Thread: HDD encryption
This is really interesting. So using knightsolidus' method, we are able to view the directory structure of the HDD, but can't modify any files without corruption due to still-withstanding problem of encryption?
I'm looking for a way to change the 'content owner' data on files and it looks like the encryption is preventing me from getting far with that.
I have not found any software for reading and writing UFS2, only for reading.
Modified this image, you can encrypt and write again in the hdd.
NOTE: This entire process is lengthy and complicated, but that does not mean it is impossible
Originally Posted by Wikipedia - Unix File System
Did anyone else see this or figure this out?
As it turns out, Ubuntu version 8.10 (Intrepid ibex), using a specific flag when compiling the kernel, will enable UFS2 write support.
The support should still be in the newest version, 9.04 (Jaunty Jackalope) and the future version 9.10 (Karmic Koala).
Originally Posted by Kidders on the Ubuntu forum
This should give us a vector to be able to change files on the hard disk outside of the PS3, but the encryption is still in our way.
Whee - interesting
I've ordered a CF-SATA adapter to play around a bit with the GameOS disk stuff. Might be funny to see what the GameOS has to say to a disk that's < 10GB considering the rigid "partitioning" scheme. I'll let you know when the adapter arrives (I'll try with a 4GB CF card).
If anyone's interested, I've written a small tool that I use under Linux to initialize disks with 0xdeadbeef before tinkering with them. Makes it easier to see which parts were touched by the PS3 and has the advantage that you'll recognize blocks of zeros written by the PS3, too
One thing I don't quite get yet - is the UFS2 partition itself encrypted or only the files residing inside the partition?
12-01-2009 #30Banned User
- Join Date
- Jul 2008
Baaa... i'm gona
Even if some one could break the hdd encryption there is still the file and flash encryption and the leaked method of decryption doesnt let you look into importend system files?Or could they then used with the leaked version to decrypt them?
(Beside the fact that we couldnt resign)
This sounds more like: Forget it!!