PS3Dec is a ISO encryptor/decryptor for PS3 disc images I found when looking for a JB folder to ISO package for Linux. I am curious how it works.
Tutorials I found online say you require a dkey and a post on PSX-Place mentions
The disk key is stored on the game disk and read by the PS3 when the game starts, without this key it is not possible to decrypt the game data. If the PS3 cannot decrypt the data correctly you will see the 80010017 error just after the game starts.
Are these keys acquired by running the game on the PS3 and somehow intercepting them?
If anyone could explain how it works or link me to a video or forum that does I’d appreciate it. All I have really been able to find are tutorials on how to do it.
Even just knowing how game ripping works with other consoles would be neat. I imagine ripping and decrypting WiiU games works in a similar way.
From what I remember (over 10 years ago, mind), the key exists outside the normal area of the blueray disk data to prevent disk copies. Some Blueray devices can read that sector but it requires custom and undocumented scsi commands.
Not sure what exactly those scsi commands are but after you get data1 you would encrypt it with AES CBC and the ps3 secret/iv to get the binary data to decrypt the rest of the encrypted sectors with AES CBC.
https://www.psdevwiki.com/ps3/Bluray_disc#"Data1"_and_"Data2" https://www.psdevwiki.com/ps3/Bluray_disc#Deriving_the_disc_key
deleted by creator
I’m not looking for the keys. I am wondering how they were obtained.
The two links I posted were for the GitHub page and PSX-Place. Both are legitimate websites. Even disabling my ad blocker I’m not seeing an excessive amount of ads so I’m not sure what you are referring to.
It’s kind of a moot point to encrypt your keys when they have to be unencrypted to run. It was all over when they got root access to the PS3. Just as simple as copying a file at that point.
That’s what I am trying to understand. Is that how they were acquired? Did they intercept them somehow?
It was all over when they got root access to the PS3. Just as simple as copying a file at that point.
Is that how programs like MultiMAN work? Wait for the game to become decrypted then copy it to a folder which can then be used to make a decrypted ISO file if that’s what the user wants?
I’m sure that Sony didn’t invent a new method of encryption/decryption. Likely there’s a key pair, and when found it was a simple matter of reversing the extra stuff on top. For MultiMAN it’s on the system already so they can just patch into the system hooks to do it the regular way.
I’d be curious to see more information on the reverse engineering aspect. I feel like that’s something a YouTuber like ModernVintageGamer would have covered
https://rdist.root.org/2010/01/27/how-the-ps3-hypervisor-was-hacked/ for some details on the initial hack.
https://www.psdevwiki.com/ps3/ for all the resources and technical details.
Look at File Formats to get info on packages from disks like PSARC or PKG for digital files. Everything you would ever want to know should be there.
The only way 2 people can keep a secret is if one of them is dead.