D
Deleted member 11852
Guest
And AES, which is likely what is being used, is not susceptible to KPA attacks. But once you have the reference data (unencrypted from one PS4), you can hugely scale attacking the main algorithm. This is why you don't, ever, use a unique device key approach to encrypt easily accessible identical information. This is infsec 101.er...... you use ciphers which are not resistant to known plaintext attacks? It is not a good idea...
Maybe you should be more focused when reading articles. They format the HDD and reinstall everything. If it werent encrypted uniquely, why would you need to do it?
Perhaps you should be more focussed when reading the articles because you clearly still do not understand how the exploit works. You said it was using a "per device" key which it is clearly not because any encryption algorithm engineered to use a unique device key would only ever work on the original PS4 because the key isn't transferrable. Taking the Brazil approach, if you cloned the NAND and HDD and put them in another PS4, it would just appear to be corrupt data.
That would be the point.
Last edited by a moderator: