- 7 Novembre 2010
- 70
- 0
- Miglior risposta
- 0
Finalmente il "metodo" con cui si trovano le chiavi 3.6x è stato rivelato!!!
(Non è stato spiegato se questo metodo funziona anche con le nuove chiavi del 3.70)
Il metodo è chiaramente fuori portata per i newbie (senza offesa) per due fondamentali motivi:
-E' necessaria una minima esperienza con le mod hardware
-Richiede attrezzatura che in genere si trova solo nei laboratori specializzati.
A seguire il procedimento:
Requisiti: (inglese)
- A brain;
- Electronic Hardware expensive:
- KNOWLEDGE plate design; <This long as it is to get through sockets>
- KNOWLEDGE SMD and BGA; <for desoldering or soldering smd components bga>
- Oscilloscopes High Frequency; <for to logging of the frecuencias>
- KNOWLEDGE ASM CFP <for to modify part of the lv and implement new funciones>
- KNOWLEDGE in the Architecture of the PS3; <for know what a lv>
- Patience.
PROCEDIMENTO: (inglese)
To have the keys, we need to have the decryption LV0. The desempaquetea LV0 is in RAM, and is decrypted with the key bld. There, the keys are already in the SPU, which is like a safe, impossible to enter (are isolated from the outside).
When the loaders and lv are already loaded in the SPU, the lv1 clean all traces of the lv and loaders decompressed in memory. But who gives the order to clean? The lv1, so it is playable in an exploitable version!
To solve the problem, you need to make a lv1 modified to copy the area of interest, the memory of LV0 and put it somewhere else, to then remove it, thereupon continue its routine cleaning and mapping.Thus, we have the memory LV0 safe. And so the LV0 gets exposed to everything.From there, we have the appldr, which needs to be decrypted with the LV0, and with that we have “keystore”
Well, it’s so simple to discover the keys? I do not believe