0 Members and 2 Guests are viewing this topic.
I bought a CX recently with 3.0.1
Quote from: Goplat on March 23, 2011, 04:30:27 pmQuote from: mikehill2003 on March 23, 2011, 01:33:27 pmUnfortunately, as someone who enjoys taking things apart to learn how they work, I am still somewhat interested in the CAS+. Does anyone know if the OS is encrypted (on the NAND Flash)? Has anyone tried to directly dump the OS from it?If the CAS+ is anything like the released TI-Nspire/TI-Nspire CAS, then the OS is encrypted but the encryption key is present in the second-stage boot loader, which is merely compressed (and we can easily decompress it).However, I don't think anybody has tried to dump the NAND flash by means of hardware hacking; I didn't know that was even feasible.Well, I don't own an Nspire CAS(+ or not) yet, so I can't say for sure if it is feasible on an Nspire, but it has worked just fine for me on many other NAND Flash chips. Give me a few minutes and I'll find a simple tutorial.This guy used an xD card reader. Simple ('cause xD cards are raw NAND in an expensive package) but it works pretty well. xD cards are pretty useful because you can use them to make a second, removable NAND. (Warning: Because the card reader contains the NAND controller chip, not all card readers work.)http://busydizzys.com/index.php/2010/12/24/reading-embedded-flash-chips-nand-tsop-without-removalSoldering this stuff is somewhat difficult. A microscope, steady hand, and hot glue really help.
Quote from: mikehill2003 on March 23, 2011, 01:33:27 pmUnfortunately, as someone who enjoys taking things apart to learn how they work, I am still somewhat interested in the CAS+. Does anyone know if the OS is encrypted (on the NAND Flash)? Has anyone tried to directly dump the OS from it?If the CAS+ is anything like the released TI-Nspire/TI-Nspire CAS, then the OS is encrypted but the encryption key is present in the second-stage boot loader, which is merely compressed (and we can easily decompress it).However, I don't think anybody has tried to dump the NAND flash by means of hardware hacking; I didn't know that was even feasible.
Unfortunately, as someone who enjoys taking things apart to learn how they work, I am still somewhat interested in the CAS+. Does anyone know if the OS is encrypted (on the NAND Flash)? Has anyone tried to directly dump the OS from it?