Changes

Jump to navigation Jump to search
457 bytes removed ,  06:58, 7 June 2013
m
well no more then. thx as always
Line 31: Line 31:  
(BTW could you please tell me where to edit if i do want to add CHN translation of 3dsexplorer?)--[[User:Syphurith|Syphurith]] 16:10, 5 June 2013 (CEST)
 
(BTW could you please tell me where to edit if i do want to add CHN translation of 3dsexplorer?)--[[User:Syphurith|Syphurith]] 16:10, 5 June 2013 (CEST)
 
:Sorry 3dsexplorer is not localizable.. --[[User:Elisherer|Elisherer]] 18:13, 6 June 2013 (CEST)
 
:Sorry 3dsexplorer is not localizable.. --[[User:Elisherer|Elisherer]] 18:13, 6 June 2013 (CEST)
::Thx for replying me. Eh i tried to communicate on irc one or two days ago. There Normmatt and others tried to analyse it, however got a result that all those encrypt/decrypt things happened on their server (which is drupal) and the save file uploaded to remote seems to be a full one (that no clues about the decryption of the saves). Very pity, but i decided not to use any type of illegal action there. Yellow said the company should already have lots of ncch or other things related to decrypt the saves, may be even decapped the SoC (at least how could they get those commands?). Any clues how (or know anyone have such ability) to analyse the DFUse File (that is used as the hardware's firmware, using DFUse Demo we can get it extracted but not knowing what to do next)? If that is analysed we would be able to get the command which that product sent to cart and get its cart id, or even more commands. (those are related to the inner of the save editor app)  
+
::Ok i know then. Tried to communicate on irc one or two days ago. There Normmatt and others tried to analyse it, however got a result that all those encrypt/decrypt things happened on their server and the save file uploaded to remote seems to be a full one (that no clues about the decryption of the saves). Yellow said the company should already have lots of decrypted ncch or other things related to decrypt the saves, may be even decapped the SoC (at least how could they get those commands?).
::Well or else, is there any hardware device that can be used as a proxy sniffer (from this save editor to the cart)? If that could help, maybe i can let someone who has already got such a product to test out the commands. --[[User:Syphurith|Syphurith]] 07:01, 7 June 2013 (CEST)
+
::Got that. if we need to analyse that firmware file we should get that product first (cause those binary/hex related to its core - STM32XXXX) so that is not a very good way to explore. So leave that waiting for chip decapping result. --[[User:Syphurith|Syphurith]] 07:58, 7 June 2013 (CEST)
174

edits

Navigation menu