Obviously, some people know how to do that, since we get patched firmwares with camd and stuff, where maincode has been properly reencrypted. Been spending the last 3 days looking for information on how exactly they manage to decrypt, inject custom code and reencrypt the firmware - no luck.
AFAIK, there is nothing illegal about wanting to modify the firmware for a device that *you* own (not everybody is trying to do something illegal with patched firmwares - there is such thing as homebrew), so there's no real reason why the procedure can't be publicized, even, as it is very likely, it requires having the actual hardware at hand. And please I am well aware that we're not dealing with Linux, that there's LZMA+Encryption from a separate chip on maincode (8051 based apparently) and, since I too have done some reverse engineering in my time, I'd appreciate if you can cut the "yet another newbie thinking he can be a hacker" condescending crap if you don't mind.
I'm not planning to spend my life trying to gain access to hardware that I own, especially as I don't care about card sharing and I don't even watch TV that much. But what I hate is knowing that I have a piece of equipment that I could run my own code on but just can't because even as OTHERS have already figured it out, they don't seem to want to share that information...
Is there a reason this stuff is kept under wraps? If not, where exactly is the ALi M3602 decryption, code injection and reencryption process, for Ferguson and clones with additional security chip, documented?
AFAIK, there is nothing illegal about wanting to modify the firmware for a device that *you* own (not everybody is trying to do something illegal with patched firmwares - there is such thing as homebrew), so there's no real reason why the procedure can't be publicized, even, as it is very likely, it requires having the actual hardware at hand. And please I am well aware that we're not dealing with Linux, that there's LZMA+Encryption from a separate chip on maincode (8051 based apparently) and, since I too have done some reverse engineering in my time, I'd appreciate if you can cut the "yet another newbie thinking he can be a hacker" condescending crap if you don't mind.
I'm not planning to spend my life trying to gain access to hardware that I own, especially as I don't care about card sharing and I don't even watch TV that much. But what I hate is knowing that I have a piece of equipment that I could run my own code on but just can't because even as OTHERS have already figured it out, they don't seem to want to share that information...
Is there a reason this stuff is kept under wraps? If not, where exactly is the ALi M3602 decryption, code injection and reencryption process, for Ferguson and clones with additional security chip, documented?