Amarbir[CDR-Labs] wrote:
Doomer wrote:
1. LBA sectors are not written sequentially
2. Encryption is AES-XTS that uses LBA number (not PBA number) to encrypt data, if LBA sector number is mismatched then data will not be decrypted
3. This model uses keys from CPU to decrypt user data, so the only way to decrypt the data is to read it, by original LBA numbers, with original PCB
4. Because original T2 is gone you cannot read original LBAs using non-original T2
5. I can still recover this case if you want to outsource.
Doomer Sir ,
I ver 7.2 of PC3K Tool they have added the capability to generate Mod 190 is this kinda stuff possible now with cpu encrypted drives .Because now we do not need to access drive in pba mode imho
In Demo video they exampled only Palmer which has no Unique encryption in MCU. So that will work. But in charger in this case there is unique key in MCU and decryption will good with correct lba.
In PC3K they create T2 with linear Method that means they are arranging PBA sectors by considering Defects and generate T2 in Linear Method. It is nothing but we access sectors in PBA in the name of Linear LBA Scheme but it is not original LBA. so decryption my not good.
The above is only my observation , May be my view is wrong.