Tweets

You blocked @elmirorac

Are you sure you want to view these Tweets? Viewing Tweets won't unblock @elmirorac

  1. Jan 29

    More precisions: -the written keys are random -they are written to keyslots 0xC and 0xD, the keyslots where the TSEC writes the real keys when it is satisfied -the function writing the fake keys is also called at each panic

    Show this thread
    Undo
  2. Retweeted
    Jan 28

    N's platform continually getting broken due to NV's problems, 2019

    Undo
  3. Jan 28

    BTW, Nintendo is a troll: the very first thing the TSEC secureboot FW does is writing a key to the SE... but not any key you would want!

    Show this thread
    Undo
  4. Jan 28

    To all pk1decryptor users: pk1decryptor is dead. It cannot decrypt the 7.0.0 package1 and never will be able to. Now the TSEC FW bypasses the SMMU (!!!)

    Undo
  5. Jan 28

    Once again many thanks to for his help!

    Show this thread
    Undo
  6. Jan 28

    7.0.0 cracked Here are some SHA256 hashes in celebration :) PK11: 434FA7D07A8D4FDFD8630AC40FF9BC697E0DE40E0041E225F154BEB9571044E9 Master key: 4EC96B8CB01B8DCE382149443430B2B6EBCB2983348AFA04A25E53609DABEDF6

    Show this thread
    Undo
  7. Retweeted
    Jan 12

    Woops! :P It looks like whatever engineer wrote this altered his message a bit since it first appeared in 0.996.070 Vita's secure kernel xD

    Undo
  8. Jan 11

    Well it looks like what I released was obsoleted mere hours after haha Oh well it'll keep the historical purpose

    Undo
  9. Retweeted
    Jan 11

    sixhundredtwenty 🦅 7c52619b99053e25f851771ab207c0b72905333a

    Undo
  10. Jan 10

    I hope this stuff will be useful to someone. :) If nothing else, it's out for historical purposes.

    Show this thread
    Undo
  11. Jan 10

    Also, here is the documentation of the secret TSEC FW I wrote a few days after. It describes the checks it is doing, and how it interacts with the outside world generally.

    Show this thread
    Undo
  12. Jan 10

    Here is the tool I developed just after having successfully defeated the 6.2.0 protections with the SMMU trick. Pretty straightforward, it decrypts package1, and also gets you the TSEC root key, the TSEC device key, and the SBK as a bonus.

    Show this thread
    Undo
  13. Jan 10

    Since there is no good reason not to make that stuff public, I'm releasing my 6.2.0 work/research from last November.

    Show this thread
    Undo
  14. Jan 1

    It's 2019 Anywhere on Earth. Happy new year!

    Undo
  15. 29 Dec 2018

    The PS Vita master key is the scream Sony's security team is having when the cryptosystem is broken.

    Undo
  16. 1 Dec 2018

    RIP cert of bricked Switch, finally banned after many courageous actions exploring Nintendo's online services

    Undo
  17. Retweeted
    29 Nov 2018

    It's June 15th today -- Atmosphere 0.8.0 has released: This is a feature update: a new fatal sysmodule was added, some protections were added for NAND partitions, and 6.2.0 support was added. Many thanks to and for their help. :)

    Undo
  18. 25 Nov 2018
    Show this thread
    Undo
  19. 25 Nov 2018
    Show this thread
    Undo
  20. 25 Nov 2018

    Nintendo, releasing 6.2.0:

    Show this thread
    Undo

Loading seems to be taking a while.

Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.

    You may also like

    ·