You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
For FW 10.50 download the latest 10.50 HEN payload from Echo Stretch's repo or use the payload attached to this release
Copy goldhen.bin to the root of an exFAT formatted USB drive
For FW 10.50 copy the payload bin to the root of an exFAT formatted USB drive and rename it to payload.bin
Plug the USB Drive into a USB port on your PS4
Connect the Pi to your PS4 via an Ethernet cable and power on both devices.
Wait for notifications confirming GoldHEN was loaded. This should happen within 2-3 minutes depending on how many attempts are required for that instance. If nothing happens within 5 minutes of boot up, I recommend restarting both the Raspberry Pi and the PS4.
Notes
This is the pppwn_cpp Jailbreak for PS4 running software versions in the title of the release only
Tested on Raspberry Pi 3 Model B
If you followed step 5 above, your PS4 will have internet access which may result in your PS4 updating it's system software. You have been warned.
After the first successful load of GoldHEN, you do not need to repeat steps 6 through 8 for subsequent runs on the same PS4
Auto updates the pppwn_cpp exploit binary at device boot (if internet available)
If postjb=pppoe config is set, PS4 can access internet if Pi is connected to WiFi and only after successful Jailbreak
No need to restart Pi if Re-Jailbreaking after PS4 was shutdown/restarted (PS4 must have stayed off for at least 30 seconds)
Handles exceptions when PS4 crashes during exploit or if the exploit itself halts or hangs