Seriously, now I want to buy a camera, smash the chip, and crack their firmware so it doesn't have the check. As far as I know there is no secureboot involved, so it should be trivial. This Is Just Inexplicably Dumb.https://twitter.com/marcan42/status/1088472549715918848 …
-
-
Correction: the key is 0d48bfb7fd81bb7fe9a24b1df9653a185f9d438aac819afe1672a77afca451a4. Went down the wrong codepath for the first key (there was an extra xor). I checked and this one computes the same results as the real Camera Module V2 from public I²C traces.
Show this thread -
Here's a Python script for validation:https://gist.github.com/marcan/6dde73a9a0c917cd4fc9784a0a73efe3 …
Show this thread -
Thanks to
@DrYerzinia for the I²C trace. I assume you're interested in that key :-)Show this thread
End of conversation
New conversation -
-
-
I see you thought exactly the same as I did when you read HMAC chip :P
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
-
-
They must of read a paper on 90s obfuscation design..
-
There are Apple 2 games with much better protection than that.
- Show replies
New conversation -
-
-
*applause*
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
-
-
Barely-entry-level-reverse-engineer here, what disassembler is that? IDA?
-
This Tweet is unavailable.
- Show replies
New conversation -
-
-
Lol you rock man
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.