No, lol, no. Marcan mentioned using "cute side channel attacks" to get the missing boot key (boot 1?).Theres always the possibility of a MITM attack but it would likely require solderong skills to do it like that
No, lol, no. Marcan mentioned using "cute side channel attacks" to get the missing boot key (boot 1?).Theres always the possibility of a MITM attack but it would likely require solderong skills to do it like that
Marcan soldered a device to get something out of memory. There was a picture of it. It was a device that was used on a Wii? I can look but that was to get something else, not what TSK is thinking.MITM between which components?
Then I wonder if whoever is considering leaking the key used an IOSU exploit to obtain it themselves, or if they were just given the key by someone else.The method for obtaining it is almost certainly an IOSU exploit.
I know they didnt use the gecko for that, but they likely wrent aiming for that at the time. Onlu one way to find out tho...Marcan soldered a device to get something out of memory. There was a picture of it. It was a device that was used on a Wii? I can look but that was to get something else, not what TSK is thinking.
Edit: http://www.maxconsole.com/maxcon_forums/threads/194099-marcan-gets-USB-Gecko-to-work-on-Wii-U
I know they didnt use the gecko for that, but they likely wrent aiming for that at the time. Onlu one way to find out tho...
They were using the gecko for debugging purposes. The wiring is to an internal wii memory card bus. All they have to do is use the old gecko debug methods and they get a working high-speed hardware debugger. Wiring it up serves no greater access than people do on 5.1 with the web browser hack. The only thing is that it may potentially still be viable for those people on >5.1 as it probably has not been closed.
Gecko debug only works if Gecko OS is running. Simply sending stuff over the memory card bus doesn't give you debug capabilities. They used GPIOGecko to dump data, and to send data to the Wii U.
They(SvenPeter42@30c3) said they "found some random gpios on the mainboard" and bitbang the wii's memory card protocol over those gpios so they could use the old hardware to get a "really fast" serial console.
But, "really fast" is limited by hardware. So the usbgecko usb chip/interface only supports speeds (theoretically/if no overhead etc) of 12mb(its)ps or 1.5 Megabytes per/second.
I don't know why it was expected to be on Christmas anyway.
Possibly a proof of concept video (I hope we'll finish it on Christmas since we'll have ample time to work)
Possibly a proof of concept video (I hope we'll finish it on Christmas since we'll have ample time to work) but no release since then we'd need to clean it up and make the homebrew launcher as mentioned before.
The problem is that my brother updated my Wii U a month ago, so now I need to rely on others to do the testing for me. Two of them live in different timezones, and one doesn't get to use their Wii U often.
It would be amazing if there was an exploit that could not be patched. Or, like the Wii; protection, nand backups, and "cleaned" updates users can apply. I know this probably won't ever happen. Wishful thinking :-)The problem is that my brother updated my Wii U a month ago, so now I need to rely on others to do the testing for me. Two of them live in different timezones, and one doesn't get to use their Wii U often.