Developer cnsldv has a solution for unlocking your memory cards. When inserting a memory card from a >3.60 Vita in your HENkaku Vita you get the "You must update" dialog. This homebrew mounts the card in a way that isn't checked, deletes the file and unmounts again. On reboot the Vita thinks it's a new card and it passes the check. Only works on PS Vita Slim models and also PlayStation TV (Vita TV) , also needs to run HENkaku without a card inserted.
What's it for?
- Sony added some annoying features to the Vita, one of which is that you can't swap memory cards between devices with different FW versions due to the "You must update" message. If one device runs HENkaku on 3.60 and the other is above 3.60 you can't use the card in the 3.60 device.
How to install
- You need a Vita running HENkaku to be able to use CardUnlock. Install the vpk in the usual way (MolecularShell or VitaShell). If you are using a model 1K Vita you should use Application Storage Manager to copy CardUnlock to ur0: since you can't have a card in ux0: when you run it - this is only known to work with HENkaku R6 and apprently does not work with the latest. Due to what it does CardUnlock is unsafe homebrew. I recommend building it from source, you should always do this where you can.
- Start Vita without the card inserted
- Run HENkaku and start CardUnlock
- Insert card, answer "no" to "do you want to reboot now" message
- Press X to remove id.dat
- Press X to reboot or O to exit (after pressing O you can remove the card to insert in another device)
- Answer "no" to questions about copying content to the card
- You now have access to the card
How does it work?
- The Vita looks at the file id.dat in the root of the card to see if it's attached to another user/version when mounting the card. Removing this file makes the Vita think this is a new card allowing you to mount it. The problem is that you need to mount the card to remove the file and mounting ux0: causes the Vita to check the file before you can delete it. CardUnlock gets around this by mounting the card as xmc0: which is the actual mount point for external cards. The Vita doesn't check for id.dat when you mount xmc0: so we can mount the device and delete id.dat.
- The code to mount the card is based on sections of VitaShell by TheFl0w. Other stuff was taken from vitastick by Xerpi. Thanks go to Team Molecule & everyone else involved in the Vita homebrew scene, especially those who share their code to help others learn and produce more homebrew.
PS VITA / PS TV CardUnlock v1.0 (by cnsldv) : Now easily access memory cards assignd to different FW
By atreyu187 on May 4, 2017 at 10:12 PM
TheFlow cracks Vita Firmware 3.67 ("Will Release" but "Not Soon")TheFlow has brought some clarity on the recent updates (commits) made to VitaShell suggesting 3.67 Support, It is indeed true that 3.67 is now exploitable for the PS Vita and sibling devices the PlayStation TV (Vita TV). The dev has now confirmed on his official twitter (tweets below) that user and kernel access on Vita's 3.67 Firmware has been achieved, However, do note before you get too excited, the developer won't release till end of year, in what seems to be a move to wait out any future Vita firmware updates that may be on the horizon,. The dev has also stated (if time allows) the possibility to update HENkaku Enso to 3.65 for existing Vita user's, but in the future we might see all vita devices with a new window for exploiting .Its unclear if the recent Vita Bootloader Hack aided or had anything to with this hack but details are sure to emerge in the coming weeks and months What ya think about this announcement from TheFlow?
-STLcardsWS/ nCadeRegalContinue reading
Something good is going on in the PS Vita SceneIt appears "Something good is going on in the PS Vita Scene" says psx-place's own kozarovv, As the recent commits by xyz (team molecule member) and then TheFlow (VitaShell Creator) Github pages some rather interesting discoveries were found in those recent commits as also The_Hero (of Games&Consoles) points out about some new commits arising following the news from last week when Yifan lu (a member of Team Molecule) disclosed the new HENkaku Enso Bootloader Hack to the Vita Community. Since, it now appears there are some rather interesting developments coming to fruition in the Vita's ecosystem. Are we are likely in store for something big for the Vita Community, like 3.67 breakthroughs? It sure looks that way, currently, we are only making suggestions and concluding details from the commits across these Open Source Projects from elite vita devs. As these changes are signaling something is on the horizon. @kozarovv laid out some of the important bits of information that can be gather from those recent commits made available -STLcardsWSContinue reading
HENkaku Ensō bootloader hack for Vita [ by Team molecule]Team molecule is not done detailing information on the PS Vita / PlayStation TV / Vita TV, after the releases of HENkaku and then HENkaku Ensō Now developer Yifan Lu has detailed a write up detailing a new exploit titled HENkaku Ensō bootloader Hack, the information detailed could lift some of the restrictions hampered in the Vita's current environment. and even lead to a full blown 3.65 exploit (but that needs additional work the team is not interested in, but they hope others will be with this new info.) There is alot to read so i will let you get to the details yourself in the this well written piece by the developer, The topic we have broke up below in our tabs for easy reading, but you can also view the original format in the source link provided from Yifanlu's blog at bottom of the article.
Share This Page
- henkaku homebrew
- homebrew game
- playstation 2
- playstation 2 emulator
- playstation 2 resources
- playstation portable
- playstation portable cfw
- playstation portable emulator
- playstation portable resources
- playstation tv
- ps tv
- ps vita
- ps2 emulator
- ps2 resources
- ps3 cfw
- ps3 homebrew
- psp cfw
- psp emulator
- psp resources
- pstv homebrew
- vita homebrew
- vita tv
- webman mod
- xmb mod
- User Record:
- Latest Member: