From 24ee589e0cd8cb97810c998349efbe94da06591c Mon Sep 17 00:00:00 2001 From: astravaganza <83530103+astravaganza@users.noreply.github.com> Date: Mon, 3 Mar 2025 03:28:23 +0530 Subject: [PATCH] Grammar --- README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/README.md b/README.md index 53b07b2..b2b2dec 100644 --- a/README.md +++ b/README.md @@ -1,5 +1,5 @@ # replayready Python port of the wrapping mechanism used for "encrypting" the ECC keys to a playready model certificate from the Playready PK. -Nothing particularly special but worth noting that several OEMs use the same hardcoded keys from the Porting Kit for respective implementations. As a result, the `zgpriv_protected.dat` (48 byte) keys from TV dumps and even firmwares can be decrypted by this method without ever actually getting into the TEE. +Nothing particularly special but worth noting that several OEMs use the same hardcoded keys from the Porting Kit for their respective implementations. As a result, the `zgpriv_protected.dat` (48 byte) keys from some TV dumps and even firmwares can be decrypted by this method without ever actually getting into the TEE. Sharing since a lot of SL3000 certificates have already been made public. Many of which were obtained through the same method.