249w ago - This working of knightsolidus with me was supposed to be private, but now DemonHades leaked it and then Pirate posted it like a fool before work was done. We try to control it by put fake but now is too late -- THANKS FOR NOTHING GUYS!
This part is also lie, it was NOT EVER brought to public attention by knightsolidus: "knightsolidus stumbled upon this during his research and brought it to the public's attention."
He ask them to remove it from their page, they did not respect and post it more like basters!
Regard to SKFU, he is right in some parts.. I was excited of seeing new files, until I find they were only from debug like CJPC said already. Also, is true so far we only remove the HDD crypt so this not much help until file crypt is beaten.
All this is truth also of SKFU: You get a few sprx, rco and xml files, possible a few more types but those are useless unless you can remove the encryption of the file itself. But you can't yet. So the only thing you can do for example is getting the firmware part which is on the HDD. But these are only UNPACKED files, NOT DECRYPTED files. You may be able to replace several firmware files ye, so if replacing some text in the XMB or an icon is a custom firmware for you, have fun with the knowledge that this may brick your PS3 and is useless as hell.
Last, from now on knightsolidus work no more with them to stop such leakings from happen again.
Stay tuned for more PS3 Hacks and PS3 CFW news, follow us on Twitter and be sure to drop by the PS3 Hacks and PS3 Custom Firmware Forums for the latest PlayStation 3 scene updates and homebrew releases!
Sure. What I was asking about is if such data pair (encrypted + decrypted) is readily available for others to look at. Currently I do not have appropriate equipment to do this myself - that's why I am asking so that I could relay the data to the smart guy dealing with encryption. For what I know that would be a challenge for him to try to find out what the encryption is (for example the level of compressibility can tell you interesting stuff about cipher strength).
In my opinion it would be highly interesting to have first dozen of sectors of PS3 partition decrypted - it would tell us something about what kind of filesystem is being used...
Yes, we have gone about this, but as you know - its not an easy feat. The simplest way is to format your drive, and take say a picture, and copy it to the hdd, then follow the process to dump it - voila - encrypted and unencrypted data.