PS4 News on Facebook! PS4 News on Twitter! PS4 News on YouTube! PS4 News RSS Feed!

Home PS4 News - Latest PlayStation 4 and PS3 News

March 4, 2009 // 9:35 pm - This working of knightsolidus with me was supposed to be private, but now DemonHades leaked it and then Pirate (Shazim Mohammad) posted it like a fool before work was done. We try to control it by put fake but now is too late -- THANKS FOR NOTHING GUYS!

This part is also lie, it was NOT EVER brought to public attention by knightsolidus: "knightsolidus stumbled upon this during his research and brought it to the public's attention."

He ask them to remove it from their page, they did not respect and post it more like basters!

Regard to SKFU, he is right in some parts.. I was excited of seeing new files, until I find they were only from debug like CJPC said already. Also, is true so far we only remove the HDD crypt so this not much help until file crypt is beaten.

All this is truth also of SKFU: You get a few sprx, rco and xml files, possible a few more types but those are useless unless you can remove the encryption of the file itself. But you can't yet. So the only thing you can do for example is getting the firmware part which is on the HDD.

But these are only UNPACKED files, NOT DECRYPTED files. You may be able to replace several firmware files ye, so if replacing some text in the XMB or an icon is a custom firmware for you, have fun with the knowledge that this may brick your PS3 and is useless as hell.

Last, from now on knightsolidus work no more with them to stop such leakings from happen again.

NDT ;-)

Lamers Have PS3 HDD Decrypted Tutorial, Sony Now Knows!

Follow us on Twitter, Facebook and drop by the PS3 Hacks and PS3 CFW forums for the latest PlayStation 3 scene and PS4 Hacks & JailBreak updates with PlayStation 4 homebrew PS4 Downloads.



#28 - bigblockchev - March 6, 2009 // 1:01 am
bigblockchev's Avatar
Keep your heads up guys, hey at least now the next discovery won't be harmed by these two weak individuals. If anything this brings us more hope, our wonderful PS3 Dev's just became that much stronger of a team. We just tightened our ship just like Sony tries to tighten theirs.

#27 - BluEvo - March 5, 2009 // 4:28 pm
BluEvo's Avatar
I think that's a great idea

When do you next see this guy?

#26 - RexVF5 - March 5, 2009 // 4:17 pm
RexVF5's Avatar
I think more promising approach would be to have a sets (pairs) of encrypted and unencrypted data and try to find out what the encryption/decryption algorithm is. Is anybody having such samples? I work with guy who is a mathematician dealing with cryptography so he might have some clue as how to proceed.

#25 - BluEvo - March 5, 2009 // 4:01 pm
BluEvo's Avatar
Quote Originally Posted by ati93 View Post
sorry for this question , im noob , if hdd is decrypted what can we do with it ?

Well according to SKFU, nothing much as we are not able to edit any of the files as they are still encrypted or so I think, PSPSwampy theory seems intersting though.

#24 - ati93 - March 5, 2009 // 3:20 pm
ati93's Avatar
sorry for this question , im noob , if hdd is decrypted what can we do with it ?

#23 - PSPSwampy - March 5, 2009 // 3:06 pm
PSPSwampy's Avatar
Can't believe some people. I deal with idiots all day too - seems the world is full of them these days!

Anyway, personally i think this method might lead somewhere (maybe filesystem drivers or something), although i don't know too much about it.

I'd love to have my high power pc setup right now (would say normal, but not had it setup for ages!). I would dump the entire disk off in 4gb chunks then join it all together and run some scans on the data to see if i could find the toc etc.

Would also be very interesting to see what would happen if you did this for the entire disk, then wrote the results back to the disk. (Would it crash? i suspect so, but would be very interesting anyway!)

Anyway - interesting news, shame about the fools.


PSPSwampy.

#22 - BluEvo - March 5, 2009 // 2:36 pm
BluEvo's Avatar
Quote Originally Posted by courier View Post
oh no !!!

ndt the world is full of lamers

Demonpr*ck is clear evidence of that, even tho the world is full of lamers doesnt mean everyone is a lamer

Quote Originally Posted by PS3 News
That was deleted because someone there leaked sce docs and they were trying to get a decrypted eboot on a retail hdd working with that swap method lol.. the leaker was facundoo10, or so I am told.

Ahhh SH*T, if this leads onto anything which maybe it wont but you never though, it means your PS3 must be able to emu PS2 so I would be officially screwed. Infact I might sell my PS3 and find an older one now lol but I'll wait to see what happens first.

#21 - CJPC - March 5, 2009 // 2:29 pm
CJPC's Avatar
Quote Originally Posted by Ragxdon View Post
So are you saying photos, videos and saved game data can be decrypted through a PC? What about quick formating the HDD does these make these things more difficult to decrpyt? I have attempted to restore my data because of a quick format though the data I found was mostly flash files that don't need decrypting but I couldn't find any of my other progress. So I gave the problem to solve to datatrack labs but they said the data was encrypted by the PS3. The software I tried to use to restore my HDD data was called Data Recovery Wizard from Easeus.com.


For the first - mostlikely, they don't have any extra encryption on them (aside from the disk encryption)

Quick formatting will not work, as the whole basis of that is to essentially erase the table of contents, although the data is still there, the table is blank - making it appear empty. But, since there is still data there (and not nothing, ie 00's), it makes it much harder to attempt to retrieve.

#20 - Ragxdon - March 5, 2009 // 2:21 pm
Ragxdon's Avatar
Quote Originally Posted by CJPC View Post
Well, I want to reinforce what NDT said, specifically this will not really help too many people (which is why it should NOT have been public) as you can not stick the drive in your PC and decrypt it. We believe it uses some form of AES to encrypt the data (just like the flash filesystem).

Although certain chunks of data can be decrypted with this method, its mostly the luck of the draw. Random encrypted data is being swapped around, with no table, no filesystem, basically shooting in the dark, which makes it nearly impossible to know what files you have, where they belong, or even their file names!

Now, assuming someone spent the time to decrypt the entire drive, find a filesystem, map it all out, it would be a step in the right direction, but that could take forever to accomplish.

However, with the exception of some assets, such as pictures and videos in certain areas (ie, photo/video, and some game data), everything on the hard disk drive (and the flash, too) is encrypted with yet another layer of encryption (namely, the SELF encryption). For example, take a game that was bought and installed via PSN. With the exception of the SFO, and PNG's, the SELF, and many packaged assets are all still encrypted!

Finally, any flash data stored on the HDD, is yet again, encrypted, so alas, no help there!

So are you saying photos, videos and saved game data can be decrypted through a PC? What about quick formating the HDD does these make these things more difficult to decrpyt? I have attempted to restore my data because of a quick format though the data I found was mostly flash files that don't need decrypting but I couldn't find any of my other progress. So I gave the problem to solve to datatrack labs but they said the data was encrypted by the PS3. The software I tried to use to restore my HDD data was called Data Recovery Wizard from Easeus.com.

#19 - PS4 News - March 5, 2009 // 2:21 pm
PS4 News's Avatar
Quote Originally Posted by JeffJ View Post
Quote Originally Posted by PS3 News;256785
Going slightly off topic, anyone see this before it was deleted? hehe
http://www.elotrolado.net/hilo_proyecto-carga-de-backups-eboot-redirect_1199019
no fill us in :P

I replied @ the chatbox, but for those who didn't see it:

That was deleted because someone there leaked sce docs and they were trying to get a decrypted eboot on a retail hdd working with that swap method lol.. the leaker was facundoo10, or so I am told.