From 82b9015445fc9aa5c74f3c7ab44f21777a9f910a Mon Sep 17 00:00:00 2001 From: astravaganza <83530103+astravaganza@users.noreply.github.com> Date: Mon, 3 Mar 2025 03:17:25 +0530 Subject: [PATCH] Update README.md --- README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/README.md b/README.md index 95020b1..53b07b2 100644 --- a/README.md +++ b/README.md @@ -1,5 +1,5 @@ # replayready Python port of the wrapping mechanism used for "encrypting" the ECC keys to a playready model certificate from the Playready PK. -Nothing particularly special but worth noting that several OEMs use the same hardcoded keys from the Porting Kit for respective implementations. As a result, the `zgpriv_protected.dat` (48 byte) keys can be decrypted by this method without ever actually getting into the TEE. +Nothing particularly special but worth noting that several OEMs use the same hardcoded keys from the Porting Kit for respective implementations. As a result, the `zgpriv_protected.dat` (48 byte) keys from TV dumps and even firmwares can be decrypted by this method without ever actually getting into the TEE. Sharing since a lot of SL3000 certificates have already been made public. Many of which were obtained through the same method.