Results 1 to 10 of 103

Hybrid View

  1. #1
    Top Sony Team luzer's Avatar
    Join Date
    Nov 2006
    Device
    Kyocera 7135
    Posts
    72
    Thanks
    0
    Thanked 38 Times in 14 Posts
    Cruiser isn't unlocking DB2020 phones ... now or before.

    Quote Originally Posted by invNT View Post
    By other words, is bruteforcing the unlock code out of box (on PC) possible?
    No ... acording to DaVinci team, they are using a 6 Tflops cluster which isn't your average PC (even if is high end), a Tflop capable setup is actually a supercomputer like the ones used by NASA ...
    Last edited by luzer; 03-31-2007 at 11:17 PM.

  2. #2
    Recently Initiate
    Join Date
    Mar 2007
    Device
    v640i
    Posts
    18
    Thanks
    0
    Thanked 0 Times in 0 Posts
    Quote Originally Posted by luzer View Post
    No ... acording to DaVinci team, they are using a 6 Tflops cluster which isn't your average PC (even if is high end), a Tflop capable setup is actually a supercomputer like the ones used by NASA ...
    It won't bother me if i have to wait 5 days to decript the log un my 3.2GHz o/c-ed C2D CPU. But who will give me the app.

  3. #3
    Recently Initiate
    Join Date
    Mar 2007
    Device
    -
    Posts
    2
    Thanks
    0
    Thanked 0 Times in 0 Posts
    Quote Originally Posted by luzer View Post
    No ... acording to DaVinci team, they are using a 6 Tflops cluster which isn't your average PC (even if is high end), a Tflop capable setup is actually a supercomputer like the ones used by NASA ...
    I suspect that they attack the loader rather than NCK.
    If NSK is 16 decimal digits long we need 10GMIPS*(instruction_per_checking_the_NCK) to break it in 10 days.
    It can be realized e.g. with PLD hardware or distributed attack with
    help of the Internet community. So, the vital question is if the NCK checking code exposed in the firmware.

  4. #4
    Top Sony Team luzer's Avatar
    Join Date
    Nov 2006
    Device
    Kyocera 7135
    Posts
    72
    Thanks
    0
    Thanked 38 Times in 14 Posts
    Quote Originally Posted by invNT View Post
    I suspect that they attack the loader rather than NCK.
    If NSK is 16 decimal digits long we need 10GMIPS*(instruction_per_checking_the_NCK) to break it in 10 days.
    It can be realized e.g. with PLD hardware or distributed attack with
    help of the Internet community. So, the vital question is if the NCK checking code exposed in the firmware.
    Over new CIDs brute forcing isn't possible, maybe Iam wrong but looks like after each wrong try the phone get disconnected and after the third is locked.

Thread Information

Users Browsing this Thread

There are currently 1 users browsing this thread. (0 members and 1 guests)

Tags for this Thread

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •