
Gary
@garyodernichts
Doing mostly Wii U related reverse engineering and security stuff.
Fediverse: @[email protected]
Bluesky: garyodernichts.bsky.social
ID: 4662081257
https://github.com/GaryOderNichts 31-12-2015 07:03:35
115 Tweet
1,1K Followers
40 Following



While it was already possible to decrypt the Alarmo contents using the crypto interface on the device itself, I was able to extract the AES-128-CTR key! sha256(alarmo_content_key)=47238c47d21165fdb2f9a26c128e4b620a39139f6514588f5edb8a16397a9201 Shout outs to Mike Heskin and Spinda 🐲🦊🏳️🌈🏳️⚧️!



