Just one problem with that logic Patrick. The encryption (and key) are stored inside the CPU as is the boot rom. Therefore, nothing is ever streamed into the cpu. Only the decrypted stuff is streamed out.
However, you can use a Boot Rom update disk (which you can download from Microsoft) to update the boot room. It might be possible to infect the encrypted boot room disk in order to replace the boot rom with a version of embedded linux. However, even if you manage to do this, the system still wont work because of several other security measures built into the processor. As I see it right now, the best bet to crack the 360 is to either develop a mod chip that snaps over the processor and disables the encryption (highly unlikely to be this easy) or replace the triple core power pc processor with a dual core ppc processor (Also Apple now has Quad cores but doubt they will work on the motherboard in the 360). You would have to replace the processor with a 3.2Ghz Dual core though, otherwise it would fry the system because the memory runs at 3.2Ghz. -----Original Message----- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Patrick Hanevold Sent: Monday, December 05, 2005 7:56 AM To: free60-devel@lists.sourceforge.net Subject: [Free60-Devel] cryptography Hello there, I have the competence to work on breaking the xb360 security system, but I am just lurking on this list and haven't really considdering puting my own effort into understanding and cracking the box. I have a question though to the wise fellows in possession of the mighty force. I have just quessed my way to how things are tied together here, but as I understand, all code is read encrpyted and decrypted totally withing the CPU with the actual decryption algorithms and keys within the memory of the CPU itself. Please correct me if Im wrong, Id guess others would like to have some insight aswell if someone knows for sure. Anyways, the encrypted data is obviously streamed trough the CPU and leaves the CPU decrypted at the same ratio as it enters. Both of these streams can be intercepted and analyzed. From my own experience with cryptography I know its a bitch to decipher modern crypthograpy systems, obviously. However, having both the encrypted and the decrypted data helps a lot. Could someone with more experience on the specifics please share some thought on this. What efforts would be needed if realistically possible at all to find the keys having both sets of data. Regards, Patrick ------------------------------------------------------- This SF.net email is sponsored by: Splunk Inc. Do you grep through log files for problems? Stop! Download the new AJAX search engine that makes searching your log files as easy as surfing the web. DOWNLOAD SPLUNK! http://ads.osdn.com/?ad_id=7637&alloc_id=16865&op=click _______________________________________________ free60-devel mailing list free60-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/free60-devel ------------------------------------------------------- This SF.net email is sponsored by: Splunk Inc. Do you grep through log files for problems? Stop! Download the new AJAX search engine that makes searching your log files as easy as surfing the web. DOWNLOAD SPLUNK! http://ads.osdn.com/?ad_id=7637&alloc_id=16865&op=click _______________________________________________ free60-devel mailing list free60-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/free60-devel