Hey team, I just got on the linux4nano team mailing list because I have a 2g nano and don't like apple anymore because they decided to encrypt the osos. Anyways I decided to do some key breaking. Anyways im sad now,I assumed a 32-bit RC4 key which is a big assumption,I used visual studio and got some rc4 decrypting functions from sourceforge and started coding a little app. Sure, ill crack this code. in 57,732 days my app predicted yeah. So much for a core2 duo t5600 doing high speed. Lol, guess .net framework isn't optimized for speed. 2^32 keys is a lot of keyspace. Anyways, so the brute force idea is pretty much out I guess. Unless someone has a mega-cluster of computers. I don't really know what is going on with the mailing group the gna.org list kinda sucks to join in and catch up on. I like the idea of a ram-dump of to get the un-encrypted firmware. Before my brute force attack I used sg3_tools and the ipod in diagnostic mode, no luck. The ipod vendor/device in diagnostic mode is 0000/0000 and does not respond to any usb commands. A usb dump of the ram is kinda silly. To do that we need to run our own code on the cpu, which means we need to write an encrypted osos so the bootloader will parse it correctly. Which came first the chicken or the egg? The decipher key or the memdumper? Haha. Using buffer overruns seems safe b/c osos will crash and reboot into the bootloader, too bad they're aren't any. Well this is what I have read/discovered the last 30 hours or so trying to brick my ipod. Any ideas? - Jeremy
_______________________________________________ Linux4nano-dev mailing list [email protected] https://mail.gna.org/listinfo/linux4nano-dev http://www.linux4nano.org
