Poor vita... Piracy... Sony has already abandoned it. Noo Exclusive games... No AAA GAMES ://
Noo Exclusive games... No AAA GAMES ://
Why are people having trouble with saves? It works just find on my vita.
I mean ppl are saying stuff like "oh you have to unzip files into the vita, obvs a devkit rip", but that was the case for most PS3 dumps as well (depending on where you got it/how it was packaged) and those where all real dumps and not devkit leaks. (I also don't see how a zip file = devkit, not sure if I'm missing something there)
the only reason we had to put the files manually on the vita is because the homebrew tools wouldn't handle a vpk that bigWhy are people having trouble with saves? It works just find on my vita.
And like others I'm more towards it being a real dump rather than a devkit.
I mean ppl are saying stuff like "oh you have to unzip files into the vita, obvs a devkit rip", but that was the case for most PS3 dumps as well (depending on where you got it/how it was packaged) and those where all real dumps and not devkit leaks. (I also don't see how a zip file = devkit, not sure if I'm missing something there)
Also, I've not tested the adventure time game, but I imagine if it has no DRM then it would boot on the vita without having to first install henkaku right? (after the reboot I mean)
This new leak doesn't run without henkaku enabled, is that the case for adventure time or not?
cool where? something new at vitahacks?
Not for post TA-88V2 motherboards.A pandora battery with DC8 would have worked on a 2000 version to un brick it.
Back to the point of a decrypted game,
http://wololo.net/talk/viewtopic.php?f=65&t=45348
What make this method by Mr.Gas different from the Xanado release?
Is this pfs protection the DRM that prevent game from loading on Henkaku?
yes, I'm a noob. Pls help me collecting the dot.
So the vita has many layers of encryption. Let's look at a game cart and digital game:Back to the point of a decrypted game,
http://wololo.net/talk/viewtopic.php?f=65&t=45348
What make this method by Mr.Gas different from the Xanado release?
Is this pfs protection the DRM that prevent game from loading on Henkaku?
yes, I'm a noob. Pls help me connecting the dot.
Basically, this lets us dump the game files in order for them to be readable; this doesn't mean it's runnable.
Maybe, if we can make the Vita expect decrypted data, playing those dumps would be possible... but we probably need a CFW for that.
Yes, that's what I mean in #2. That's mr.gas & major_tom's method.Ok, how about the new dump method with molecularshell, where the near app decrypt the game and we can modify everything related to the game? Can we swap all the game file with the decrypted dump?
Yes, that's what I mean in #2. That's mr.gas & major_tom's method.
So the vita has many layers of encryption. Let's look at a game cart and digital game:
1a) The cart has encryption on the raw data (that's why if you dump it externally, you'll see encrypted data). However, as soon as the game is placed into the vita, that layer is decrypted before the vita sees the game. Then we have "gro0" mounted, which is the unencrypted FAT partition.
1b) Digital games are encrypted in the SCE PKG format. Basically there is an encryption key chosen (at random) by the developer. The package is encrypted and signed by sony. Package Installer can get past this encryption (and it does for drm-free packages). For other packages, package installer sees that you don't have a license and errors out, but you can bypass this without kernel or anything (exercise left for the reader). Once the package is decrypted, it is basically an archive of files that is extracted to "ux0"
2) The second layer of encryption is PFS. All game data (images, textures, executables, etc) are encrypted with PFS. PFS key is derived from a passphrase chosen by the developer. It is also signed (either with a key derived from the passphrase or with sony's key, I'm not sure). This layer is decrypted when a game is mounted (gro0: => app0: or ux0:app/titleid => app0). mr.gas & major_tom's trick gets you past this layer.
3) Now, the showstopper. Game executable files (eboot.self, *.suprx, etc) are encrypted through NPDRM. The key to decrypt this is derived from ux0:license/titleid/*.rif AND tm0:npdrm/act.dat (for digital games) or just gro0:license/titleid/*.rif (for game cart). Of course, the key derivation process includes secrets that userland/system does not have access to and therefore there is no current public way of decrypting it. This is the last line of defense for sony.
Basically #1 can be bypassed through Blackfin or HENkaku's FS access. #2 was bypassed by mr.gas and Major_Tom's pfs mounting trick. And we are waiting for #3 to be bypassed before the floodgates of piracy opens.
And what is it that ebootSegs does? Looking at the source code you just tell the kernel to load an encrypted self?
Does the PSV has some sort of hardware crypto engine like KIRK or the SPUs whcih you can ask to decrypt stuff?
Thank you yifan_lu, I've been looking for exactly this.
Though the .rif file remind me of reactPSN, which I think PS3 can break the last defense line.