Bahattin TOZYILMAZ wrote: > Sorry to ask that. Is there any news. I'm tierd of these questions. If there are some progress, I would write it on the mailing-list. So, if I didn't write anything there nothing new.
> I recall that some qualified people inside this project was trying to > extract the content of FLASH ROM chip. I would like to learn if there > were any improvements. > > And I want to ask a question. Below is what I could understand about > bootloader: > > 1.) bootloader is kept in FLASH. > 2.) ARM940T cpu boots that bootloader inside FLASH > 3.) bootloader contains decryption algorithm, and our precious secret > key(or keys). > 4.) bootloader decrypts firmware with using key data contained in > firmware header and secret key in flash. > 5.) firmware comes alive in nearly 10 seconds. > > Is there any mistake above. No, these are the assumptions we are assuming right now. > And questions depend on my bootloader problem: > > 1.) What happens if we fill key data in firmware header with 0x00 s? I > don't think that Apple is so careless that they left such a backdoor. We don't know. Try it and tell us. > 2.) When is AUPD code used? Does it contains disk-mode firmware, or > restoration and formatting code? AUPD is the software used for the updates, I'm no specialist of it. If you want to know more about it, please refer to the unciphered version of it in the iPod Nano first generation. Regards -- Emmanuel Fleury We've all heard that a million monkeys banging on a million typewriters will eventually reproduce the works of Shakespeare. Now, thanks to the Internet, we know this is not true. -- Arthur C. Clarke _______________________________________________ Linux4nano-dev mailing list [email protected] https://mail.gna.org/listinfo/linux4nano-dev http://www.linux4nano.org
