ PS3 Firmware. Please NOTE that this may change, and also we do NOT yet recommend anyone update their console due to this news. Why not update yet? According to several PS3Dev'ers, this PS3 Network Hole found (including bypass, fake PKG, etc) is now a way for Devs to attempt to copy/replace a .SELF (executable) file to the PS3 HDD... however, they have yet to actually upload a file which brings about a true "Hello World PS3" (which is the primary goal of course, followed thereafter by homebrew, iSO Loaders, and so on). As always, we will post updates as they are available so be sure to stay tuned throughout the week! check it out urself on ps3news.com!!!