PDA

Visualizza Versione Completa : Team Rebug e il cfw 4.30



Prometheus_91
24-10-2012, 20:56
Team Rebug e il cfw 4.30


http://i.imgur.com/JgbAk.png



Il Famoso Team Rebug torna ha far parlare di se, dopo il cfw 3.55 , ha annuncito un nuovo cfw 4.30 e che verrà rilasciato molto presto dopo l'uscita del firmware 4.30 ( Già uscito quindi credo sia imminente ) questo cfw dichiarano che sarà la soluzione completa per tutti.



Le parole di Cyberskunk:

Noi del Team Rebug abbiamo trovato una solizione senza rischio di brik al 100% , tale modifica la stiamo testando da settembre, e possiamo confermare il funzionamento, e che rilascerò tutto dopo il rilascio del firmware 4.30.

Cloud1050
24-10-2012, 21:17
Non vedo l'ora!
Se è così non tocco neanche il cfw 4.25 rogero!!

MJomarDB
24-10-2012, 21:31
Io personalmente mi fido del team rebug!!!!ha fatto molto per la scena PS3!!!!
Dunque si vede che le chiavi del 4.21 sono uguali al 4.25 e 4.30!!!!;)

Prometheus_91
24-10-2012, 21:32
Non tiriamo conclusione.. ancora non ho trovato la fonte ufficiale..

MJomarDB
24-10-2012, 21:37
Non tiriamo conclusione.. ancora non ho trovato la fonte ufficiale..

Sì questa notizia si trova dappertutto!!!! poi è stato annunciato su ps3 crunch!!

Prometheus_91
24-10-2012, 21:43
Sì questa notizia si trova dappertutto!!!! poi è stato annunciato su ps3 crunch!!

sei sicuro? mandami il link in pm!

MJomarDB
24-10-2012, 21:48
sei sicuro? mandami il link in pm!

Questo è stato annunciato da Cyberskunk di conseguenza uno degli sviluppatori del team rebug in qualche sito anonimo!!!

Prometheus_91
24-10-2012, 21:49
Questo è stato annunciato da Cyberskunk di conseguenza uno degli sviluppatori del team rebug!!!

Questo lo so pure io... per ora e una notizia senza fonte ufficiale neanche nel loro sito c'e'.... quindi non era stata annunciata da ps3crunch? il link?


Edit: trovato!

Agrippa90
24-10-2012, 21:52
si ma senza le root key non possono farl installare su chi ha un fw 3.56+ (se poi riescono pure a trovare queste key , buon per tutti noi)

possono installarselo solo chi ha il 3.55 come al solito .

The Dark Butter
24-10-2012, 22:07
Beh, che dire........... CONFIDO IN LORO ALLORA!!!! :D

Agrippa90
24-10-2012, 22:25
non seguo i rebug , chi sà usare ps3devwiki già sà di cosa sto parlando , non ho bisogno di seguire le promesse dei team che la maggior parte non mantiene (non è questo il caso ma ci siam capiti)

Io non ho letto da nessuna parte delle root key , voi? questo permette l'installazione di cfw anche per chi ha un fw 3.56+

Ace
25-10-2012, 05:17
non seguo i rebug , chi sà usare ps3devwiki già sà di cosa sto parlando , non ho bisogno di seguire le promesse dei team che la maggior parte non mantiene (non è questo il caso ma ci siam capiti)

Io non ho letto da nessuna parte delle root key , voi? questo permette l'installazione di cfw anche per chi ha un fw 3.56+

La notizia è probabilmente vera ma è altrettanto vero quello che dici tu. Questo cfw sarà comunque per chi è al 3.55.

Mr Big
25-10-2012, 08:19
Una mia ipotesi,è che abbiano trovato e utilizzato un exploit su i fw superiori al 3.55,questo vorrebbe dire che per flashare la console,servirebbe un dongle.Ripeto però che questa è solo una mia ipotesi e null'altro.

BigBoss25
25-10-2012, 08:27
Io invece ipotizzo che hanno aggirato totalmente il problema dell'lv0 e Lv1 con qualcosa di brutale a livello hardware... qualcosa di univoco per tutti...

diabolik
25-10-2012, 08:51
Mi viene spontanea una domanda,ma funzioneranno i backup? Se si appena esce mi metto a ballare sul tavolo come Totò in miseria e nobiltà

Mr Big
25-10-2012, 08:56
Mi viene spontanea una domanda,ma funzioneranno i backup? Se si appena esce mi metto a ballare sul tavolo come Totò in miseria e nobiltà

In teoria si.

jiro180387
25-10-2012, 08:56
sul sito ufficiale non ci sono notizie à riguardo quindi questa notizia è da prendere con le pinzetta.

C@rlo
25-10-2012, 09:19
Mi viene spontanea una domanda,ma funzioneranno i backup? Se si appena esce mi metto a ballare sul tavolo come Totò in miseria e nobiltà
Di solito i cfw servono a questo...

Agrippa90
25-10-2012, 12:15
sul sito ufficiale non ci sono notizie à riguardo quindi questa notizia è da prendere con le pinzetta.

quoto

Ahl
25-10-2012, 13:56
sul sito ufficiale non ci sono notizie à riguardo quindi questa notizia è da prendere con le pinzetta.

veramente è stato Cyberskunk ha postarlo su ps3crunch, quindi le pinzette non servono :\
credo sia solo questione di giorni ^^

sid01993
25-10-2012, 13:57
dicono tutti che ha postato su ps3crunch!! ma io sono andato a vedere ma non ho trovato nulla!! qualcuno in PM mi invia per piacere il link.

lerrel
25-10-2012, 14:26
Scusate allora ha rilasciato?


Sent from my iPhone 4 using Tapatalk

Mr Big
25-10-2012, 14:29
no.

PowerLucaMito
25-10-2012, 14:31
Scusate allora ha rilasciato?


Sent from my iPhone 4 using Tapatalk

Tieni conto del fuso orario, secondo le sue parole dovrebbe rilasciare entro domani mattina

Prometheus_91
25-10-2012, 14:35
Tieni conto del fuso orario, secondo le sue parole dovrebbe rilasciare entro domani mattina


ma la finiamo di dire caz**** nessuno a detto che rilascia ha detto che ci vuole tempo io mi sono letto tutti i mess ben 49 pagine per trovarlo.. e non c'e' scritto quando ne dove..

Mr Big
25-10-2012, 14:37
Quotone.unsisi:

Prometheus_91
25-10-2012, 14:46
Spero questo vi chiarisca le idee io non vedo scritto niente di questo domani dopo domani fra un mese un anno oggi ecc ecc

http://i.imgur.com/zGhgQ.png

jiro180387
25-10-2012, 14:49
Finché non vedo un comunicato ufficiale sul sito codename rebug non credo ad una coppa.
Hanno un sito ufficiale non credo si fanno pubblicità. In un altri sito.

Prometheus_91
25-10-2012, 14:50
Finché non vedo un comunicato ufficiale sul sito codename rebug non credo ad una coppa.
Hanno un sito ufficiale non credo si fanno pubblicità. In un altri sito.

stesso per me se non avrò il pup fra le mani per me restano parole fallo capire a loro!

sid01993
25-10-2012, 14:56
ma se vai nel profilo suo in ps3crunch c'è la scritta donate al team rebug !! cliccandoci sopra si apre il sito ufficiale del team rebug dove puoi donare !! quindi penso che è realmente lui!!

Prometheus_91
25-10-2012, 14:57
ma se vai nel profilo suo in ps3crunch c'è la scritta donate al team rebug !! cliccandoci sopra si apre il sito ufficiale del team rebug dove puoi donare !! quindi penso che è realmente lui!!

sicuramente e lui! nessuno dice che non è lui ma sono parole.. la domanda è perchè postarlo li e non sul loro sito?

sid01993
25-10-2012, 15:00
forse appena lo rilascerà lo pubblicherà sul proprio sito!! forse non l'ha pubblicato sul suo sito per non avere pressione da parte degli utenti che lo frequentano!! questa è solo un idea...

Agrippa90
25-10-2012, 15:32
lol quindi non era cosi semplice fare un cfw 4.30 , mentre rogero ha dato un impressione diversa visto che in 10 min aveva compilato il .pup facendo da cavie gli utenti che lo scaricavano .

lerrel
25-10-2012, 15:36
Ma quindi non esce nessun cfw?


Sent from my iPhone 4 using Tapatalk

Agrippa90
25-10-2012, 15:43
Ma quindi non esce nessun cfw?


Sent from my iPhone 4 using Tapatalk


non si hanno date certe , un cfw richiede uno studio approfondito di tutti i file sbloccati a disposizione , Rogero ha messo in rete dei file molto rischiosi e a farne le spese sono gli utenti che hanno fretta di "provare"

lerrel
25-10-2012, 15:45
Ah io nn ho fretta perché nn ho modo di fare il downgrade.. Quindi mi tocca aspettare.. Una domanda sola.. Con una ps3 80 gb fat avrò problemi per installarlo?


Sent from my iPhone 4 using Tapatalk

Agrippa90
25-10-2012, 15:48
Ah io nn ho fretta perché nn ho modo di fare il downgrade.. Quindi mi tocca aspettare.. Una domanda sola.. Con una ps3 80 gb fat avrò problemi per installarlo?


Sent from my iPhone 4 using Tapatalk

non sappiamo ancora a chi è destinato il cfw

se è solamente per quelli con fw 3.55 oppure anche per chi ha ofw superiori.

lerrel
25-10-2012, 15:50
Ho trovato questo:

The first-stage bootloader is in ROM and has a per-console key which is effectively in tamper-resistant silicon. The second-stage bootloader (bootldr) is encrypted with the per-console key, but is not upgradable and is the same for all consoles (other than the encryption wrapper around it). This second-stage bootloader verifies lv0. Sony signed lv0 using the same broken process that they used for everything else, which leaks their private key. This means that the lv0 private key was doomed from the start, ever since we demonstrated the screwup at the Chaos Communication Congress two years ago.

However, because lv0 is also encrypted, including its signature block, we need that decryption key (which is part of bootldr) before we can decrypt the signature and apply the algorithm to derive the private key. We did this for several later-stage loaders by using an exploit to dump them, and Geohot did it for metldr (the “second root” in the PS3′s bizarre boot process) using a different exploit (we replicated this, although our exploit might be different). At the time, this was enough to break the security of all released firmware to date, since everything that mattered was rooted in metldr (which is bootldr’s brother and is also decrypted by the per-console key). However, Sony took a last ditch effort after that hack and wrapped everything after metldr into lv0, effectively using the only security they had left (bootldr and lv0) to attempt to re-secure their platform.

Bootldr suffers from the same exploit as metldr, so it was also doomed. However, because bootldr is designed to run from a cold boot, it cannot be loaded into a “sandboxed” SPU like metldr can from the comfort of OS-mode code execution (which we had via the USB lv2 exploit), so the exploit is harder to pull off because you don’t have control over the rest of the software. For the exploit that we knew about, it would’ve required hardware assistance to repeatedly reboot the PS3 and some kind of flash emulator to set up the exploit with varying parameters each boot, and it probably would’ve taken several hours or days of automated attempts to hit the right combination (basically the exploit would work by executing random garbage as code, and hoping that it jumps to somewhere within a segment that we control – the probabilities are high enough that it would work out within a reasonable timeframe). We never bothered to do this after the whole lawsuit episode.

Presumably, 18 months later, some other group has finally figured this out and either used our exploit and the hardware assistance, or some other equivalent trick/exploit, to dump bootldr. Once the lv0 decryption key is known, the signing private key can be computed (thanks to Sony’s epic failure).

The effect of this is essentially the same that the metldr key release had: all existing and future firmwares can be decrypted, except Sony no longer has the lv0 trick up their sleeve. What this means is that there is no way for Sony to wrap future firmware to hide it from anyone, because old PS3s must be able to use all future firmware (assuming Sony doesn’t just decide to brick them all…), and those old PS3s now have no remaining seeds of security that aren’t known. This means that all future firmwares and all future games are decryptable, and this time around they really can’t do anything about it. By extension, this means that given the usual cat-and-mouse game of analyzing and patching firmware, every current user of vulnerable or hacked firmware should be able to maintain that state through all future updates, as all future firmwares can be decrypted and patched and resigned for old PS3s. From the homebrew side, it means that it should be possible to have hombrew/linux and current games at the same time. From the piracy side, it means that all future games can be pirated. Note that this doesn’t mean that these things will be easy (Sony can obfuscate things to annoy people as much as their want), but from the fundamental security standpoint, Sony doesn’t have any security leg to stand on now.

It does not mean that current firmwares are exploitable. Firmware upgrades are still signed, so you need an exploit in your current firmware to downgrade. Also, newer PS3s presumably have fixed this (probably by using newer bootldr/metldrs as trust roots, and proper signing all along).

….

The keys are used for two purposes: chain of trust and chain of secrecy. The compromise of the keys fully compromises the secrecy of the PS3 platform permanently, as you can just follow the links down the chain (off-line, on a PC) and decrypt any past, current, or future firmware version. Current consoles must be able to use any future firmware update, and we now have access to 100% of the common key material of current PS3s, so it follows that any future firmware decryptable by current PS3s is also decryptable by anyone on a PC.

However, the chain of trust can be re-established at any point along the line that can be updated. The chain of trust is safely rooted in hardware that is near impossible to modify (i.e. the CPU’s ROM and eFuse key). The next link down the chain has been compromised (bootldr), and this link cannot be updated as it is specific to each console, so the chain of trust now has a permanent weak second link. However, the third link, lv0, can be updated as it is located in flash memory and signed using public key crypto. This allows Sony to secure the entire chain from there onwards. Unless you find a vulnerability in these updated links, you will not be able to attack them directly (applications, e.g. homebrew software, are verified much further down the chain). The only guaranteed way to break the chain is to attack the weak link directly, which means using a flash writer to overwrite lv0. Once you do so, the entire chain collapses (well, you still need to do some work to modify every subsequent link to turn off security, but that is easy). If you have old firmware, you have at least some other weak links that, when compromised, allow you direct access to break the bootldr link (replacing lv0), but if you run up to date firmware you’re out of luck unless you can find a weakness or you use hardware.

Old PS3s are now in the same boat as an old Wii, and in fact we can draw a direct comparison of the boot process. On an old Wii, boot0 (the on-die ROM) securely loads boot1 from flash, which is securely checked against an eFuse hash, and boot1 loads boot2 but insecurely checks its signature. On an old PS3, the Cell boot ROM securely loads bootldr from flash, which is securely decrypted and checked using an eFuse key, and then bootldr loads lv0 but checks its signature against a hardcoded public key whose private counterpart is now known. In both cases, the system can be persistently compromised if you can write to flash, or if you already have code execution in system context (which lets you write to flash). However, in both cases, you need to use some kind of high-level exploit to break into the firmware initially, particularly if you have up-to-date firmware. It just happens that this is trivial on the Wii because there is no game patch system and Nintendo seems to have stopped caring, while this is significantly harder on the PS3 because the system software has more security layers and there is a game patch system.

….

The name is presumably wrong – they would be the bootldr keys, as the keyset is considered to “belong” to the entity that uses those keys to check and decrypt the next thing down the chain – just like the metldr keys are the keys metldr uses to decrypt and verify other *ldrs, the bootldr keys are the keys bootldr uses to decrypt and verify lv0.

Anyway, you’re confusing secrecy with trust. These keys let you decrypt any future firmware; as you say, if they were to “fix” that, that would mean new updates would not work on older machines. However, decrypting firmware doesn’t imply that you can run homebrew or anything else. It just means you can see the firmware, not actually exploit it if you’re running it.

The only trust that is broken by this keyset (assuming they are the bootldr keys) is the trust in lv0, the first upgradable component in the boot process (and both it and bootldr are definitely software, not hardware, but bootldr is not upgradable/replaceable so this cannot be fixed). This means that you can use them to sign lv0. Period. Nothing more, nothing less. The only things that these keys let you modify is lv0. In order to modify anything else, you have to modify everything between it and lv0 first. This means that these keys are only useful if you have write access to lv0, which means a hardware flasher, or an already exploited console, or a system exploit that lets you do so.

….

Oh, one more thing. I’m assuming that these keys actually should be called the bootldr keys (as in the keys that bootldr uses to verify lv0), and that the name “lv0″ is just a misnomer (because lv0 is, itself, signed using these keys).

If this keyset is just what Sony introduced in lv0 after the original hack, and they are used to sign everything *under* lv0 and that is loaded *by* lv0, then this whole thing is not newsworthy and none of what I said applies. It just means that all firmwares *to date* can be decrypted. Sony will replace this keyset and update lv0 and everything will be back at step 1 again. lv0 is updatable, unlike bootldr, and is most definitely not a fixed root of trust (unlike metldr, which was, until the architecture hack/change wrapped everything in lv0). If this is the case, color me unimpressed.

…..

by marcansoft on Wednesday October 24, @01:04AM (#41748707) Attached to: PS3 Encryption Keys Leaked

Nevermind, I just checked. They are indeed the bootldr keys (I was able to decrypt an lv0 with them). Consider this confirmation that the story is not fake.


Sent from my iPhone 4 using Tapatalk

Gory
25-10-2012, 15:59
Ho trovato questo:

The first-stage bootloader is in ROM and has a per-console key which is effectively in tamper-resistant silicon. The second-stage bootloader (bootldr) is encrypted with the per-console key, but is not upgradable and is the same for all consoles (other than the encryption wrapper around it). This second-stage bootloader verifies lv0. Sony signed lv0 using the same broken process that they used for everything else, which leaks their private key. This means that the lv0 private key was doomed from the start, ever since we demonstrated the screwup at the Chaos Communication Congress two years ago.

However, because lv0 is also encrypted, including its signature block, we need that decryption key (which is part of bootldr) before we can decrypt the signature and apply the algorithm to derive the private key. We did this for several later-stage loaders by using an exploit to dump them, and Geohot did it for metldr (the “second root” in the PS3′s bizarre boot process) using a different exploit (we replicated this, although our exploit might be different). At the time, this was enough to break the security of all released firmware to date, since everything that mattered was rooted in metldr (which is bootldr’s brother and is also decrypted by the per-console key). However, Sony took a last ditch effort after that hack and wrapped everything after metldr into lv0, effectively using the only security they had left (bootldr and lv0) to attempt to re-secure their platform.

Bootldr suffers from the same exploit as metldr, so it was also doomed. However, because bootldr is designed to run from a cold boot, it cannot be loaded into a “sandboxed” SPU like metldr can from the comfort of OS-mode code execution (which we had via the USB lv2 exploit), so the exploit is harder to pull off because you don’t have control over the rest of the software. For the exploit that we knew about, it would’ve required hardware assistance to repeatedly reboot the PS3 and some kind of flash emulator to set up the exploit with varying parameters each boot, and it probably would’ve taken several hours or days of automated attempts to hit the right combination (basically the exploit would work by executing random garbage as code, and hoping that it jumps to somewhere within a segment that we control – the probabilities are high enough that it would work out within a reasonable timeframe). We never bothered to do this after the whole lawsuit episode.

Presumably, 18 months later, some other group has finally figured this out and either used our exploit and the hardware assistance, or some other equivalent trick/exploit, to dump bootldr. Once the lv0 decryption key is known, the signing private key can be computed (thanks to Sony’s epic failure).

The effect of this is essentially the same that the metldr key release had: all existing and future firmwares can be decrypted, except Sony no longer has the lv0 trick up their sleeve. What this means is that there is no way for Sony to wrap future firmware to hide it from anyone, because old PS3s must be able to use all future firmware (assuming Sony doesn’t just decide to brick them all…), and those old PS3s now have no remaining seeds of security that aren’t known. This means that all future firmwares and all future games are decryptable, and this time around they really can’t do anything about it. By extension, this means that given the usual cat-and-mouse game of analyzing and patching firmware, every current user of vulnerable or hacked firmware should be able to maintain that state through all future updates, as all future firmwares can be decrypted and patched and resigned for old PS3s. From the homebrew side, it means that it should be possible to have hombrew/linux and current games at the same time. From the piracy side, it means that all future games can be pirated. Note that this doesn’t mean that these things will be easy (Sony can obfuscate things to annoy people as much as their want), but from the fundamental security standpoint, Sony doesn’t have any security leg to stand on now.

It does not mean that current firmwares are exploitable. Firmware upgrades are still signed, so you need an exploit in your current firmware to downgrade. Also, newer PS3s presumably have fixed this (probably by using newer bootldr/metldrs as trust roots, and proper signing all along).

….

The keys are used for two purposes: chain of trust and chain of secrecy. The compromise of the keys fully compromises the secrecy of the PS3 platform permanently, as you can just follow the links down the chain (off-line, on a PC) and decrypt any past, current, or future firmware version. Current consoles must be able to use any future firmware update, and we now have access to 100% of the common key material of current PS3s, so it follows that any future firmware decryptable by current PS3s is also decryptable by anyone on a PC.

However, the chain of trust can be re-established at any point along the line that can be updated. The chain of trust is safely rooted in hardware that is near impossible to modify (i.e. the CPU’s ROM and eFuse key). The next link down the chain has been compromised (bootldr), and this link cannot be updated as it is specific to each console, so the chain of trust now has a permanent weak second link. However, the third link, lv0, can be updated as it is located in flash memory and signed using public key crypto. This allows Sony to secure the entire chain from there onwards. Unless you find a vulnerability in these updated links, you will not be able to attack them directly (applications, e.g. homebrew software, are verified much further down the chain). The only guaranteed way to break the chain is to attack the weak link directly, which means using a flash writer to overwrite lv0. Once you do so, the entire chain collapses (well, you still need to do some work to modify every subsequent link to turn off security, but that is easy). If you have old firmware, you have at least some other weak links that, when compromised, allow you direct access to break the bootldr link (replacing lv0), but if you run up to date firmware you’re out of luck unless you can find a weakness or you use hardware.

Old PS3s are now in the same boat as an old Wii, and in fact we can draw a direct comparison of the boot process. On an old Wii, boot0 (the on-die ROM) securely loads boot1 from flash, which is securely checked against an eFuse hash, and boot1 loads boot2 but insecurely checks its signature. On an old PS3, the Cell boot ROM securely loads bootldr from flash, which is securely decrypted and checked using an eFuse key, and then bootldr loads lv0 but checks its signature against a hardcoded public key whose private counterpart is now known. In both cases, the system can be persistently compromised if you can write to flash, or if you already have code execution in system context (which lets you write to flash). However, in both cases, you need to use some kind of high-level exploit to break into the firmware initially, particularly if you have up-to-date firmware. It just happens that this is trivial on the Wii because there is no game patch system and Nintendo seems to have stopped caring, while this is significantly harder on the PS3 because the system software has more security layers and there is a game patch system.

….

The name is presumably wrong – they would be the bootldr keys, as the keyset is considered to “belong” to the entity that uses those keys to check and decrypt the next thing down the chain – just like the metldr keys are the keys metldr uses to decrypt and verify other *ldrs, the bootldr keys are the keys bootldr uses to decrypt and verify lv0.

Anyway, you’re confusing secrecy with trust. These keys let you decrypt any future firmware; as you say, if they were to “fix” that, that would mean new updates would not work on older machines. However, decrypting firmware doesn’t imply that you can run homebrew or anything else. It just means you can see the firmware, not actually exploit it if you’re running it.

The only trust that is broken by this keyset (assuming they are the bootldr keys) is the trust in lv0, the first upgradable component in the boot process (and both it and bootldr are definitely software, not hardware, but bootldr is not upgradable/replaceable so this cannot be fixed). This means that you can use them to sign lv0. Period. Nothing more, nothing less. The only things that these keys let you modify is lv0. In order to modify anything else, you have to modify everything between it and lv0 first. This means that these keys are only useful if you have write access to lv0, which means a hardware flasher, or an already exploited console, or a system exploit that lets you do so.

….

Oh, one more thing. I’m assuming that these keys actually should be called the bootldr keys (as in the keys that bootldr uses to verify lv0), and that the name “lv0″ is just a misnomer (because lv0 is, itself, signed using these keys).

If this keyset is just what Sony introduced in lv0 after the original hack, and they are used to sign everything *under* lv0 and that is loaded *by* lv0, then this whole thing is not newsworthy and none of what I said applies. It just means that all firmwares *to date* can be decrypted. Sony will replace this keyset and update lv0 and everything will be back at step 1 again. lv0 is updatable, unlike bootldr, and is most definitely not a fixed root of trust (unlike metldr, which was, until the architecture hack/change wrapped everything in lv0). If this is the case, color me unimpressed.

…..

by marcansoft on Wednesday October 24, @01:04AM (#41748707) Attached to: PS3 Encryption Keys Leaked

Nevermind, I just checked. They are indeed the bootldr keys (I was able to decrypt an lv0 with them). Consider this confirmation that the story is not fake.


Sent from my iPhone 4 using Tapatalk
Riassuntino? :asd:

jiro180387
25-10-2012, 16:07
io l'inglese lo conosco come il mandarino (non il Frutto).

potete tradurlo in modo chiaro e non alla google?

lerrel
25-10-2012, 16:11
Comunque alla fine c'è scritto che nn è un fake..


Sent from my iPhone 4 using Tapatalk

Mr Big
25-10-2012, 16:23
Che non sia un fake ci credo anche,ma al momento non c é neanche un cfw,c è solo un annuncio.

Inviato dal mio GT-S5570 con Tapatalk 2

IceMan
25-10-2012, 16:33
Che non sia un fake ci credo anche,ma al momento non c é neanche un cfw,c è solo un annuncio.

Inviato dal mio GT-S5570 con Tapatalk 2

Ecco...no cfw no party...possono annunciare quanto vogliono ma se non rilasciano niente non serve a niente...

Mr Big
25-10-2012, 16:45
Ecco...no cfw no party...possono annunciare quanto vogliono ma se non rilasciano niente non serve a niente...

;)

Inviato dal mio GT-S5570 con Tapatalk 2

Ace
25-10-2012, 16:48
Bisogna aspettare, avere fiducia ma con delle riserve.

IceMan
25-10-2012, 16:55
Bisogna aspettare, avere fiducia ma con delle riserve.

Fidarsi è bene, non fidarsi è meglio... :P

Ace
25-10-2012, 17:01
Sempre :unsisi:

Belmont
25-10-2012, 17:35
aiuto, è ricominciato il periodo annunci di cfw come l anno scorso...?

IceMan
25-10-2012, 17:39
Si sembra di si...ora o rilasciano decine di cfw oppure la maggior parte si riveleranno annunci falsi...

jiro180387
25-10-2012, 17:47
vorrei solo dire la mia sul team rebug, hanno dato anche loro un contributo con il loro cfw rebug ,quindi credo che se realmente abbiano in programma un cfw 4.30 , lo rilasceranno tanto con comunicato ufficiale sul loro sito quindi nulla di tanto complicato.
è inutile pensare se sia fake o meno questo team è conosciuto e non credo che si sporchi la faccia con un annuncio che poi non possono mantenere.

Belmont
25-10-2012, 17:50
hai ragione jiro, ma io ho imparato a non fidarmi più, a meno di prove (almeno in ambito cfw..)

Ace
25-10-2012, 18:01
vorrei solo dire la mia sul team rebug, hanno dato anche loro un contributo con il loro cfw rebug ,quindi credo che se realmente abbiano in programma un cfw 4.30 , lo rilasceranno tanto con comunicato ufficiale sul loro sito quindi nulla di tanto complicato.
è inutile pensare se sia fake o meno questo team è conosciuto e non credo che si sporchi la faccia con un annuncio che poi non possono mantenere.

Infatti è quello che credo anche io sul loro conto,semplicemente volevo dire di non eccitarsi troppo e aspettare con pazienza.

Mr Big
25-10-2012, 18:05
:unsisi: