Hacking 3DS Firmware has been decrypted

Status
Not open for further replies.

DarkShinigami

#1 strongest Shinigami BANKAI
Member
Joined
Sep 12, 2009
Messages
1,922
Trophies
1
Location
Soul Society
XP
2,150
Country
United States
well i for one hope the 3ds is closer to being hack but i want it hacked to get arround the region locked

once that happens i will buy the 3ds project diva game in a heartbeat
 

SifJar

Not a pirate
Member
Joined
Apr 4, 2009
Messages
6,022
Trophies
0
Website
Visit site
XP
1,175
Country
but with a common key you can decrypt cant you? is that not the more important part of the equation ? with p3 there was only decrypt with common key and some fake sign tool right?
No ps3 had a flaw which meant the private key was able to be calculated, so actual signing could be done. That was fixed in 3.60 and above, so private key can't be found anymore, so no more signing. The 3.60 public keys were recently released, meaning 3.60 content can be decrypted, but not encrypted. Anything over 3.60 remains unable to be decrypted.
 
  • Like
Reactions: 1 person

FireGrey

Undercover Admin
Member
Joined
Apr 13, 2010
Messages
3,921
Trophies
1
Website
www.youtube.com
XP
1,281
Country
the possibility exists that some team develop some exploit
already working in some exploit?
No one outside of neimod and maybe a few others knows what's going on, so who knows. Probably not though since no one knows if encryption's been broken....
the possibility exists that some team develop some exploit

we still cant sign anything...(unless of course the common key is just there in the files that were unencrypted..... If thats even happened lol)

No, the common key CANNOT sign anything.
Regardless Nintendo wouldn't leave it so carelessly. Leaving it plaintext in the firmware would be like leaving your house key under the mat.
Maybe they left their key under a fake rock.
 

Cyan

GBATemp's lurking knight
Former Staff
Joined
Oct 27, 2002
Messages
23,749
Trophies
4
Age
45
Location
Engine room, learning
XP
15,648
Country
France
Anything over 3.60 remains unable to be decrypted.
Unless its a TB patch, which can now also be decrypted for 3.55 thanks to duplex.
E.g. Max Payne 3
No, the "TB" are not decrypted. They are debug Eboots + DRM.

The recent "TB crack" is only the DRM check which is bypassed.
The eboots are still the one provided by TB team (debug eboots, which are unsigned and run on any cfw able to run unsigned eboots). Duplex didn't provide new eboots that the TB team didn't.

If the release teams (Duplex) don't know how to get or create debug eboots, they are still dependent on the TB team. And I suspect that TB team will stop providing such eboots at all if their DRM is bypassed, unless they make a new DRM.

Well, debug are also decrypted? maybe SifJar can explain it better? I didn't follow the TB hack very closed.
 

KiiWii

Editorial Team
Editorial Team
Joined
Nov 17, 2008
Messages
16,574
Trophies
3
Website
defaultdnb.github.io
XP
26,884
Country
United Kingdom
No, the "TB" are not decrypted. They are debug Eboots + DRM.

The recent "TB crack" is only the DRM check which is bypassed.
The eboots are still the one provided by TB team (debug eboots, which are unsigned and run on any cfw able to run unsigned eboots). Duplex didn't provide new eboots that the TB team didn't.

If the release teams (Duplex) don't know how to get or create debug eboots, they are still dependent on the TB team. And I suspect that TB team will stop providing such eboots at all if their DRM is bypassed, unless they make a new DRM.

Well, debug are also decrypted? maybe SifJar can explain it better? I didn't follow the TB hack very closed.

Correct me if I am wrong:

If this were true how come debug eboots havent proved useful to date? I'm 99% sure people have obtained debug eboots but they wont run on CEX FW.

TB somehow cracked either getting debug eboots to work or found an exploit for cracking some (not all) eboots without keys.

No one knows what the truth is behind TB, but I thought we couldn't run debug eboots on retail cfw's.
 

SifJar

Not a pirate
Member
Joined
Apr 4, 2009
Messages
6,022
Trophies
0
Website
Visit site
XP
1,175
Country
No, the "TB" are not decrypted. They are debug Eboots + DRM.

The recent "TB crack" is only the DRM check which is bypassed.
The eboots are still the one provided by TB team (debug eboots, which are unsigned and run on any cfw able to run unsigned eboots). Duplex didn't provide new eboots that the TB team didn't.

If the release teams (Duplex) don't know how to get or create debug eboots, they are still dependent on the TB team. And I suspect that TB team will stop providing such eboots at all if their DRM is bypassed, unless they make a new DRM.

Well, debug are also decrypted? maybe SifJar can explain it better? I didn't follow the TB hack very closed.
My understanding of the topic was that TB were able to decrypt the EBOOTs from games requiring 3.60+, and they then re-encrypted the EBOOTs with their own key, which was stored in their dongle (the results were then released under the release group names "Paradox" and "ParadiSO" or something like that). Their CFW would then use the key from the dongle to decrypt the EBOOTs and play them; without the dongle, their key wasn't present and the EBOOTs couldn't be decrypted. But I haven't really read too much about TB stuff and could be completely wrong. You seem to know more about this than I (as with most PS3 stuff).

I haven't heard of "debug EBOOTs" before, but that seems plausible to me. I may look into it more later if I get a chance.

EDIT: Although this all has nothing to do with the 3DS... :P
EDIT: A little research later...Looks like Cyan is right about them being debug EBOOTs. And the TB CFW contains patches to run debug EBOOTs, patches which I don't believe are present in other FWs. Debug EBOOTs can be obtained using a modified PS3 and downloading via a proxy. Apparently they are also signed using TB's own keys, presumably so that even if someone else does figure out the patches for another CFW, the TB EBOOTs can't be used (i.e. debug EBOOTs would be needed to be obtained/released independently from TB's releases).

Note that I am still not 100% clear on the whole thing, so this post could be slightly inaccurate. I still intend to look into this further at a later date, and may update this post again at some time.

EDIT: OK, from reading here, it would appear that what is happening is this: TB get the debug EBOOTs for games (for disc based games, I assume these are updates, so it will only work for games that have an update I guess?), which are unencrypted, they then encrypt these EBOOTs with keys that only work with their CFW, which in turn only works (fully) with their dongle present because of the DRM in the dongle.
 
  • Like
Reactions: 2 people

3DSGuy

No longer in scene
Member
Joined
May 22, 2012
Messages
345
Trophies
0
XP
467
Country
United States
Anything over 3.60 remains unable to be decrypted.
Unless its a TB patch, which can now also be decrypted for 3.55 thanks to duplex.
E.g. Max Payne 3
No, the "TB" are not decrypted. They are debug Eboots + DRM.

The recent "TB crack" is only the DRM check which is bypassed.
The eboots are still the one provided by TB team (debug eboots, which are unsigned and run on any cfw able to run unsigned eboots). Duplex didn't provide new eboots that the TB team didn't.

If the release teams (Duplex) don't know how to get or create debug eboots, they are still dependent on the TB team. And I suspect that TB team will stop providing such eboots at all if their DRM is bypassed, unless they make a new DRM.

Well, debug are also decrypted? maybe SifJar can explain it better? I didn't follow the TB hack very closed.
No they weren't debug (un-encrypted) eboots, TB eboots are just flagged as fself (fake self/debug self), probably so the TB dongle would be notified to intervene and decrypt the eboot when a TB eboot is played. And TB wasn't relying on debug game updates, to get unencrypted eboots, 99% of TB eboots were fixes of the original disc eboot.

Also just to clarify, proper Debug eboots(fself) are not encrypted, and anyone can make debug eboots. The PS3 SDK has been leaked numerous times, which can make debug eboots.
 

SifJar

Not a pirate
Member
Joined
Apr 4, 2009
Messages
6,022
Trophies
0
Website
Visit site
XP
1,175
Country
No they weren't debug (un-encrypted) eboots, TB eboots are just flagged as fself (fake self/debug self), probably so the TB dongle would be notified to intervene and decrypt the eboot when a TB eboot is played. And TB wasn't relying on debug game updates, to get unencrypted eboots, 99% of TB eboots were fixes of the original disc eboot.

Also just to clarify, proper Debug eboots(fself) are not encrypted, and anyone can make debug eboots. The PS3 SDK has been leaked numerous times, which can make debug eboots.

According to this page, they are debug EBOOTs, which are then encrypted with the TB keys so that they only work with the TB CFW, which in turn only works with the TB dongle inserted. The same could be done with the regular 3.55 keys and the results could be played on a regular 3.55 console apparently. If you have a better source of information, please share it as I'm rather interested in reading about it. (I find the whole "piracy dongles with DRM" thing from the PS3 rather interesting).
 

3DSGuy

No longer in scene
Member
Joined
May 22, 2012
Messages
345
Trophies
0
XP
467
Country
United States
No they weren't debug (un-encrypted) eboots, TB eboots are just flagged as fself (fake self/debug self), probably so the TB dongle would be notified to intervene and decrypt the eboot when a TB eboot is played. And TB wasn't relying on debug game updates, to get unencrypted eboots, 99% of TB eboots were fixes of the original disc eboot.

Also just to clarify, proper Debug eboots(fself) are not encrypted, and anyone can make debug eboots. The PS3 SDK has been leaked numerous times, which can make debug eboots.

According to this page, they are debug EBOOTs, which are then encrypted with the TB keys so that they only work with the TB CFW, which in turn only works with the TB dongle inserted. The same could be done with the regular 3.55 keys and the results could be played on a regular 3.55 console apparently. If you have a better source of information, please share it as I'm rather interested in reading about it. (I find the whole "piracy dongles with DRM" thing from the PS3 rather interesting).
Source:Myself/Knowledge of PS3/looking at TB eboots. There are many speculated methods on obtaining decrypted eboots, which mostly surrounds dumping the RAM, in some form (and having the keys, but having the keys is unlikely). Nothing confirmed of course. But they are re-encrypted versions of the original disc eboots, I haven't checked Duplex's 'anti-drmed' TB eboots, but they should be the same size as the disc original eboot. When they say debug eboot, they mean an eboot flagged as debug in the SCE header. Again TB obtain decrypted eboots (to which they apply DRM to) from a source other than debug fselfs(that is unless they get debug copies of every game they've patched again unlikely). What you see when you look at a TB eboot, is simply the result of their DRM process. The fself flag among other things in the SCE Header, is simply a way for the DRM distinguish between regular eboots and TB eboots(after all, all a SCE header does(for selfs) is tell the PS3 what the eboot is). Especially since fselfs are treated differently by the PS3 simply for been an fself(it has to be modified to accept them). And of course the encryption of TB eboots is part of the DRM.

EDIT: If you don't believe me, here's a quote from the dev wiki regarding the 'fself nature' of TB eboots:
Real FSELFs are never encrypted. You can extract it with official unfself tool from SDK.
But, in this FSELF I looked into (driver sf) ELF inside IS encrypted. You can say this because it's masterdisc fself, but I really doubt it.
It doesn't look like a proper fself to me at all, in header it says that sections unecrypted, but it's not true.
Another thing - Masterdisc Generator tool from Sony gives errors with this EBOOT (if it's a masterdisc eboot as stated, why?).
 
  • Like
Reactions: 2 people

SifJar

Not a pirate
Member
Joined
Apr 4, 2009
Messages
6,022
Trophies
0
Website
Visit site
XP
1,175
Country
Source:Myself/Knowledge of PS3/looking at TB eboots. There are many speculated methods on obtaining decrypted eboots, which mostly surrounds dumping the RAM, in some form (and having the keys, but having the keys is unlikely). Nothing confirmed of course. But they are re-encrypted versions of the original disc eboots, I haven't checked Duplex's 'anti-drmed' TB eboots, but they should be the same size as the disc original eboot. When they say debug eboot, they mean an eboot flagged as debug in the SCE header. Again TB obtain decrypted eboots (to which they apply DRM to) from a source other than debug fselfs(that is unless they get debug copies of every game they've patched again unlikely). What you see when you look at a TB eboot, is simply the result of their DRM process. The fself flag among other things in the SCE Header, is simply a way for the DRM distinguish between regular eboots and TB eboots(after all, all a SCE header does(for selfs) is tell the PS3 what the eboot is). Especially since fselfs are treated differently by the PS3 simply for been an fself(it has to be modified to accept them). And of course the encryption of TB eboots is part of the DRM.

EDIT: If you don't believe me, here's a quote from the dev wiki regarding the 'fself nature' of TB eboots:

I get what you're saying, true FSLEFs aren't encrypted. But that doesn't mean that the decrypted EBOOTs TB have access to aren't the debug EBOOTs (i.e. FSELFs). As I see it, it is perfectly possible they have access to the FSELFs (debug EBOOTs) of the games they release "patches" for, and they apply their DRM to those (including the encryption with their own keys) so they only work with the dongle. I see no other way for them to obtain decrypted EBOOTs for newer games unless they had all the newer keys, in which case they could release far more fixed games than they do. They could possibly also create some sort of software to allow users to fix games themselves (without giving the keys away; that part could be tricky, but they've managed to protect their EBOOTs this far, they could probably have a decent attempt at protecting the keys also). AFAIK, the only way to get unencrypted EBOOTs is debug EBOOTs (FSELFs), so that must be their "starting point" for each fix, right?

EDIT: The quote from the dev wiki you posted is found under this header:
old talk

(seems obsolete and incorrect in many ways)
I wouldn't put too much faith in that quote...

EDIT: Just found this post above:

The PSP and the PS3 Used the same key (Common and Private) so finding in the psp would also work in the ps3.
No they didn't. The PS3 firmware just contained (some of) the keys needed to (sort of) sign stuff for the PSP.
 

ZombiePosessor

Well-Known Member
Member
Joined
May 1, 2008
Messages
445
Trophies
0
Age
39
Location
West Virginia
XP
322
Country
United States
Why is there all this talk of old PS3 eboots and shit instead of what the topic is about? Who gives a shit about PS3 stuff, there's a PS3 section where you guys can talk about that shit.
 

Fudge

Remember that death is not the end, but only a tra
Banned
Joined
Aug 26, 2009
Messages
2,653
Trophies
0
Age
27
Location
New York
Website
Visit site
XP
662
Country
United States

Rydian

Resident Furvert™
Member
Joined
Feb 4, 2010
Messages
27,880
Trophies
0
Age
36
Location
Cave Entrance, Watching Cyan Write Letters
Website
rydian.net
XP
9,111
Country
United States
Why is there all this talk of old PS3 eboots and shit instead of what the topic is about? Who gives a shit about PS3 stuff, there's a PS3 section where you guys can talk about that shit.
Yeah, 'cause we all know that the 3DS and PS3 have absolutely no technology or security methods in common whatsoever.

Oh wait.
 
Status
Not open for further replies.

Site & Scene News

Popular threads in this forum

General chit-chat
Help Users
  • No one is chatting at the moment.
    SylverReZ @ SylverReZ: https://www.youtube.com/watch?v=pnRVIC7kS4s