Sponsored Links

Sponsored Links

Page 20 of 21 FirstFirst ... 1018192021 LastLast
Results 191 to 200 of 202



  1. #191
    Senior Member oVERSoLDiER's Avatar
    Sponsored Links
    Sponsored Links
    Quote Originally Posted by Blade86 View Post
    SLI-GPUs could calculate this in minutes...
    Well, if you know the encryption-type and write an CUDA / OpenCL program for GPU bf'ing, I would rent the Amazon EC2 quadruple GPU solution.

  2. #192
    Banned User landon's Avatar
    Sponsored Links
    Sponsored Links
    Yes, it's right..

  3. #193
    Senior Member Transient's Avatar
    Sponsored Links
    Sponsored Links
    I don't think anyone who has replied thus far has actually read what the author wrote. He said this does NOT use a bf method. If I understand it correctly, he's using all possible combinations of 32-bytes that can be found in the source file. The time required to calculate that isn't much at all. Of course, this would require the lv0 key to just be sitting there unencrypted, so pretty unlikely, but I guess one can dream. Maybe a good enhancement (for the sake of completeness) would be to first try decrypting using all known keys and then searching for lv0 key.

    Either way though, I can't think of any reason lv0 key would be in any file but I guess you never know. Nobody would have expected Sony to use the same "random" key in their signing algorithm either, but as it turned out they did and all someone had to do was look.

  4. #194
    I believe the real hacking has to be done on the hardware, like the good old days of mod chips. Nothing can equal a good mod chip, look at the 360, can run isos from external HD the 360key.

    Need someone with some good tech skills and knowledge on the PS3 architecture to release some mod chip, and voila. Why being stubborn about finding keys and making some CFW ?

    A bit of soldering and some tools and you might find what you're looking for. I believe the next level of PS3 hacking resides in mod chip, like the 360.

  5. #195
    this is the dongle era..

  6. #196
    The xbox 360 security is a lot less complicated than the ps3. The days of say PS1 where it was so simple as to inject "SCEASCEESCEJ" over and over between the drive and the cpu (one each of the magic letters for each region that the drive read from the subchannel data on original cds), or the ps2 days where it was more complicated but once it was done there was no such thing as firmware upgrades are gone... this is where it is now for ps3...

  7. #197
    Quote Originally Posted by Transient View Post
    I don't think anyone who has replied thus far has actually read what the author wrote. He said this does NOT use a bf method. If I understand it correctly, he's using all possible combinations of 32-bytes that can be found in the source file.
    That's still seems a bf-ish method to me, but I understand what you are saying.
    Last edited by moja; 02-05-2012 at 01:52 AM

  8. #198
    technically the x360 doesn't use a modchip its just a replica pcb, but a blank 1

  9. #199
    So... He gets a, let's say, 3.7+ EBOOT and tries to decrypt it with every possible key combination possible? I suggested that for PS360 Team a few months ago, but nobody gave attention.

  10. #200
    AMD Stream and CUDA would make this 100 time faster...
    Attached Thumbnails<br><br> Attached Thumbnails

    ewsa.png  

 
Sponsored Links

Page 20 of 21 FirstFirst ... 1018192021 LastLast
Advertising - Affiliates - Contact Us - PS3 Downloads - PS3 Forums - Privacy Statement - Site Rules - Top - © 2015 PlayStation 3 News