02-09-2016, 08:44 AM
jai trouver ca en anglais et je pense que oursonnet avez utiliser cette methode :
the format is pretty much the same between the ITA files and the storio bin files.
When downloaded they are encrypted with a key, which is unique to each device. To decrypt the files, they need to be decrypted with the key from the device they were downloaded on.
For instance to decrypt an innotab ITA file on the innotab it was downloaded on you would do something like this..
TARGET_PATH=/vp_mnt/sd/LLN/APPS/Games/58-126803-300-051.ita
MOUNT_POINT=/vp_mnt/app_bin
mkdir -p $MOUNT_POINT
vmount -d /dev/loop7
lmaid "$TARGET_PATH" /dev/loop7 $MOUNT_POINT
cp -r /vp_mnt/app_bin /vp_mnt/sd/LLN/dump/app_bin
Cartridges are also encrypted the same way, but they use a "common" key, that is shared between devices.
So.. its probably not going to be very easy to decrypt the storio1 books and run them on your storio2.
I know that is it possible to do
but even if you get them to run there is an icon missing for to go back to the main menu.
The innotab2 or storio2 versions are exactly the same anyway
but with the added icons.
the format is pretty much the same between the ITA files and the storio bin files.
When downloaded they are encrypted with a key, which is unique to each device. To decrypt the files, they need to be decrypted with the key from the device they were downloaded on.
For instance to decrypt an innotab ITA file on the innotab it was downloaded on you would do something like this..
TARGET_PATH=/vp_mnt/sd/LLN/APPS/Games/58-126803-300-051.ita
MOUNT_POINT=/vp_mnt/app_bin
mkdir -p $MOUNT_POINT
vmount -d /dev/loop7
lmaid "$TARGET_PATH" /dev/loop7 $MOUNT_POINT
cp -r /vp_mnt/app_bin /vp_mnt/sd/LLN/dump/app_bin
Cartridges are also encrypted the same way, but they use a "common" key, that is shared between devices.
So.. its probably not going to be very easy to decrypt the storio1 books and run them on your storio2.
I know that is it possible to do

The innotab2 or storio2 versions are exactly the same anyway
