• 0 Posts
  • 156 Comments
Joined 2 years ago
cake
Cake day: April 13th, 2024

help-circle




  • Yeah agreed especially further down when it’s just randomly rehashing old history. It’s also mixing up decryption and verification even in the beginning of the article. First they write:

    BootROM (Level 0): The CPU runs code burned into it at the factory. This code is immutable (cannot be changed). It uses the ROM Keys to verify the signature of the next loader.

    Then just two paragraphs below:

    The ROM Keys change everything. With these keys, hackers can decrypt the Level 1 Bootloader.

    So which is it? Usually bootloaders in a chain hash the next stage. That hash is compared with the signed hash the stage presents, and the signature on the signed hash is cryptographically verified against the locally stored trusted keys. No encryption or decryption takes place. Maybe this is different for the PS5 but then that would be noteworthy, not something you just assume readers to know.
















  • But it does say right on that page:

    Take note that the network request logger in uBO is a forward-looking logger: this means only future requests can be logged.

    In the spirit of efficiency, uBO will log entries IF AND ONLY IF the logger is opened. Otherwise, if the logger is not opened, no CPU/memory resources are consumed by uBO for logging purpose.