The above video goes away if you are a member and logged in, so log in now!
I also had ps3 isolated loaders dumped and reversed long before psjailbreak showed up, as shown through the self cryptography documentation history seen here Revision history of "Self Crypto" - PS3Wiki so that date does not mean these informations are not accurate, do you think that because otheros was available we (devs) sat for years and did nothing ? Hacks were done long before they went public, how do you think I know so much about this system ?
Originally Posted by garyopa
The fact that I was actually able to read out the per drive key should also pretty much tell you that at the time I had at least lv2 privileged code running as well as isolated spu code execution, (because that is what it takes to read out that key). Basically, I pretty much owned the system.
As to the drive crypto the per drive key on the ps3 side is stored in EID4, decrypted by sv_iso. The only reason any of you can pair drives is because someone leaked a sony lv2diag with an isolated module, yet I assume most of you do not know that the key gets retrieved from the drive and fed to the fdm module which reencrypts EID4 with it. The only actual information that needs editing is that appldr isn't the loader that decrypts the per disc key.
Last edited by mathieulh; 07-21-2011 at 03:12 PM.
SAK cannot read the pic zone, in fact only the drive firmware itself can, the data never leaves the drive. Instead the drive fills in some register the PPU code reads to tell if the disc is genuine.
Originally Posted by xPreatorianx