Front-page
Updated
Yifan Lu releases psvimgtools, a Vita Backup Decrypter
The Playstation Vita's Content Manager Assistant allows you to backup games, saves and settings to your PC, encrypted with an AES256 key, which means that you can't do that much with them. While the hackers xyz and proxima were reportedly busy researching the F00D processor of the Vita, they discovered a trick that lets you practically obtain this secret key. With the AES256 key in one's possession, it's it now possible to decrypt Vita CMA Backups, even those from an unhackable firmware (3.63 etc.)
Scratch that. Team Molecule member Davee prepared an online converter at this address.
Yifan Lu posted about this process in their blog and released psvimgtools, which consists of a PC tool for Windows, Mac and Linux as well as a companion homebrew application for Henkaku-enabled PS Vita systems. Yifan Lu summarized the possibilities that this provides as follows:
Hacking backups isn’t as fun as having a hacked system. So, don’t update from 3.60 if you have it! You cannot run unsigned code with this, so you are only limited to tricks that can be done on the registry, app.db, and other places. This includes:
- Enabling almost any games to run on the PSTV
- Swap X/O buttons for out-of-region consoles
- Run PSP homebrew with custom bubbles
- and maybe more as people make new discoveries
As a bonus, Yifan Lu claimed that because how Sony implements CMA backups and this trick relying on a hardware vulnerability, it is pretty much impossible to patch in future system updates. If Sony nonetheless decides to fix this, they would break compatibility of all CMA backups created to date, which even Sony is unlikely to pull off.
For more information on how this works, head to the source for Yifan Lu's blog post.
Get psvimgtools on Github
Source
Yifan Lu's Twitter
Last edited by WiiUBricker,