GliGli, Tiros, cOz, and the fine folks from the LibXenon project have recently discovered a glitch in the Xbox 360's CPU which enables the running of an unsigned second stage bootloader on consoles with Zephyr, Jasper, and Trinity (Slim!) motherboards. Called the "Reset Glitch Hack" (no, Se7ensins, it has nothing to do with JTAG), the hack is centered around a glitch in the CPU where sending it a quick reset signal while slowed down causes the processor to incorrectly execute the boot code. If the reset signal is timed correctly, the hash verification code in the CB can become screwed up so that it always reports the hashes as valid, thus allowing a custom second-stage bootloader to be run. Also, the hack is impossible for Microsoft to patch through a software update - because the bootloader does not check the fuses and cannot be patched, it would require a hardware update to fix! No rebooter for the hack has been released yet, but it is possible to run LibXenon-based homebrew through XeLL as shown in the video below. I've also heard word that it might be possible to utilize the glitch to run the Devkit hypervisor on a non-Devkit console - can I get some more information on this? Either way, I'm really looking forward to what people are going to do with this, and we'll keep you posted if anything significant happens. Stay tuned! Now, sit back and enjoy this video of XeLL running on a Slim: http://www.youtube.com/watch?v=FfDxBnWf9tQ&feature=player_embedded#! For more information, feel free to check out the official post from libxenon.org. If you're interested in performing the hack, you can download the necessary files here and can find a tutorial here.