the other day, i went to the super market and found a bottle of wine, with a 50% rebate. What an amazing finding
It is a custom motherboard designed only for this specific purpose. MSI also make the custom motherboards that google uses in it's servers with the UPS battery controller and ports on them. Also, if they TC key is stored on the drive, why is there a black security key (like from the NAOMI) on the back? Or is that not a security key?
Which is terrible protection, you could easily make your own SSD that fakes all that. You might be able to just take off the delete permission from windows temp.
Sata is widely documented, sniffing the ATA password is always an option, regardless of the SSD they use. Its highly insecure from its design, as the password is in the system. Its doomed to fail from the start.
Thanks for clearing that up, I clearly had no idea its not like a PS3 game. Point is, the design is terrible. The keychip is pointless - its used to generate the keyfile to unlock the volume. This is written (and can be copied). In that case, you might as well do away with the keychip and just leave the file on the SSD all the time and rely on the hardware encryption - because if the hardware encryption falls (hotswap, sniffing, what ever) - the keychip is rendered pointless for protecting the key to unlock the truecrypt partition. I dont even know what you are arguing about anymore
You don't even have the system and start to speculate things here. Get system first, then talk. Idiot.
Decrypt truecrypt -> exe's then need cracking (as its a windows application). I am not saying the keychip isnt needed for the machine to run in its stock state and that its not checked or referenced (just to point out, my post above was very much specifically talking about the keychips role in protecting the contents of the truecrypt partition - not about it as a dongle the game executables, although I didnt make that very clear). You can do as much fancy crap generating the key from a hardware chip as you like - but if you then pass this as a parameter within the Windows OS where it can be copied trivially - its kinda pointless, which was my point. Anyway, then once you have the exes (via insecure method of hiding the data - ata passwords, passing password to truecrypt via parameters), it can/will be cracked - at that point the whole arcade part isnt really applicable, its just a windows application with a dongle style check. I dont need a machine to comment on that. I also dont need a machine to tell you relying on a ATA password that is IN THE MACHINE to unlock a disk ALSO in the machine is not secure. I have experience with cracking applications and information was posted above about the rest - which are repeats of attacks on this type of thing (ATA passwords, etc). tl;dr Is storing the password to the disk you want to unlock on the same machine as the disk a bad idea? Yes? - then its never going to be secure - at all. ATA passwords for IDE and SATA devices have to be sent in a certain way, which is interceptable. My point simplified, as it seems to be getting dragged out into something else.
Supplying an ATA password, be it local or via the internet isn't secure - that is my point. Using ATA passwords for something it wasnt designed = mistake. Simples. ATA passwords are only secure because the password and the device are separated. If they are together on the device, its not. Neither is supplying a password to truecrypt that is also on the device. The rest, I never said. So please do not put words in my mouth. But on a positive, id be interested in your contacts for decapping - have a few things id like to be able to read out.
Still you don't have the system, for example newer ring games have custom protector that works with the rootkits and only runs when everything is in order and only on original machine. You cannot attach debugger, most debuggers can't even see the process because of ring0 stuff, you cannot dump the process without ring0 methods and even then not easily, you cannot press alt+tab or use any key combination keys (Unless you know how to go around them). The windows protection is very complicated and strong, you are still just speculating here. It's not some jumps you patch to skip the dongle check. And it's not as simple as Taito Type X2 which was mostly a joke. I have unpacked hundreds of custom malware packers, Commercial protections: Securom (Yes with VM Redirects, Opcode VM, Constant Hook Stealer etc), SafeDisk(+Nanomites), ASProtect SKE(+VM) blablabla. And when I tell you newer sega games have good protection, it really does have it. Sure you can clone it but emulation and running on PC is pretty much impossible without deprotecting the binary and emulating entire MX drivers/libraries. I have already run Ring games on PC but it's gay, for example Melty Blood that I paid over 1000€ for I have ran on my PC. Get system, then come talk. This is why this information is not public because people who have no knowledge come to public and act like experts with no stripes.
Getting them to play on a PC wasnt the topic I was talking about. It was very specific about the role in the ATA password and that method being insecure. This is general PC stuff, no knowledge of the arcade machine is required to know how ATA passwords work and how insecure they are. The conversation was very focused on the hot swapping and ATA pasword - it got side tracked by other people, to which I replied with generalities and "speculation". However, I am failing to see where I am wrong: ATA passwords are insecure - yes If you get the contents, someone can/will crack them to run on windows - yes, your screenshot proves it. I really dont see whats the issue, I have said nothing incorrect. So I dont really think you calling me an idiot is exactly justified. tl;dr - why so aggressive
I never mentioned difficulty, just that it can/will be done. Which his screenshot shows is the case. This is getting seriously offtopic, over things that either I have not said or what I have said and is correct. Maybe we should get back on course? =/
When did I disagree with you? Unlocking the truecrypt partition the way it apparently does is also a weak point. But please point out where I said all this was easy.... Only thing I said they did wrong/badly is the whole sata password thing because they are reusing PC tech in a way its not really designed to be secure and the passing a truecrypt key via a way you can copy it. Maybe you should be quoting Serantes and moaning at him, rather than me.