PS4 News on Facebook! PS4 News on Twitter! PS4 News on YouTube! PS4 News RSS Feed!

  1. #211
    I got what you mean, don't worry. When you have unencrypted eboot, what you do? Keys are 3.6 , or 3.7. RE adapt them for work, is what their dongle + tool do. Actually, just TUHTA could do something with unencrypted eboots, not you, nor me

  2. #212
    Join Date
    Oct 2010
    On the blu ray the eboot is encrypted, probably with a custom key we've very little chance of getting, but the PS3 has the decryption key because appldr has to decrypt it before running it.

    so after opening it, the copy in RAM is UNENCRYPTED, in RAM the eboot will be completely 100% decrypted otherwise it wont run! it's just a case of cleaning the dump and re signing it with the 3.55 keys.

    and you'll find quite a few people around here know at least how to sign an eboot lol

  3. #213
    yep, this will further advance the cfw scene.

  4. #214
    Absolutely agree. The problem is, as you said: where is the decrypted eboot? We don't have it. That's why this tool is needed. Surely do a decrypt encrypt, not a separate process.

    Reason because we cannot play with 3.6+ games, and why we want jb2 or wait TUHTA. So i repeat, upload eboot coming directly from indonesian BDRs is pointless. You want to manipulate it during the ram passage? Uhm, interesting.

    But i can tell you, eboot goes on ram as is, 3.6. It's modified, worst. So what you find on ram, is a strange code, something either owning 3.6 keys you cannot decrypt.

  5. #215
    Join Date
    Oct 2010
    appldr will decrypt it for us! Have you any idea what you're talking about? You do understand that all encrypted code has to be decrypted before it is executed. The appldr key in their FW will be the public key to their private key that they encrypted the eboot with, when the PS3 runs the game appldr will use THEIR KEY to decrypt it as it loads it into memory to be run.

    So if you dump the ram you get a 100% completely free of all keys, clean as a whistle, decrypted eboot buried in the dump and because its a 3.55 FW dumping RAM shouldn't be an issue.

    Yes uploading their encrypted eboots seems pointless for now but there are numerous comparisons that can be done with them so it helps.

    Maybe I'm not making this clear enough. On blu ray eboot is encrypted. In RAM eboot is decrypted.. we can dump ram on 3.55, we cant on 3.56+

    That's why this is different, it's a decrypted 3.60+ eboot somewhere we have access, it's just a case of grabbing it.

  6. #216
    Join Date
    Aug 2011
    As I said before, the eboots are special fself, the eboot of driver san francisco has a debug header but the self is encrypted, so you cannot decrypt it. The eboot of pes 2012 is completely encrypted. We cannot do anything if before we didn't get the dongle and at least a special bd.
    I got an elf from driver san francisco eboot, I could create so an eboot.bin, but I'm sure it won't work because the elf I got is yet encrypted.

  7. #217
    Join Date
    Oct 2010
    I mean taking the dump with a dongle and the special bd of the game.

  8. #218
    If this dongle is real one so i should buy one whatever tomorrow is the CFW but at least i respect the team work there for bringing life the ps3 scene.

    thanks a lot for all the great work guys

  9. #219
    Join Date
    Feb 2011
    I tried that Sniper eboot and it doesn't work.

  10. #220
    some extra info from math...

    [Register or Login to view code]

Closed Thread
Page 22 of 87 FirstFirst ... 122122233272 ... LastLast


Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts