Discussion:
83+ OS Signing Key Cracked!
(too old to reply)
"[Anon] Anon User" >
2009-10-16 00:52:08 UTC
Permalink
found on http://posts.kennethreitz.com/private/JDJnApflhy


August 17, 2009

Private Private Post
This post has a secret URL and not linked on your public blog. Send the secret URL to share it with anyone.
83+ OS Signing Key Cracked!

Yes, that's right, the 83+ OS public key has been cracked, enabling anyone to resign the TI-OS for the 83+/84+ series or sign their own OS without ANY other steps, making Free83P obsolete.

Benjamin Moody posted it on the United-TI forum, and here is the information in case the thread is deleted or something happens:

n=82EF4009ED7CAC2A5EE12B5F8E8AD9A0
AB9CC9F4F3E44B7E8BF2D57A2F2BEACE
83424E1CFF0D2A5A7E2E53CB926D61F3
47DFAA4B35B205B5881CEB40B328E58F
p=B709D3A0CD2FEC08EAFCCF540D8A100BB38E5E091D646ADB7B14D021096FFCD
q=B7207BD184E0B5A0B89832AA68849B29EDFB03FBA2E8917B176504F08A96246CB
e=11
d=4D0534BA8BB2BFA0740BFB6562E843C7
EC7A58AE351CE11D43438CA239DD9927
6CD125FEBAEE5D2696579FA3A3958FF4FC54C685EAA91723BC8888F292947BA1

(all numbers in hexadecimal and Big Endian)

This is very big, people. RSA factorization of the 83+ OS public key is something the TI community has been dreaming of for nearly a decade, and here are the magic numbers, finally.

To Ben or whoever made this possible (we don't have the full story yet), thank you very very very much.
1PW
2009-10-16 02:56:53 UTC
Permalink
Post by "[Anon] Anon User" >
found on http://posts.kennethreitz.com/private/JDJnApflhy
August 17, 2009
Private Private Post
This post has a secret URL and not linked on your public blog. Send the secret URL to share it with anyone.
83+ OS Signing Key Cracked!
Yes, that's right, the 83+ OS public key has been cracked, enabling anyone to resign the TI-OS for the 83+/84+ series or sign their own OS without ANY other steps, making Free83P obsolete.
n=82EF4009ED7CAC2A5EE12B5F8E8AD9A0
AB9CC9F4F3E44B7E8BF2D57A2F2BEACE
83424E1CFF0D2A5A7E2E53CB926D61F3
47DFAA4B35B205B5881CEB40B328E58F
p=B709D3A0CD2FEC08EAFCCF540D8A100BB38E5E091D646ADB7B14D021096FFCD
q=B7207BD184E0B5A0B89832AA68849B29EDFB03FBA2E8917B176504F08A96246CB
e=11
d=4D0534BA8BB2BFA0740BFB6562E843C7
EC7A58AE351CE11D43438CA239DD9927
6CD125FEBAEE5D2696579FA3A3958FF4FC54C685EAA91723BC8888F292947BA1
(all numbers in hexadecimal and Big Endian)
This is very big, people. RSA factorization of the 83+ OS public key is something the TI community has been dreaming of for nearly a decade, and here are the magic numbers, finally.
To Ben or whoever made this possible (we don't have the full story yet), thank you very very very much.
I guess what the OP is trying to convey is that if these $100USD
calculators can be hacked, PGP/GnuPG's safety is in immediate
jeopardy. Pity.
--
1PW
Loading...