Sam eid0 to 48B. Zaszyfrowany (i skompresowany?) metldr to 59KB, odszyfrowany 256KB (u mnie eid0 jest na samym początku, ale podobno nie jest to regułą i może być w środku, a na początku tylko riv i erk).
Nie wiem.
Cytat:
|
Napisany przez DeanK
This "tool" is far from doing anything useful yet. It reads from your flash the "metldr" and "eEID" and saves them as files on the USB - nothing more, nothing less. It doesn't decrypt anything, it doesn't give you the keys, it doesn't convert anything. You can get these two files by dumping your flash and extracting it with norunpack or cex2dex applications. You still need a way to use your "metldr" file and make the PS3 extract the key+iv so you can change the target_id and re-encrypt and write to the flash.
|
Czyli póki co jest bezużyteczny.
Cytat:
|
Tranced, I guess if one compiles it and finds a way to sign it properly and then execute it with proper privileges it will work as he said. Launching it from GameOS as lv2 app probably won't work, because it has to be executed as secure_loader (the way the actual metldr is executed when PS3 boots). Back in November last year there was such compiled .self (still on the wiki) which was supposedly used to do the same job. I'll check about that.
|
I wygląda na to, że z poziomu GameOS nigdy nie będzie to możliwe. Ale... diabli wiedzą.
- - -
No i nie trzeba Linuksa (podobno

). Ale z tego co widzę to dalej OtherOS.
https://twitter.com/naehrwert