trademark91 Wrote:c'mon team W*ldcard, this is your chance *crosses fingers*
LOL. That's not going to happen. Team W*ldcard broke up long ago. Some aren't even in the scene anymore...
Mr. Shizzy Wrote:trademark91 Wrote:c'mon team W*ldcard, this is your chance *crosses fingers*
LOL. That's not going to happen. Team W*ldcard broke up long ago. Some aren't even in the scene anymore...
i know. wishful thinking...
I'm nowhere near a good enough programmer to write a cfw, or I would.
W*ldcard really was a talented bunch. They actually reversed OE themselves, and DAX even confirmed that.
With DaRk_ALeX's blessing, they did officially release the reversed OE source code:
http://dl.qj.net/Team-Wildcard-OE-Revers.../catid/203
If someone was savvy enough, and wanted to make their own cfw; then looking that src over thoroughly would be a really good start for them.
Mr. Shizzy Wrote:I'm nowhere near a good enough programmer to write a cfw, or I would.
W*ldcard really was a talented bunch. They actually reversed OE themselves, and DAX even confirmed that.
With DaRk_ALeX's blessing, they did officially release the reversed OE source code:
http://dl.qj.net/Team-Wildcard-OE-Revers.../catid/203
If someone was savvy enough, and wanted to make their own cfw; then looking that src over thoroughly would be a really good start for them.
ill look at it. but, im kinda inexperienced at programming, so don't expect anything more than me looking at it. if i can find a few pplz who would work with me so i wasn't doing everything myself, i bet i could get something out.
Still, someone would have to figure out how to decrypt 6.00 first in order to make a CFW. Sure GEN decrypted it, but I doubt they'd tell anyone how they did it. I think it still uses the same encryption 5.55 uses, and I'm pretty sure 5.55 was decrypted.
I know PHP, not C++, unfortunately, but at least they're not too far apart.
The likelihood of a 6.00 cfw is pretty high, at least.
i know C++ and java, and UNIX, but that doesn't come in handy here
trademark91 Wrote:i know C++ and java, and UNIX, but that doesn't come in handy here
I'd say quite the opposite actually.
This sort of stuff requires a lot of disassembling knowledge and
experience. Learning ASM is not difficult, however making sense of it is another issue (actually, it's probably more time consuming rather than tricky). You'd probably start by examining the update modules to see how the PSAR is unpacked and follow through that. As I don't do much reverse engineering, there may be more efficient ways of doing this (ie attach a debugger?), but that's somewhat the gist of it.
I bet Kaz Hirai is laughing in his high chair right now :(
..like i said before in other threat..
Diabelski Chojrak Wrote:Can't wait to see a devhook on 5.00m33.. ^^
Diabelski Chojrak Wrote:..like i said before in other threat..
Diabelski Chojrak Wrote:Can't wait to see a devhook on 5.00m33.. ^^
that would be the ULTIMATE!