220w ago - Update: It's now confirmed as a fake guys.
Today Spanish PS3 Developer DemonHades has announced news that they may have decrypted the Sony PS3 HDD. We will update the 'rumor' status of this when more questions are answered of course.
Several PS3 Devs including NDT are currently investigating whether the method can be repeated in other PS3 consoles, or just for one console only (possibly brute-forced?) as it's already known the key differs between each.
Below is a picture of a font on the PS3 decrypted, followed by some preliminary (roughly translated) details:
The key is 512bytes is a sha1-4096 (512 bytes per sector). The key is xoreada own... To be sure it was not a simple xor as speculation... text still appears ... /cell_mw_cfs and more text:
The method I can/should I even say it is very close to an update could change the key or decryption/encryption. The first is to investigate all of its content and then go looking at what interests us is that we have to go 40gbs decoding one by one and is not easy.
But since you said that all the published info that this method allows for and is something that decode the hdd, as advice... I will not make an actualizar. It's about read PS3 hdd content (512 bytes xored key has been decoded), by the moment this means that hard disk content could be read, but not all info about this have been revealed.
Stay tuned for more PS3 Hacks and PS3 CFW news, follow us on Twitter and be sure to drop by the PS3 Hacks and PS3 Custom Firmware Forums for the latest PlayStation 3 scene updates and homebrew releases!
Sorry i have been gone all day but to let you all know i spoke with DemonHades the other day before this was posted here and he told me this is repeatable on more than one console and is indeed real and and being done on retail consoles.
To be honest i would rather see the method withheld until something more can be done than to just decrypt the hdd.
Im mexican if you need any translation I can do it too. Ill stick to the forums as much as I can to translate if needed. Today Im going to see ironmaiden but ill be back around 1 or 2am central time.
All this was posted by demonhades in the last 2 days..
As we can see we didnt only get the redirection route(like I said a long time ago) this also shows the autentification and validation certificates with the game key for the ps3 to execute.
hmmm.. the method I can't/should'nt tell because theres an update coming soon that could change the type of key to decrypt/crypt.
First thing to do is investigate all the content and look for what could interest us, its 40gbs of things that need to be decrypted one by one and thats not an easy thing to do hahaha
But let me tell you that all the info this method shows will be published and lets hope its for something else than to decrypt the hdd, take my advise and do not update, let everyone do what they see fit.
Patience its still soon we only have 3 days wokring day and night without stoping making tests, formats and extractions etc.
everything at its due time.
This investigation has already time on the works, 2 years ago we started in teknoconsolas and eol(I give the link for being a waste of time) theirs the result of working without stoping in something that we are interested and we like.
Previously ifcaro also said:
What do you mean by what is a font?
What I mean is that I can make out the things of the image are from a typography font because there are words like font and bold XD
Edit: to be specific "SCE-PS3 NewRodin JPNBold"
Demonhades also says...
Okay to give more details:
The key is a 512bytes key
its a sha1-4096(512 per sector)
The key is xored
To make it clear it hasnt been a simple xor like its believed
Edit: Sorry but the automerge post is making the post difficult to read...
Ifcaro is posting pictures apparently extracted from the hard drive of what he is finding. like the resistance picture.