Message from @SirW00f
Discord ID: 646225882041679872
any additional features are in a secondary chip
Buffer overflow somewhere continue to execute your code and overwrite existing code. (Tether)
which is why they can't update the os past a certain point
Once you run your code, start uart brute Force to understand other chip access.
Once you understand you can get the chips to tell you the keys themselves
Once you have the keys, you can sign your own firmware forever on that device
That's how I helped beat the ibm cell security
One of 8 people on the planet who can do it not under an nda. Military knows about me already and knows I'm not a threat, and a white hat so they leave me be
I only did it to control my own PS3.
I would never use that nefariously
Now they are being phased out anyway. So doesnt matter
https://unicornriot.ninja/2019/massive-hack-strikes-offshore-cayman-national-bank-and-trust/
Brute force for a 2048 bit encryption?
Sorry reading what was above posting a little late
I don’t think that’s possible in a single lifetime
was trying to explain it to somebody either here or on another server, some scif servers run old hardware that uses trite encoding schemes
basically any pc that has a parity system can run trite encoding/decoding schemes
trite is what 'quantum' claims to be
2048 is based upon binary, make it 3072 and u can do trite or trinary
but like i said, u need parity support in those systems to properly decode it
nearly all ram is 8-bit address cycling(8,16,32,64, ect)...except for parity ram 9-bit(9,18,36,72)
alot of the older systems were all 9-bit based parity bit processing ...the excuse was incase of a bad bit in the cycle
all consumer systems now are 8-bit address cycling(personal, commercial, server farms, industrial)
but only very restricted systems are 9-bit address cycling(saps, some gov systems, military)
A 3-state computing system?
His name was Seth Rich
i suggest u all dl the yt vid incase it vanishes
Done