QUOTE(armyof1ne @ Nov 5 2009, 03:34 PM) *
Are you saying that its not feasible that *Without changing the internal architecture* that they cant find the firmware version at all? If a computer can do it... They can make an software emulation of a computer that could read the firmware just not dump it or anything... I think this is a possibility, unfortunetly with everything being encrypted to high hell on the Mobo.. it would be hard to figure just how these consoles are being detected, They arent doing random shots in the dark, There is a method to their madness... The obvious thought is unstealthed games, things of that nature... But because numbers dont jive(Between people doing legit backups and knowin wtflark is up vs the people that dont)... I believe a dormant Emulation proggy was loaded via older update and captured data(Including dvd serials and product_Id numbers and even the firmware version things like that)... a program running in the background hidden is extremely easy to make... Since they know all the encryption and everything else, it would be a million times easier for them to make vs peeps here who cant crack it completely yet......
BenJeremy: Well, I could just ask you to defer to my user number, moderator status, and reputation, but that would be petty of me, heh heh.
The reality is that in order to bypass firmguard, you have to cycle power. The Xbox 360 console is not designed to do this. The test/debug mode that the optical drive makers kept in their firmware, which enables us to read the firmware (well, not any longer, since drives made from August on) is designed for a QA /refurb department, with human intervention and specialized equipment. There are even reasons only certain chipsets work with this. The console hardware simply is not equipped to get around Firmguard. The whole "feature" was intended to defeat anybody from reading the drive once flashed (it just had lots of holes that could be exploited with a PC, the right chipset, and human intervention).
Beyond all that, people like C4Eva know the firmware inside and out... and they have tools to monitor traffic across the SATA connection. In other words, they know EXACTLY what is possible for the console to query to the drive, and what the responses should be. **EVEN IF** Microsoft started using a different query from the ones they've used in the past, those bases have already been covered (even so, we'd have heard about it on the news page - every dash update gets scrutinized by C4Eva and probably a hundred others in the scene).
Bookmarks