<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://wiki.hackmanhattan.com/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=LNRC</id>
	<title>Hack Manhattan Wiki - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://wiki.hackmanhattan.com/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=LNRC"/>
	<link rel="alternate" type="text/html" href="https://wiki.hackmanhattan.com/Special:Contributions/LNRC"/>
	<updated>2026-05-17T13:14:22Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.40.1</generator>
	<entry>
		<id>https://wiki.hackmanhattan.com/index.php?title=Meeting_2026-01-28&amp;diff=9557</id>
		<title>Meeting 2026-01-28</title>
		<link rel="alternate" type="text/html" href="https://wiki.hackmanhattan.com/index.php?title=Meeting_2026-01-28&amp;diff=9557"/>
		<updated>2026-01-29T00:33:28Z</updated>

		<summary type="html">&lt;p&gt;LNRC: /* Treasurer's Report */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Meetings are conducted according to [[MIBS_Rules]].&lt;br /&gt;
&lt;br /&gt;
==Approve Minutes==&lt;br /&gt;
&lt;br /&gt;
==Consensus Agenda==&lt;br /&gt;
* Reimburse Robin $52.53 for 75 Soldering class PCBs (6-9 months worth of supply)&lt;br /&gt;
* Spend up to $120 on bulbs, ballasts, and other necessary components such as connectors to repair the overhead lighting in the space&lt;br /&gt;
&lt;br /&gt;
==Member Reports==&lt;br /&gt;
=== Board Reports===&lt;br /&gt;
====President's Report====&lt;br /&gt;
* No report.&lt;br /&gt;
====Treasurer's Report====&lt;br /&gt;
* We are breaking even&lt;br /&gt;
&lt;br /&gt;
====Secretary's Report====&lt;br /&gt;
* No report.&lt;br /&gt;
====Directors-at-Large's Report====&lt;br /&gt;
* No report.&lt;br /&gt;
===Member and Project Reports===&lt;br /&gt;
&lt;br /&gt;
== Old Business ==&lt;br /&gt;
&lt;br /&gt;
== New Business ==&lt;br /&gt;
&lt;br /&gt;
===Sponsored Members Induction===&lt;br /&gt;
For each prospective member, please confirm no later than Thursday before the meeting:&lt;br /&gt;
&lt;br /&gt;
* Has the member visited 3 times at the regular Tuesday and Thursday open nights?&lt;br /&gt;
* Has the member received the briefing? When, and who was the briefer?&lt;br /&gt;
* Has the member's bio and photo been circulated on the members list? (not just Discord)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Meeting Meta==&lt;br /&gt;
* Members in Attendance: member1, member2 | latemember1&lt;br /&gt;
* Visitors: visitor1, visitor2&lt;br /&gt;
* Called to order at 23:59 by MEMBER.&lt;br /&gt;
* The meeting was adjourned at 23:59 by MEMBER.&lt;br /&gt;
* Minutes taken and submitted by MEMBER.&lt;br /&gt;
&lt;br /&gt;
[[Category:Meetings]]&lt;/div&gt;</summary>
		<author><name>LNRC</name></author>
	</entry>
	<entry>
		<id>https://wiki.hackmanhattan.com/index.php?title=Meeting_2025-11-26&amp;diff=9539</id>
		<title>Meeting 2025-11-26</title>
		<link rel="alternate" type="text/html" href="https://wiki.hackmanhattan.com/index.php?title=Meeting_2025-11-26&amp;diff=9539"/>
		<updated>2025-11-26T20:03:09Z</updated>

		<summary type="html">&lt;p&gt;LNRC: /* Treasurer's Report */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Meetings are conducted according to [[MIBS_Rules]].&lt;br /&gt;
&lt;br /&gt;
==Approve Minutes==&lt;br /&gt;
&lt;br /&gt;
==Consensus Agenda==&lt;br /&gt;
* Approve purchase of a barely used (one or two prints) Prusa Mini + for $140 to have another small reliable printer available and cut down wait times/print backlog. (Peter found someone selling one for cheap and bought, will resell to Hack at same price.)&lt;br /&gt;
&lt;br /&gt;
* Approve up to $500 for purchase of a new sewing machine. Model tbd.&lt;br /&gt;
&lt;br /&gt;
==Member Reports==&lt;br /&gt;
=== Board Reports===&lt;br /&gt;
====President's Report====&lt;br /&gt;
* No report.&lt;br /&gt;
====Treasurer's Report====&lt;br /&gt;
* Benevity is now set up!&lt;br /&gt;
* Progress in moving from LESFCU to Amalgamated Bank: 10k transferred over, debit cards activated, online account activated.&lt;br /&gt;
* Tasks remaining: sync Amalgamated Bank to Xero (accounting software), transfer rest of bills.&lt;br /&gt;
* This month, member dues appear to be significantly lower, operating income was -$500.&lt;br /&gt;
&lt;br /&gt;
====Secretary's Report====&lt;br /&gt;
* No report.&lt;br /&gt;
====Directors-at-Large's Report====&lt;br /&gt;
* No report.&lt;br /&gt;
===Member and Project Reports===&lt;br /&gt;
&lt;br /&gt;
== Old Business ==&lt;br /&gt;
&lt;br /&gt;
== New Business ==&lt;br /&gt;
&lt;br /&gt;
===Sponsored Members Induction===&lt;br /&gt;
For each prospective member, please confirm no later than Thursday before the meeting:&lt;br /&gt;
&lt;br /&gt;
* Has the member visited 3 times at the regular Tuesday and Thursday open nights?&lt;br /&gt;
* Has the member received the briefing? When, and who was the briefer?&lt;br /&gt;
* Has the member's bio and photo been circulated on the members list? (not just Discord)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Meeting Meta==&lt;br /&gt;
* Members in Attendance: member1, member2 | latemember1&lt;br /&gt;
* Visitors: visitor1, visitor2&lt;br /&gt;
* Called to order at 23:59 by MEMBER.&lt;br /&gt;
* The meeting was adjourned at 23:59 by MEMBER.&lt;br /&gt;
* Minutes taken and submitted by MEMBER.&lt;br /&gt;
&lt;br /&gt;
[[Category:Meetings]]&lt;/div&gt;</summary>
		<author><name>LNRC</name></author>
	</entry>
	<entry>
		<id>https://wiki.hackmanhattan.com/index.php?title=Meeting_2025-08-27&amp;diff=9486</id>
		<title>Meeting 2025-08-27</title>
		<link rel="alternate" type="text/html" href="https://wiki.hackmanhattan.com/index.php?title=Meeting_2025-08-27&amp;diff=9486"/>
		<updated>2025-08-27T22:10:36Z</updated>

		<summary type="html">&lt;p&gt;LNRC: /* Treasurer's Report */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Meetings are conducted according to [[MIBS_Rules]].&lt;br /&gt;
&lt;br /&gt;
==Approve Minutes==&lt;br /&gt;
&lt;br /&gt;
==Consensus Agenda==&lt;br /&gt;
* Authorize spending up to $200 per year for business cards. Disbursement subject to Board approval.&lt;br /&gt;
&lt;br /&gt;
* Consensus Item 2&lt;br /&gt;
&lt;br /&gt;
==Member Reports==&lt;br /&gt;
=== Board Reports===&lt;br /&gt;
====President's Report====&lt;br /&gt;
* No report.&lt;br /&gt;
====Treasurer's Report====&lt;br /&gt;
* Income was negative this month. Positive income from previous months came from deposits from cash box and Venmo, so this month's report may be a more accurate assessment of where we are at.&lt;br /&gt;
* Increase in Digital Services comes from Bitwarden (password management software).&lt;br /&gt;
&lt;br /&gt;
====Secretary's Report====&lt;br /&gt;
* No report.&lt;br /&gt;
====Directors-at-Large's Report====&lt;br /&gt;
* No report.&lt;br /&gt;
===Member and Project Reports===&lt;br /&gt;
&lt;br /&gt;
== Old Business ==&lt;br /&gt;
&lt;br /&gt;
== New Business ==&lt;br /&gt;
&lt;br /&gt;
===Sponsored Members Induction===&lt;br /&gt;
Welcome, Sam!&lt;br /&gt;
&lt;br /&gt;
==Meeting Meta==&lt;br /&gt;
* Members in Attendance: member1, member2 | latemember1&lt;br /&gt;
* Visitors: visitor1, visitor2&lt;br /&gt;
* Called to order at 23:59 by MEMBER.&lt;br /&gt;
* The meeting was adjourned at 23:59 by MEMBER.&lt;br /&gt;
* Minutes taken and submitted by MEMBER.&lt;br /&gt;
&lt;br /&gt;
[[Category:Meetings]]&lt;/div&gt;</summary>
		<author><name>LNRC</name></author>
	</entry>
	<entry>
		<id>https://wiki.hackmanhattan.com/index.php?title=Meeting_2025-07-30&amp;diff=9477</id>
		<title>Meeting 2025-07-30</title>
		<link rel="alternate" type="text/html" href="https://wiki.hackmanhattan.com/index.php?title=Meeting_2025-07-30&amp;diff=9477"/>
		<updated>2025-07-30T23:23:17Z</updated>

		<summary type="html">&lt;p&gt;LNRC: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Meetings are conducted according to [[MIBS_Rules]].&lt;br /&gt;
&lt;br /&gt;
==Approve Minutes==&lt;br /&gt;
&lt;br /&gt;
==Consensus Agenda==&lt;br /&gt;
* Allow start membership applications before the 3rd visit. All other aspects would remain unchanged&lt;br /&gt;
&lt;br /&gt;
==Member Reports==&lt;br /&gt;
=== Board Reports===&lt;br /&gt;
====President's Report====&lt;br /&gt;
* No report.&lt;br /&gt;
====Treasurer's Report====&lt;br /&gt;
* June's income statement is in the green!&lt;br /&gt;
* High donations comes from cumulative cash deposit ($639.00) and donation from [https://bidya.org/ Bidya] (thanks Lambda for coordinating this!)&lt;br /&gt;
* Event cost comes from Lightburn Laser Expo&lt;br /&gt;
====Secretary's Report====&lt;br /&gt;
* No report.&lt;br /&gt;
====Directors-at-Large's Report====&lt;br /&gt;
* No report.&lt;br /&gt;
===Member and Project Reports===&lt;br /&gt;
&lt;br /&gt;
== Old Business ==&lt;br /&gt;
&lt;br /&gt;
== New Business ==&lt;br /&gt;
&lt;br /&gt;
===Sponsored Members Induction===&lt;br /&gt;
For each prospective member, please confirm no later than Thursday before the meeting:&lt;br /&gt;
&lt;br /&gt;
* Has the member visited 3 times at the regular Tuesday and Thursday open nights?&lt;br /&gt;
* Has the member received the briefing? When, and who was the briefer?&lt;br /&gt;
* Has the member's bio and photo been circulated on the members list? (not just Discord)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Meeting Meta==&lt;br /&gt;
* Members in Attendance: member1, member2 | latemember1&lt;br /&gt;
* Visitors: visitor1, visitor2&lt;br /&gt;
* Called to order at 23:59 by MEMBER.&lt;br /&gt;
* The meeting was adjourned at 23:59 by MEMBER.&lt;br /&gt;
* Minutes taken and submitted by MEMBER.&lt;br /&gt;
&lt;br /&gt;
[[Category:Meetings]]&lt;/div&gt;</summary>
		<author><name>LNRC</name></author>
	</entry>
	<entry>
		<id>https://wiki.hackmanhattan.com/index.php?title=Meeting_2025-05-28&amp;diff=9430</id>
		<title>Meeting 2025-05-28</title>
		<link rel="alternate" type="text/html" href="https://wiki.hackmanhattan.com/index.php?title=Meeting_2025-05-28&amp;diff=9430"/>
		<updated>2025-05-28T01:01:50Z</updated>

		<summary type="html">&lt;p&gt;LNRC: Created page with &amp;quot;Meetings are conducted according to MIBS_Rules.  ==Approve Minutes==  ==Consensus Agenda== * Consensus Item 1 * Consensus Item 2  ==Member Reports== === Board Reports=== ====President's Report==== * No report. ====Treasurer's Report==== * No report. ====Secretary's Report==== * No report. ====Directors-at-Large's Report==== * No report. ===Member and Project Reports===  == Old Business ==  == New Business ==  ===Sponsored Members Induction=== For each prospective mem...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Meetings are conducted according to [[MIBS_Rules]].&lt;br /&gt;
&lt;br /&gt;
==Approve Minutes==&lt;br /&gt;
&lt;br /&gt;
==Consensus Agenda==&lt;br /&gt;
* Consensus Item 1&lt;br /&gt;
* Consensus Item 2&lt;br /&gt;
&lt;br /&gt;
==Member Reports==&lt;br /&gt;
=== Board Reports===&lt;br /&gt;
====President's Report====&lt;br /&gt;
* No report.&lt;br /&gt;
====Treasurer's Report====&lt;br /&gt;
* No report.&lt;br /&gt;
====Secretary's Report====&lt;br /&gt;
* No report.&lt;br /&gt;
====Directors-at-Large's Report====&lt;br /&gt;
* No report.&lt;br /&gt;
===Member and Project Reports===&lt;br /&gt;
&lt;br /&gt;
== Old Business ==&lt;br /&gt;
&lt;br /&gt;
== New Business ==&lt;br /&gt;
&lt;br /&gt;
===Sponsored Members Induction===&lt;br /&gt;
For each prospective member, please confirm no later than Thursday before the meeting:&lt;br /&gt;
&lt;br /&gt;
* Has the member visited 3 times at the regular Tuesday and Thursday open nights?&lt;br /&gt;
* Has the member received the briefing? When, and who was the briefer?&lt;br /&gt;
* Has the member's bio and photo been circulated on the members list? (not just Discord)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Meeting Meta==&lt;br /&gt;
* Members in Attendance: member1, member2 | latemember1&lt;br /&gt;
* Visitors: visitor1, visitor2&lt;br /&gt;
* Called to order at 23:59 by MEMBER.&lt;br /&gt;
* The meeting was adjourned at 23:59 by MEMBER.&lt;br /&gt;
* Minutes taken and submitted by MEMBER.&lt;br /&gt;
&lt;br /&gt;
[[Category:Meetings]]&lt;/div&gt;</summary>
		<author><name>LNRC</name></author>
	</entry>
	<entry>
		<id>https://wiki.hackmanhattan.com/index.php?title=Meeting_2025-02-26&amp;diff=9285</id>
		<title>Meeting 2025-02-26</title>
		<link rel="alternate" type="text/html" href="https://wiki.hackmanhattan.com/index.php?title=Meeting_2025-02-26&amp;diff=9285"/>
		<updated>2025-02-27T00:30:30Z</updated>

		<summary type="html">&lt;p&gt;LNRC: /* Treasurer's Report */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Consensus Agenda==&lt;br /&gt;
&lt;br /&gt;
== New Business ==&lt;br /&gt;
&lt;br /&gt;
===Nominations===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+ Election Candidates (in order of nomination)&lt;br /&gt;
|-&lt;br /&gt;
! Candidates !! Nominated By !! Accepted  !! Notes&lt;br /&gt;
|-&lt;br /&gt;
| Chris || Ellen || Yes || &lt;br /&gt;
|-&lt;br /&gt;
| Ellen || Nick || Yes || &lt;br /&gt;
|-&lt;br /&gt;
| Robin || Nick || Yes || &lt;br /&gt;
|-&lt;br /&gt;
| Nick || Ellen || No || &lt;br /&gt;
|-&lt;br /&gt;
| Hannah || Ellen || Yes || &lt;br /&gt;
|-&lt;br /&gt;
| Drew || Hannah || Yes || &lt;br /&gt;
|-&lt;br /&gt;
| Clyde || Hannah || Yes || &lt;br /&gt;
|-&lt;br /&gt;
| Pidge || Jay || Yes || &lt;br /&gt;
|-&lt;br /&gt;
| Chaim || Nick || Yes || &lt;br /&gt;
|-&lt;br /&gt;
| Alex S. || Nick || Yes || &lt;br /&gt;
|}&lt;br /&gt;
==Member Reports==&lt;br /&gt;
=== Board Reports===&lt;br /&gt;
====President's Report====&lt;br /&gt;
====Treasurer's Report====&lt;br /&gt;
* The HVAC has been replaced!! $5,000 total&lt;br /&gt;
* Electric bill for Feb 2025 was high (around $300), but about the same as that of Feb 2024&lt;br /&gt;
* After HVAC replacement purchase, bank account is at $29,331.45&lt;br /&gt;
* Monthly expenses = ~$3.8k a month (not including toiletries, etc.). Monthly member dues = $4,260.00 a month. We are in the green.&lt;br /&gt;
* January had income of around $500, HVAC purchase will apply to February financial summary&lt;br /&gt;
&lt;br /&gt;
====Secretary's Report====&lt;br /&gt;
====Directors-at-Large's Report====&lt;br /&gt;
===Member and Project Reports===&lt;br /&gt;
&lt;br /&gt;
==Meeting Meta==&lt;br /&gt;
* Members in Attendance: Member1, ... | LateMember1, ...&lt;br /&gt;
* Visitors: &lt;br /&gt;
* Called to order at TIME by NAME&lt;br /&gt;
* The meeting was adjourned at TIME by NAME&lt;br /&gt;
* Minutes taken and submitted by NAME&lt;br /&gt;
[[Category:Meetings]]&lt;/div&gt;</summary>
		<author><name>LNRC</name></author>
	</entry>
	<entry>
		<id>https://wiki.hackmanhattan.com/index.php?title=Meeting_2025-01-29&amp;diff=9276</id>
		<title>Meeting 2025-01-29</title>
		<link rel="alternate" type="text/html" href="https://wiki.hackmanhattan.com/index.php?title=Meeting_2025-01-29&amp;diff=9276"/>
		<updated>2025-01-29T20:42:05Z</updated>

		<summary type="html">&lt;p&gt;LNRC: Created page with &amp;quot;Meetings are conducted according to MIBS_Rules.  ==Approve Minutes==  ==Consensus Agenda== * Consensus Item 1 * Consensus Item 2  ==Member Reports== === Board Reports=== ====President's Report==== * No report. ====Treasurer's Report==== * Accounting books have been reconciled, but we are still working on fixing automated systems * Class expenses are missing because they were not paid in December (sorry folks still catching up here). However, all teachers should be pa...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Meetings are conducted according to [[MIBS_Rules]].&lt;br /&gt;
&lt;br /&gt;
==Approve Minutes==&lt;br /&gt;
&lt;br /&gt;
==Consensus Agenda==&lt;br /&gt;
* Consensus Item 1&lt;br /&gt;
* Consensus Item 2&lt;br /&gt;
&lt;br /&gt;
==Member Reports==&lt;br /&gt;
=== Board Reports===&lt;br /&gt;
====President's Report====&lt;br /&gt;
* No report.&lt;br /&gt;
====Treasurer's Report====&lt;br /&gt;
* Accounting books have been reconciled, but we are still working on fixing automated systems&lt;br /&gt;
* Class expenses are missing because they were not paid in December (sorry folks still catching up here). However, all teachers should be paid by now. January class expenses may be larger than usual as a result.&lt;br /&gt;
* Current amount in bank: $34,168.72&lt;br /&gt;
====Secretary's Report====&lt;br /&gt;
* No report.&lt;br /&gt;
====Directors-at-Large's Report====&lt;br /&gt;
* No report.&lt;br /&gt;
===Member and Project Reports===&lt;br /&gt;
&lt;br /&gt;
== Old Business ==&lt;br /&gt;
&lt;br /&gt;
== New Business ==&lt;br /&gt;
&lt;br /&gt;
===Sponsored Members Induction===&lt;br /&gt;
For each prospective member, please confirm no later than Thursday before the meeting:&lt;br /&gt;
&lt;br /&gt;
* Has the member visited 3 times at the regular Tuesday and Thursday open nights?&lt;br /&gt;
* Has the member received the briefing? When, and who was the briefer?&lt;br /&gt;
* Has the member's bio and photo been circulated on the members list? (not just Discord)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Meeting Meta==&lt;br /&gt;
* Members in Attendance: member1, member2 | latemember1&lt;br /&gt;
* Visitors: visitor1, visitor2&lt;br /&gt;
* Called to order at 23:59 by MEMBER.&lt;br /&gt;
* The meeting was adjourned at 23:59 by MEMBER.&lt;br /&gt;
* Minutes taken and submitted by MEMBER.&lt;br /&gt;
&lt;br /&gt;
[[Category:Meetings]]&lt;/div&gt;</summary>
		<author><name>LNRC</name></author>
	</entry>
	<entry>
		<id>https://wiki.hackmanhattan.com/index.php?title=Meeting_2024-12-16&amp;diff=9266</id>
		<title>Meeting 2024-12-16</title>
		<link rel="alternate" type="text/html" href="https://wiki.hackmanhattan.com/index.php?title=Meeting_2024-12-16&amp;diff=9266"/>
		<updated>2024-12-16T23:58:56Z</updated>

		<summary type="html">&lt;p&gt;LNRC: /* Treasurer's Report */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Consensus Agenda==&lt;br /&gt;
* Consensus Item 1&lt;br /&gt;
* Consensus Item 2&lt;br /&gt;
&lt;br /&gt;
== New Business ==&lt;br /&gt;
&lt;br /&gt;
===Sponsored Members Induction===&lt;br /&gt;
For each prospective member, please confirm no later than Thursday before the meeting:&lt;br /&gt;
&lt;br /&gt;
* Has the member visited 3 times at the regular Tuesday and Thursday open nights?&lt;br /&gt;
* Has the member received the briefing? When, and who was the briefer?&lt;br /&gt;
* Has the member's bio and photo been circulated on the members list? (not just Discord)&lt;br /&gt;
&lt;br /&gt;
==Member Reports==&lt;br /&gt;
=== Board Reports===&lt;br /&gt;
====President's Report====&lt;br /&gt;
* No report.&lt;br /&gt;
====Treasurer's Report====&lt;br /&gt;
* Still properly organizing accounts after abrupt transition between treasurers. &lt;br /&gt;
Number of Active Members: ~47&lt;br /&gt;
* Operating Expenses: $3,938.87&lt;br /&gt;
** Rent: $3,267.95&lt;br /&gt;
** Utilities (Internet, Electricity, Waste Management): $466.69&lt;br /&gt;
*** ConEd bill went up about $30 this month&lt;br /&gt;
** Other Expenses: $204.23&lt;br /&gt;
*Total Income: $4,919.18&lt;br /&gt;
** Income from dues: $4,155.00&lt;br /&gt;
** Income from donations + sales: $858.86&lt;br /&gt;
** Income from class fees (new income category!): $23.24&lt;br /&gt;
** Payment processing fees: -$117.92&lt;br /&gt;
* Net Income: $980.31&lt;br /&gt;
&lt;br /&gt;
====Secretary's Report====&lt;br /&gt;
* No report.&lt;br /&gt;
====Directors-at-Large's Report====&lt;br /&gt;
* No report.&lt;br /&gt;
===Member and Project Reports===&lt;br /&gt;
&lt;br /&gt;
==Meeting Meta==&lt;br /&gt;
* Members in Attendance: member1, member2 | latemember1&lt;br /&gt;
* Visitors: visitor1, visitor2&lt;br /&gt;
* Called to order at 23:59 by MEMBER.&lt;br /&gt;
* The meeting was adjourned at 23:59 by MEMBER.&lt;br /&gt;
* Minutes taken and submitted by MEMBER.&lt;br /&gt;
&lt;br /&gt;
[[Category:Meetings]]&lt;/div&gt;</summary>
		<author><name>LNRC</name></author>
	</entry>
	<entry>
		<id>https://wiki.hackmanhattan.com/index.php?title=Individual_Pages&amp;diff=9263</id>
		<title>Individual Pages</title>
		<link rel="alternate" type="text/html" href="https://wiki.hackmanhattan.com/index.php?title=Individual_Pages&amp;diff=9263"/>
		<updated>2024-12-16T23:52:09Z</updated>

		<summary type="html">&lt;p&gt;LNRC: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;* [[User:Anna | Anna]]&lt;br /&gt;
* [[User:beadsland|Beads Land-Trujillo]]&lt;br /&gt;
* [[User:Chaim | Chaim Fraiman]]&lt;br /&gt;
* [[User:k10 | k10]]&lt;br /&gt;
* [[User:Citybadger|citybadger (Stephen Lynch)]]&lt;br /&gt;
* [[User:Clyde | Clyde]]&lt;br /&gt;
* [[User:LNRC | Ellen]]&lt;br /&gt;
* [[User:Nick|Nick]] (WIP)&lt;br /&gt;
* [[User:mc4bbs|MC4BBS (Chaz Antonelli)]]&lt;br /&gt;
* [[User:Shenkin|Peter Shenkin]]&lt;br /&gt;
* [[User:Pidge|Pidge (Peter M)]]&lt;br /&gt;
* [[User:Cuebus|Robin]]&lt;br /&gt;
* [[User:Sam|Rotabush (Sam Brown)]]&lt;br /&gt;
* [[User: Shway|Shway]]&lt;br /&gt;
* [[User:Justinej|Justine]]&lt;br /&gt;
* [[User:Boostfox|Boost]]&lt;br /&gt;
&lt;br /&gt;
[[Former Members]]&lt;br /&gt;
&lt;br /&gt;
Hey current members!  Make yourself a page and add it here!&lt;/div&gt;</summary>
		<author><name>LNRC</name></author>
	</entry>
	<entry>
		<id>https://wiki.hackmanhattan.com/index.php?title=Meeting_2024-11-27&amp;diff=9255</id>
		<title>Meeting 2024-11-27</title>
		<link rel="alternate" type="text/html" href="https://wiki.hackmanhattan.com/index.php?title=Meeting_2024-11-27&amp;diff=9255"/>
		<updated>2024-12-03T22:09:26Z</updated>

		<summary type="html">&lt;p&gt;LNRC: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Consensus Agenda==&lt;br /&gt;
* Ban on minors (under 18 yo) in the space unless accompanying their legal guardian.&lt;br /&gt;
&lt;br /&gt;
* Require verification of photo id (US state id, NYC id, or passport) upon membership initiation. Procedure is just email to board.&lt;br /&gt;
&lt;br /&gt;
== New Business ==&lt;br /&gt;
* Ban on minors (under 18 yo) in the space unless accompanying their legal guardian.&lt;br /&gt;
Tristan pulled this out of the consensus agenda&lt;br /&gt;
Version B: Minors (Defined as under 18 years old) are not allowed in the space unless accompanying their legal guardian. Additionally, no minors are allowed at open house unless their accompanying guardian is a member.&lt;br /&gt;
Motion passes 13-4&lt;br /&gt;
&lt;br /&gt;
* Require verification of photo id (US state id, NYC id, or passport) upon membership initiation. Procedure is just email to board.&lt;br /&gt;
Shaina pulled this out of the consensus agenda&lt;br /&gt;
This item will be postponed and further revised&lt;br /&gt;
&lt;br /&gt;
Vote to ban Luna &lt;br /&gt;
Motion passes 18-0&lt;br /&gt;
&lt;br /&gt;
Vote to ban Johnny&lt;br /&gt;
Motion Passes 19-0&lt;br /&gt;
&lt;br /&gt;
===Sponsored Members Induction===&lt;br /&gt;
&lt;br /&gt;
Welcome Akash, Audrey, and Kent!&lt;br /&gt;
&lt;br /&gt;
==Member Reports==&lt;br /&gt;
=== Board Reports===&lt;br /&gt;
====President's Report====&lt;br /&gt;
&lt;br /&gt;
* December members meeting to be rescheduled due to falling on Christmas day, please vote in Discord poll about date&lt;br /&gt;
* Will also hold election for open board slot then&lt;br /&gt;
&lt;br /&gt;
&amp;lt;blockquote&amp;gt;&lt;br /&gt;
=====Official Statement from the Board of Hack Manhattan=====&lt;br /&gt;
&lt;br /&gt;
Dear Members,&lt;br /&gt;
&lt;br /&gt;
We are writing to inform you of a recent decision made by the board of Hack Manhattan. The person known as &amp;quot;Luna Turing&amp;quot;* was asked to resign from their position as Treasurer and as a board member of our organization. Following their resignation, we took action to terminate their membership and permanently ban them in order to protect our community.&lt;br /&gt;
&lt;br /&gt;
It has come to our attention that over the past year Luna has engaged in unacceptable and harmful behavior, including fabricating stories involving serious criminal activity to manipulate members for personal gain. They engaged in deliberate intimidation and concealed their true identity in furtherance of these deceptions. These needless actions have caused significant emotional distress to multiple members, including severe consequences for their professional and personal lives.&lt;br /&gt;
&lt;br /&gt;
We have received direct confirmation from multiple people affected, as well as an admission from Luna regarding their conduct. &lt;br /&gt;
&lt;br /&gt;
We want to make it clear that Luna is no longer affiliated with Hack Manhattan, and we strongly advise against extending any form of trust to them. If you have been impacted or have any concerns regarding their actions, particularly if you have been subjected to their lies and need help understanding what is true, we encourage you to reach out to us, either directly or at board@hackmanhattan.com. We are committed to supporting anyone affected and ensuring that our community is a safe and welcoming space.&lt;br /&gt;
&lt;br /&gt;
Thank you for your understanding and continued support as we navigate this difficult situation. We appreciate the resilience of our members and are working diligently to prevent any further harm.&lt;br /&gt;
&lt;br /&gt;
Sincerely,&amp;lt;br/&amp;gt;&lt;br /&gt;
The Board of Hack Manhattan&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;*&amp;lt;/nowiki&amp;gt; Luna Turing is neither their given name, nor their current chosen legal name&lt;br /&gt;
&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Treasurer's Report====&lt;br /&gt;
* The HVAC is broken and the replacement is quoted at $8000. Plan is to proceed with professional replacement.&lt;br /&gt;
&lt;br /&gt;
====Secretary's Report====&lt;br /&gt;
* No report.&lt;br /&gt;
====Directors-at-Large's Report====&lt;br /&gt;
* No report.&lt;br /&gt;
===Member and Project Reports===&lt;br /&gt;
* Ed will be setting up a non-permanent radio antenna in the window of the space&lt;br /&gt;
&lt;br /&gt;
==Meeting Meta==&lt;br /&gt;
* Members in Attendance: Clyde, Ellen, Mihir, Peter, Jay, Tristan, Robin, Cat, Audrey, Xander, Shaina, Charlotte (Late)&lt;br /&gt;
* Online Attendance: Suha, Ashley, Hannah, Nick, Chaim, Michelle, Chris, Justine&lt;br /&gt;
* Proxy attendance for: Hannah is proxy for Marceline, Robin is proxy for Boost, Suha is proxy for James&lt;br /&gt;
* Called to order at 7:42 by Peter.&lt;br /&gt;
* The meeting was adjourned at 8:57 by Peter.&lt;br /&gt;
* Minutes taken and submitted by Ellen.&lt;br /&gt;
&lt;br /&gt;
[[Category:Meetings]]&lt;/div&gt;</summary>
		<author><name>LNRC</name></author>
	</entry>
	<entry>
		<id>https://wiki.hackmanhattan.com/index.php?title=Japanese_Feature_Phone_Preservation&amp;diff=9077</id>
		<title>Japanese Feature Phone Preservation</title>
		<link rel="alternate" type="text/html" href="https://wiki.hackmanhattan.com/index.php?title=Japanese_Feature_Phone_Preservation&amp;diff=9077"/>
		<updated>2024-01-19T20:31:27Z</updated>

		<summary type="html">&lt;p&gt;LNRC: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:JapaneseFeaturePhones.jpg |thumb]]&lt;br /&gt;
Japanese feature phones is a category of mobile devices that were released (almost) exclusively in Japan between approximately 1999-2015. These phones contained many features that took over a decade to reach the rest of the world: game streaming, live TV, digital wallets, virtual characters to replace you on video calls, and more. The phones offered platform-exclusive games from many beloved franchises such as ''Final Fantasy, Pokemon, Kingdom Hearts, Professor Layton,'' and ''Megami Tensei.'' Mobile devices in Japan were developed by a variety of companies, each with their own proprietary hardware and software. Because of the diversity of phone models, the restrictive copyright protections, a separate set of [https://en.wikipedia.org/wiki/I-mode proprietary internet protocols], and more, these phones and their games have been extremely challenging to preserve.&lt;br /&gt;
&lt;br /&gt;
== Mobile Device Data Extraction Projects ==&lt;br /&gt;
Some Japanese feature phones can have their data extracted using the [https://github.com/ktdumper/ktdumper ktdumper] scripts available on GitHub, along with a FOMA debug cable (a FOMA cable with pins 8, 9, and 10 bridged together). Information on creating a debug cable can be found [https://docs.google.com/document/d/1iELxocYKh-hDV6hk7SYsnb7AHU1j1JkgolC6kz61PA8/edit?usp=sharing here].&lt;br /&gt;
&lt;br /&gt;
To see models that are currently compatible with the script, check out the [https://github.com/ktdumper/ktdumper/blob/main/ktdumper/devices.py devices.py] file in the KTdumper project. There may be more models compatible that the ones listed, but these models are essentially guaranteed to work.&lt;br /&gt;
&lt;br /&gt;
=== NEC, Panasonic, Casio ===&lt;br /&gt;
==== NEC ====&lt;br /&gt;
NEC devices enter a testing mode when plugged into a PC using a debug cable. Currently known exploits for NEC devices work with phones that have NEC M2 and NEC M3 CPU chips (note this is not the same as the Apple M2). Some phones with OMAP chips are also preservable (OMAP 1610, OMAP 1621?), but later phone models still require more study (OMAP 3430).&lt;br /&gt;
&lt;br /&gt;
==== Panasonic ====&lt;br /&gt;
For Panasonic phones, the debug cable triggers Panasonic IPL mode. &lt;br /&gt;
&lt;br /&gt;
Some Panasonic phones have also had their firmware extracted by unsoldering the eMMC and analyzing it with a chip programmer.&lt;br /&gt;
&lt;br /&gt;
We have extracted data with Panasonic phones that have the following CPUs:&lt;br /&gt;
* OMAP 1610&lt;br /&gt;
* OMAP 1611&lt;br /&gt;
* OMAP 2420&lt;br /&gt;
* UniPhier 3M&lt;br /&gt;
* UniPhier 4MBB +&lt;br /&gt;
&lt;br /&gt;
Progress was halted on Panasonic phones for a while due to difficulty in deciphering the FTL (Flash Translation Layer), but this has now been solved.&lt;br /&gt;
&lt;br /&gt;
====Casio====&lt;br /&gt;
A small number of late Casio phones are compatible with current exploits, such as the 930CA. Extracting data from other models will require an entirely new strain of research.&lt;br /&gt;
&lt;br /&gt;
=== Fujitsu, Mitsubishi, Sharp ===&lt;br /&gt;
Fujitsu, Mitsubishi, and Sharp phones can all be booted into a special &amp;quot;Maker Mode&amp;quot; with additional permissions. We have figured out how to extract data from the JAVA folder in some of these phones, but have yet to take full advantage of this &amp;quot;Maker Mode.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Phones from these manufacturers generally use the SH-Mobile CPU chip.&lt;br /&gt;
&lt;br /&gt;
====Fujitsu====&lt;br /&gt;
Current exploits for Fujitsu phones have worked with some models and not others. Issues likely stem from the ktdumper script requesting the wrong folder path. It will be difficult to fix this code for more Fujitsu phone models until more firmware dumps are provided. This requires desoldering the CPU BGA chip and putting it into a compatible chip reader.&lt;br /&gt;
&lt;br /&gt;
These are the general ranges of models our current exploit works for, though many in-between models still need to be tested.&lt;br /&gt;
&lt;br /&gt;
* F902i - F906i&lt;br /&gt;
* F884iES&lt;br /&gt;
* F-04A - F-10A&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Mitsubishi====&lt;br /&gt;
The situation with Mitsubishi phones is essentially the same as it is with Fujitsu phones. &lt;br /&gt;
&lt;br /&gt;
These are the general ranges of models our current exploit works for, though many in-between models still need to be tested.&lt;br /&gt;
&lt;br /&gt;
* D702i - D705i(myu)&lt;br /&gt;
* D902i - D905i&lt;br /&gt;
&lt;br /&gt;
==== Sharp ====&lt;br /&gt;
We have successfully preserved one Sharp phone, the SH-03E, by reading its eMMC flash. This firmware has helped us derive the exploits to work with Fujitsu and Mitsubishi phones. Ironically, we have not been able to use these tools with Sharp phones yet. These phones can be booted into Maker Mode, but we still need to figure out what to do from there.&lt;br /&gt;
&lt;br /&gt;
===== Sharp SH-10C =====&lt;br /&gt;
The Sharp SH-10C is a DoCoMo phone released in 2011. Attempts have been made to read the NAND chip on this phone, in part because its schematics were made public by the [https://fcc.report/FCC-ID/APYHRO00145 FCC]. Currently, there are no chip programmers that support its NAND chip (Toshiba TY00D0021211KC) by default, and attempts at using a chip programmer have not reached past the bootloader. For more information, we recommend reading the report below.&lt;br /&gt;
*[https://docs.google.com/document/d/1X3TN1QIvINPMDC6fmwo6vHCgAT377jOFM1zYkWZzdZY/edit?usp=sharing Report on Extraction of Data from DoCoMo Sharp SH-10C Mobile Phone] by Kraze&lt;br /&gt;
*[https://lpcwiki.miraheze.org/wiki/Sharp_SH-10C Sharp SH-10C] on the Legacy Portable Computer Wiki&lt;br /&gt;
&lt;br /&gt;
=== Others===&lt;br /&gt;
==== LG ====&lt;br /&gt;
LG DoCoMo mobile phones had their firmware dumped at least 10 years ago, though most of these files have been lost. The firmware dumping process has not been replicated since, but should be possible to figure out with some research.&lt;br /&gt;
&lt;br /&gt;
The following phones have had their firmware preserved:&lt;br /&gt;
&lt;br /&gt;
* [https://lpcwiki.miraheze.org/wiki/LG_L704i L704i] (Found Online)&lt;br /&gt;
* L706ie (Found Online)&lt;br /&gt;
* [https://lpcwiki.miraheze.org/wiki/LG_L-03A L-03A] (Found Online)&lt;br /&gt;
&lt;br /&gt;
==== Motorola ====&lt;br /&gt;
The Motorola M702iG and M702iS are based upon the Motorola Razr that was released internationally. Due to the availability of information about these phones, their firmware has successfully been accessed through USB. It's possible to browse the entire file system on these phones using a '''RMCDA General Program''', '''M702iS/M702iG USB Drivers''', and '''P2K Commander'''.&lt;br /&gt;
&lt;br /&gt;
The following phones have had their firmware preserved:&lt;br /&gt;
&lt;br /&gt;
* M702iG&lt;br /&gt;
* M702iS&lt;br /&gt;
&lt;br /&gt;
==Brute Force Live Stream: Cracking the Cryptomeria Cipher==&lt;br /&gt;
THIS SECTION IS UNDER CONSTRUCTION AND IS NOT UP TO DATE.&lt;br /&gt;
===General Summary===&lt;br /&gt;
[[File:RockmanDash5Islands.jpg|thumb|Rockman DASH: Great Adventure on 5 Islands! ([https://www.legends-station.com/?id=big-5-island-adventure image source])]]&lt;br /&gt;
The microSD cards in Japanese feature phones hide copyright protected data using a [https://en.wikipedia.org/wiki/Cryptomeria_cipher Cryptomeria Cipher], also known as a C2. Cracking the C2 requires three things: s-box, device keys, and a game-specific bind ID. &lt;br /&gt;
* The S-BOX was discovered a few years ago within the firmware of a Japanese Samsung Galaxy S2 (it was used to encrypt live television recordings&lt;br /&gt;
* The &lt;br /&gt;
&lt;br /&gt;
Having the s-box and device keys allows us to find the bind ID. The s-box was discovered last year, but hackers are still searching for phone specific device keys. These device keys can be used across multiple game dumps, so it's not necessary to find each device's set of device keys for decryption to work. &lt;br /&gt;
&lt;br /&gt;
'''THE DEVICE KEY HAS BEEN FOUND THROUGH BRUTE FORCE.'''&lt;br /&gt;
&lt;br /&gt;
With that in tow, we'll now get to the games: finding the game-specific bind ID using the device key and s-box (which has already been acquired). It depends on how long that will take, but the device key will make things exponentially easier than if we didn't have it. Next is to combine the three to decrypt the game files... and nobody knows what will happen next.&lt;br /&gt;
&lt;br /&gt;
One of the main goals of this brute force effort is to access a specific SD card that contains '''Rockman DASH: Great Adventure on Five Islands!''' &lt;br /&gt;
&lt;br /&gt;
* [https://www.youtube.com/watch?v=fVtgixfBdDc Video footage of Rockman DASH: Great Adventure on Five Islands!]&lt;br /&gt;
* [https://www.twitch.tv/goodtofufriday Cracking Rockman DASH: Great Adventure on Five Islands! Livestream]&lt;br /&gt;
* [https://gitlab.com/usernameak/mkb_bruteforce Source code for MKB Bruteforce]&lt;br /&gt;
&lt;br /&gt;
===Hardcore Summary===&lt;br /&gt;
[[File: MKB.png|thumb|Chart of the 16 MKB types used in SD cards involved in this process. Games are encrypted with MKB 11: SD Binding]]&lt;br /&gt;
&lt;br /&gt;
An MKB on SD cards generally contains two records (except some mostly irrelevant header records): '''Calculate Media Key''' and '''Conditionally Calculate Media Key'''.&lt;br /&gt;
&lt;br /&gt;
# A row which corresponds to our device key is looked up in Calculate Media Key record.&lt;br /&gt;
# We decrypt this row with our device key, and get another key.&lt;br /&gt;
# In the Conditionally Calculate Media Key record, there's an encrypted block with a specific (constant) value which we attempt to decrypt with the key from the previous step.&lt;br /&gt;
# If this value matches what we expected, we look up a row in the Conditionally Calculate Media Key record (same row number as in step 1) and decrypt it with the key we got in step 2, then decrypt it again with the device key - that's our key; else we are done and the key is what we got in step 2.&lt;br /&gt;
&lt;br /&gt;
We've made an assumption that the condition in step 4 is always true. Which isn't extremely unreasonable - values in the Conditionally Calculate Media Key record don't seem like what you would expect according to specification (if I've interpreted it correctly, invalid values would be identical to what is in the Calculate Media Key record; and they aren't). So as long as the assumption holds true, it'll eventually succeed.&lt;br /&gt;
&lt;br /&gt;
For more technical information, please look at the following official PDFs:&lt;br /&gt;
* [{{SERVER}}{{localurl:File:Cprm-base110-20101215.pdf}} Content Protection for Recordable Media Specification: Introduction and Common Cryptographic Elements] (PDF)&lt;br /&gt;
* [{{SERVER}}{{localurl:File:Cprm-sd-com097-20101215.pdf}} Content Protection for Recordable Media Specification: SD Memory Card Book - Common Part] (PDF)&lt;br /&gt;
* [{{SERVER}}{{localurl:File:Cprm-sd-bind-part-092-2005-1212.pdf}} Content Protection for Recordable Media Specification: SD Memory Card Book - SD-Binding Part] (PDF)&lt;br /&gt;
&lt;br /&gt;
== Archive Re-release Restoration Projects ==&lt;br /&gt;
This section will describe efforts to restore original DoJa game files.'''DoJa''' is a proprietary Java runtime developed by NTT Docomo to run specifically on feature phones. Games consist of two files: the .jam file (java manager file), which provides technical information to the phone about the application's install requirements, and the .jar file, which is the game itself. DoJa games use a scratchpad, which is saved as a .sp file.&lt;br /&gt;
&lt;br /&gt;
=== [https://japanesefeaturephones.miraheze.org/wiki/Appli_Archives Appli Archives] for PlayStation Mobile ===&lt;br /&gt;
The Appli Archives are a series of feature phone re-releases. The PlayStation Mobile games contain DoJa files for each game, likely from original source. Game files and assets are drawn from a localhost server that runs within the PlayStation Mobile application. Because of use of localhost, these games cannot run directly in the DoJa SDK. However, some files have been made to run by hosting files on a localhost server on PC.&lt;br /&gt;
&lt;br /&gt;
PlayStation Mobile game packages use [https://www.psdevwiki.com/vita/PSSE PSSE encryption], which requires a game's original license key in order to perform decryption. Because of this, many of the Appli Archive files have not been decrypted, and their DoJa games have remained inaccessible. &lt;br /&gt;
&lt;br /&gt;
Visit the [https://japanesefeaturephones.miraheze.org/wiki/Appli_Archives Japanese Feature Phones wiki] for the full list of games in this collection.&lt;br /&gt;
&lt;br /&gt;
=== [https://japanesefeaturephones.miraheze.org/wiki/Mobile_Game_Deployer Mobile Game Deployer] (MGD) and [https://japanesefeaturephones.miraheze.org/wiki/I%CE%B1ppli_Publisher iαppli Publisher] Games ===&lt;br /&gt;
Mobile Game Deployer/iαppli Publisher was a software that could easily convert i-mode applis into Android, iOS, and Windows Phone programs. A number of prominent feature phone game publishers used this tool to bring their games to the smartphone generation.&lt;br /&gt;
&lt;br /&gt;
The game [https://japanesefeaturephones.miraheze.org/wiki/Flyhight_Cloudia Flyhight Cloudia] was successfully extracted from an Android APK in a fully playable version. &lt;br /&gt;
&lt;br /&gt;
So far, other games have not been converted due to the difficultly in finding original application files for early smartphone games. Not only are these games approximately 10 years old, but they were often distributed in provider-specific mobile game portals, rather than common application stores such as Google Play and the App Store.&lt;br /&gt;
&lt;br /&gt;
===G-mode Archives===&lt;br /&gt;
The [https://japanesefeaturephones.miraheze.org/wiki/G-mode_Archives G-mode Archives] are a collection of Japanese feature phone re-releases for Nintendo Switch and Windows (Steam) published by G-mode. These games were developed in Unity, and so far no DoJa files have been discovered inside of them.&lt;br /&gt;
&lt;br /&gt;
==Emulating Network Protocol?==&lt;br /&gt;
At this point, no one knows how to emulate the proprietary network protocols that were used by these mobile devices to download games. This means that ''no one'' has successfully added new applications or side-loaded applications to a Japanese feature phone. Even though a wifi enabled phone can access a website containing a game download, the wifi Full Browser does not offer the ability to download the game files. Only the proprietary browser (such as i-mode) has the capacity to download and install games.&lt;br /&gt;
&lt;br /&gt;
== Notable Japanese Feature Phone Games ==&lt;br /&gt;
Some notable titles from recognizable game series include:&lt;br /&gt;
&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Before_Crisis_-Final_Fantasy_VII- Before Crisis -Final Fantasy VII-] and [https://japanesefeaturephones.miraheze.org/wiki/Dirge_of_Cerberus_Lost_Episode_-Final_Fantasy_VII- Dirge of Cerberus Lost Episode -Final Fantasy VII-]: Games in the Final Fantasy VII metaverse that greatly expand upon its lore&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Professor_Layton_and_the_Mansion_of_the_Deathly_Mirror Professor Layton and the Mansion of the Deathly Mirror]: A unique Professor Layton title released exclusively for Japanese mobile phones&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Kingdom_Hearts_coded Kingdom Hearts coded]: A story that covers events proceeding the finale of Kingdom Hearts II&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Persona_Mobile_Online Persona Mobile Online]: An entire Persona online MMORPG for cellphones&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Ni_no_Kuni:_Hotroit_Stories Ni no Kuni: Hotroit Stories]: A prologue to the Ni no Kuni series that takes place before Ni no Kuni: Dominion of the Dark Djinn&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Pok%C3%A9mate Pokémate]: The first Pokémon mobile game&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Nakayoshi_Chao! Nakayoshi Chao!]: A Chao virtual pet game for phones&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.youtube.com/watch?v=tKH0x21rj1Y Japan's Game Preservation Crisis] by Did You Know Gaming&lt;br /&gt;
* [https://hitsave.org/feature-phone-gaming/ Japanese Feature Phone Game Preservation: Uncovering a Forgotten Era of Gaming] on HitSave.org&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Main_Page Japanese Feature Phones Wiki] (made by HM member Ellen!)&lt;br /&gt;
* [https://docs.google.com/document/d/1fJdByYSfUPRFFAOixBX5BXx6sGkEc2uqX5verAgBhyc/edit?usp=sharing Feature Phone Preservation Resources] by Ellen&lt;br /&gt;
* [https://archive.org/details/@dekafire Japanese Feature Phone PC Downloads] posted on Archive.org&lt;/div&gt;</summary>
		<author><name>LNRC</name></author>
	</entry>
	<entry>
		<id>https://wiki.hackmanhattan.com/index.php?title=Japanese_Feature_Phone_Preservation&amp;diff=8909</id>
		<title>Japanese Feature Phone Preservation</title>
		<link rel="alternate" type="text/html" href="https://wiki.hackmanhattan.com/index.php?title=Japanese_Feature_Phone_Preservation&amp;diff=8909"/>
		<updated>2023-11-04T02:31:39Z</updated>

		<summary type="html">&lt;p&gt;LNRC: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:JapaneseFeaturePhones.jpg |thumb]]&lt;br /&gt;
Japanese feature phones is a category of mobile devices that were released (almost) exclusively in Japan between approximately 1999-2015. These phones contained many features that took over a decade to reach the rest of the world: game streaming, live TV, digital wallets, virtual characters to replace you on video calls, and more. The phones offered platform-exclusive games from many beloved franchises such as ''Final Fantasy, Pokemon, Kingdom Hearts, Professor Layton,'' and ''Megami Tensei.'' Mobile devices in Japan were developed by a variety of companies, each with their own proprietary hardware and software. Because of the diversity of phone models, the restrictive copyright protections, a separate set of [https://en.wikipedia.org/wiki/I-mode proprietary internet protocols], and more, these phones and their games have been extremely challenging to preserve.&lt;br /&gt;
&lt;br /&gt;
==Brute Force Live Stream: Cracking the Cryptomeria Cipher==&lt;br /&gt;
===General Summary===&lt;br /&gt;
[[File:RockmanDash5Islands.jpg|thumb|Rockman DASH: Great Adventure on 5 Islands! ([https://www.legends-station.com/?id=big-5-island-adventure image source])]]&lt;br /&gt;
The microSD cards in Japanese feature phones hide copyright protected data using a [https://en.wikipedia.org/wiki/Cryptomeria_cipher Cryptomeria Cipher], also known as a C2. Cracking the C2 requires three things: s-box, device keys, and a game-specific bind ID. Having the s-box and device keys allows us to find the bind ID. The s-box was discovered last year, but hackers are still searching for phone specific device keys. These device keys can be used across multiple game dumps, so it's not necessary to find each device's set of device keys for decryption to work. &lt;br /&gt;
&lt;br /&gt;
'''Update: THE DEVICE KEY HAS BEEN FOUND THROUGH BRUTE FORCE.''' But there is still much more to do!&lt;br /&gt;
&lt;br /&gt;
With that in tow, we'll now get to the games: finding the game-specific bind ID using the device key and s-box (which has already been acquired). It depends on how long that will take, but the device key will make things exponentially easier than if we didn't have it. Next is to combine the three to decrypt the game files... and nobody knows what will happen next.&lt;br /&gt;
&lt;br /&gt;
One of the main goals of this brute force effort is to access a specific SD card that contains '''Rockman DASH: Great Adventure on Five Islands!''' &lt;br /&gt;
&lt;br /&gt;
* [https://www.youtube.com/watch?v=fVtgixfBdDc Video footage of Rockman DASH: Great Adventure on Five Islands!]&lt;br /&gt;
* [https://www.twitch.tv/goodtofufriday Cracking Rockman DASH: Great Adventure on Five Islands! Livestream]&lt;br /&gt;
* [https://gitlab.com/usernameak/mkb_bruteforce Source code for MKB Bruteforce]&lt;br /&gt;
&lt;br /&gt;
===Hardcore Summary===&lt;br /&gt;
[[File: MKB.png|thumb|Chart of the 16 MKB types used in SD cards involved in this process. Games are encrypted with MKB 11: SD Binding]]&lt;br /&gt;
&lt;br /&gt;
An MKB on SD cards generally contains two records (except some mostly irrelevant header records): '''Calculate Media Key''' and '''Conditionally Calculate Media Key'''.&lt;br /&gt;
&lt;br /&gt;
# A row which corresponds to our device key is looked up in Calculate Media Key record.&lt;br /&gt;
# We decrypt this row with our device key, and get another key.&lt;br /&gt;
# In the Conditionally Calculate Media Key record, there's an encrypted block with a specific (constant) value which we attempt to decrypt with the key from the previous step.&lt;br /&gt;
# If this value matches what we expected, we look up a row in the Conditionally Calculate Media Key record (same row number as in step 1) and decrypt it with the key we got in step 2, then decrypt it again with the device key - that's our key; else we are done and the key is what we got in step 2.&lt;br /&gt;
&lt;br /&gt;
We've made an assumption that the condition in step 4 is always true. Which isn't extremely unreasonable - values in the Conditionally Calculate Media Key record don't seem like what you would expect according to specification (if I've interpreted it correctly, invalid values would be identical to what is in the Calculate Media Key record; and they aren't). So as long as the assumption holds true, it'll eventually succeed.&lt;br /&gt;
&lt;br /&gt;
For more technical information, please look at the following official PDFs:&lt;br /&gt;
* [{{SERVER}}{{localurl:File:Cprm-base110-20101215.pdf}} Content Protection for Recordable Media Specification: Introduction and Common Cryptographic Elements] (PDF)&lt;br /&gt;
* [{{SERVER}}{{localurl:File:Cprm-sd-com097-20101215.pdf}} Content Protection for Recordable Media Specification: SD Memory Card Book - Common Part] (PDF)&lt;br /&gt;
* [{{SERVER}}{{localurl:File:Cprm-sd-bind-part-092-2005-1212.pdf}} Content Protection for Recordable Media Specification: SD Memory Card Book - SD-Binding Part] (PDF)&lt;br /&gt;
&lt;br /&gt;
== Mobile Device Data Extraction Projects ==&lt;br /&gt;
&lt;br /&gt;
=== NEC ===&lt;br /&gt;
NEC devices enter a testing mode when plugged into a PC using a debug cable (a FOMA cable with pins 8, 9, and 10 bridged together). This cable also works with Panasonic phones. Information on creating a debug cable can be found [https://docs.google.com/document/d/1iELxocYKh-hDV6hk7SYsnb7AHU1j1JkgolC6kz61PA8/edit?usp=sharing here].&lt;br /&gt;
&lt;br /&gt;
==== Firmware Dumped Phone Models ====&lt;br /&gt;
&lt;br /&gt;
* N901iS&lt;br /&gt;
&lt;br /&gt;
=== Panasonic ===&lt;br /&gt;
For Panasonic phones, the debug cable triggers Panasonic IPL mode. This cable also works with NEC phones.&lt;br /&gt;
&lt;br /&gt;
Some Panasonic phones have also had their firmware extracted by unsoldering the eMMC and analyzing it with a chip programmer. &lt;br /&gt;
&lt;br /&gt;
==== Firmware Dumped Phone Models ====&lt;br /&gt;
&lt;br /&gt;
* 301P (eMMC)&lt;br /&gt;
* 401PM (eMMC)&lt;br /&gt;
* P901iS (Debug Cable)&lt;br /&gt;
* P-01F (eMMC)&lt;br /&gt;
* P-01H (eMMC)&lt;br /&gt;
Some phones have had their system data dumped but not their user data&lt;br /&gt;
&lt;br /&gt;
==== System Only Firmware Dumps ====&lt;br /&gt;
&lt;br /&gt;
* P851i&lt;br /&gt;
* P903i&lt;br /&gt;
&lt;br /&gt;
=== LG ===&lt;br /&gt;
LG DoCoMo mobile phones had their firmware dumped at least 10 years ago, though most of these files have been lost. The firmware dumping process has not been replicated since, but should be possible to figure out with some research.&lt;br /&gt;
&lt;br /&gt;
==== Firmware Dumped Phone Models ====&lt;br /&gt;
&lt;br /&gt;
* [https://lpcwiki.miraheze.org/wiki/LG_L704i L704i] (Found Online)&lt;br /&gt;
* L706ie (Found Online)&lt;br /&gt;
* [https://lpcwiki.miraheze.org/wiki/LG_L-03A L-03A] (Found Online)&lt;br /&gt;
&lt;br /&gt;
=== Motorola ===&lt;br /&gt;
The Motorola M702iG and M702iS are based upon the Motorola Razr that was released internationally. Due to the availability of information about these phones, their firmware has successfully been accessed through USB. It's possible to browse the entire file system on these phones using a '''RMCDA General Program''', '''M702iS/M702iG USB Drivers''', and '''P2K Commander'''.&lt;br /&gt;
&lt;br /&gt;
==== Firmware Dumped Phone Models ====&lt;br /&gt;
&lt;br /&gt;
* M702iG&lt;br /&gt;
* M702iS&lt;br /&gt;
&lt;br /&gt;
=== Sharp ===&lt;br /&gt;
Sharp mobile phones have not yet been dumped, but there have been specific efforts towards breaking open the Sharp SH-10C, detailed below.&lt;br /&gt;
&lt;br /&gt;
==== Sharp SH-10C ====&lt;br /&gt;
The Sharp SH-10C is a DoCoMo phone released in 2011. Attempts have been made to read the NAND chip on this phone, in part because its schematics were made public by the [https://fcc.report/FCC-ID/APYHRO00145 FCC]. Currently, there are no chip programmers that support its NAND chip (Toshiba TY00D0021211KC) by default, and attempts at using a chip programmer have not reached past the bootloader. For more information, we recommend reading the report below.&lt;br /&gt;
*[https://docs.google.com/document/d/1X3TN1QIvINPMDC6fmwo6vHCgAT377jOFM1zYkWZzdZY/edit?usp=sharing Report on Extraction of Data from DoCoMo Sharp SH-10C Mobile Phone] by Kraze&lt;br /&gt;
*[https://lpcwiki.miraheze.org/wiki/Sharp_SH-10C Sharp SH-10C] on the Legacy Portable Computer Wiki&lt;br /&gt;
&lt;br /&gt;
== Archive Re-release Restoration Projects ==&lt;br /&gt;
This section will describe efforts to restore original DoJa game files.'''DoJa''' is a proprietary Java runtime developed by NTT Docomo to run specifically on feature phones. Games consist of two files: the .jam file (java manager file), which provides technical information to the phone about the application's install requirements, and the .jar file, which is the game itself. DoJa games use a scratchpad, which is saved as a .sp file.&lt;br /&gt;
&lt;br /&gt;
=== [https://japanesefeaturephones.miraheze.org/wiki/Appli_Archives Appli Archives] for PlayStation Mobile ===&lt;br /&gt;
The Appli Archives are a series of feature phone re-releases. The PlayStation Mobile games contain DoJa files for each game, likely from original source. Game files and assets are drawn from a localhost server that runs within the PlayStation Mobile application. Because of use of localhost, these games cannot run directly in the DoJa SDK. However, some files have been made to run by hosting files on a localhost server on PC.&lt;br /&gt;
&lt;br /&gt;
PlayStation Mobile game packages use [https://www.psdevwiki.com/vita/PSSE PSSE encryption], which requires a game's original license key in order to perform decryption. Because of this, many of the Appli Archive files have not been decrypted, and their DoJa games have remained inaccessible. &lt;br /&gt;
&lt;br /&gt;
Visit the [https://japanesefeaturephones.miraheze.org/wiki/Appli_Archives Japanese Feature Phones wiki] for the full list of games in this collection.&lt;br /&gt;
&lt;br /&gt;
=== [https://japanesefeaturephones.miraheze.org/wiki/Mobile_Game_Deployer Mobile Game Deployer] (MGD) and [https://japanesefeaturephones.miraheze.org/wiki/I%CE%B1ppli_Publisher iαppli Publisher] Games ===&lt;br /&gt;
Mobile Game Deployer/iαppli Publisher was a software that could easily convert i-mode applis into Android, iOS, and Windows Phone programs. A number of prominent feature phone game publishers used this tool to bring their games to the smartphone generation.&lt;br /&gt;
&lt;br /&gt;
The game [https://japanesefeaturephones.miraheze.org/wiki/Flyhight_Cloudia Flyhight Cloudia] was successfully extracted from an Android APK in a fully playable version. &lt;br /&gt;
&lt;br /&gt;
So far, other games have not been converted due to the difficultly in finding original application files for early smartphone games. Not only are these games approximately 10 years old, but they were often distributed in provider-specific mobile game portals, rather than common application stores such as Google Play and the App Store.&lt;br /&gt;
&lt;br /&gt;
===G-mode Archives===&lt;br /&gt;
The [https://japanesefeaturephones.miraheze.org/wiki/G-mode_Archives G-mode Archives] are a collection of Japanese feature phone re-releases for Nintendo Switch and Windows (Steam) published by G-mode. These games were developed in Unity, and so far no DoJa files have been discovered inside of them.&lt;br /&gt;
&lt;br /&gt;
==Emulating Network Protocol?==&lt;br /&gt;
At this point, no one knows how to emulate the proprietary network protocols that were used by these mobile devices to download games. This means that ''no one'' has successfully added new applications or side-loaded applications to a Japanese feature phone. Even though a wifi enabled phone can access a website containing a game download, the wifi Full Browser does not offer the ability to download the game files. Only the proprietary browser (such as i-mode) has the capacity to download and install games.&lt;br /&gt;
&lt;br /&gt;
== Notable Japanese Feature Phone Games ==&lt;br /&gt;
Some notable titles from recognizable game series include:&lt;br /&gt;
&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Before_Crisis_-Final_Fantasy_VII- Before Crisis -Final Fantasy VII-] and [https://japanesefeaturephones.miraheze.org/wiki/Dirge_of_Cerberus_Lost_Episode_-Final_Fantasy_VII- Dirge of Cerberus Lost Episode -Final Fantasy VII-]: Games in the Final Fantasy VII metaverse that greatly expand upon its lore&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Professor_Layton_and_the_Mansion_of_the_Deathly_Mirror Professor Layton and the Mansion of the Deathly Mirror]: A unique Professor Layton title released exclusively for Japanese mobile phones&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Kingdom_Hearts_coded Kingdom Hearts coded]: A story that covers events proceeding the finale of Kingdom Hearts II&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Persona_Mobile_Online Persona Mobile Online]: An entire Persona online MMORPG for cellphones&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Ni_no_Kuni:_Hotroit_Stories Ni no Kuni: Hotroit Stories]: A prologue to the Ni no Kuni series that takes place before Ni no Kuni: Dominion of the Dark Djinn&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Pok%C3%A9mate Pokémate]: The first Pokémon mobile game&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Nakayoshi_Chao! Nakayoshi Chao!]: A Chao virtual pet game for phones&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.youtube.com/watch?v=tKH0x21rj1Y Japan's Game Preservation Crisis] by Did You Know Gaming&lt;br /&gt;
* [https://hitsave.org/feature-phone-gaming/ Japanese Feature Phone Game Preservation: Uncovering a Forgotten Era of Gaming] on HitSave.org&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Main_Page Japanese Feature Phones Wiki] (made by HM member Ellen!)&lt;br /&gt;
* [https://docs.google.com/document/d/1fJdByYSfUPRFFAOixBX5BXx6sGkEc2uqX5verAgBhyc/edit?usp=sharing Feature Phone Preservation Resources] by Ellen&lt;br /&gt;
* [https://archive.org/details/@dekafire Japanese Feature Phone PC Downloads] posted on Archive.org&lt;/div&gt;</summary>
		<author><name>LNRC</name></author>
	</entry>
	<entry>
		<id>https://wiki.hackmanhattan.com/index.php?title=Meeting_2023-10-25&amp;diff=8874</id>
		<title>Meeting 2023-10-25</title>
		<link rel="alternate" type="text/html" href="https://wiki.hackmanhattan.com/index.php?title=Meeting_2023-10-25&amp;diff=8874"/>
		<updated>2023-10-26T00:07:11Z</updated>

		<summary type="html">&lt;p&gt;LNRC: /* Member and Project Reports */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Consensus Agenda==&lt;br /&gt;
None&lt;br /&gt;
&lt;br /&gt;
== New Business ==&lt;br /&gt;
* New Members: Jordan, Bill&lt;br /&gt;
* Front door RFIDs and physical keys are inside the safe&lt;br /&gt;
&lt;br /&gt;
===Sponsored Members Induction===&lt;br /&gt;
For each prospective member, please confirm no later than Thursday before the meeting:&lt;br /&gt;
&lt;br /&gt;
* Has the member visited 3 times at the regular Tuesday and Thursday open nights?&lt;br /&gt;
* Has the member received the briefing? When, and who was the briefer?&lt;br /&gt;
* Has the member's bio and photo been circulated on the members list? (not just Discord)&lt;br /&gt;
&lt;br /&gt;
==Member Reports==&lt;br /&gt;
=== Board Reports===&lt;br /&gt;
====President's Report====&lt;br /&gt;
* IMPORTANT REMINDERS ABOUT THE SPACE&lt;br /&gt;
** You must lock the building door (street door) if you're last out (no one else in the space when you leave. A board member can give you a key from the safe if you do not have one.&lt;br /&gt;
** '''No sleeping is allowed in the space.'''&lt;br /&gt;
** Do NOT go upstairs for any reason.&lt;br /&gt;
&lt;br /&gt;
====Treasurer's Report====&lt;br /&gt;
* Insurance payment of $475&lt;br /&gt;
** Insurance payments have risen&lt;br /&gt;
* ConEd: $220.63&lt;br /&gt;
** About $40 higher that the same time last year&lt;br /&gt;
&lt;br /&gt;
====Secretary's Report====&lt;br /&gt;
* No report.&lt;br /&gt;
&lt;br /&gt;
====Directors-at-Large's Report====&lt;br /&gt;
* No report.&lt;br /&gt;
&lt;br /&gt;
===Member and Project Reports===&lt;br /&gt;
* Shway: Shakespeare Night every Monday - Still going but only a few members so far. Please join!&lt;br /&gt;
* Jordan: Proposal for lockpicking workshop - Rough idea for this first one is it will be between 12-16 people at $30-40 where people will get a SC1 lock and I'll provide tools to be borrowed to learn how to disassemble and re-pin the lock from the current key to the new key. Students will be able to take both keys and the lock home. &lt;br /&gt;
** 12 people X $30 = $360&lt;br /&gt;
** 16 people x $$30 = $480&lt;br /&gt;
** 12 people x $40 = $480&lt;br /&gt;
** 16 people x $40 = $640&lt;br /&gt;
** And we do half space half me.&lt;br /&gt;
* Ellen: Update on [[Japanese Feature Phone Preservation]] - The device key brute force effort worked and the key was found! However, there is one more key to discover. Right now members of the project are analyzing firmware dumps of Panasonic phones to understand the encryption mechanism. Separately, Ellen is trying to get acquired Java games working in an emulator but needs help reading Java code to make them work. Please reach out in the Retro Gaming channel!&lt;br /&gt;
* Tristan: Got some objects cut with CNC, now the objects need to be spray painted and dried&lt;br /&gt;
* Erika: Windows are clean! Do we need curtains now?&lt;br /&gt;
* Shway: Went to amateur radio meetup, one person from meetup came to visit&lt;br /&gt;
* Tristan: We've made a larger 3D printout of Erika's head&lt;br /&gt;
* Erika: Brought paintings this week&lt;br /&gt;
&lt;br /&gt;
==Meeting Meta==&lt;br /&gt;
* Members in Attendance: Online: Jay, Nick, Clyde, Mihir, Tristan - In-Person: Erika, Shway, Peter | Thomas&lt;br /&gt;
* Visitors: visitor1, visitor2&lt;br /&gt;
* Called to order at 7:37 by Peter.&lt;br /&gt;
* The meeting was adjourned at 8:04 by Peter.&lt;br /&gt;
* Minutes taken and submitted by Ellen.&lt;br /&gt;
&lt;br /&gt;
[[Category:Meetings]]&lt;/div&gt;</summary>
		<author><name>LNRC</name></author>
	</entry>
	<entry>
		<id>https://wiki.hackmanhattan.com/index.php?title=Meeting_2023-10-25&amp;diff=8873</id>
		<title>Meeting 2023-10-25</title>
		<link rel="alternate" type="text/html" href="https://wiki.hackmanhattan.com/index.php?title=Meeting_2023-10-25&amp;diff=8873"/>
		<updated>2023-10-26T00:06:30Z</updated>

		<summary type="html">&lt;p&gt;LNRC: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Consensus Agenda==&lt;br /&gt;
None&lt;br /&gt;
&lt;br /&gt;
== New Business ==&lt;br /&gt;
* New Members: Jordan, Bill&lt;br /&gt;
* Front door RFIDs and physical keys are inside the safe&lt;br /&gt;
&lt;br /&gt;
===Sponsored Members Induction===&lt;br /&gt;
For each prospective member, please confirm no later than Thursday before the meeting:&lt;br /&gt;
&lt;br /&gt;
* Has the member visited 3 times at the regular Tuesday and Thursday open nights?&lt;br /&gt;
* Has the member received the briefing? When, and who was the briefer?&lt;br /&gt;
* Has the member's bio and photo been circulated on the members list? (not just Discord)&lt;br /&gt;
&lt;br /&gt;
==Member Reports==&lt;br /&gt;
=== Board Reports===&lt;br /&gt;
====President's Report====&lt;br /&gt;
* IMPORTANT REMINDERS ABOUT THE SPACE&lt;br /&gt;
** You must lock the building door (street door) if you're last out (no one else in the space when you leave. A board member can give you a key from the safe if you do not have one.&lt;br /&gt;
** '''No sleeping is allowed in the space.'''&lt;br /&gt;
** Do NOT go upstairs for any reason.&lt;br /&gt;
&lt;br /&gt;
====Treasurer's Report====&lt;br /&gt;
* Insurance payment of $475&lt;br /&gt;
** Insurance payments have risen&lt;br /&gt;
* ConEd: $220.63&lt;br /&gt;
** About $40 higher that the same time last year&lt;br /&gt;
&lt;br /&gt;
====Secretary's Report====&lt;br /&gt;
* No report.&lt;br /&gt;
&lt;br /&gt;
====Directors-at-Large's Report====&lt;br /&gt;
* No report.&lt;br /&gt;
&lt;br /&gt;
===Member and Project Reports===&lt;br /&gt;
* Shway: Shakespeare Night every Monday - Still going but only a few members so far. Please join!&lt;br /&gt;
* Jordan: Proposal for lockpicking workshop - Rough idea for this first one is it will be between 12-16 people at $30-40 where people will get a SC1 lock and I'll provide tools to be borrowed to learn how to disassemble and re-pin the lock from the current key to the new key. Students will be able to take both keys and the lock home. &lt;br /&gt;
** 12 people X $30 = $360&lt;br /&gt;
** 16 people x $$30 = $480&lt;br /&gt;
** 12 people x $40 = $480&lt;br /&gt;
** 16 people x $40 = $640&lt;br /&gt;
** And we do half space half me.&lt;br /&gt;
* Ellen: Update on [[Japanese Feature Phone Preservation]] - The device key brute force effort worked and the key was found! However, there is one more key to discover. Right now members of the project are analyzing firmware dumps of Panasonic phones to understand the encryption mechanism. Separately, Ellen is working to get acquired Java games working in an emulator but needs help reading Java code to make them work. Please reach out in the Retro Gaming channel!&lt;br /&gt;
* Tristan: Got some objects cut with CNC, now the objects need to be spray painted and dried&lt;br /&gt;
* Erika: Windows are clean! Do we need curtains now?&lt;br /&gt;
* Shway: Went to amateur radio meetup, one person from meetup came to visit&lt;br /&gt;
* Tristan: We've made a larger 3D printout of Erika's head&lt;br /&gt;
* Erika: Brought paintings this week&lt;br /&gt;
&lt;br /&gt;
==Meeting Meta==&lt;br /&gt;
* Members in Attendance: Online: Jay, Nick, Clyde, Mihir, Tristan - In-Person: Erika, Shway, Peter | Thomas&lt;br /&gt;
* Visitors: visitor1, visitor2&lt;br /&gt;
* Called to order at 7:37 by Peter.&lt;br /&gt;
* The meeting was adjourned at 8:04 by Peter.&lt;br /&gt;
* Minutes taken and submitted by Ellen.&lt;br /&gt;
&lt;br /&gt;
[[Category:Meetings]]&lt;/div&gt;</summary>
		<author><name>LNRC</name></author>
	</entry>
	<entry>
		<id>https://wiki.hackmanhattan.com/index.php?title=Meeting_2023-10-25&amp;diff=8872</id>
		<title>Meeting 2023-10-25</title>
		<link rel="alternate" type="text/html" href="https://wiki.hackmanhattan.com/index.php?title=Meeting_2023-10-25&amp;diff=8872"/>
		<updated>2023-10-26T00:05:10Z</updated>

		<summary type="html">&lt;p&gt;LNRC: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Consensus Agenda==&lt;br /&gt;
None&lt;br /&gt;
&lt;br /&gt;
== New Business ==&lt;br /&gt;
* New Members: Jordan, Bill&lt;br /&gt;
* Front door RFIDs and physical keys are inside the safe&lt;br /&gt;
&lt;br /&gt;
===Sponsored Members Induction===&lt;br /&gt;
For each prospective member, please confirm no later than Thursday before the meeting:&lt;br /&gt;
&lt;br /&gt;
* Has the member visited 3 times at the regular Tuesday and Thursday open nights?&lt;br /&gt;
* Has the member received the briefing? When, and who was the briefer?&lt;br /&gt;
* Has the member's bio and photo been circulated on the members list? (not just Discord)&lt;br /&gt;
&lt;br /&gt;
==Member Reports==&lt;br /&gt;
=== Board Reports===&lt;br /&gt;
====President's Report====&lt;br /&gt;
* IMPORTANT REMINDERS ABOUT THE SPACE&lt;br /&gt;
** You must lock the building door (street door) if you're last out (no one else in the space when you leave. A board member can give you a key from the safe if you do not have one.&lt;br /&gt;
** '''No sleeping is allowed in the space.'''&lt;br /&gt;
** Do NOT go upstairs for any reason.&lt;br /&gt;
&lt;br /&gt;
====Treasurer's Report====&lt;br /&gt;
* Insurance payment of $475&lt;br /&gt;
** Insurance payments have risen&lt;br /&gt;
* ConEd: $220.63&lt;br /&gt;
** About $40 higher that the same time last year&lt;br /&gt;
&lt;br /&gt;
====Secretary's Report====&lt;br /&gt;
* No report.&lt;br /&gt;
&lt;br /&gt;
====Directors-at-Large's Report====&lt;br /&gt;
* No report.&lt;br /&gt;
&lt;br /&gt;
===Member and Project Reports===&lt;br /&gt;
* Shway: Shakespeare Night every Monday - Still going but only a few members so far. Please join!&lt;br /&gt;
* Jordan: Proposal for lockpicking workshop - Rough idea for this first one is it will be between 12-16 people at $30-40 where people will get a SC1 lock and I'll provide tools to be borrowed to learn how to disassemble and re-pin the lock from the current key to the new key. Students will be able to take both keys and the lock home. &lt;br /&gt;
** 12 people X $30 = $360&lt;br /&gt;
** 16 people x $$30 = $480&lt;br /&gt;
** 12 people x $40 = $480&lt;br /&gt;
** 16 people x $40 = $640&lt;br /&gt;
** And we do half space half me.&lt;br /&gt;
* Ellen: Update on [[Japanese Feature Phone Preservation]] - The device key brute force effort worked and the key was found! However, there is one more key to discover and few leads. Ellen is also working to get acquired Java games working in an emulator but needs help reading Java code to make them work. Please reach out in the Retro Gaming channel!&lt;br /&gt;
* Tristan: Got some objects cut with CNC, now the objects need to be spray painted and dried&lt;br /&gt;
* Erika: Windows are clean! Do we need curtains now?&lt;br /&gt;
* Shway: Went to amateur radio meetup, one person from meetup came to visit&lt;br /&gt;
* Tristan: We've made a larger 3D printout of Erika's head&lt;br /&gt;
* Erika: Brought paintings this week&lt;br /&gt;
&lt;br /&gt;
==Meeting Meta==&lt;br /&gt;
* Members in Attendance: Online: Jay, Nick, Clyde, Mihir, Tristan - In-Person: Erika, Shway, Peter | Thomas&lt;br /&gt;
* Visitors: visitor1, visitor2&lt;br /&gt;
* Called to order at 7:37 by Peter.&lt;br /&gt;
* The meeting was adjourned at 8:04 by Peter.&lt;br /&gt;
* Minutes taken and submitted by Ellen.&lt;br /&gt;
&lt;br /&gt;
[[Category:Meetings]]&lt;/div&gt;</summary>
		<author><name>LNRC</name></author>
	</entry>
	<entry>
		<id>https://wiki.hackmanhattan.com/index.php?title=Meeting_2023-10-25&amp;diff=8871</id>
		<title>Meeting 2023-10-25</title>
		<link rel="alternate" type="text/html" href="https://wiki.hackmanhattan.com/index.php?title=Meeting_2023-10-25&amp;diff=8871"/>
		<updated>2023-10-26T00:04:07Z</updated>

		<summary type="html">&lt;p&gt;LNRC: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Consensus Agenda==&lt;br /&gt;
None&lt;br /&gt;
&lt;br /&gt;
== New Business ==&lt;br /&gt;
* New Members: Jordan, Bill&lt;br /&gt;
* Front door RFIDs and physical keys are inside the safe&lt;br /&gt;
&lt;br /&gt;
===Sponsored Members Induction===&lt;br /&gt;
For each prospective member, please confirm no later than Thursday before the meeting:&lt;br /&gt;
&lt;br /&gt;
* Has the member visited 3 times at the regular Tuesday and Thursday open nights?&lt;br /&gt;
* Has the member received the briefing? When, and who was the briefer?&lt;br /&gt;
* Has the member's bio and photo been circulated on the members list? (not just Discord)&lt;br /&gt;
&lt;br /&gt;
==Member Reports==&lt;br /&gt;
=== Board Reports===&lt;br /&gt;
====President's Report====&lt;br /&gt;
* IMPORTANT REMINDERS ABOUT THE SPACE&lt;br /&gt;
** You must lock the building door (street door) if you're last out (no one else in the space when you leave. A board member can give you a key from the safe if you do not have one.&lt;br /&gt;
** '''No sleeping is allowed in the space.'''&lt;br /&gt;
** Do NOT go upstairs for any reason.&lt;br /&gt;
&lt;br /&gt;
====Treasurer's Report====&lt;br /&gt;
* Insurance payment of $475&lt;br /&gt;
** Insurance payments have risen&lt;br /&gt;
* ConEd: $220.63&lt;br /&gt;
** About $40 higher that the same time last year&lt;br /&gt;
&lt;br /&gt;
====Secretary's Report====&lt;br /&gt;
* No report.&lt;br /&gt;
&lt;br /&gt;
====Directors-at-Large's Report====&lt;br /&gt;
* No report.&lt;br /&gt;
&lt;br /&gt;
===Member and Project Reports===&lt;br /&gt;
* Shway: Shakespeare Night every Monday - Still going but only a few members so far. Please join!&lt;br /&gt;
* Jordan: Proposal for lockpicking workshop - Rough idea for this first one is it will be between 12-16 people at $30-40 where people will get a SC1 lock and I'll provide tools to be borrowed to learn how to disassemble and re-pin the lock from the current key to the new key. Students will be able to take both keys and the lock home. &lt;br /&gt;
** 12 people X $30 = $360&lt;br /&gt;
** 16 people x $$30 = $480&lt;br /&gt;
** 12 people x $40 = $480&lt;br /&gt;
** 16 people x $40 = $640&lt;br /&gt;
** And we do half space half me.&lt;br /&gt;
* Ellen: Update on [[Japanese Feature Phone Preservation]] - The device key brute force effort worked and the key was found! However, there is one more key to discover and few leads. Ellen is also working to get acquired Java games working in an emulator but needs help reading Java code to make them work. Please reach out in the Retro Gaming channel!&lt;br /&gt;
* Tristan: Got some objects cut with CNC, now the objects need to be spray painted and dried&lt;br /&gt;
* Erika: Windows are clean! Do we need curtains now?&lt;br /&gt;
* Shway: Went to amateur radio meetup, one person from meetup came to visit&lt;br /&gt;
* Tristan: We've made a larger 3D printout of Erika's head&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Meeting Meta==&lt;br /&gt;
* Members in Attendance: Online: Jay, Nick, Clyde, Mihir, Tristan - In-Person: Erika, Shway, Peter | Thomas&lt;br /&gt;
* Visitors: visitor1, visitor2&lt;br /&gt;
* Called to order at 7:37 by Peter.&lt;br /&gt;
* The meeting was adjourned at 23:59 by MEMBER.&lt;br /&gt;
* Minutes taken and submitted by Ellen.&lt;br /&gt;
&lt;br /&gt;
[[Category:Meetings]]&lt;/div&gt;</summary>
		<author><name>LNRC</name></author>
	</entry>
	<entry>
		<id>https://wiki.hackmanhattan.com/index.php?title=Meeting_2023-10-25&amp;diff=8870</id>
		<title>Meeting 2023-10-25</title>
		<link rel="alternate" type="text/html" href="https://wiki.hackmanhattan.com/index.php?title=Meeting_2023-10-25&amp;diff=8870"/>
		<updated>2023-10-26T00:01:15Z</updated>

		<summary type="html">&lt;p&gt;LNRC: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Consensus Agenda==&lt;br /&gt;
None&lt;br /&gt;
&lt;br /&gt;
== New Business ==&lt;br /&gt;
* New Members: Jordan, Bill&lt;br /&gt;
* Front door RFIDs and physical keys are inside the safe&lt;br /&gt;
&lt;br /&gt;
===Sponsored Members Induction===&lt;br /&gt;
For each prospective member, please confirm no later than Thursday before the meeting:&lt;br /&gt;
&lt;br /&gt;
* Has the member visited 3 times at the regular Tuesday and Thursday open nights?&lt;br /&gt;
* Has the member received the briefing? When, and who was the briefer?&lt;br /&gt;
* Has the member's bio and photo been circulated on the members list? (not just Discord)&lt;br /&gt;
&lt;br /&gt;
==Member Reports==&lt;br /&gt;
=== Board Reports===&lt;br /&gt;
====President's Report====&lt;br /&gt;
* IMPORTANT REMINDERS ABOUT THE SPACE&lt;br /&gt;
** You must lock the building door (street door) if you're last out (no one else in the space when you leave. A board member can give you a key from the safe if you do not have one.&lt;br /&gt;
** '''No sleeping is allowed in the space.'''&lt;br /&gt;
** Do NOT go upstairs for any reason.&lt;br /&gt;
&lt;br /&gt;
====Treasurer's Report====&lt;br /&gt;
* Insurance payment of $475&lt;br /&gt;
** Insurance payments have risen&lt;br /&gt;
* ConEd: $220.63&lt;br /&gt;
** About $40 higher that the same time last year&lt;br /&gt;
&lt;br /&gt;
====Secretary's Report====&lt;br /&gt;
* No report.&lt;br /&gt;
&lt;br /&gt;
====Directors-at-Large's Report====&lt;br /&gt;
* No report.&lt;br /&gt;
&lt;br /&gt;
===Member and Project Reports===&lt;br /&gt;
* Shway: Shakespeare Night every Monday - Still going but only a few members so far. Please join!&lt;br /&gt;
* Jordan: Proposal for lockpicking workshop - Rough idea for this first one is it will be between 12-16 people at $30-40 where people will get a SC1 lock and I'll provide tools to be borrowed to learn how to disassemble and re-pin the lock from the current key to the new key. Students will be able to take both keys and the lock home. &lt;br /&gt;
** 12 people X $30 = $360&lt;br /&gt;
** 16 people x $$30 = $480&lt;br /&gt;
** 12 people x $40 = $480&lt;br /&gt;
** 16 people x $40 = $640&lt;br /&gt;
** And we do half space half me.&lt;br /&gt;
* Ellen: Update on [[Japanese Feature Phone Preservation]] - The device key brute force effort worked and the key was found! However, there is one more key to discover and few leads. Ellen is also working to get acquired Java games working in an emulator but needs help reading Java code to make them work.&lt;br /&gt;
* Tristan: Got some objects cut with CNC, now the objects need to be spray painted and dried&lt;br /&gt;
&lt;br /&gt;
==Meeting Meta==&lt;br /&gt;
* Members in Attendance: Online: Jay, Nick, Clyde, Mihir, Tristan | In-Person: Erika, Shway, Peter | latemember1&lt;br /&gt;
* Visitors: visitor1, visitor2&lt;br /&gt;
* Called to order at 7:37 by Peter.&lt;br /&gt;
* The meeting was adjourned at 23:59 by MEMBER.&lt;br /&gt;
* Minutes taken and submitted by Ellen.&lt;br /&gt;
&lt;br /&gt;
[[Category:Meetings]]&lt;/div&gt;</summary>
		<author><name>LNRC</name></author>
	</entry>
	<entry>
		<id>https://wiki.hackmanhattan.com/index.php?title=Meeting_2023-10-25&amp;diff=8869</id>
		<title>Meeting 2023-10-25</title>
		<link rel="alternate" type="text/html" href="https://wiki.hackmanhattan.com/index.php?title=Meeting_2023-10-25&amp;diff=8869"/>
		<updated>2023-10-25T23:48:07Z</updated>

		<summary type="html">&lt;p&gt;LNRC: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Consensus Agenda==&lt;br /&gt;
None&lt;br /&gt;
&lt;br /&gt;
== New Business ==&lt;br /&gt;
* New Members: Sidepocket, Bill&lt;br /&gt;
* Front door RFIDs and physical keys are inside the safe&lt;br /&gt;
&lt;br /&gt;
===Sponsored Members Induction===&lt;br /&gt;
For each prospective member, please confirm no later than Thursday before the meeting:&lt;br /&gt;
&lt;br /&gt;
* Has the member visited 3 times at the regular Tuesday and Thursday open nights?&lt;br /&gt;
* Has the member received the briefing? When, and who was the briefer?&lt;br /&gt;
* Has the member's bio and photo been circulated on the members list? (not just Discord)&lt;br /&gt;
&lt;br /&gt;
==Member Reports==&lt;br /&gt;
=== Board Reports===&lt;br /&gt;
====President's Report====&lt;br /&gt;
* IMPORTANT REMINDERS ABOUT THE SPACE&lt;br /&gt;
** You must lock the building door (street door) if you're last out (no one else in the space when you leave. A board member can give you a key from the safe if you do not have one.&lt;br /&gt;
** '''No sleeping is allowed in the space.'''&lt;br /&gt;
** Do NOT go upstairs for any reason.&lt;br /&gt;
&lt;br /&gt;
====Treasurer's Report====&lt;br /&gt;
* Insurance payment of $475&lt;br /&gt;
** Insurance payments have risen&lt;br /&gt;
* ConEd: $220.63&lt;br /&gt;
&lt;br /&gt;
====Secretary's Report====&lt;br /&gt;
* No report.&lt;br /&gt;
&lt;br /&gt;
====Directors-at-Large's Report====&lt;br /&gt;
* No report.&lt;br /&gt;
&lt;br /&gt;
===Member and Project Reports===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Meeting Meta==&lt;br /&gt;
* Members in Attendance: Online: Jay, Nick, Clyde, Mihir, Tristan | In-Person: Erika, Shway, Peter | latemember1&lt;br /&gt;
* Visitors: visitor1, visitor2&lt;br /&gt;
* Called to order at 7:37 by Peter.&lt;br /&gt;
* The meeting was adjourned at 23:59 by MEMBER.&lt;br /&gt;
* Minutes taken and submitted by Ellen.&lt;br /&gt;
&lt;br /&gt;
[[Category:Meetings]]&lt;/div&gt;</summary>
		<author><name>LNRC</name></author>
	</entry>
	<entry>
		<id>https://wiki.hackmanhattan.com/index.php?title=Meeting_2023-10-25&amp;diff=8868</id>
		<title>Meeting 2023-10-25</title>
		<link rel="alternate" type="text/html" href="https://wiki.hackmanhattan.com/index.php?title=Meeting_2023-10-25&amp;diff=8868"/>
		<updated>2023-10-25T23:38:13Z</updated>

		<summary type="html">&lt;p&gt;LNRC: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Consensus Agenda==&lt;br /&gt;
* Consensus Item 1&lt;br /&gt;
* Consensus Item 2&lt;br /&gt;
&lt;br /&gt;
== New Business ==&lt;br /&gt;
&lt;br /&gt;
===Sponsored Members Induction===&lt;br /&gt;
For each prospective member, please confirm no later than Thursday before the meeting:&lt;br /&gt;
&lt;br /&gt;
* Has the member visited 3 times at the regular Tuesday and Thursday open nights?&lt;br /&gt;
* Has the member received the briefing? When, and who was the briefer?&lt;br /&gt;
* Has the member's bio and photo been circulated on the members list? (not just Discord)&lt;br /&gt;
&lt;br /&gt;
==Member Reports==&lt;br /&gt;
=== Board Reports===&lt;br /&gt;
====President's Report====&lt;br /&gt;
* No report.&lt;br /&gt;
====Treasurer's Report====&lt;br /&gt;
* Insurance payment of $475&lt;br /&gt;
* ConEd: $220.63&lt;br /&gt;
====Secretary's Report====&lt;br /&gt;
* No report.&lt;br /&gt;
====Directors-at-Large's Report====&lt;br /&gt;
* No report.&lt;br /&gt;
===Member and Project Reports===&lt;br /&gt;
&lt;br /&gt;
==Meeting Meta==&lt;br /&gt;
* Members in Attendance: Online: Jay, Nick, Clyde, Mihir | In-Person: Erika, Shway, Peter | latemember1&lt;br /&gt;
* Visitors: visitor1, visitor2&lt;br /&gt;
* Called to order at 7:37 by Peter.&lt;br /&gt;
* The meeting was adjourned at 23:59 by MEMBER.&lt;br /&gt;
* Minutes taken and submitted by Ellen.&lt;br /&gt;
&lt;br /&gt;
[[Category:Meetings]]&lt;/div&gt;</summary>
		<author><name>LNRC</name></author>
	</entry>
	<entry>
		<id>https://wiki.hackmanhattan.com/index.php?title=Japanese_Feature_Phone_Preservation&amp;diff=8867</id>
		<title>Japanese Feature Phone Preservation</title>
		<link rel="alternate" type="text/html" href="https://wiki.hackmanhattan.com/index.php?title=Japanese_Feature_Phone_Preservation&amp;diff=8867"/>
		<updated>2023-10-25T23:36:45Z</updated>

		<summary type="html">&lt;p&gt;LNRC: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:JapaneseFeaturePhones.jpg |thumb]]&lt;br /&gt;
Japanese feature phones is a category of mobile devices that were released (almost) exclusively in Japan between approximately 1999-2015. These phones contained many features that took over a decade to reach the rest of the world: game streaming, live TV, digital wallets, virtual characters to replace you on video calls, and more. The phones offered platform-exclusive games from many beloved franchises such as ''Final Fantasy, Pokemon, Kingdom Hearts, Professor Layton,'' and ''Megami Tensei.'' Mobile devices in Japan were developed by a variety of companies, each with their own proprietary hardware and software. Because of the diversity of phone models, the restrictive copyright protections, a separate set of [https://en.wikipedia.org/wiki/I-mode proprietary internet protocols], and more, these phones and their games have been extremely challenging to preserve.&lt;br /&gt;
&lt;br /&gt;
==Brute Force Live Stream: Cracking the Cryptomeria Cipher==&lt;br /&gt;
===General Summary===&lt;br /&gt;
[[File:RockmanDash5Islands.jpg|thumb|Rockman DASH: Great Adventure on 5 Islands! ([https://www.legends-station.com/?id=big-5-island-adventure image source])]]&lt;br /&gt;
The microSD cards in Japanese feature phones hide copyright protected data using a [https://en.wikipedia.org/wiki/Cryptomeria_cipher Cryptomeria Cipher], also known as a C2. Cracking the C2 requires three things: s-box, device keys, and a game-specific bind ID. Having the s-box and device keys allows us to find the bind ID. The s-box was discovered last year, but hackers are still searching for phone specific device keys. These device keys can be used across multiple game dumps, so it's not necessary to find each device's set of device keys for decryption to work. &lt;br /&gt;
&lt;br /&gt;
'''Update: THE DEVICE KEY HAS BEEN FOUND THROUGH BRUTE FORCE.''' But there is still much more to do!&lt;br /&gt;
&lt;br /&gt;
With that in tow, we'll now get to the games: finding the game-specific bind ID using the device key and s-box (which has already been acquired). It depends on how long that will take, but the device key will make things exponentially easier than if we didn't have it. Next is to combine the three to decrypt the game files... and nobody knows what will happen next.&lt;br /&gt;
&lt;br /&gt;
One of the main goals of this brute force effort is to access a specific SD card that contains '''Rockman DASH: Great Adventure on Five Islands!''' &lt;br /&gt;
&lt;br /&gt;
* [https://www.youtube.com/watch?v=fVtgixfBdDc Video footage of Rockman DASH: Great Adventure on Five Islands!]&lt;br /&gt;
* [https://www.twitch.tv/goodtofufriday Cracking Rockman DASH: Great Adventure on Five Islands! Livestream]&lt;br /&gt;
* [https://gitlab.com/usernameak/mkb_bruteforce Source code for MKB Bruteforce]&lt;br /&gt;
&lt;br /&gt;
===Hardcore Summary===&lt;br /&gt;
[[File: MKB.png|thumb|Chart of the 16 MKB types used in SD cards involved in this process. Games are encrypted with MKB 11: SD Binding]]&lt;br /&gt;
&lt;br /&gt;
An MKB on SD cards generally contains two records (except some mostly irrelevant header records): '''Calculate Media Key''' and '''Conditionally Calculate Media Key'''.&lt;br /&gt;
&lt;br /&gt;
# A row which corresponds to our device key is looked up in Calculate Media Key record.&lt;br /&gt;
# We decrypt this row with our device key, and get another key.&lt;br /&gt;
# In the Conditionally Calculate Media Key record, there's an encrypted block with a specific (constant) value which we attempt to decrypt with the key from the previous step.&lt;br /&gt;
# If this value matches what we expected, we look up a row in the Conditionally Calculate Media Key record (same row number as in step 1) and decrypt it with the key we got in step 2, then decrypt it again with the device key - that's our key; else we are done and the key is what we got in step 2.&lt;br /&gt;
&lt;br /&gt;
We've made an assumption that the condition in step 4 is always true. Which isn't extremely unreasonable - values in the Conditionally Calculate Media Key record don't seem like what you would expect according to specification (if I've interpreted it correctly, invalid values would be identical to what is in the Calculate Media Key record; and they aren't). So as long as the assumption holds true, it'll eventually succeed.&lt;br /&gt;
&lt;br /&gt;
For more technical information, please look at the following official PDFs:&lt;br /&gt;
* [{{SERVER}}{{localurl:File:Cprm-base110-20101215.pdf}} Content Protection for Recordable Media Specification: Introduction and Common Cryptographic Elements] (PDF)&lt;br /&gt;
* [{{SERVER}}{{localurl:File:Cprm-sd-com097-20101215.pdf}} Content Protection for Recordable Media Specification: SD Memory Card Book - Common Part] (PDF)&lt;br /&gt;
* [{{SERVER}}{{localurl:File:Cprm-sd-bind-part-092-2005-1212.pdf}} Content Protection for Recordable Media Specification: SD Memory Card Book - SD-Binding Part] (PDF)&lt;br /&gt;
&lt;br /&gt;
== Mobile Device Data Extraction Projects ==&lt;br /&gt;
&lt;br /&gt;
===Sharp SH-10C===&lt;br /&gt;
[[File:RockmanPhantomofNetwork.png|thumb|Screenshot of ''Rockman.exe Phantom of Network'' ([https://www.rockman-corner.com/2021/09/rockman-exe-phantom-of-networklegend-of.html source])]]&lt;br /&gt;
The Sharp SH-10C is a DoCoMo phone released in 2011. Attempts have been made to read the NAND chip on this phone, in part because its schematics were made public by the [https://fcc.report/FCC-ID/APYHRO00145 FCC]. Currently, there are no chip programmers that support its NAND chip (Toshiba TY00D0021211KC) by default, and attempts at using a chip programmer have not reached past the bootloader. This phone model does not allow applications to be transferred to an SD card.&lt;br /&gt;
&lt;br /&gt;
Right now, preservationists are focusing on this model of phone for a few reasons:&lt;br /&gt;
* The schematics were leaked by the FFC ([https://fcc.report/FCC-ID/APYHRO00145 see here])&lt;br /&gt;
* A member of the community possesses a phone with two Mega Man exclusive games: '''Rockman.exe: Phantom of Network''' and '''Rockman.exe: Legend of Network'''&lt;br /&gt;
* Since this was one of the last Japanese feature phones to be released, it offers a wider variety of possibly exploitable tools such as a wifi-enabled Netfront web browser and [https://en.wikipedia.org/wiki/Adobe_Flash_Lite Adobe Flash Lite]&lt;br /&gt;
&lt;br /&gt;
For more information, we recommend reading the report below. &lt;br /&gt;
* [https://docs.google.com/document/d/1X3TN1QIvINPMDC6fmwo6vHCgAT377jOFM1zYkWZzdZY/edit?usp=sharing Report on Extraction of Data from DoCoMo Sharp SH-10C Mobile Phone] by Kraze&lt;br /&gt;
* [https://lpcwiki.miraheze.org/wiki/Sharp_SH-10C Sharp SH-10C] on the Legacy Portable Computer Wiki&lt;br /&gt;
&lt;br /&gt;
===Motorola M702iG and M702iS===&lt;br /&gt;
The Motorola M702iG and M702iS are based upon the Motorola Razr that was released internationally. Due to the availability of information about these phones, their firmware has successfully been accessed through USB. It's possible to browse the entire file system on these phones using '''RMCDA General Program'''.&lt;br /&gt;
&lt;br /&gt;
* M702iS/M702iG USB Drivers are required.&lt;br /&gt;
* You will need RMCDA General Program. This will do something to the M702iS/G that open its file system up to P2K Commander. You will need information displayed on the screen to proceed to the next step.&lt;br /&gt;
* P2K Commander will be able to access file system after using RCDMA General.&lt;br /&gt;
* Java Games are located in KJAVA folder.&lt;br /&gt;
&lt;br /&gt;
===Panasonic P-01F===&lt;br /&gt;
The Panasonic P-01F successfully had its firmware extracted by unsoldering the eMMC and analyzing it with a chip programmer. This technique was also used for the '''Panasonic 301P''' and '''Panasonic 401PM'''.&lt;br /&gt;
&lt;br /&gt;
===Others===&lt;br /&gt;
There are many individuals in the preservation community with their own unique phone models seeking unique device solutions, either through debugging software or direct eMMC file transfer. Feel free to ask in the [https://discord.com/invite/jh56s2v5PP Discord] Retro Gaming channel for more info!&lt;br /&gt;
&lt;br /&gt;
== Archive Re-release Restoration Projects ==&lt;br /&gt;
This section will describe efforts to restore original DoJa game files.'''DoJa''' is a proprietary Java runtime developed by NTT Docomo to run specifically on feature phones. Games consist of two files: the .jam file (java manager file), which provides technical information to the phone about the application's install requirements, and the .jar file, which is the game itself. DoJa games use a scratchpad, which is saved as a .sp file.&lt;br /&gt;
&lt;br /&gt;
=== [https://japanesefeaturephones.miraheze.org/wiki/Appli_Archives Appli Archives] for PlayStation Mobile ===&lt;br /&gt;
The Appli Archives are a series of feature phone re-releases. The PlayStation Mobile games contain DoJa files for each game, likely from original source. Game files and assets are drawn from a localhost server that runs within the PlayStation Mobile application. Because of use of localhost, these games cannot run directly in the DoJa SDK. However, some files have been made to run by hosting files on a localhost server on PC.&lt;br /&gt;
&lt;br /&gt;
PlayStation Mobile game packages use [https://www.psdevwiki.com/vita/PSSE PSSE encryption], which requires a game's original license key in order to perform decryption. Because of this, many of the Appli Archive files have not been decrypted, and their DoJa games have remained inaccessible. &lt;br /&gt;
&lt;br /&gt;
Visit the [https://japanesefeaturephones.miraheze.org/wiki/Appli_Archives Japanese Feature Phones wiki] for the full list of games in this collection.&lt;br /&gt;
&lt;br /&gt;
=== [https://japanesefeaturephones.miraheze.org/wiki/Mobile_Game_Deployer Mobile Game Deployer] (MGD) and [https://japanesefeaturephones.miraheze.org/wiki/I%CE%B1ppli_Publisher iαppli Publisher] Games ===&lt;br /&gt;
Mobile Game Deployer/iαppli Publisher was a software that could easily convert i-mode applis into Android, iOS, and Windows Phone programs. A number of prominent feature phone game publishers used this tool to bring their games to the smartphone generation.&lt;br /&gt;
&lt;br /&gt;
The game [https://japanesefeaturephones.miraheze.org/wiki/Flyhight_Cloudia Flyhight Cloudia] was successfully extracted from an Android APK in a fully playable version. &lt;br /&gt;
&lt;br /&gt;
So far, other games have not been converted due to the difficultly in finding original application files for early smartphone games. Not only are these games approximately 10 years old, but they were often distributed in provider-specific mobile game portals, rather than common application stores such as Google Play and the App Store.&lt;br /&gt;
&lt;br /&gt;
===G-mode Archives===&lt;br /&gt;
The [https://japanesefeaturephones.miraheze.org/wiki/G-mode_Archives G-mode Archives] are a collection of Japanese feature phone re-releases for Nintendo Switch and Windows (Steam) published by G-mode. These games were developed in Unity, and so far no DoJa files have been discovered inside of them.&lt;br /&gt;
&lt;br /&gt;
==Emulating Network Protocol?==&lt;br /&gt;
At this point, no one knows how to emulate the proprietary network protocols that were used by these mobile devices to download games. This means that ''no one'' has successfully added new applications or side-loaded applications to a Japanese feature phone. Even though a wifi enabled phone can access a website containing a game download, the wifi Full Browser does not offer the ability to download the game files. Only the proprietary browser (such as i-mode) has the capacity to download and install games.&lt;br /&gt;
&lt;br /&gt;
== Notable Japanese Feature Phone Games ==&lt;br /&gt;
Some notable titles from recognizable game series include:&lt;br /&gt;
&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Before_Crisis_-Final_Fantasy_VII- Before Crisis -Final Fantasy VII-] and [https://japanesefeaturephones.miraheze.org/wiki/Dirge_of_Cerberus_Lost_Episode_-Final_Fantasy_VII- Dirge of Cerberus Lost Episode -Final Fantasy VII-]: Games in the Final Fantasy VII metaverse that greatly expand upon its lore&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Professor_Layton_and_the_Mansion_of_the_Deathly_Mirror Professor Layton and the Mansion of the Deathly Mirror]: A unique Professor Layton title released exclusively for Japanese mobile phones&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Kingdom_Hearts_coded Kingdom Hearts coded]: A story that covers events proceeding the finale of Kingdom Hearts II&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Persona_Mobile_Online Persona Mobile Online]: An entire Persona online MMORPG for cellphones&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Ni_no_Kuni:_Hotroit_Stories Ni no Kuni: Hotroit Stories]: A prologue to the Ni no Kuni series that takes place before Ni no Kuni: Dominion of the Dark Djinn&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Pok%C3%A9mate Pokémate]: The first Pokémon mobile game&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Nakayoshi_Chao! Nakayoshi Chao!]: A Chao virtual pet game for phones&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.youtube.com/watch?v=tKH0x21rj1Y Japan's Game Preservation Crisis] by Did You Know Gaming&lt;br /&gt;
* [https://hitsave.org/feature-phone-gaming/ Japanese Feature Phone Game Preservation: Uncovering a Forgotten Era of Gaming] on HitSave.org&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Main_Page Japanese Feature Phones Wiki] (made by HM member Ellen!)&lt;br /&gt;
* [https://docs.google.com/document/d/1fJdByYSfUPRFFAOixBX5BXx6sGkEc2uqX5verAgBhyc/edit?usp=sharing Feature Phone Preservation Resources] by Ellen&lt;br /&gt;
* [https://archive.org/details/@dekafire Japanese Feature Phone PC Downloads] posted on Archive.org&lt;/div&gt;</summary>
		<author><name>LNRC</name></author>
	</entry>
	<entry>
		<id>https://wiki.hackmanhattan.com/index.php?title=Japanese_Feature_Phone_Preservation&amp;diff=8846</id>
		<title>Japanese Feature Phone Preservation</title>
		<link rel="alternate" type="text/html" href="https://wiki.hackmanhattan.com/index.php?title=Japanese_Feature_Phone_Preservation&amp;diff=8846"/>
		<updated>2023-10-08T00:23:56Z</updated>

		<summary type="html">&lt;p&gt;LNRC: /* Brute Force Live Stream: Cracking the Cryptomeria Cipher */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:JapaneseFeaturePhones.jpg |thumb]]&lt;br /&gt;
&lt;br /&gt;
'''''SD CARD BRUTE FORCE LIVE STREAM HERE: https://www.twitch.tv/goodtofufriday''''' '''''READ FIRST HEADER ON THIS PAGE FOR INFO ON LIVE STREAM'''''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Japanese feature phones is a category of mobile devices that were released (almost) exclusively in Japan between approximately 1999-2015. These phones contained many features that took over a decade to reach the rest of the world: game streaming, live TV, digital wallets, virtual characters to replace you on video calls, and more. The phones offered platform-exclusive games from many beloved franchises such as ''Final Fantasy, Pokemon, Kingdom Hearts, Professor Layton,'' and ''Megami Tensei.'' Mobile devices in Japan were developed by a variety of companies, each with their own proprietary hardware and software. Because of the diversity of phone models, the restrictive copyright protections, a separate set of [https://en.wikipedia.org/wiki/I-mode proprietary internet protocols], and more, these phones and their games have been extremely challenging to preserve.&lt;br /&gt;
&lt;br /&gt;
==Brute Force Live Stream: Cracking the Cryptomeria Cipher==&lt;br /&gt;
===General Summary===&lt;br /&gt;
[[File:RockmanDash5Islands.jpg|thumb|Rockman DASH: Great Adventure on 5 Islands! ([https://www.legends-station.com/?id=big-5-island-adventure image source])]]&lt;br /&gt;
The microSD cards in Japanese feature phones hide copyright protected data using a [https://en.wikipedia.org/wiki/Cryptomeria_cipher Cryptomeria Cipher], also known as a C2. Cracking the C2 requires three things: s-box, device keys, and a game-specific bind ID. Having the s-box and device keys allows us to find the bind ID. The s-box was discovered last year, but hackers are still searching for phone specific device keys. These device keys can be used across multiple game dumps, so it's not necessary to find each device's set of device keys for decryption to work. &lt;br /&gt;
&lt;br /&gt;
The user GoodTofuFriday is currently brute-forcing the C2 with his GPU to obtain one device key that can be applied to encrypted SD game dumps. Once we have that device key, we will test it on the card that this particular MKB (a key inside DRM) came from. That has a 100% chance of working because that's literally where the device key came from. &lt;br /&gt;
&lt;br /&gt;
With that in tow, we'll now get to the games: finding the game-specific bind ID using the device key and s-box (which has already been acquired). It depends on how long that will take, but the device key will make things exponentially easier than if we didn't have it. Next is to combine the three to decrypt the game files... and nobody knows what will happen next.&lt;br /&gt;
&lt;br /&gt;
One of the main goals of this brute force effort is to access a specific SD card that contains '''Rockman DASH: Great Adventure on Five Islands!''' &lt;br /&gt;
&lt;br /&gt;
* [https://www.youtube.com/watch?v=fVtgixfBdDc Video footage of Rockman DASH: Great Adventure on Five Islands!]&lt;br /&gt;
* [https://www.twitch.tv/goodtofufriday Cracking Rockman DASH: Great Adventure on Five Islands! Livestream]&lt;br /&gt;
* [https://gitlab.com/usernameak/mkb_bruteforce Source code for MKB Bruteforce]&lt;br /&gt;
&lt;br /&gt;
===Hardcore Summary===&lt;br /&gt;
[[File: MKB.png|thumb|Chart of the 16 MKB types used in SD cards involved in this process. Games are encrypted with MKB 11: SD Binding]]&lt;br /&gt;
&lt;br /&gt;
An MKB on SD cards generally contains two records (except some mostly irrelevant header records): '''Calculate Media Key''' and '''Conditionally Calculate Media Key'''.&lt;br /&gt;
&lt;br /&gt;
# A row which corresponds to our device key is looked up in Calculate Media Key record.&lt;br /&gt;
# We decrypt this row with our device key, and get another key.&lt;br /&gt;
# In the Conditionally Calculate Media Key record, there's an encrypted block with a specific (constant) value which we attempt to decrypt with the key from the previous step.&lt;br /&gt;
# If this value matches what we expected, we look up a row in the Conditionally Calculate Media Key record (same row number as in step 1) and decrypt it with the key we got in step 2, then decrypt it again with the device key - that's our key; else we are done and the key is what we got in step 2.&lt;br /&gt;
&lt;br /&gt;
We've made an assumption that the condition in step 4 is always true. Which isn't extremely unreasonable - values in the Conditionally Calculate Media Key record don't seem like what you would expect according to specification (if I've interpreted it correctly, invalid values would be identical to what is in the Calculate Media Key record; and they aren't). So as long as the assumption holds true, it'll eventually succeed.&lt;br /&gt;
&lt;br /&gt;
For more technical information, please look at the following official PDFs:&lt;br /&gt;
* [{{SERVER}}{{localurl:File:Cprm-base110-20101215.pdf}} Content Protection for Recordable Media Specification: Introduction and Common Cryptographic Elements] (PDF)&lt;br /&gt;
* [{{SERVER}}{{localurl:File:Cprm-sd-com097-20101215.pdf}} Content Protection for Recordable Media Specification: SD Memory Card Book - Common Part] (PDF)&lt;br /&gt;
* [{{SERVER}}{{localurl:File:Cprm-sd-bind-part-092-2005-1212.pdf}} Content Protection for Recordable Media Specification: SD Memory Card Book - SD-Binding Part] (PDF)&lt;br /&gt;
&lt;br /&gt;
== Mobile Device Data Extraction Projects ==&lt;br /&gt;
&lt;br /&gt;
===Sharp SH-10C===&lt;br /&gt;
[[File:RockmanPhantomofNetwork.png|thumb|Screenshot of ''Rockman.exe Phantom of Network'' ([https://www.rockman-corner.com/2021/09/rockman-exe-phantom-of-networklegend-of.html source])]]&lt;br /&gt;
The Sharp SH-10C is a DoCoMo phone released in 2011. Attempts have been made to read the NAND chip on this phone, in part because its schematics were made public by the [https://fcc.report/FCC-ID/APYHRO00145 FCC]. Currently, there are no chip programmers that support its NAND chip (Toshiba TY00D0021211KC) by default, and attempts at using a chip programmer have not reached past the bootloader. This phone model does not allow applications to be transferred to an SD card.&lt;br /&gt;
&lt;br /&gt;
Right now, preservationists are focusing on this model of phone for a few reasons:&lt;br /&gt;
* The schematics were leaked by the FFC ([https://fcc.report/FCC-ID/APYHRO00145 see here])&lt;br /&gt;
* A member of the community possesses a phone with two Mega Man exclusive games: '''Rockman.exe: Phantom of Network''' and '''Rockman.exe: Legend of Network'''&lt;br /&gt;
* Since this was one of the last Japanese feature phones to be released, it offers a wider variety of possibly exploitable tools such as a wifi-enabled Netfront web browser and [https://en.wikipedia.org/wiki/Adobe_Flash_Lite Adobe Flash Lite]&lt;br /&gt;
&lt;br /&gt;
For more information, we recommend reading the report below. &lt;br /&gt;
* [https://docs.google.com/document/d/1X3TN1QIvINPMDC6fmwo6vHCgAT377jOFM1zYkWZzdZY/edit?usp=sharing Report on Extraction of Data from DoCoMo Sharp SH-10C Mobile Phone] by Kraze&lt;br /&gt;
* [https://lpcwiki.miraheze.org/wiki/Sharp_SH-10C Sharp SH-10C] on the Legacy Portable Computer Wiki&lt;br /&gt;
&lt;br /&gt;
===Motorola M702iG and M702iS===&lt;br /&gt;
The Motorola M702iG and M702iS are based upon the Motorola Razr that was released internationally. Due to the availability of information about these phones, their firmware has successfully been accessed through USB. It's possible to browse the entire file system on these phones using '''RMCDA General Program'''.&lt;br /&gt;
&lt;br /&gt;
* M702iS/M702iG USB Drivers are required.&lt;br /&gt;
* You will need RMCDA General Program. This will do something to the M702iS/G that open its file system up to P2K Commander. You will need information displayed on the screen to proceed to the next step.&lt;br /&gt;
* P2K Commander will be able to access file system after using RCDMA General.&lt;br /&gt;
* Java Games are located in KJAVA folder.&lt;br /&gt;
&lt;br /&gt;
===Panasonic P-01F===&lt;br /&gt;
The Panasonic P-01F successfully had its firmware extracted by unsoldering the eMMC and analyzing it with a chip programmer. This technique was also used for the '''Panasonic 301P''' and '''Panasonic 401PM'''.&lt;br /&gt;
&lt;br /&gt;
===Others===&lt;br /&gt;
There are many individuals in the preservation community with their own unique phone models seeking unique device solutions, either through debugging software or direct eMMC file transfer. Feel free to ask in the [https://discord.com/invite/jh56s2v5PP Discord] Retro Gaming channel for more info!&lt;br /&gt;
&lt;br /&gt;
== Archive Re-release Restoration Projects ==&lt;br /&gt;
This section will describe efforts to restore original DoJa game files.'''DoJa''' is a proprietary Java runtime developed by NTT Docomo to run specifically on feature phones. Games consist of two files: the .jam file (java manager file), which provides technical information to the phone about the application's install requirements, and the .jar file, which is the game itself. DoJa games use a scratchpad, which is saved as a .sp file.&lt;br /&gt;
&lt;br /&gt;
=== [https://japanesefeaturephones.miraheze.org/wiki/Appli_Archives Appli Archives] for PlayStation Mobile ===&lt;br /&gt;
The Appli Archives are a series of feature phone re-releases. The PlayStation Mobile games contain DoJa files for each game, likely from original source. Game files and assets are drawn from a localhost server that runs within the PlayStation Mobile application. Because of use of localhost, these games cannot run directly in the DoJa SDK. However, some files have been made to run by hosting files on a localhost server on PC.&lt;br /&gt;
&lt;br /&gt;
PlayStation Mobile game packages use [https://www.psdevwiki.com/vita/PSSE PSSE encryption], which requires a game's original license key in order to perform decryption. Because of this, many of the Appli Archive files have not been decrypted, and their DoJa games have remained inaccessible. &lt;br /&gt;
&lt;br /&gt;
Visit the [https://japanesefeaturephones.miraheze.org/wiki/Appli_Archives Japanese Feature Phones wiki] for the full list of games in this collection.&lt;br /&gt;
&lt;br /&gt;
=== [https://japanesefeaturephones.miraheze.org/wiki/Mobile_Game_Deployer Mobile Game Deployer] (MGD) and [https://japanesefeaturephones.miraheze.org/wiki/I%CE%B1ppli_Publisher iαppli Publisher] Games ===&lt;br /&gt;
Mobile Game Deployer/iαppli Publisher was a software that could easily convert i-mode applis into Android, iOS, and Windows Phone programs. A number of prominent feature phone game publishers used this tool to bring their games to the smartphone generation.&lt;br /&gt;
&lt;br /&gt;
The game [https://japanesefeaturephones.miraheze.org/wiki/Flyhight_Cloudia Flyhight Cloudia] was successfully extracted from an Android APK in a fully playable version. &lt;br /&gt;
&lt;br /&gt;
So far, other games have not been converted due to the difficultly in finding original application files for early smartphone games. Not only are these games approximately 10 years old, but they were often distributed in provider-specific mobile game portals, rather than common application stores such as Google Play and the App Store.&lt;br /&gt;
&lt;br /&gt;
===G-mode Archives===&lt;br /&gt;
The [https://japanesefeaturephones.miraheze.org/wiki/G-mode_Archives G-mode Archives] are a collection of Japanese feature phone re-releases for Nintendo Switch and Windows (Steam) published by G-mode. These games were developed in Unity, and so far no DoJa files have been discovered inside of them.&lt;br /&gt;
&lt;br /&gt;
==Emulating Network Protocol?==&lt;br /&gt;
At this point, no one knows how to emulate the proprietary network protocols that were used by these mobile devices to download games. This means that ''no one'' has successfully added new applications or side-loaded applications to a Japanese feature phone. Even though a wifi enabled phone can access a website containing a game download, the wifi Full Browser does not offer the ability to download the game files. Only the proprietary browser (such as i-mode) has the capacity to download and install games.&lt;br /&gt;
&lt;br /&gt;
== Notable Japanese Feature Phone Games ==&lt;br /&gt;
Some notable titles from recognizable game series include:&lt;br /&gt;
&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Before_Crisis_-Final_Fantasy_VII- Before Crisis -Final Fantasy VII-] and [https://japanesefeaturephones.miraheze.org/wiki/Dirge_of_Cerberus_Lost_Episode_-Final_Fantasy_VII- Dirge of Cerberus Lost Episode -Final Fantasy VII-]: Games in the Final Fantasy VII metaverse that greatly expand upon its lore&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Professor_Layton_and_the_Mansion_of_the_Deathly_Mirror Professor Layton and the Mansion of the Deathly Mirror]: A unique Professor Layton title released exclusively for Japanese mobile phones&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Kingdom_Hearts_coded Kingdom Hearts coded]: A story that covers events proceeding the finale of Kingdom Hearts II&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Persona_Mobile_Online Persona Mobile Online]: An entire Persona online MMORPG for cellphones&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Ni_no_Kuni:_Hotroit_Stories Ni no Kuni: Hotroit Stories]: A prologue to the Ni no Kuni series that takes place before Ni no Kuni: Dominion of the Dark Djinn&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Pok%C3%A9mate Pokémate]: The first Pokémon mobile game&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Nakayoshi_Chao! Nakayoshi Chao!]: A Chao virtual pet game for phones&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.youtube.com/watch?v=tKH0x21rj1Y Japan's Game Preservation Crisis] by Did You Know Gaming&lt;br /&gt;
* [https://hitsave.org/feature-phone-gaming/ Japanese Feature Phone Game Preservation: Uncovering a Forgotten Era of Gaming] on HitSave.org&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Main_Page Japanese Feature Phones Wiki] (made by HM member Ellen!)&lt;br /&gt;
* [https://docs.google.com/document/d/1fJdByYSfUPRFFAOixBX5BXx6sGkEc2uqX5verAgBhyc/edit?usp=sharing Feature Phone Preservation Resources] by Ellen&lt;br /&gt;
* [https://archive.org/details/@dekafire Japanese Feature Phone PC Downloads] posted on Archive.org&lt;/div&gt;</summary>
		<author><name>LNRC</name></author>
	</entry>
	<entry>
		<id>https://wiki.hackmanhattan.com/index.php?title=Japanese_Feature_Phone_Preservation&amp;diff=8845</id>
		<title>Japanese Feature Phone Preservation</title>
		<link rel="alternate" type="text/html" href="https://wiki.hackmanhattan.com/index.php?title=Japanese_Feature_Phone_Preservation&amp;diff=8845"/>
		<updated>2023-10-08T00:23:28Z</updated>

		<summary type="html">&lt;p&gt;LNRC: /* Brute Force Live Stream: Cracking the C2 Cipher */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:JapaneseFeaturePhones.jpg |thumb]]&lt;br /&gt;
&lt;br /&gt;
'''''SD CARD BRUTE FORCE LIVE STREAM HERE: https://www.twitch.tv/goodtofufriday''''' '''''READ FIRST HEADER ON THIS PAGE FOR INFO ON LIVE STREAM'''''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Japanese feature phones is a category of mobile devices that were released (almost) exclusively in Japan between approximately 1999-2015. These phones contained many features that took over a decade to reach the rest of the world: game streaming, live TV, digital wallets, virtual characters to replace you on video calls, and more. The phones offered platform-exclusive games from many beloved franchises such as ''Final Fantasy, Pokemon, Kingdom Hearts, Professor Layton,'' and ''Megami Tensei.'' Mobile devices in Japan were developed by a variety of companies, each with their own proprietary hardware and software. Because of the diversity of phone models, the restrictive copyright protections, a separate set of [https://en.wikipedia.org/wiki/I-mode proprietary internet protocols], and more, these phones and their games have been extremely challenging to preserve.&lt;br /&gt;
&lt;br /&gt;
==Brute Force Live Stream: Cracking the Cryptomeria Cipher==&lt;br /&gt;
===General Summary===&lt;br /&gt;
[[File:RockmanDash5Islands.jpg|thumb|Rockman DASH: Great Adventure on 5 Islands! ([https://www.legends-station.com/?id=big-5-island-adventure image source])]]&lt;br /&gt;
The microSD cards in Japanese feature phones hide copyright protected data using a [https://en.wikipedia.org/wiki/Cryptomeria_cipher Cryptomeria Cipher], also known as a C2. Cracking the C2 cipher requires three things: s-box, device keys, and a game-specific bind ID. Having the s-box and device keys allows us to find the bind ID. The s-box was discovered last year, but hackers are still searching for phone specific device keys. These device keys can be used across multiple game dumps, so it's not necessary to find each device's set of device keys for decryption to work. &lt;br /&gt;
&lt;br /&gt;
The user GoodTofuFriday is currently brute-forcing the C2 cipher with his GPU to obtain one device key that can be applied to encrypted SD game dumps. Once we have that device key, we will test it on the card that this particular MKB (a key inside DRM) came from. That has a 100% chance of working because that's literally where the device key came from. &lt;br /&gt;
&lt;br /&gt;
With that in tow, we'll now get to the games: finding the game-specific bind ID using the device key and s-box (which has already been acquired). It depends on how long that will take, but the device key will make things exponentially easier than if we didn't have it. Next is to combine the three to decrypt the game files... and nobody knows what will happen next.&lt;br /&gt;
&lt;br /&gt;
One of the main goals of this brute force effort is to access a specific SD card that contains '''Rockman DASH: Great Adventure on Five Islands!''' &lt;br /&gt;
&lt;br /&gt;
* [https://www.youtube.com/watch?v=fVtgixfBdDc Video footage of Rockman DASH: Great Adventure on Five Islands!]&lt;br /&gt;
* [https://www.twitch.tv/goodtofufriday Cracking Rockman DASH: Great Adventure on Five Islands! Livestream]&lt;br /&gt;
* [https://gitlab.com/usernameak/mkb_bruteforce Source code for MKB Bruteforce]&lt;br /&gt;
&lt;br /&gt;
===Hardcore Summary===&lt;br /&gt;
[[File: MKB.png|thumb|Chart of the 16 MKB types used in SD cards involved in this process. Games are encrypted with MKB 11: SD Binding]]&lt;br /&gt;
&lt;br /&gt;
An MKB on SD cards generally contains two records (except some mostly irrelevant header records): '''Calculate Media Key''' and '''Conditionally Calculate Media Key'''.&lt;br /&gt;
&lt;br /&gt;
# A row which corresponds to our device key is looked up in Calculate Media Key record.&lt;br /&gt;
# We decrypt this row with our device key, and get another key.&lt;br /&gt;
# In the Conditionally Calculate Media Key record, there's an encrypted block with a specific (constant) value which we attempt to decrypt with the key from the previous step.&lt;br /&gt;
# If this value matches what we expected, we look up a row in the Conditionally Calculate Media Key record (same row number as in step 1) and decrypt it with the key we got in step 2, then decrypt it again with the device key - that's our key; else we are done and the key is what we got in step 2.&lt;br /&gt;
&lt;br /&gt;
We've made an assumption that the condition in step 4 is always true. Which isn't extremely unreasonable - values in the Conditionally Calculate Media Key record don't seem like what you would expect according to specification (if I've interpreted it correctly, invalid values would be identical to what is in the Calculate Media Key record; and they aren't). So as long as the assumption holds true, it'll eventually succeed.&lt;br /&gt;
&lt;br /&gt;
For more technical information, please look at the following official PDFs:&lt;br /&gt;
* [{{SERVER}}{{localurl:File:Cprm-base110-20101215.pdf}} Content Protection for Recordable Media Specification: Introduction and Common Cryptographic Elements] (PDF)&lt;br /&gt;
* [{{SERVER}}{{localurl:File:Cprm-sd-com097-20101215.pdf}} Content Protection for Recordable Media Specification: SD Memory Card Book - Common Part] (PDF)&lt;br /&gt;
* [{{SERVER}}{{localurl:File:Cprm-sd-bind-part-092-2005-1212.pdf}} Content Protection for Recordable Media Specification: SD Memory Card Book - SD-Binding Part] (PDF)&lt;br /&gt;
&lt;br /&gt;
== Mobile Device Data Extraction Projects ==&lt;br /&gt;
&lt;br /&gt;
===Sharp SH-10C===&lt;br /&gt;
[[File:RockmanPhantomofNetwork.png|thumb|Screenshot of ''Rockman.exe Phantom of Network'' ([https://www.rockman-corner.com/2021/09/rockman-exe-phantom-of-networklegend-of.html source])]]&lt;br /&gt;
The Sharp SH-10C is a DoCoMo phone released in 2011. Attempts have been made to read the NAND chip on this phone, in part because its schematics were made public by the [https://fcc.report/FCC-ID/APYHRO00145 FCC]. Currently, there are no chip programmers that support its NAND chip (Toshiba TY00D0021211KC) by default, and attempts at using a chip programmer have not reached past the bootloader. This phone model does not allow applications to be transferred to an SD card.&lt;br /&gt;
&lt;br /&gt;
Right now, preservationists are focusing on this model of phone for a few reasons:&lt;br /&gt;
* The schematics were leaked by the FFC ([https://fcc.report/FCC-ID/APYHRO00145 see here])&lt;br /&gt;
* A member of the community possesses a phone with two Mega Man exclusive games: '''Rockman.exe: Phantom of Network''' and '''Rockman.exe: Legend of Network'''&lt;br /&gt;
* Since this was one of the last Japanese feature phones to be released, it offers a wider variety of possibly exploitable tools such as a wifi-enabled Netfront web browser and [https://en.wikipedia.org/wiki/Adobe_Flash_Lite Adobe Flash Lite]&lt;br /&gt;
&lt;br /&gt;
For more information, we recommend reading the report below. &lt;br /&gt;
* [https://docs.google.com/document/d/1X3TN1QIvINPMDC6fmwo6vHCgAT377jOFM1zYkWZzdZY/edit?usp=sharing Report on Extraction of Data from DoCoMo Sharp SH-10C Mobile Phone] by Kraze&lt;br /&gt;
* [https://lpcwiki.miraheze.org/wiki/Sharp_SH-10C Sharp SH-10C] on the Legacy Portable Computer Wiki&lt;br /&gt;
&lt;br /&gt;
===Motorola M702iG and M702iS===&lt;br /&gt;
The Motorola M702iG and M702iS are based upon the Motorola Razr that was released internationally. Due to the availability of information about these phones, their firmware has successfully been accessed through USB. It's possible to browse the entire file system on these phones using '''RMCDA General Program'''.&lt;br /&gt;
&lt;br /&gt;
* M702iS/M702iG USB Drivers are required.&lt;br /&gt;
* You will need RMCDA General Program. This will do something to the M702iS/G that open its file system up to P2K Commander. You will need information displayed on the screen to proceed to the next step.&lt;br /&gt;
* P2K Commander will be able to access file system after using RCDMA General.&lt;br /&gt;
* Java Games are located in KJAVA folder.&lt;br /&gt;
&lt;br /&gt;
===Panasonic P-01F===&lt;br /&gt;
The Panasonic P-01F successfully had its firmware extracted by unsoldering the eMMC and analyzing it with a chip programmer. This technique was also used for the '''Panasonic 301P''' and '''Panasonic 401PM'''.&lt;br /&gt;
&lt;br /&gt;
===Others===&lt;br /&gt;
There are many individuals in the preservation community with their own unique phone models seeking unique device solutions, either through debugging software or direct eMMC file transfer. Feel free to ask in the [https://discord.com/invite/jh56s2v5PP Discord] Retro Gaming channel for more info!&lt;br /&gt;
&lt;br /&gt;
== Archive Re-release Restoration Projects ==&lt;br /&gt;
This section will describe efforts to restore original DoJa game files.'''DoJa''' is a proprietary Java runtime developed by NTT Docomo to run specifically on feature phones. Games consist of two files: the .jam file (java manager file), which provides technical information to the phone about the application's install requirements, and the .jar file, which is the game itself. DoJa games use a scratchpad, which is saved as a .sp file.&lt;br /&gt;
&lt;br /&gt;
=== [https://japanesefeaturephones.miraheze.org/wiki/Appli_Archives Appli Archives] for PlayStation Mobile ===&lt;br /&gt;
The Appli Archives are a series of feature phone re-releases. The PlayStation Mobile games contain DoJa files for each game, likely from original source. Game files and assets are drawn from a localhost server that runs within the PlayStation Mobile application. Because of use of localhost, these games cannot run directly in the DoJa SDK. However, some files have been made to run by hosting files on a localhost server on PC.&lt;br /&gt;
&lt;br /&gt;
PlayStation Mobile game packages use [https://www.psdevwiki.com/vita/PSSE PSSE encryption], which requires a game's original license key in order to perform decryption. Because of this, many of the Appli Archive files have not been decrypted, and their DoJa games have remained inaccessible. &lt;br /&gt;
&lt;br /&gt;
Visit the [https://japanesefeaturephones.miraheze.org/wiki/Appli_Archives Japanese Feature Phones wiki] for the full list of games in this collection.&lt;br /&gt;
&lt;br /&gt;
=== [https://japanesefeaturephones.miraheze.org/wiki/Mobile_Game_Deployer Mobile Game Deployer] (MGD) and [https://japanesefeaturephones.miraheze.org/wiki/I%CE%B1ppli_Publisher iαppli Publisher] Games ===&lt;br /&gt;
Mobile Game Deployer/iαppli Publisher was a software that could easily convert i-mode applis into Android, iOS, and Windows Phone programs. A number of prominent feature phone game publishers used this tool to bring their games to the smartphone generation.&lt;br /&gt;
&lt;br /&gt;
The game [https://japanesefeaturephones.miraheze.org/wiki/Flyhight_Cloudia Flyhight Cloudia] was successfully extracted from an Android APK in a fully playable version. &lt;br /&gt;
&lt;br /&gt;
So far, other games have not been converted due to the difficultly in finding original application files for early smartphone games. Not only are these games approximately 10 years old, but they were often distributed in provider-specific mobile game portals, rather than common application stores such as Google Play and the App Store.&lt;br /&gt;
&lt;br /&gt;
===G-mode Archives===&lt;br /&gt;
The [https://japanesefeaturephones.miraheze.org/wiki/G-mode_Archives G-mode Archives] are a collection of Japanese feature phone re-releases for Nintendo Switch and Windows (Steam) published by G-mode. These games were developed in Unity, and so far no DoJa files have been discovered inside of them.&lt;br /&gt;
&lt;br /&gt;
==Emulating Network Protocol?==&lt;br /&gt;
At this point, no one knows how to emulate the proprietary network protocols that were used by these mobile devices to download games. This means that ''no one'' has successfully added new applications or side-loaded applications to a Japanese feature phone. Even though a wifi enabled phone can access a website containing a game download, the wifi Full Browser does not offer the ability to download the game files. Only the proprietary browser (such as i-mode) has the capacity to download and install games.&lt;br /&gt;
&lt;br /&gt;
== Notable Japanese Feature Phone Games ==&lt;br /&gt;
Some notable titles from recognizable game series include:&lt;br /&gt;
&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Before_Crisis_-Final_Fantasy_VII- Before Crisis -Final Fantasy VII-] and [https://japanesefeaturephones.miraheze.org/wiki/Dirge_of_Cerberus_Lost_Episode_-Final_Fantasy_VII- Dirge of Cerberus Lost Episode -Final Fantasy VII-]: Games in the Final Fantasy VII metaverse that greatly expand upon its lore&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Professor_Layton_and_the_Mansion_of_the_Deathly_Mirror Professor Layton and the Mansion of the Deathly Mirror]: A unique Professor Layton title released exclusively for Japanese mobile phones&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Kingdom_Hearts_coded Kingdom Hearts coded]: A story that covers events proceeding the finale of Kingdom Hearts II&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Persona_Mobile_Online Persona Mobile Online]: An entire Persona online MMORPG for cellphones&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Ni_no_Kuni:_Hotroit_Stories Ni no Kuni: Hotroit Stories]: A prologue to the Ni no Kuni series that takes place before Ni no Kuni: Dominion of the Dark Djinn&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Pok%C3%A9mate Pokémate]: The first Pokémon mobile game&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Nakayoshi_Chao! Nakayoshi Chao!]: A Chao virtual pet game for phones&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.youtube.com/watch?v=tKH0x21rj1Y Japan's Game Preservation Crisis] by Did You Know Gaming&lt;br /&gt;
* [https://hitsave.org/feature-phone-gaming/ Japanese Feature Phone Game Preservation: Uncovering a Forgotten Era of Gaming] on HitSave.org&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Main_Page Japanese Feature Phones Wiki] (made by HM member Ellen!)&lt;br /&gt;
* [https://docs.google.com/document/d/1fJdByYSfUPRFFAOixBX5BXx6sGkEc2uqX5verAgBhyc/edit?usp=sharing Feature Phone Preservation Resources] by Ellen&lt;br /&gt;
* [https://archive.org/details/@dekafire Japanese Feature Phone PC Downloads] posted on Archive.org&lt;/div&gt;</summary>
		<author><name>LNRC</name></author>
	</entry>
	<entry>
		<id>https://wiki.hackmanhattan.com/index.php?title=Japanese_Feature_Phone_Preservation&amp;diff=8844</id>
		<title>Japanese Feature Phone Preservation</title>
		<link rel="alternate" type="text/html" href="https://wiki.hackmanhattan.com/index.php?title=Japanese_Feature_Phone_Preservation&amp;diff=8844"/>
		<updated>2023-10-07T05:43:53Z</updated>

		<summary type="html">&lt;p&gt;LNRC: /* General Summary */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:JapaneseFeaturePhones.jpg |thumb]]&lt;br /&gt;
&lt;br /&gt;
'''''SD CARD BRUTE FORCE LIVE STREAM HERE: https://www.twitch.tv/goodtofufriday''''' '''''READ FIRST HEADER ON THIS PAGE FOR INFO ON LIVE STREAM'''''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Japanese feature phones is a category of mobile devices that were released (almost) exclusively in Japan between approximately 1999-2015. These phones contained many features that took over a decade to reach the rest of the world: game streaming, live TV, digital wallets, virtual characters to replace you on video calls, and more. The phones offered platform-exclusive games from many beloved franchises such as ''Final Fantasy, Pokemon, Kingdom Hearts, Professor Layton,'' and ''Megami Tensei.'' Mobile devices in Japan were developed by a variety of companies, each with their own proprietary hardware and software. Because of the diversity of phone models, the restrictive copyright protections, a separate set of [https://en.wikipedia.org/wiki/I-mode proprietary internet protocols], and more, these phones and their games have been extremely challenging to preserve.&lt;br /&gt;
&lt;br /&gt;
==Brute Force Live Stream: Cracking the C2 Cipher==&lt;br /&gt;
===General Summary===&lt;br /&gt;
[[File:RockmanDash5Islands.jpg|thumb|Rockman DASH: Great Adventure on 5 Islands! ([https://www.legends-station.com/?id=big-5-island-adventure image source])]]&lt;br /&gt;
The microSD cards in Japanese feature phones hide copyright protected data using a [https://en.wikipedia.org/wiki/Cryptomeria_cipher Cryptomeria Cipher], also known as a C2. Cracking the C2 cipher requires three things: s-box, device keys, and a game-specific bind ID. Having the s-box and device keys allows us to find the bind ID. The s-box was discovered last year, but hackers are still searching for phone specific device keys. These device keys can be used across multiple game dumps, so it's not necessary to find each device's set of device keys for decryption to work. &lt;br /&gt;
&lt;br /&gt;
The user GoodTofuFriday is currently brute-forcing the C2 cipher with his GPU to obtain one device key that can be applied to encrypted SD game dumps. Once we have that device key, we will test it on the card that this particular MKB (a key inside DRM) came from. That has a 100% chance of working because that's literally where the device key came from. &lt;br /&gt;
&lt;br /&gt;
With that in tow, we'll now get to the games: finding the game-specific bind ID using the device key and s-box (which has already been acquired). It depends on how long that will take, but the device key will make things exponentially easier than if we didn't have it. Next is to combine the three to decrypt the game files... and nobody knows what will happen next.&lt;br /&gt;
&lt;br /&gt;
One of the main goals of this brute force effort is to access a specific SD card that contains '''Rockman DASH: Great Adventure on Five Islands!''' &lt;br /&gt;
&lt;br /&gt;
* [https://www.youtube.com/watch?v=fVtgixfBdDc Video footage of Rockman DASH: Great Adventure on Five Islands!]&lt;br /&gt;
* [https://www.twitch.tv/goodtofufriday Cracking Rockman DASH: Great Adventure on Five Islands! Livestream]&lt;br /&gt;
* [https://gitlab.com/usernameak/mkb_bruteforce Source code for MKB Bruteforce]&lt;br /&gt;
&lt;br /&gt;
===Hardcore Summary===&lt;br /&gt;
[[File: MKB.png|thumb|Chart of the 16 MKB types used in SD cards involved in this process. Games are encrypted with MKB 11: SD Binding]]&lt;br /&gt;
&lt;br /&gt;
An MKB on SD cards generally contains two records (except some mostly irrelevant header records): '''Calculate Media Key''' and '''Conditionally Calculate Media Key'''.&lt;br /&gt;
&lt;br /&gt;
# A row which corresponds to our device key is looked up in Calculate Media Key record.&lt;br /&gt;
# We decrypt this row with our device key, and get another key.&lt;br /&gt;
# In the Conditionally Calculate Media Key record, there's an encrypted block with a specific (constant) value which we attempt to decrypt with the key from the previous step.&lt;br /&gt;
# If this value matches what we expected, we look up a row in the Conditionally Calculate Media Key record (same row number as in step 1) and decrypt it with the key we got in step 2, then decrypt it again with the device key - that's our key; else we are done and the key is what we got in step 2.&lt;br /&gt;
&lt;br /&gt;
We've made an assumption that the condition in step 4 is always true. Which isn't extremely unreasonable - values in the Conditionally Calculate Media Key record don't seem like what you would expect according to specification (if I've interpreted it correctly, invalid values would be identical to what is in the Calculate Media Key record; and they aren't). So as long as the assumption holds true, it'll eventually succeed.&lt;br /&gt;
&lt;br /&gt;
For more technical information, please look at the following official PDFs:&lt;br /&gt;
* [{{SERVER}}{{localurl:File:Cprm-base110-20101215.pdf}} Content Protection for Recordable Media Specification: Introduction and Common Cryptographic Elements] (PDF)&lt;br /&gt;
* [{{SERVER}}{{localurl:File:Cprm-sd-com097-20101215.pdf}} Content Protection for Recordable Media Specification: SD Memory Card Book - Common Part] (PDF)&lt;br /&gt;
* [{{SERVER}}{{localurl:File:Cprm-sd-bind-part-092-2005-1212.pdf}} Content Protection for Recordable Media Specification: SD Memory Card Book - SD-Binding Part] (PDF)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Mobile Device Data Extraction Projects ==&lt;br /&gt;
&lt;br /&gt;
===Sharp SH-10C===&lt;br /&gt;
[[File:RockmanPhantomofNetwork.png|thumb|Screenshot of ''Rockman.exe Phantom of Network'' ([https://www.rockman-corner.com/2021/09/rockman-exe-phantom-of-networklegend-of.html source])]]&lt;br /&gt;
The Sharp SH-10C is a DoCoMo phone released in 2011. Attempts have been made to read the NAND chip on this phone, in part because its schematics were made public by the [https://fcc.report/FCC-ID/APYHRO00145 FCC]. Currently, there are no chip programmers that support its NAND chip (Toshiba TY00D0021211KC) by default, and attempts at using a chip programmer have not reached past the bootloader. This phone model does not allow applications to be transferred to an SD card.&lt;br /&gt;
&lt;br /&gt;
Right now, preservationists are focusing on this model of phone for a few reasons:&lt;br /&gt;
* The schematics were leaked by the FFC ([https://fcc.report/FCC-ID/APYHRO00145 see here])&lt;br /&gt;
* A member of the community possesses a phone with two Mega Man exclusive games: '''Rockman.exe: Phantom of Network''' and '''Rockman.exe: Legend of Network'''&lt;br /&gt;
* Since this was one of the last Japanese feature phones to be released, it offers a wider variety of possibly exploitable tools such as a wifi-enabled Netfront web browser and [https://en.wikipedia.org/wiki/Adobe_Flash_Lite Adobe Flash Lite]&lt;br /&gt;
&lt;br /&gt;
For more information, we recommend reading the report below. &lt;br /&gt;
* [https://docs.google.com/document/d/1X3TN1QIvINPMDC6fmwo6vHCgAT377jOFM1zYkWZzdZY/edit?usp=sharing Report on Extraction of Data from DoCoMo Sharp SH-10C Mobile Phone] by Kraze&lt;br /&gt;
* [https://lpcwiki.miraheze.org/wiki/Sharp_SH-10C Sharp SH-10C] on the Legacy Portable Computer Wiki&lt;br /&gt;
&lt;br /&gt;
===Motorola M702iG and M702iS===&lt;br /&gt;
The Motorola M702iG and M702iS are based upon the Motorola Razr that was released internationally. Due to the availability of information about these phones, their firmware has successfully been accessed through USB. It's possible to browse the entire file system on these phones using '''RMCDA General Program'''.&lt;br /&gt;
&lt;br /&gt;
* M702iS/M702iG USB Drivers are required.&lt;br /&gt;
* You will need RMCDA General Program. This will do something to the M702iS/G that open its file system up to P2K Commander. You will need information displayed on the screen to proceed to the next step.&lt;br /&gt;
* P2K Commander will be able to access file system after using RCDMA General.&lt;br /&gt;
* Java Games are located in KJAVA folder.&lt;br /&gt;
&lt;br /&gt;
===Panasonic P-01F===&lt;br /&gt;
The Panasonic P-01F successfully had its firmware extracted by unsoldering the eMMC and analyzing it with a chip programmer. This technique was also used for the '''Panasonic 301P''' and '''Panasonic 401PM'''.&lt;br /&gt;
&lt;br /&gt;
===Others===&lt;br /&gt;
There are many individuals in the preservation community with their own unique phone models seeking unique device solutions, either through debugging software or direct eMMC file transfer. Feel free to ask in the [https://discord.com/invite/jh56s2v5PP Discord] Retro Gaming channel for more info!&lt;br /&gt;
&lt;br /&gt;
== Archive Re-release Restoration Projects ==&lt;br /&gt;
This section will describe efforts to restore original DoJa game files.'''DoJa''' is a proprietary Java runtime developed by NTT Docomo to run specifically on feature phones. Games consist of two files: the .jam file (java manager file), which provides technical information to the phone about the application's install requirements, and the .jar file, which is the game itself. DoJa games use a scratchpad, which is saved as a .sp file.&lt;br /&gt;
&lt;br /&gt;
=== [https://japanesefeaturephones.miraheze.org/wiki/Appli_Archives Appli Archives] for PlayStation Mobile ===&lt;br /&gt;
The Appli Archives are a series of feature phone re-releases. The PlayStation Mobile games contain DoJa files for each game, likely from original source. Game files and assets are drawn from a localhost server that runs within the PlayStation Mobile application. Because of use of localhost, these games cannot run directly in the DoJa SDK. However, some files have been made to run by hosting files on a localhost server on PC.&lt;br /&gt;
&lt;br /&gt;
PlayStation Mobile game packages use [https://www.psdevwiki.com/vita/PSSE PSSE encryption], which requires a game's original license key in order to perform decryption. Because of this, many of the Appli Archive files have not been decrypted, and their DoJa games have remained inaccessible. &lt;br /&gt;
&lt;br /&gt;
Visit the [https://japanesefeaturephones.miraheze.org/wiki/Appli_Archives Japanese Feature Phones wiki] for the full list of games in this collection.&lt;br /&gt;
&lt;br /&gt;
=== [https://japanesefeaturephones.miraheze.org/wiki/Mobile_Game_Deployer Mobile Game Deployer] (MGD) and [https://japanesefeaturephones.miraheze.org/wiki/I%CE%B1ppli_Publisher iαppli Publisher] Games ===&lt;br /&gt;
Mobile Game Deployer/iαppli Publisher was a software that could easily convert i-mode applis into Android, iOS, and Windows Phone programs. A number of prominent feature phone game publishers used this tool to bring their games to the smartphone generation.&lt;br /&gt;
&lt;br /&gt;
The game [https://japanesefeaturephones.miraheze.org/wiki/Flyhight_Cloudia Flyhight Cloudia] was successfully extracted from an Android APK in a fully playable version. &lt;br /&gt;
&lt;br /&gt;
So far, other games have not been converted due to the difficultly in finding original application files for early smartphone games. Not only are these games approximately 10 years old, but they were often distributed in provider-specific mobile game portals, rather than common application stores such as Google Play and the App Store.&lt;br /&gt;
&lt;br /&gt;
===G-mode Archives===&lt;br /&gt;
The [https://japanesefeaturephones.miraheze.org/wiki/G-mode_Archives G-mode Archives] are a collection of Japanese feature phone re-releases for Nintendo Switch and Windows (Steam) published by G-mode. These games were developed in Unity, and so far no DoJa files have been discovered inside of them.&lt;br /&gt;
&lt;br /&gt;
==Emulating Network Protocol?==&lt;br /&gt;
At this point, no one knows how to emulate the proprietary network protocols that were used by these mobile devices to download games. This means that ''no one'' has successfully added new applications or side-loaded applications to a Japanese feature phone. Even though a wifi enabled phone can access a website containing a game download, the wifi Full Browser does not offer the ability to download the game files. Only the proprietary browser (such as i-mode) has the capacity to download and install games.&lt;br /&gt;
&lt;br /&gt;
== Notable Japanese Feature Phone Games ==&lt;br /&gt;
Some notable titles from recognizable game series include:&lt;br /&gt;
&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Before_Crisis_-Final_Fantasy_VII- Before Crisis -Final Fantasy VII-] and [https://japanesefeaturephones.miraheze.org/wiki/Dirge_of_Cerberus_Lost_Episode_-Final_Fantasy_VII- Dirge of Cerberus Lost Episode -Final Fantasy VII-]: Games in the Final Fantasy VII metaverse that greatly expand upon its lore&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Professor_Layton_and_the_Mansion_of_the_Deathly_Mirror Professor Layton and the Mansion of the Deathly Mirror]: A unique Professor Layton title released exclusively for Japanese mobile phones&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Kingdom_Hearts_coded Kingdom Hearts coded]: A story that covers events proceeding the finale of Kingdom Hearts II&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Persona_Mobile_Online Persona Mobile Online]: An entire Persona online MMORPG for cellphones&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Ni_no_Kuni:_Hotroit_Stories Ni no Kuni: Hotroit Stories]: A prologue to the Ni no Kuni series that takes place before Ni no Kuni: Dominion of the Dark Djinn&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Pok%C3%A9mate Pokémate]: The first Pokémon mobile game&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Nakayoshi_Chao! Nakayoshi Chao!]: A Chao virtual pet game for phones&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.youtube.com/watch?v=tKH0x21rj1Y Japan's Game Preservation Crisis] by Did You Know Gaming&lt;br /&gt;
* [https://hitsave.org/feature-phone-gaming/ Japanese Feature Phone Game Preservation: Uncovering a Forgotten Era of Gaming] on HitSave.org&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Main_Page Japanese Feature Phones Wiki] (made by HM member Ellen!)&lt;br /&gt;
* [https://docs.google.com/document/d/1fJdByYSfUPRFFAOixBX5BXx6sGkEc2uqX5verAgBhyc/edit?usp=sharing Feature Phone Preservation Resources] by Ellen&lt;br /&gt;
* [https://archive.org/details/@dekafire Japanese Feature Phone PC Downloads] posted on Archive.org&lt;/div&gt;</summary>
		<author><name>LNRC</name></author>
	</entry>
	<entry>
		<id>https://wiki.hackmanhattan.com/index.php?title=Japanese_Feature_Phone_Preservation&amp;diff=8843</id>
		<title>Japanese Feature Phone Preservation</title>
		<link rel="alternate" type="text/html" href="https://wiki.hackmanhattan.com/index.php?title=Japanese_Feature_Phone_Preservation&amp;diff=8843"/>
		<updated>2023-10-07T05:19:17Z</updated>

		<summary type="html">&lt;p&gt;LNRC: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:JapaneseFeaturePhones.jpg |thumb]]&lt;br /&gt;
&lt;br /&gt;
'''''SD CARD BRUTE FORCE LIVE STREAM HERE: https://www.twitch.tv/goodtofufriday''''' '''''READ FIRST HEADER ON THIS PAGE FOR INFO ON LIVE STREAM'''''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Japanese feature phones is a category of mobile devices that were released (almost) exclusively in Japan between approximately 1999-2015. These phones contained many features that took over a decade to reach the rest of the world: game streaming, live TV, digital wallets, virtual characters to replace you on video calls, and more. The phones offered platform-exclusive games from many beloved franchises such as ''Final Fantasy, Pokemon, Kingdom Hearts, Professor Layton,'' and ''Megami Tensei.'' Mobile devices in Japan were developed by a variety of companies, each with their own proprietary hardware and software. Because of the diversity of phone models, the restrictive copyright protections, a separate set of [https://en.wikipedia.org/wiki/I-mode proprietary internet protocols], and more, these phones and their games have been extremely challenging to preserve.&lt;br /&gt;
&lt;br /&gt;
==Brute Force Live Stream: Cracking the C2 Cipher==&lt;br /&gt;
===General Summary===&lt;br /&gt;
[[File:RockmanDash5Islands.jpg|thumb|Rockman DASH: Great Adventure on 5 Islands! ([https://www.legends-station.com/?id=big-5-island-adventure image source])]]&lt;br /&gt;
The microSD cards in Japanese feature phones hide copyright protected data using a [https://en.wikipedia.org/wiki/Cryptomeria_cipher Cryptomeria Cipher], also known as a C2. Cracking the C2 cipher requires three things: s-box, device keys, and a game-specific bind ID. Having the s-box and device keys allows us to find the bind ID. The s-box was discovered last year, but hackers are still searching for phone specific device keys. These device keys can be used across multiple game dumps, so it's not necessary to find each device's set of device keys for decryption to work. &lt;br /&gt;
&lt;br /&gt;
The user GoodTofuFriday is currently brute-forcing the C2 cipher with his GPU to obtain one device key that can be applied to encrypted SD game dumps. Once we have that device key, we will test it on the card that this particular MKB (a key inside DRM) came from. That has a 100% chance of working because that's literally where the device key came from. &lt;br /&gt;
&lt;br /&gt;
With that in tow, we'll now get to the games: finding the game-specific bind ID using the device key and s-box (which has already been acquired). It depends on how long that will take, but the device key will make things exponentially easier than if we didn't have it. Next is to combine the three to decrypt the game files... and nobody knows what will happen next.&lt;br /&gt;
&lt;br /&gt;
One of the main goals of this brute force effort is to access a specific SD card that contains '''Rockman DASH: Great Adventure on Five Islands!''' &lt;br /&gt;
&lt;br /&gt;
* [https://www.youtube.com/watch?v=fVtgixfBdDc Video footage of Rockman DASH: Great Adventure on Five Islands!]&lt;br /&gt;
* [https://www.twitch.tv/goodtofufriday Cracking Rockman DASH: Great Adventure on Five Islands! Livestream]&lt;br /&gt;
===Hardcore Summary===&lt;br /&gt;
[[File: MKB.png|thumb|Chart of the 16 MKB types used in SD cards involved in this process. Games are encrypted with MKB 11: SD Binding]]&lt;br /&gt;
&lt;br /&gt;
An MKB on SD cards generally contains two records (except some mostly irrelevant header records): '''Calculate Media Key''' and '''Conditionally Calculate Media Key'''.&lt;br /&gt;
&lt;br /&gt;
# A row which corresponds to our device key is looked up in Calculate Media Key record.&lt;br /&gt;
# We decrypt this row with our device key, and get another key.&lt;br /&gt;
# In the Conditionally Calculate Media Key record, there's an encrypted block with a specific (constant) value which we attempt to decrypt with the key from the previous step.&lt;br /&gt;
# If this value matches what we expected, we look up a row in the Conditionally Calculate Media Key record (same row number as in step 1) and decrypt it with the key we got in step 2, then decrypt it again with the device key - that's our key; else we are done and the key is what we got in step 2.&lt;br /&gt;
&lt;br /&gt;
We've made an assumption that the condition in step 4 is always true. Which isn't extremely unreasonable - values in the Conditionally Calculate Media Key record don't seem like what you would expect according to specification (if I've interpreted it correctly, invalid values would be identical to what is in the Calculate Media Key record; and they aren't). So as long as the assumption holds true, it'll eventually succeed.&lt;br /&gt;
&lt;br /&gt;
For more technical information, please look at the following official PDFs:&lt;br /&gt;
* [{{SERVER}}{{localurl:File:Cprm-base110-20101215.pdf}} Content Protection for Recordable Media Specification: Introduction and Common Cryptographic Elements] (PDF)&lt;br /&gt;
* [{{SERVER}}{{localurl:File:Cprm-sd-com097-20101215.pdf}} Content Protection for Recordable Media Specification: SD Memory Card Book - Common Part] (PDF)&lt;br /&gt;
* [{{SERVER}}{{localurl:File:Cprm-sd-bind-part-092-2005-1212.pdf}} Content Protection for Recordable Media Specification: SD Memory Card Book - SD-Binding Part] (PDF)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Mobile Device Data Extraction Projects ==&lt;br /&gt;
&lt;br /&gt;
===Sharp SH-10C===&lt;br /&gt;
[[File:RockmanPhantomofNetwork.png|thumb|Screenshot of ''Rockman.exe Phantom of Network'' ([https://www.rockman-corner.com/2021/09/rockman-exe-phantom-of-networklegend-of.html source])]]&lt;br /&gt;
The Sharp SH-10C is a DoCoMo phone released in 2011. Attempts have been made to read the NAND chip on this phone, in part because its schematics were made public by the [https://fcc.report/FCC-ID/APYHRO00145 FCC]. Currently, there are no chip programmers that support its NAND chip (Toshiba TY00D0021211KC) by default, and attempts at using a chip programmer have not reached past the bootloader. This phone model does not allow applications to be transferred to an SD card.&lt;br /&gt;
&lt;br /&gt;
Right now, preservationists are focusing on this model of phone for a few reasons:&lt;br /&gt;
* The schematics were leaked by the FFC ([https://fcc.report/FCC-ID/APYHRO00145 see here])&lt;br /&gt;
* A member of the community possesses a phone with two Mega Man exclusive games: '''Rockman.exe: Phantom of Network''' and '''Rockman.exe: Legend of Network'''&lt;br /&gt;
* Since this was one of the last Japanese feature phones to be released, it offers a wider variety of possibly exploitable tools such as a wifi-enabled Netfront web browser and [https://en.wikipedia.org/wiki/Adobe_Flash_Lite Adobe Flash Lite]&lt;br /&gt;
&lt;br /&gt;
For more information, we recommend reading the report below. &lt;br /&gt;
* [https://docs.google.com/document/d/1X3TN1QIvINPMDC6fmwo6vHCgAT377jOFM1zYkWZzdZY/edit?usp=sharing Report on Extraction of Data from DoCoMo Sharp SH-10C Mobile Phone] by Kraze&lt;br /&gt;
* [https://lpcwiki.miraheze.org/wiki/Sharp_SH-10C Sharp SH-10C] on the Legacy Portable Computer Wiki&lt;br /&gt;
&lt;br /&gt;
===Motorola M702iG and M702iS===&lt;br /&gt;
The Motorola M702iG and M702iS are based upon the Motorola Razr that was released internationally. Due to the availability of information about these phones, their firmware has successfully been accessed through USB. It's possible to browse the entire file system on these phones using '''RMCDA General Program'''.&lt;br /&gt;
&lt;br /&gt;
* M702iS/M702iG USB Drivers are required.&lt;br /&gt;
* You will need RMCDA General Program. This will do something to the M702iS/G that open its file system up to P2K Commander. You will need information displayed on the screen to proceed to the next step.&lt;br /&gt;
* P2K Commander will be able to access file system after using RCDMA General.&lt;br /&gt;
* Java Games are located in KJAVA folder.&lt;br /&gt;
&lt;br /&gt;
===Panasonic P-01F===&lt;br /&gt;
The Panasonic P-01F successfully had its firmware extracted by unsoldering the eMMC and analyzing it with a chip programmer. This technique was also used for the '''Panasonic 301P''' and '''Panasonic 401PM'''.&lt;br /&gt;
&lt;br /&gt;
===Others===&lt;br /&gt;
There are many individuals in the preservation community with their own unique phone models seeking unique device solutions, either through debugging software or direct eMMC file transfer. Feel free to ask in the [https://discord.com/invite/jh56s2v5PP Discord] Retro Gaming channel for more info!&lt;br /&gt;
&lt;br /&gt;
== Archive Re-release Restoration Projects ==&lt;br /&gt;
This section will describe efforts to restore original DoJa game files.'''DoJa''' is a proprietary Java runtime developed by NTT Docomo to run specifically on feature phones. Games consist of two files: the .jam file (java manager file), which provides technical information to the phone about the application's install requirements, and the .jar file, which is the game itself. DoJa games use a scratchpad, which is saved as a .sp file.&lt;br /&gt;
&lt;br /&gt;
=== [https://japanesefeaturephones.miraheze.org/wiki/Appli_Archives Appli Archives] for PlayStation Mobile ===&lt;br /&gt;
The Appli Archives are a series of feature phone re-releases. The PlayStation Mobile games contain DoJa files for each game, likely from original source. Game files and assets are drawn from a localhost server that runs within the PlayStation Mobile application. Because of use of localhost, these games cannot run directly in the DoJa SDK. However, some files have been made to run by hosting files on a localhost server on PC.&lt;br /&gt;
&lt;br /&gt;
PlayStation Mobile game packages use [https://www.psdevwiki.com/vita/PSSE PSSE encryption], which requires a game's original license key in order to perform decryption. Because of this, many of the Appli Archive files have not been decrypted, and their DoJa games have remained inaccessible. &lt;br /&gt;
&lt;br /&gt;
Visit the [https://japanesefeaturephones.miraheze.org/wiki/Appli_Archives Japanese Feature Phones wiki] for the full list of games in this collection.&lt;br /&gt;
&lt;br /&gt;
=== [https://japanesefeaturephones.miraheze.org/wiki/Mobile_Game_Deployer Mobile Game Deployer] (MGD) and [https://japanesefeaturephones.miraheze.org/wiki/I%CE%B1ppli_Publisher iαppli Publisher] Games ===&lt;br /&gt;
Mobile Game Deployer/iαppli Publisher was a software that could easily convert i-mode applis into Android, iOS, and Windows Phone programs. A number of prominent feature phone game publishers used this tool to bring their games to the smartphone generation.&lt;br /&gt;
&lt;br /&gt;
The game [https://japanesefeaturephones.miraheze.org/wiki/Flyhight_Cloudia Flyhight Cloudia] was successfully extracted from an Android APK in a fully playable version. &lt;br /&gt;
&lt;br /&gt;
So far, other games have not been converted due to the difficultly in finding original application files for early smartphone games. Not only are these games approximately 10 years old, but they were often distributed in provider-specific mobile game portals, rather than common application stores such as Google Play and the App Store.&lt;br /&gt;
&lt;br /&gt;
===G-mode Archives===&lt;br /&gt;
The [https://japanesefeaturephones.miraheze.org/wiki/G-mode_Archives G-mode Archives] are a collection of Japanese feature phone re-releases for Nintendo Switch and Windows (Steam) published by G-mode. These games were developed in Unity, and so far no DoJa files have been discovered inside of them.&lt;br /&gt;
&lt;br /&gt;
==Emulating Network Protocol?==&lt;br /&gt;
At this point, no one knows how to emulate the proprietary network protocols that were used by these mobile devices to download games. This means that ''no one'' has successfully added new applications or side-loaded applications to a Japanese feature phone. Even though a wifi enabled phone can access a website containing a game download, the wifi Full Browser does not offer the ability to download the game files. Only the proprietary browser (such as i-mode) has the capacity to download and install games.&lt;br /&gt;
&lt;br /&gt;
== Notable Japanese Feature Phone Games ==&lt;br /&gt;
Some notable titles from recognizable game series include:&lt;br /&gt;
&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Before_Crisis_-Final_Fantasy_VII- Before Crisis -Final Fantasy VII-] and [https://japanesefeaturephones.miraheze.org/wiki/Dirge_of_Cerberus_Lost_Episode_-Final_Fantasy_VII- Dirge of Cerberus Lost Episode -Final Fantasy VII-]: Games in the Final Fantasy VII metaverse that greatly expand upon its lore&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Professor_Layton_and_the_Mansion_of_the_Deathly_Mirror Professor Layton and the Mansion of the Deathly Mirror]: A unique Professor Layton title released exclusively for Japanese mobile phones&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Kingdom_Hearts_coded Kingdom Hearts coded]: A story that covers events proceeding the finale of Kingdom Hearts II&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Persona_Mobile_Online Persona Mobile Online]: An entire Persona online MMORPG for cellphones&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Ni_no_Kuni:_Hotroit_Stories Ni no Kuni: Hotroit Stories]: A prologue to the Ni no Kuni series that takes place before Ni no Kuni: Dominion of the Dark Djinn&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Pok%C3%A9mate Pokémate]: The first Pokémon mobile game&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Nakayoshi_Chao! Nakayoshi Chao!]: A Chao virtual pet game for phones&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.youtube.com/watch?v=tKH0x21rj1Y Japan's Game Preservation Crisis] by Did You Know Gaming&lt;br /&gt;
* [https://hitsave.org/feature-phone-gaming/ Japanese Feature Phone Game Preservation: Uncovering a Forgotten Era of Gaming] on HitSave.org&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Main_Page Japanese Feature Phones Wiki] (made by HM member Ellen!)&lt;br /&gt;
* [https://docs.google.com/document/d/1fJdByYSfUPRFFAOixBX5BXx6sGkEc2uqX5verAgBhyc/edit?usp=sharing Feature Phone Preservation Resources] by Ellen&lt;br /&gt;
* [https://archive.org/details/@dekafire Japanese Feature Phone PC Downloads] posted on Archive.org&lt;/div&gt;</summary>
		<author><name>LNRC</name></author>
	</entry>
	<entry>
		<id>https://wiki.hackmanhattan.com/index.php?title=Japanese_Feature_Phone_Preservation&amp;diff=8842</id>
		<title>Japanese Feature Phone Preservation</title>
		<link rel="alternate" type="text/html" href="https://wiki.hackmanhattan.com/index.php?title=Japanese_Feature_Phone_Preservation&amp;diff=8842"/>
		<updated>2023-10-07T05:06:14Z</updated>

		<summary type="html">&lt;p&gt;LNRC: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:JapaneseFeaturePhones.jpg |thumb]]&lt;br /&gt;
&lt;br /&gt;
'''''SD CARD BRUTE FORCE LIVE STREAM HERE: https://www.twitch.tv/goodtofufriday''''' '''''READ FIRST HEADER ON THIS PAGE FOR INFO ON LIVE STREAM'''''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Japanese feature phones is a category of mobile devices that were released (almost) exclusively in Japan between approximately 1999-2015. These phones contained many features that took over a decade to reach the rest of the world: game streaming, live TV, digital wallets, virtual characters to replace you on video calls, and more. The phones offered platform-exclusive games from many beloved franchises such as ''Final Fantasy, Pokemon, Kingdom Hearts, Professor Layton,'' and ''Megami Tensei.'' Mobile devices in Japan were developed by a variety of companies, each with their own proprietary hardware and software. Because of the diversity of phone models, the restrictive copyright protections, a separate set of [https://en.wikipedia.org/wiki/I-mode proprietary internet protocols], and more, these phones and their games have been extremely challenging to preserve.&lt;br /&gt;
&lt;br /&gt;
==Brute Force Live Stream: Cracking the C2 Cipher==&lt;br /&gt;
===General Summary===&lt;br /&gt;
[[File:RockmanDash5Islands.jpg|thumb|Rockman DASH: Great Adventure on 5 Islands! ([https://www.legends-station.com/?id=big-5-island-adventure image source])]]&lt;br /&gt;
The microSD cards in Japanese feature phones hide copyright protected data using a [https://en.wikipedia.org/wiki/Cryptomeria_cipher Cryptomeria Cipher], also known as a C2. Cracking the C2 cipher requires three things: s-box, device keys, and a game-specific bind ID. Having the s-box and device keys allows us to find the bind ID. The s-box was discovered last year, but hackers are still searching for phone specific device keys. These device keys can be used across multiple game dumps, so it's not necessary to find each device's set of device keys for decryption to work. &lt;br /&gt;
&lt;br /&gt;
The user GoodTofuFriday is currently brute-forcing the C2 cipher with his GPU to obtain one device key that can be applied to encrypted SD game dumps. Once we have that device key, we will test it on the card that this particular MKB (a key inside DRM) came from. That has a 100% chance of working because that's literally where the device key came from. &lt;br /&gt;
&lt;br /&gt;
With that in tow, we'll now get to the games: finding the game-specific bind ID using the device key and s-box (which has already been acquired). It depends on how long that will take, but the device key will make things exponentially easier than if we didn't have it. Next is to combine the three to decrypt the game files... and nobody knows what will happen next.&lt;br /&gt;
&lt;br /&gt;
One of the main goals of this brute force effort is to access a specific SD card that contains '''Rockman DASH: Great Adventure on Five Islands!''' &lt;br /&gt;
&lt;br /&gt;
* [https://www.youtube.com/watch?v=fVtgixfBdDc Video footage of Rockman DASH: Great Adventure on Five Islands!]&lt;br /&gt;
* [https://www.twitch.tv/goodtofufriday Cracking Rockman DASH: Great Adventure on Five Islands! Livestream]&lt;br /&gt;
===Hardcore Summary===&lt;br /&gt;
[[File: MKB.png|thumb|Chart of the 16 MKB types used in SD cards involved in this process. Games are encrypted with MKB 11: SD Binding]]&lt;br /&gt;
&lt;br /&gt;
An MKB on SD cards generally contains two records (except some mostly irrelevant header records): '''Calculate Media Key''' and '''Conditionally Calculate Media Key'''.&lt;br /&gt;
&lt;br /&gt;
# A row which corresponds to our device key is looked up in Calculate Media Key record.&lt;br /&gt;
# We decrypt this row with our device key, and get another key.&lt;br /&gt;
# In the Conditionally Calculate Media Key record, there's an encrypted block with a specific (constant) value which we attempt to decrypt with the key from the previous step.&lt;br /&gt;
# If this value matches what we expected, we look up a row in the Conditionally Calculate Media Key record (same row number as in step 1) and decrypt it with the key we got in step 2, then decrypt it again with the device key - that's our key; else we are done and the key is what we got in step 2.&lt;br /&gt;
&lt;br /&gt;
We've made an assumption that the condition in step 4 is always true. Which isn't extremely unreasonable - values in the Conditionally Calculate Media Key record don't seem like what you would expect according to specification (if I've interpreted it correctly, invalid values would be identical to what is in the Calculate Media Key record; and they aren't). So as long as the assumption holds true, it'll eventually succeed.&lt;br /&gt;
&lt;br /&gt;
For more technical information, please look at the following official PDFs:&lt;br /&gt;
* [{{SERVER}}{{localurl:File:Cprm-base110-20101215.pdf}} Content Protection for Recordable Media Specification: Introduction and Common Cryptographic Elements] (PDF)&lt;br /&gt;
* [{{SERVER}}{{localurl:File:Cprm-sd-com097-20101215.pdf}} Content Protection for Recordable Media Specification: SD Memory Card Book - Common Part] (PDF)&lt;br /&gt;
* [{{SERVER}}{{localurl:File:Cprm-sd-bind-part-092-2005-1212.pdf}} Content Protection for Recordable Media Specification: SD Memory Card Book - SD-Binding Part] (PDF)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Mobile Device Data Extraction Projects ==&lt;br /&gt;
&lt;br /&gt;
===Sharp SH-10C===&lt;br /&gt;
[[File:RockmanPhantomofNetwork.png|thumb|Screenshot of ''Rockman.exe Phantom of Network'' ([https://www.rockman-corner.com/2021/09/rockman-exe-phantom-of-networklegend-of.html source])]]&lt;br /&gt;
The Sharp SH-10C is a DoCoMo phone released in 2011. Attempts have been made to read the NAND chip on this phone, in part because its schematics were made public by the [https://fcc.report/FCC-ID/APYHRO00145 FCC]. Currently, there are no chip programmers that support its NAND chip (Toshiba TY00D0021211KC) by default, and attempts at using a chip programmer have not reached past the bootloader. This phone model does not allow applications to be transferred to an SD card.&lt;br /&gt;
&lt;br /&gt;
Right now, preservationists are focusing on this model of phone for a few reasons:&lt;br /&gt;
* The schematics were leaked by the FFC ([https://fcc.report/FCC-ID/APYHRO00145 see here])&lt;br /&gt;
* A member of the community possesses a phone with two Mega Man exclusive games: '''Rockman.exe: Phantom of Network''' and '''Rockman.exe: Legend of Network'''&lt;br /&gt;
* Since this was one of the last Japanese feature phones to be released, it offers a wider variety of possibly exploitable tools such as a wifi-enabled Netfront web browser and [https://en.wikipedia.org/wiki/Adobe_Flash_Lite Adobe Flash Lite]&lt;br /&gt;
&lt;br /&gt;
For more information, we recommend reading the report below. &lt;br /&gt;
* [https://docs.google.com/document/d/1X3TN1QIvINPMDC6fmwo6vHCgAT377jOFM1zYkWZzdZY/edit?usp=sharing Report on Extraction of Data from DoCoMo Sharp SH-10C Mobile Phone] by Kraze&lt;br /&gt;
* [https://lpcwiki.miraheze.org/wiki/Sharp_SH-10C Sharp SH-10C] on the Legacy Portable Computer Wiki&lt;br /&gt;
&lt;br /&gt;
===Motorola M702iG and M702iS===&lt;br /&gt;
The Motorola M702iG and M702iS are based upon the Motorola Razr that was released internationally. Due to the availability of information about these phones, their firmware has successfully been accessed through USB. It's possible to browse the entire file system on these phones using '''RMCDA General Program'''.&lt;br /&gt;
&lt;br /&gt;
* M702iS/M702iG USB Drivers are required.&lt;br /&gt;
* You will need RMCDA General Program. This will do something to the M702iS/G that open its file system up to P2K Commander. You will need information displayed on the screen to proceed to the next step.&lt;br /&gt;
* P2K Commander will be able to access file system after using RCDMA General.&lt;br /&gt;
* Java Games are located in KJAVA folder.&lt;br /&gt;
&lt;br /&gt;
===Panasonic P-01F===&lt;br /&gt;
The Panasonic P-01F successfully had its firmware extracted by unsoldering the eMMC and analyzing it with a chip programmer. This technique was also used for the '''Panasonic 301P''' and '''Panasonic 401PM'''.&lt;br /&gt;
&lt;br /&gt;
===Others===&lt;br /&gt;
There are many individuals in the preservation community with their own unique phone models seeking unique device solutions, either through debugging software or direct eMMC file transfer. Feel free to ask in the [https://discord.com/invite/jh56s2v5PP Discord] for more info!&lt;br /&gt;
&lt;br /&gt;
== Archive Re-release Restoration Projects ==&lt;br /&gt;
This section will describe efforts to restore original DoJa game files.'''DoJa''' is a proprietary Java runtime developed by NTT Docomo to run specifically on feature phones. Games consist of two files: the .jam file (java manager file), which provides technical information to the phone about the application's install requirements, and the .jar file, which is the game itself. DoJa games use a scratchpad, which is saved as a .sp file.&lt;br /&gt;
&lt;br /&gt;
=== [https://japanesefeaturephones.miraheze.org/wiki/Appli_Archives Appli Archives] for PlayStation Mobile ===&lt;br /&gt;
The Appli Archives are a series of feature phone re-releases. The PlayStation Mobile games contain DoJa files for each game, likely from original source. Game files and assets are drawn from a localhost server that runs within the PlayStation Mobile application. Because of use of localhost, these games cannot run directly in the DoJa SDK. However, some files have been made to run by hosting files on a localhost server on PC.&lt;br /&gt;
&lt;br /&gt;
PlayStation Mobile game packages use [https://www.psdevwiki.com/vita/PSSE PSSE encryption], which requires a game's original license key in order to perform decryption. Because of this, many of the Appli Archive files have not been decrypted, and their DoJa games have remained inaccessible. &lt;br /&gt;
&lt;br /&gt;
Visit the [https://japanesefeaturephones.miraheze.org/wiki/Appli_Archives Japanese Feature Phones wiki] for the full list of games in this collection.&lt;br /&gt;
&lt;br /&gt;
=== [https://japanesefeaturephones.miraheze.org/wiki/Mobile_Game_Deployer Mobile Game Deployer] (MGD) and [https://japanesefeaturephones.miraheze.org/wiki/I%CE%B1ppli_Publisher iαppli Publisher] Games ===&lt;br /&gt;
Mobile Game Deployer/iαppli Publisher was a software that could easily convert i-mode applis into Android, iOS, and Windows Phone programs. A number of prominent feature phone game publishers used this tool to bring their games to the smartphone generation.&lt;br /&gt;
&lt;br /&gt;
The game [https://japanesefeaturephones.miraheze.org/wiki/Flyhight_Cloudia Flyhight Cloudia] was successfully extracted from an Android APK in a fully playable version. &lt;br /&gt;
&lt;br /&gt;
So far, other games have not been converted due to the difficultly in finding original application files for early smartphone games. Not only are these games approximately 10 years old, but they were often distributed in provider-specific mobile game portals, rather than common application stores such as Google Play and the App Store.&lt;br /&gt;
&lt;br /&gt;
===G-mode Archives===&lt;br /&gt;
The [https://japanesefeaturephones.miraheze.org/wiki/G-mode_Archives G-mode Archives] are a collection of Japanese feature phone re-releases for Nintendo Switch and Windows (Steam) published by G-mode. These games were developed in Unity, and so far no DoJa files have been discovered inside of them.&lt;br /&gt;
&lt;br /&gt;
==Emulating Network Protocol?==&lt;br /&gt;
At this point, no one knows how to emulate the proprietary network protocols that were used by these mobile devices to download games. This means that ''no one'' has successfully added new applications or side-loaded applications to a Japanese feature phone. Even though a wifi enabled phone can access a website containing a game download, the wifi Full Browser does not offer the ability to download the game files. Only the proprietary browser (such as i-mode) has the capacity to download and install games.&lt;br /&gt;
&lt;br /&gt;
== Notable Japanese Feature Phone Games ==&lt;br /&gt;
Some notable titles from recognizable game series include:&lt;br /&gt;
&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Before_Crisis_-Final_Fantasy_VII- Before Crisis -Final Fantasy VII-] and [https://japanesefeaturephones.miraheze.org/wiki/Dirge_of_Cerberus_Lost_Episode_-Final_Fantasy_VII- Dirge of Cerberus Lost Episode -Final Fantasy VII-]: Games in the Final Fantasy VII metaverse that greatly expand upon its lore&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Professor_Layton_and_the_Mansion_of_the_Deathly_Mirror Professor Layton and the Mansion of the Deathly Mirror]: A unique Professor Layton title released exclusively for Japanese mobile phones&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Kingdom_Hearts_coded Kingdom Hearts coded]: A story that covers events proceeding the finale of Kingdom Hearts II&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Persona_Mobile_Online Persona Mobile Online]: An entire Persona online MMORPG for cellphones&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Ni_no_Kuni:_Hotroit_Stories Ni no Kuni: Hotroit Stories]: A prologue to the Ni no Kuni series that takes place before Ni no Kuni: Dominion of the Dark Djinn&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Pok%C3%A9mate Pokémate]: The first Pokémon mobile game&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Nakayoshi_Chao! Nakayoshi Chao!]: A Chao virtual pet game for phones&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.youtube.com/watch?v=tKH0x21rj1Y Japan's Game Preservation Crisis] by Did You Know Gaming&lt;br /&gt;
* [https://hitsave.org/feature-phone-gaming/ Japanese Feature Phone Game Preservation: Uncovering a Forgotten Era of Gaming] on HitSave.org&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Main_Page Japanese Feature Phones Wiki] (made by HM member Ellen!)&lt;br /&gt;
* [https://docs.google.com/document/d/1fJdByYSfUPRFFAOixBX5BXx6sGkEc2uqX5verAgBhyc/edit?usp=sharing Feature Phone Preservation Resources] by Ellen&lt;br /&gt;
* [https://archive.org/details/@dekafire Japanese Feature Phone PC Downloads] posted on Archive.org&lt;/div&gt;</summary>
		<author><name>LNRC</name></author>
	</entry>
	<entry>
		<id>https://wiki.hackmanhattan.com/index.php?title=Japanese_Feature_Phone_Preservation&amp;diff=8841</id>
		<title>Japanese Feature Phone Preservation</title>
		<link rel="alternate" type="text/html" href="https://wiki.hackmanhattan.com/index.php?title=Japanese_Feature_Phone_Preservation&amp;diff=8841"/>
		<updated>2023-10-07T05:03:00Z</updated>

		<summary type="html">&lt;p&gt;LNRC: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:JapaneseFeaturePhones.jpg |thumb]]&lt;br /&gt;
&lt;br /&gt;
'''''SD CARD BRUTE FORCE LIVE STREAM HERE: https://www.twitch.tv/goodtofufriday''''' '''''READ FIRST HEADER ON THIS PAGE FOR INFO ON LIVE STREAM'''''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Japanese feature phones is a category of mobile devices that were released (almost) exclusively in Japan between approximately 1999-2015. These phones contained many features that took over a decade to reach the rest of the world: game streaming, live TV, digital wallets, virtual characters to replace you on video calls, and more. The phones offered platform-exclusive games from many beloved franchises such as ''Final Fantasy, Pokemon, Kingdom Hearts, Professor Layton,'' and ''Megami Tensei.'' Mobile devices in Japan were developed by a variety of companies, each with their own proprietary hardware and software. Because of the diversity of phone models, the restrictive copyright protections, a separate set of [https://en.wikipedia.org/wiki/I-mode proprietary internet protocols], and more, these phones and their games have been extremely challenging to preserve.&lt;br /&gt;
&lt;br /&gt;
==Brute Force Live Stream: Cracking the C2 Cipher==&lt;br /&gt;
===General Summary===&lt;br /&gt;
[[File:RockmanDash5Islands.jpg|thumb|Rockman DASH: Great Adventure on 5 Islands! ([https://www.legends-station.com/?id=big-5-island-adventure image source])]]&lt;br /&gt;
The microSD cards in Japanese feature phones hide copyright protected data using a [https://en.wikipedia.org/wiki/Cryptomeria_cipher Cryptomeria Cipher], also known as a C2. Cracking the C2 cipher requires three things: s-box, device keys, and a game-specific bind ID. Having the s-box and device keys allows us to find the bind ID. The s-box was discovered last year, but hackers are still searching for phone specific device keys. These device keys can be used across multiple game dumps, so it's not necessary to find each device's set of device keys for decryption to work. &lt;br /&gt;
&lt;br /&gt;
The user GoodTofuFriday is currently brute-forcing the C2 cipher with his GPU to obtain one device key that can be applied to encrypted SD game dumps. Once we have that device key, we will test it on the card that this particular MKB (a key inside DRM) came from. That has a 100% chance of working because that's literally where the device key came from. &lt;br /&gt;
&lt;br /&gt;
With that in tow, we'll now get to the games: finding the game-specific bind ID using the device key and s-box (which has already been acquired). It depends on how long that will take, but the device key will make things exponentially easier than if we didn't have it. Next is to combine the three to decrypt the game files... and nobody knows what will happen next.&lt;br /&gt;
&lt;br /&gt;
One of the main goals of this brute force effort is to access a specific SD card that contains '''Rockman DASH: Great Adventure on Five Islands!''' &lt;br /&gt;
&lt;br /&gt;
* [https://www.youtube.com/watch?v=fVtgixfBdDc Video footage of Rockman DASH: Great Adventure on Five Islands!]&lt;br /&gt;
* [https://www.twitch.tv/goodtofufriday Cracking Rockman DASH: Great Adventure on Five Islands! Livestream]&lt;br /&gt;
===Hardcore Summary===&lt;br /&gt;
[[File: MKB.png|thumb|Chart of the 16 MKB types used in SD cards involved in this process. Games are encrypted with MKB 11: SD Binding]]&lt;br /&gt;
&lt;br /&gt;
An MKB on SD cards generally contains two records (except some mostly irrelevant header records): '''Calculate Media Key''' and '''Conditionally Calculate Media Key'''.&lt;br /&gt;
&lt;br /&gt;
# A row which corresponds to our device key is looked up in Calculate Media Key record.&lt;br /&gt;
# We decrypt this row with our device key, and get another key.&lt;br /&gt;
# In the Conditionally Calculate Media Key record, there's an encrypted block with a specific (constant) value which we attempt to decrypt with the key from the previous step.&lt;br /&gt;
# If this value matches what we expected, we look up a row in the Conditionally Calculate Media Key record (same row number as in step 1) and decrypt it with the key we got in step 2, then decrypt it again with the device key - that's our key; else we are done and the key is what we got in step 2.&lt;br /&gt;
&lt;br /&gt;
We've made an assumption that the condition in step 4 is always true. Which isn't extremely unreasonable - values in the Conditionally Calculate Media Key record don't seem like what you would expect according to specification (if I've interpreted it correctly, invalid values would be identical to what is in the Calculate Media Key record; and they aren't). So as long as the assumption holds true, it'll eventually succeed.&lt;br /&gt;
&lt;br /&gt;
For more technical information, please look at the following official PDFs:&lt;br /&gt;
* [{{SERVER}}{{localurl:File:Cprm-base110-20101215.pdf}} Content Protection for Recordable Media Specification: Introduction and Common Cryptographic Elements] (PDF)&lt;br /&gt;
* [{{SERVER}}{{localurl:File:Cprm-sd-com097-20101215.pdf}} Content Protection for Recordable Media Specification: SD Memory Card Book - Common Part] (PDF)&lt;br /&gt;
* [{{SERVER}}{{localurl:File:Cprm-sd-bind-part-092-2005-1212.pdf}} Content Protection for Recordable Media Specification: SD Memory Card Book - SD-Binding Part] (PDF)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Mobile Device Data Extraction Projects ==&lt;br /&gt;
&lt;br /&gt;
===Sharp SH-10C===&lt;br /&gt;
[[File:RockmanPhantomofNetwork.png|thumb|Screenshot of ''Rockman.exe Phantom of Network'' ([https://www.rockman-corner.com/2021/09/rockman-exe-phantom-of-networklegend-of.html source])]]&lt;br /&gt;
The Sharp SH-10C is a DoCoMo phone released in 2011. Attempts have been made to read the NAND chip on this phone, in part because its schematics were made public by the [https://fcc.report/FCC-ID/APYHRO00145 FCC]. Currently, there are no chip programmers that support its NAND chip (Toshiba TY00D0021211KC) by default, and attempts at using a chip programmer have not reached past the bootloader. &lt;br /&gt;
&lt;br /&gt;
Right now, preservationists are focusing on this model of phone for a few reasons:&lt;br /&gt;
* The schematics were leaked by the FFC ([https://fcc.report/FCC-ID/APYHRO00145 see here])&lt;br /&gt;
* A member of the community possesses a phone with two Mega Man exclusive games: '''Rockman.exe: Phantom of Network''' and '''Rockman.exe: Legend of Network'''&lt;br /&gt;
* Since this was one of the last Japanese feature phones to be released, it offers a wider variety of possibly exploitable tools such as a wifi-enabled Netfront web browser and [https://en.wikipedia.org/wiki/Adobe_Flash_Lite Adobe Flash Lite]&lt;br /&gt;
&lt;br /&gt;
For more information, we recommend reading the report below. &lt;br /&gt;
* [https://docs.google.com/document/d/1X3TN1QIvINPMDC6fmwo6vHCgAT377jOFM1zYkWZzdZY/edit?usp=sharing Report on Extraction of Data from DoCoMo Sharp SH-10C Mobile Phone] by Kraze&lt;br /&gt;
* [https://lpcwiki.miraheze.org/wiki/Sharp_SH-10C Sharp SH-10C] on the Legacy Portable Computer Wiki&lt;br /&gt;
&lt;br /&gt;
===Motorola M702iG and M702iS===&lt;br /&gt;
The Motorola M702iG and M702iS are based upon the Motorola Razr that was released internationally. Due to the availability of information about these phones, their firmware has successfully been accessed through USB. It's possible to browse the entire file system on these phones using '''RMCDA General Program'''.&lt;br /&gt;
&lt;br /&gt;
* M702iS/M702iG USB Drivers are required.&lt;br /&gt;
* You will need RMCDA General Program. This will do something to the M702iS/G that open its file system up to P2K Commander. You will need information displayed on the screen to proceed to the next step.&lt;br /&gt;
* P2K Commander will be able to access file system after using RCDMA General.&lt;br /&gt;
* Java Games are located in KJAVA folder.&lt;br /&gt;
&lt;br /&gt;
===Panasonic P-01F===&lt;br /&gt;
The Panasonic P-01F successfully had its firmware extracted by unsoldering the eMMC and analyzing it with a chip programmer. This technique was also used for the '''Panasonic 301P''' and '''Panasonic 401PM'''.&lt;br /&gt;
&lt;br /&gt;
===Others===&lt;br /&gt;
There are many individuals in the preservation community with their own unique phone models seeking unique device solutions, either through debugging software or direct eMMC file transfer. Feel free to ask in the [https://discord.com/invite/jh56s2v5PP Discord] for more info!&lt;br /&gt;
&lt;br /&gt;
== Archive Re-release Restoration Projects ==&lt;br /&gt;
This section will describe efforts to restore original DoJa game files.'''DoJa''' is a proprietary Java runtime developed by NTT Docomo to run specifically on feature phones. Games consist of two files: the .jam file (java manager file), which provides technical information to the phone about the application's install requirements, and the .jar file, which is the game itself. DoJa games use a scratchpad, which is saved as a .sp file.&lt;br /&gt;
&lt;br /&gt;
=== [https://japanesefeaturephones.miraheze.org/wiki/Appli_Archives Appli Archives] for PlayStation Mobile ===&lt;br /&gt;
The Appli Archives are a series of feature phone re-releases. The PlayStation Mobile games contain DoJa files for each game, likely from original source. Game files and assets are drawn from a localhost server that runs within the PlayStation Mobile application. Because of use of localhost, these games cannot run directly in the DoJa SDK. However, some files have been made to run by hosting files on a localhost server on PC.&lt;br /&gt;
&lt;br /&gt;
PlayStation Mobile game packages use [https://www.psdevwiki.com/vita/PSSE PSSE encryption], which requires a game's original license key in order to perform decryption. Because of this, many of the Appli Archive files have not been decrypted, and their DoJa games have remained inaccessible. &lt;br /&gt;
&lt;br /&gt;
Visit the [https://japanesefeaturephones.miraheze.org/wiki/Appli_Archives Japanese Feature Phones wiki] for the full list of games in this collection.&lt;br /&gt;
&lt;br /&gt;
=== [https://japanesefeaturephones.miraheze.org/wiki/Mobile_Game_Deployer Mobile Game Deployer] (MGD) and [https://japanesefeaturephones.miraheze.org/wiki/I%CE%B1ppli_Publisher iαppli Publisher] Games ===&lt;br /&gt;
Mobile Game Deployer/iαppli Publisher was a software that could easily convert i-mode applis into Android, iOS, and Windows Phone programs. A number of prominent feature phone game publishers used this tool to bring their games to the smartphone generation.&lt;br /&gt;
&lt;br /&gt;
The game [https://japanesefeaturephones.miraheze.org/wiki/Flyhight_Cloudia Flyhight Cloudia] was successfully extracted from an Android APK in a fully playable version. &lt;br /&gt;
&lt;br /&gt;
So far, other games have not been converted due to the difficultly in finding original application files for early smartphone games. Not only are these games approximately 10 years old, but they were often distributed in provider-specific mobile game portals, rather than common application stores such as Google Play and the App Store.&lt;br /&gt;
&lt;br /&gt;
===G-mode Archives===&lt;br /&gt;
The [https://japanesefeaturephones.miraheze.org/wiki/G-mode_Archives G-mode Archives] are a collection of Japanese feature phone re-releases for Nintendo Switch and Windows (Steam) published by G-mode. These games were developed in Unity, and so far no DoJa files have been discovered inside of them.&lt;br /&gt;
&lt;br /&gt;
==Emulating Network Protocol?==&lt;br /&gt;
At this point, no one knows how to emulate the proprietary network protocols that were used by these mobile devices to download games. This means that ''no one'' has successfully added new applications or side-loaded applications to a Japanese feature phone. Even though a wifi enabled phone can access a website containing a game download, the wifi Full Browser does not offer the ability to download the game files. Only the proprietary browser (such as i-mode) has the capacity to download and install games.&lt;br /&gt;
&lt;br /&gt;
== Notable Japanese Feature Phone Games ==&lt;br /&gt;
Some notable titles from recognizable game series include:&lt;br /&gt;
&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Before_Crisis_-Final_Fantasy_VII- Before Crisis -Final Fantasy VII-] and [https://japanesefeaturephones.miraheze.org/wiki/Dirge_of_Cerberus_Lost_Episode_-Final_Fantasy_VII- Dirge of Cerberus Lost Episode -Final Fantasy VII-]: Games in the Final Fantasy VII metaverse that greatly expand upon its lore&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Professor_Layton_and_the_Mansion_of_the_Deathly_Mirror Professor Layton and the Mansion of the Deathly Mirror]: A unique Professor Layton title released exclusively for Japanese mobile phones&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Kingdom_Hearts_coded Kingdom Hearts coded]: A story that covers events proceeding the finale of Kingdom Hearts II&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Persona_Mobile_Online Persona Mobile Online]: An entire Persona online MMORPG for cellphones&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Ni_no_Kuni:_Hotroit_Stories Ni no Kuni: Hotroit Stories]: A prologue to the Ni no Kuni series that takes place before Ni no Kuni: Dominion of the Dark Djinn&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Pok%C3%A9mate Pokémate]: The first Pokémon mobile game&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Nakayoshi_Chao! Nakayoshi Chao!]: A Chao virtual pet game for phones&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.youtube.com/watch?v=tKH0x21rj1Y Japan's Game Preservation Crisis] by Did You Know Gaming&lt;br /&gt;
* [https://hitsave.org/feature-phone-gaming/ Japanese Feature Phone Game Preservation: Uncovering a Forgotten Era of Gaming] on HitSave.org&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Main_Page Japanese Feature Phones Wiki] (made by HM member Ellen!)&lt;br /&gt;
* [https://docs.google.com/document/d/1fJdByYSfUPRFFAOixBX5BXx6sGkEc2uqX5verAgBhyc/edit?usp=sharing Feature Phone Preservation Resources] by Ellen&lt;br /&gt;
* [https://archive.org/details/@dekafire Japanese Feature Phone PC Downloads] posted on Archive.org&lt;/div&gt;</summary>
		<author><name>LNRC</name></author>
	</entry>
	<entry>
		<id>https://wiki.hackmanhattan.com/index.php?title=Japanese_Feature_Phone_Preservation&amp;diff=8840</id>
		<title>Japanese Feature Phone Preservation</title>
		<link rel="alternate" type="text/html" href="https://wiki.hackmanhattan.com/index.php?title=Japanese_Feature_Phone_Preservation&amp;diff=8840"/>
		<updated>2023-10-07T05:00:59Z</updated>

		<summary type="html">&lt;p&gt;LNRC: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:JapaneseFeaturePhones.jpg |thumb]]&lt;br /&gt;
&lt;br /&gt;
'''''SD CARD BRUTE FORCE LIVE STREAM HERE: https://www.twitch.tv/goodtofufriday''''' '''''READ FIRST HEADER ON THIS PAGE FOR INFO ON LIVE STREAM'''''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Japanese feature phones is a category of mobile devices that were released (almost) exclusively in Japan between approximately 1999-2015. These phones contained many features that took over a decade to reach the rest of the world: game streaming, live TV, digital wallets, virtual characters to replace you on video calls, and more. The phones offered platform-exclusive games from many beloved franchises such as ''Final Fantasy, Pokemon, Kingdom Hearts, Professor Layton,'' and ''Megami Tensei.'' Mobile devices in Japan were developed by a variety of companies, each with their own proprietary hardware and software. Because of the diversity of phone models, the restrictive copyright protections, a separate set of [https://en.wikipedia.org/wiki/I-mode proprietary internet protocols], and more, these phones and their games have been extremely challenging to preserve.&lt;br /&gt;
&lt;br /&gt;
==Brute Force Live Stream: Cracking the C2 Cipher==&lt;br /&gt;
===General Summary===&lt;br /&gt;
[[File:RockmanDash5Islands.jpg|thumb|Rockman DASH: Great Adventure on 5 Islands! ([https://www.legends-station.com/?id=big-5-island-adventure image source])]]&lt;br /&gt;
The microSD cards in Japanese feature phones hide copyright protected data using a [https://en.wikipedia.org/wiki/Cryptomeria_cipher Cryptomeria Cipher], also known as a C2. Cracking the C2 cipher requires three things: s-box, device keys, and a game-specific bind ID. Having the s-box and device keys allows us to find the bind ID. The s-box was discovered last year, but hackers are still searching for phone specific device keys. These device keys can be used across multiple game dumps, so it's not necessary to find each device's set of device keys for decryption to work. &lt;br /&gt;
&lt;br /&gt;
The user GoodTofuFriday is currently brute-forcing the C2 cipher with his GPU to obtain one device key that can be applied to encrypted SD game dumps. Once we have that device key, we will test it on the card that this particular MKB (a key inside DRM) came from. That has a 100% chance of working because that's literally where the device key came from. &lt;br /&gt;
&lt;br /&gt;
With that in tow, we'll now get to the games: finding the game-specific bind ID using the device key and s-box (which has already been acquired). It depends on how long that will take, but the device key will make things exponentially easier than if we didn't have it. Next is to combine the three to decrypt the game files... and nobody knows what will happen next.&lt;br /&gt;
&lt;br /&gt;
One of the main goals of this brute force effort is to access a specific SD card that contains '''Rockman DASH: Great Adventure on Five Islands!''' &lt;br /&gt;
&lt;br /&gt;
* [https://www.youtube.com/watch?v=fVtgixfBdDc Video footage of Rockman DASH: Great Adventure on Five Islands!]&lt;br /&gt;
* [https://www.twitch.tv/goodtofufriday Cracking Rockman DASH: Great Adventure on Five Islands! Livestream]&lt;br /&gt;
===Hardcore Summary===&lt;br /&gt;
[[File: MKB.png|thumb|Chart of the 16 MKB types used in SD cards involved in this process. Games are encrypted with MKB 11: SD Binding]]&lt;br /&gt;
&lt;br /&gt;
An MKB on SD cards generally contains two records (except some mostly irrelevant header records): '''Calculate Media Key''' and '''Conditionally Calculate Media Key'''.&lt;br /&gt;
&lt;br /&gt;
# A row which corresponds to our device key is looked up in Calculate Media Key record.&lt;br /&gt;
# We decrypt this row with our device key, and get another key.&lt;br /&gt;
# In the Conditionally Calculate Media Key record, there's an encrypted block with a specific (constant) value which we attempt to decrypt with the key from the previous step.&lt;br /&gt;
# If this value matches what we expected, we look up a row in the Conditionally Calculate Media Key record (same row number as in step 1) and decrypt it with the key we got in step 2, then decrypt it again with the device key - that's our key; else we are done and the key is what we got in step 2.&lt;br /&gt;
&lt;br /&gt;
We've made an assumption that the condition in step 4 is always true. Which isn't extremely unreasonable - values in the Conditionally Calculate Media Key record don't seem like what you would expect according to specification (if I've interpreted it correctly, invalid values would be identical to what is in the Calculate Media Key record; and they aren't). So as long as the assumption holds true, it'll eventually succeed.&lt;br /&gt;
&lt;br /&gt;
For more technical information, please look at the following official PDFs:&lt;br /&gt;
* [{{SERVER}}{{localurl:File:Cprm-base110-20101215.pdf}} Content Protection for Recordable Media Specification: Introduction and Common Cryptographic Elements] (PDF)&lt;br /&gt;
* [{{SERVER}}{{localurl:File:Cprm-sd-com097-20101215.pdf}} Content Protection for Recordable Media Specification: SD Memory Card Book - Common Part] (PDF)&lt;br /&gt;
* [{{SERVER}}{{localurl:File:Cprm-sd-bind-part-092-2005-1212.pdf}} Content Protection for Recordable Media Specification: SD Memory Card Book - SD-Binding Part] (PDF)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Mobile Device Data Extraction Projects ==&lt;br /&gt;
&lt;br /&gt;
===Sharp SH-10C===&lt;br /&gt;
[[File:RockmanPhantomofNetwork.png|thumb|Screenshot of ''Rockman.exe Phantom of Network'' ([https://www.rockman-corner.com/2021/09/rockman-exe-phantom-of-networklegend-of.html source])]]&lt;br /&gt;
The Sharp SH-10C is a DoCoMo phone released in 2011. Attempts have been made to read the NAND chip on this phone, in part because its schematics were made public by the [https://fcc.report/FCC-ID/APYHRO00145 FCC]. Currently, there are no chip programmers that support its NAND chip (Toshiba TY00D0021211KC) by default, and attempts at using a chip programmer have not reached past the bootloader. &lt;br /&gt;
&lt;br /&gt;
Right now, preservationists are focusing on this model of phone for a few reasons:&lt;br /&gt;
* The schematics were leaked by the FFC ([https://fcc.report/FCC-ID/APYHRO00145 see here])&lt;br /&gt;
* A member of the community possesses a phone with two Mega Man exclusive games: '''Rockman.exe: Phantom of Network''' and '''Rockman.exe: Legend of Network'''&lt;br /&gt;
* Since this was one of the last Japanese feature phones to be released, it offers a wider variety of possibly exploitable tools such as a wifi-enabled Netfront web browser and [https://en.wikipedia.org/wiki/Adobe_Flash_Lite Adobe Flash Lite]&lt;br /&gt;
&lt;br /&gt;
For more information, we recommend reading the report below. &lt;br /&gt;
* [https://docs.google.com/document/d/1X3TN1QIvINPMDC6fmwo6vHCgAT377jOFM1zYkWZzdZY/edit?usp=sharing Report on Extraction of Data from DoCoMo Sharp SH-10C Mobile Phone] by Kraze&lt;br /&gt;
* [https://lpcwiki.miraheze.org/wiki/Sharp_SH-10C Sharp SH-10C] on the Legacy Portable Computer Wiki&lt;br /&gt;
&lt;br /&gt;
===Motorola M702iG and M702iS===&lt;br /&gt;
The Motorola M702iG and M702iS are based upon the Motorola Razr that was released internationally. Due to the availability of information about these phones, their firmware has successfully been accessed through USB. It's possible to browse the entire file system on these phones using a RMCDA General Program.&lt;br /&gt;
&lt;br /&gt;
* M702iS/M702iG USB Drivers are required.&lt;br /&gt;
* You will need RMCDA General Program. This will do something to the M702iS/G that open its file system up to P2K Commander. You will need information displayed on the screen to proceed to the next step.&lt;br /&gt;
* P2K Commander will be able to access file system after using RCDMA General.&lt;br /&gt;
* Java Games are located in KJAVA folder.&lt;br /&gt;
&lt;br /&gt;
===Panasonic P-01F===&lt;br /&gt;
The Panasonic P-01F successfully had its firmware extracted by unsoldering the eMMC and analyzing it with a chip programmer. This technique was also used for the '''Panasonic 301P''' and '''Panasonic 401PM'''.&lt;br /&gt;
&lt;br /&gt;
===Others===&lt;br /&gt;
There are many individuals in the preservation community with their own unique phone models seeking unique device solutions. Feel free to ask in the [https://discord.com/invite/jh56s2v5PP Discord] for more info!&lt;br /&gt;
&lt;br /&gt;
== Archive Re-release Restoration Projects ==&lt;br /&gt;
This section will describe efforts to restore original DoJa game files.'''DoJa''' is a proprietary Java runtime developed by NTT Docomo to run specifically on feature phones. Games consist of two files: the .jam file (java manager file), which provides technical information to the phone about the application's install requirements, and the .jar file, which is the game itself. DoJa games use a scratchpad, which is saved as a .sp file.&lt;br /&gt;
&lt;br /&gt;
=== [https://japanesefeaturephones.miraheze.org/wiki/Appli_Archives Appli Archives] for PlayStation Mobile ===&lt;br /&gt;
The Appli Archives are a series of feature phone re-releases. The PlayStation Mobile games contain DoJa files for each game, likely from original source. Game files and assets are drawn from a localhost server that runs within the PlayStation Mobile application. Because of use of localhost, these games cannot run directly in the DoJa SDK. However, some files have been made to run by hosting files on a localhost server on PC.&lt;br /&gt;
&lt;br /&gt;
PlayStation Mobile game packages use [https://www.psdevwiki.com/vita/PSSE PSSE encryption], which requires a game's original license key in order to perform decryption. Because of this, many of the Appli Archive files have not been decrypted, and their DoJa games have remained inaccessible. &lt;br /&gt;
&lt;br /&gt;
Visit the [https://japanesefeaturephones.miraheze.org/wiki/Appli_Archives Japanese Feature Phones wiki] for the full list of games in this collection.&lt;br /&gt;
&lt;br /&gt;
=== [https://japanesefeaturephones.miraheze.org/wiki/Mobile_Game_Deployer Mobile Game Deployer] (MGD) and [https://japanesefeaturephones.miraheze.org/wiki/I%CE%B1ppli_Publisher iαppli Publisher] Games ===&lt;br /&gt;
Mobile Game Deployer/iαppli Publisher was a software that could easily convert i-mode applis into Android, iOS, and Windows Phone programs. A number of prominent feature phone game publishers used this tool to bring their games to the smartphone generation.&lt;br /&gt;
&lt;br /&gt;
The game [https://japanesefeaturephones.miraheze.org/wiki/Flyhight_Cloudia Flyhight Cloudia] was successfully extracted from an Android APK in a fully playable version. &lt;br /&gt;
&lt;br /&gt;
So far, other games have not been converted due to the difficultly in finding original application files for early smartphone games. Not only are these games approximately 10 years old, but they were often distributed in provider-specific mobile game portals, rather than common application stores such as Google Play and the App Store.&lt;br /&gt;
&lt;br /&gt;
===G-mode Archives===&lt;br /&gt;
The [https://japanesefeaturephones.miraheze.org/wiki/G-mode_Archives G-mode Archives] are a collection of Japanese feature phone re-releases for Nintendo Switch and Windows (Steam) published by G-mode. These games were developed in Unity, and so far no DoJa files have been discovered inside of them.&lt;br /&gt;
&lt;br /&gt;
==Emulating Network Protocol?==&lt;br /&gt;
At this point, no one knows how to emulate the proprietary network protocols that were used by these mobile devices to download games. This means that ''no one'' has successfully added new applications or side-loaded applications to a Japanese feature phone. Even though a wifi enabled phone can access a website containing a game download, the wifi Full Browser does not offer the ability to download the game files. Only the proprietary browser (such as i-mode) has the capacity to download and install games.&lt;br /&gt;
&lt;br /&gt;
== Notable Japanese Feature Phone Games ==&lt;br /&gt;
Some notable titles from recognizable game series include:&lt;br /&gt;
&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Before_Crisis_-Final_Fantasy_VII- Before Crisis -Final Fantasy VII-] and [https://japanesefeaturephones.miraheze.org/wiki/Dirge_of_Cerberus_Lost_Episode_-Final_Fantasy_VII- Dirge of Cerberus Lost Episode -Final Fantasy VII-]: Games in the Final Fantasy VII metaverse that greatly expand upon its lore&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Professor_Layton_and_the_Mansion_of_the_Deathly_Mirror Professor Layton and the Mansion of the Deathly Mirror]: A unique Professor Layton title released exclusively for Japanese mobile phones&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Kingdom_Hearts_coded Kingdom Hearts coded]: A story that covers events proceeding the finale of Kingdom Hearts II&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Persona_Mobile_Online Persona Mobile Online]: An entire Persona online MMORPG for cellphones&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Ni_no_Kuni:_Hotroit_Stories Ni no Kuni: Hotroit Stories]: A prologue to the Ni no Kuni series that takes place before Ni no Kuni: Dominion of the Dark Djinn&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Pok%C3%A9mate Pokémate]: The first Pokémon mobile game&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Nakayoshi_Chao! Nakayoshi Chao!]: A Chao virtual pet game for phones&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.youtube.com/watch?v=tKH0x21rj1Y Japan's Game Preservation Crisis] by Did You Know Gaming&lt;br /&gt;
* [https://hitsave.org/feature-phone-gaming/ Japanese Feature Phone Game Preservation: Uncovering a Forgotten Era of Gaming] on HitSave.org&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Main_Page Japanese Feature Phones Wiki] (made by HM member Ellen!)&lt;br /&gt;
* [https://docs.google.com/document/d/1fJdByYSfUPRFFAOixBX5BXx6sGkEc2uqX5verAgBhyc/edit?usp=sharing Feature Phone Preservation Resources] by Ellen&lt;br /&gt;
* [https://archive.org/details/@dekafire Japanese Feature Phone PC Downloads] posted on Archive.org&lt;/div&gt;</summary>
		<author><name>LNRC</name></author>
	</entry>
	<entry>
		<id>https://wiki.hackmanhattan.com/index.php?title=Japanese_Feature_Phone_Preservation&amp;diff=8839</id>
		<title>Japanese Feature Phone Preservation</title>
		<link rel="alternate" type="text/html" href="https://wiki.hackmanhattan.com/index.php?title=Japanese_Feature_Phone_Preservation&amp;diff=8839"/>
		<updated>2023-10-07T04:58:46Z</updated>

		<summary type="html">&lt;p&gt;LNRC: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:JapaneseFeaturePhones.jpg |thumb]]&lt;br /&gt;
&lt;br /&gt;
'''''SD CARD BRUTE FORCE LIVE STREAM HERE: https://www.twitch.tv/goodtofufriday''''' '''''READ FIRST HEADER ON THIS PAGE FOR INFO ON LIVE STREAM'''''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Japanese feature phones is a category of mobile devices that were released (almost) exclusively in Japan between approximately 1999-2015. These phones contained many features that took over a decade to reach the rest of the world: game streaming, live TV, digital wallets, virtual characters to replace you on video calls, and more. The phones offered platform-exclusive games from many beloved franchises such as ''Final Fantasy, Pokemon, Kingdom Hearts, Professor Layton,'' and ''Megami Tensei.'' Mobile devices in Japan were developed by a variety of companies, each with their own proprietary hardware and software. Because of the diversity of phone models, the restrictive copyright protections, a separate set of [https://en.wikipedia.org/wiki/I-mode proprietary internet protocols], and more, these phones and their games have been extremely challenging to preserve.&lt;br /&gt;
&lt;br /&gt;
==Brute Force Live Stream: Cracking the C2 Cipher==&lt;br /&gt;
===General Summary===&lt;br /&gt;
[[File:RockmanDash5Islands.jpg|thumb|Rockman DASH: Great Adventure on 5 Islands! ([https://www.legends-station.com/?id=big-5-island-adventure image source])]]&lt;br /&gt;
The microSD cards in Japanese feature phones hide copyright protected data using a [https://en.wikipedia.org/wiki/Cryptomeria_cipher Cryptomeria Cipher], also known as a C2. Cracking the C2 cipher requires three things: s-box, device keys, and a game-specific bind ID. Having the s-box and device keys allows us to find the bind ID. The s-box was discovered last year, but hackers are still searching for phone specific device keys. These device keys can be used across multiple game dumps, so it's not necessary to find each device's set of device keys for decryption to work. &lt;br /&gt;
&lt;br /&gt;
The user GoodTofuFriday is currently brute-forcing the C2 cipher with his GPU to obtain one device key that can be applied to encrypted SD game dumps. Once we have that device key, we will test it on the card that this particular MKB (a key inside DRM) came from. That has a 100% chance of working because that's literally where the device key came from. &lt;br /&gt;
&lt;br /&gt;
With that in tow, we'll now get to the games: finding the game-specific bind ID using the device key and s-box (which has already been acquired). It depends on how long that will take, but the device key will make things exponentially easier than if we didn't have it. Next is to combine the three to decrypt the game files... and nobody knows what will happen next.&lt;br /&gt;
&lt;br /&gt;
One of the main goals of this brute force effort is to access a specific SD card that contains '''Rockman DASH: Great Adventure on Five Islands!''' &lt;br /&gt;
&lt;br /&gt;
* [https://www.youtube.com/watch?v=fVtgixfBdDc Video footage of Rockman DASH: Great Adventure on Five Islands!]&lt;br /&gt;
* [https://www.twitch.tv/goodtofufriday Cracking Rockman DASH: Great Adventure on Five Islands! Livestream]&lt;br /&gt;
===Hardcore Summary===&lt;br /&gt;
[[File: MKB.png|thumb|Chart of the 16 MKB types used in SD cards involved in this process. Games are encrypted with MKB 11: SD Binding]]&lt;br /&gt;
&lt;br /&gt;
An MKB on SD cards generally contains two records (except some mostly irrelevant header records): '''Calculate Media Key''' and '''Conditionally Calculate Media Key'''.&lt;br /&gt;
&lt;br /&gt;
# A row which corresponds to our device key is looked up in Calculate Media Key record.&lt;br /&gt;
# We decrypt this row with our device key, and get another key.&lt;br /&gt;
# In the Conditionally Calculate Media Key record, there's an encrypted block with a specific (constant) value which we attempt to decrypt with the key from the previous step.&lt;br /&gt;
# If this value matches what we expected, we look up a row in the Conditionally Calculate Media Key record (same row number as in step 1) and decrypt it with the key we got in step 2, then decrypt it again with the device key - that's our key; else we are done and the key is what we got in step 2.&lt;br /&gt;
&lt;br /&gt;
We've made an assumption that the condition in step 4 is always true. Which isn't extremely unreasonable - values in the Conditionally Calculate Media Key record don't seem like what you would expect according to specification (if I've interpreted it correctly, invalid values would be identical to what is in the Calculate Media Key record; and they aren't). So as long as the assumption holds true, it'll eventually succeed.&lt;br /&gt;
&lt;br /&gt;
For more technical information, please look at the following official PDFs:&lt;br /&gt;
* [{{SERVER}}{{localurl:File:Cprm-base110-20101215.pdf}} Content Protection for Recordable Media Specification: Introduction and Common Cryptographic Elements] (PDF)&lt;br /&gt;
* [{{SERVER}}{{localurl:File:Cprm-sd-com097-20101215.pdf}} Content Protection for Recordable Media Specification: SD Memory Card Book - Common Part] (PDF)&lt;br /&gt;
* [{{SERVER}}{{localurl:File:Cprm-sd-bind-part-092-2005-1212.pdf}} Content Protection for Recordable Media Specification: SD Memory Card Book - SD-Binding Part] (PDF)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Mobile Device Data Extraction Projects ==&lt;br /&gt;
&lt;br /&gt;
===Sharp SH-10C===&lt;br /&gt;
[[File:RockmanPhantomofNetwork.png|thumb|Screenshot of ''Rockman.exe Phantom of Network'' ([https://www.rockman-corner.com/2021/09/rockman-exe-phantom-of-networklegend-of.html source])]]&lt;br /&gt;
The Sharp SH-10C is a DoCoMo phone released in 2011. Attempts have been made to read the NAND chip on this phone, in part because its schematics were made public by the [https://fcc.report/FCC-ID/APYHRO00145 FCC]. Currently, there are no chip programmers that support its NAND chip (Toshiba TY00D0021211KC) by default, and attempts at using a chip programmer have not reached past the bootloader. &lt;br /&gt;
&lt;br /&gt;
Right now, preservationists are focusing on this model of phone for a few reasons:&lt;br /&gt;
* The schematics were leaked by the FFC ([https://fcc.report/FCC-ID/APYHRO00145 see here])&lt;br /&gt;
* A member of the community possesses a phone with two Mega Man exclusive games: '''Rockman.exe: Phantom of Network''' and '''Rockman.exe: Legend of Network'''&lt;br /&gt;
* Since this was one of the last Japanese feature phones to be released, it offers a wider variety of possibly exploitable tools such as a wifi-enabled Netfront web browser and [https://en.wikipedia.org/wiki/Adobe_Flash_Lite Adobe Flash Lite]&lt;br /&gt;
&lt;br /&gt;
For more information, we recommend reading the report below. &lt;br /&gt;
* [https://docs.google.com/document/d/1X3TN1QIvINPMDC6fmwo6vHCgAT377jOFM1zYkWZzdZY/edit?usp=sharing Report on Extraction of Data from DoCoMo Sharp SH-10C Mobile Phone] by Kraze&lt;br /&gt;
* [https://lpcwiki.miraheze.org/wiki/Sharp_SH-10C Sharp SH-10C] on the Legacy Portable Computer Wiki&lt;br /&gt;
&lt;br /&gt;
===Motorola M702iG and M702iS===&lt;br /&gt;
The Motorola M702iG and M702iS are based upon the Motorola Razr that was released internationally. Due to the availability of information about these phones, their firmware has successfully been accessed through USB. It's possible to browse the entire file system on these phones using a RMCDA General Program.&lt;br /&gt;
&lt;br /&gt;
* M702iS/M702iG USB Drivers are required.&lt;br /&gt;
* You will need RMCDA General Program. This will do something to the M702iS/G that open its file system up to P2K Commander. You will need information displayed on the screen to proceed to the next step.&lt;br /&gt;
* P2K Commander will be able to access file system after using RCDMA General.&lt;br /&gt;
* Java Games are located in KJAVA folder.&lt;br /&gt;
&lt;br /&gt;
===Panasonic P-01F===&lt;br /&gt;
The Panasonic P-01F successfully had its firmware extracted by unsoldering the eMMC and analyzing it with a chip programmer. This technique was also used for the '''Panasonic 301P''' and '''Panasonic 401PM'''.&lt;br /&gt;
&lt;br /&gt;
===Others===&lt;br /&gt;
There are many individuals in the preservation community with their own unique phone models seeking unique device solutions. Feel free to ask in the [https://discord.com/invite/jh56s2v5PP Discord] for more info!&lt;br /&gt;
&lt;br /&gt;
== Archive Re-release Restoration Projects ==&lt;br /&gt;
This section will describe efforts to restore original DoJa game files.'''DoJa''' is a proprietary Java runtime developed by NTT Docomo to run specifically on feature phones. Games consist of two files: the .jam file (java manager file), which provides technical information to the phone about the application's install requirements, and the .jar file, which is the game itself. DoJa games use a scratchpad, which is saved as a .sp file.&lt;br /&gt;
&lt;br /&gt;
=== [https://japanesefeaturephones.miraheze.org/wiki/Appli_Archives Appli Archives] for PlayStation Mobile ===&lt;br /&gt;
The Appli Archives are a series of feature phone re-releases. The PlayStation Mobile games contain DoJa files for each game, likely from original source. Game files and assets are drawn from a localhost server that runs within the PlayStation Mobile application. Because of use of localhost, these games cannot run directly in the DoJa SDK. However, some files have been made to run by hosting files on a localhost server on PC.&lt;br /&gt;
&lt;br /&gt;
PlayStation Mobile game packages use [https://www.psdevwiki.com/vita/PSSE PSSE encryption], which requires a game's original license key in order to perform decryption. Because of this, many of the Appli Archive files have not been decrypted, and their DoJa games have remained inaccessible. &lt;br /&gt;
&lt;br /&gt;
==== Currently Accessible Appli Archives Games ====&lt;br /&gt;
Any game not on this list lacks a publicly known license key in order to be decrypted. Visit the [https://japanesefeaturephones.miraheze.org/wiki/Appli_Archives Japanese Feature Phones wiki] for the full list of games in this collection.&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
!Appli Archive Game&lt;br /&gt;
!Games Included&lt;br /&gt;
!Release Date&lt;br /&gt;
|-&lt;br /&gt;
|'''アプリアーカイブス ジャレコ シティコネクション'''&lt;br /&gt;
Appli Archives: Jaleco City Connection&lt;br /&gt;
|&lt;br /&gt;
* City Connection DX&lt;br /&gt;
* City Connection: Rocket&lt;br /&gt;
|2014.12.17&lt;br /&gt;
|-&lt;br /&gt;
|'''アプリアーカイブス 日本一ソフトウェア デュオローグ'''&lt;br /&gt;
Appli Archives: Nippon Ichi Software Duologue&lt;br /&gt;
|&lt;br /&gt;
* Duologue&lt;br /&gt;
|2014.12.17&lt;br /&gt;
|-&lt;br /&gt;
|'''アプリアーカイブス ジャレコ モモコ1200%'''&lt;br /&gt;
Appli Archives: Jaleco Momoko 1200%&lt;br /&gt;
|&lt;br /&gt;
* Momoko 1200% Prequel&lt;br /&gt;
* Momoko 1200% Sequel&lt;br /&gt;
|2014.12.24&lt;br /&gt;
|-&lt;br /&gt;
|'''アプリアーカイブス 日本一ソフトウェア ミニゲームパック1'''&lt;br /&gt;
Appli Archives: Nippon Ichi Software Mini Game Pack 1&lt;br /&gt;
|&lt;br /&gt;
* Elingya Puzzle DX&lt;br /&gt;
* Going Down the Hill&lt;br /&gt;
* The Throwing Prinnies&lt;br /&gt;
|2015.01.14&lt;br /&gt;
|-&lt;br /&gt;
|'''アプリアーカイブス ジャレコ アーガス＆フィールドコンバット'''&lt;br /&gt;
Appli Archives: Jaleco Argus &amp;amp; Field Combat&lt;br /&gt;
|&lt;br /&gt;
* Argus&lt;br /&gt;
* Buta-san&lt;br /&gt;
* Exerion DX&lt;br /&gt;
* Field Combat DX&lt;br /&gt;
|2015.01.28&lt;br /&gt;
|-&lt;br /&gt;
|'''アプリアーカイブス ジー・モード バーガータイム'''&lt;br /&gt;
Appli Archives G-MODE Burger Time&lt;br /&gt;
|&lt;br /&gt;
* BurgerTime&lt;br /&gt;
* Pucchin Puzzle&lt;br /&gt;
* Snowboard Man&lt;br /&gt;
|2015.03.11&lt;br /&gt;
|-&lt;br /&gt;
|'''アプリアーカイブス 日本一ソフトウェア ミニゲームパック2'''&lt;br /&gt;
Appli Archives Nippon Ichi Software Mini Game Pack 2&lt;br /&gt;
|&lt;br /&gt;
* Disgaea: The Prinnies Strike Back&lt;br /&gt;
* Nyanko Panel DX|Nyanko Panels DX&lt;br /&gt;
* Nyanko Suberi DX|The Slipping Nyanko DX&lt;br /&gt;
|2015.04.28&lt;br /&gt;
|-&lt;br /&gt;
|'''アプリアーカイブス チームライズ HumanFly'''&lt;br /&gt;
Appli Archives Team Rise HumanFly&lt;br /&gt;
|&lt;br /&gt;
* HumanFly Kai&lt;br /&gt;
* HumanFly 2&lt;br /&gt;
* CIA Sniper Investigator DX&lt;br /&gt;
|2015.05.27&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== [https://japanesefeaturephones.miraheze.org/wiki/Mobile_Game_Deployer Mobile Game Deployer] (MGD) Games ===&lt;br /&gt;
Mobile Game Deployer was a software that could easily convert i-mode applis into Android, iOS, and Windows Phone programs. A number of prominent feature phone game publishers used this tool to bring their games to the smartphone generation.&lt;br /&gt;
&lt;br /&gt;
The game [https://japanesefeaturephones.miraheze.org/wiki/Flyhight_Cloudia Flyhight Cloudia] was successfully extracted from an Android APK in a fully playable version. &lt;br /&gt;
&lt;br /&gt;
So far, other games have not been converted due to the difficultly in finding original application files for early smartphone games. Not only are these games approximately 10 years old, but they were often distributed in provider-specific mobile game portals, rather than common application stores such as Google Play and the App Store.&lt;br /&gt;
&lt;br /&gt;
===G-mode Archives===&lt;br /&gt;
The [https://japanesefeaturephones.miraheze.org/wiki/G-mode_Archives G-mode Archives] are a collection of Japanese feature phone re-releases for Nintendo Switch and Windows (Steam) published by G-mode. These games were developed in Unity, and so far no DoJa files have been discovered inside of them.&lt;br /&gt;
&lt;br /&gt;
==Emulating Network Protocol?==&lt;br /&gt;
At this point, no one knows how to emulate the proprietary network protocols that were used by these mobile devices to download games. This means that ''no one'' has successfully added new applications or side-loaded applications to a Japanese feature phone. Even though a wifi enabled phone can access a website containing a game download, the wifi Full Browser does not offer the ability to download the game files. Only the proprietary browser (such as i-mode) has the capacity to download and install games.&lt;br /&gt;
&lt;br /&gt;
== Notable Japanese Feature Phone Games ==&lt;br /&gt;
Some notable titles from recognizable game series include:&lt;br /&gt;
&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Before_Crisis_-Final_Fantasy_VII- Before Crisis -Final Fantasy VII-] and [https://japanesefeaturephones.miraheze.org/wiki/Dirge_of_Cerberus_Lost_Episode_-Final_Fantasy_VII- Dirge of Cerberus Lost Episode -Final Fantasy VII-]: Games in the Final Fantasy VII metaverse that greatly expand upon its lore&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Professor_Layton_and_the_Mansion_of_the_Deathly_Mirror Professor Layton and the Mansion of the Deathly Mirror]: A unique Professor Layton title released exclusively for Japanese mobile phones&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Kingdom_Hearts_coded Kingdom Hearts coded]: A story that covers events proceeding the finale of Kingdom Hearts II&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Persona_Mobile_Online Persona Mobile Online]: An entire Persona online MMORPG for cellphones&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Ni_no_Kuni:_Hotroit_Stories Ni no Kuni: Hotroit Stories]: A prologue to the Ni no Kuni series that takes place before Ni no Kuni: Dominion of the Dark Djinn&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Pok%C3%A9mate Pokémate]: The first Pokémon mobile game&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Nakayoshi_Chao! Nakayoshi Chao!]: A Chao virtual pet game for phones&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.youtube.com/watch?v=tKH0x21rj1Y Japan's Game Preservation Crisis] by Did You Know Gaming&lt;br /&gt;
* [https://hitsave.org/feature-phone-gaming/ Japanese Feature Phone Game Preservation: Uncovering a Forgotten Era of Gaming] on HitSave.org&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Main_Page Japanese Feature Phones Wiki] (made by HM member Ellen!)&lt;br /&gt;
* [https://docs.google.com/document/d/1fJdByYSfUPRFFAOixBX5BXx6sGkEc2uqX5verAgBhyc/edit?usp=sharing Feature Phone Preservation Resources] by Ellen&lt;br /&gt;
* [https://archive.org/details/@dekafire Japanese Feature Phone PC Downloads] posted on Archive.org&lt;/div&gt;</summary>
		<author><name>LNRC</name></author>
	</entry>
	<entry>
		<id>https://wiki.hackmanhattan.com/index.php?title=File:RockmanPhantomofNetwork.png&amp;diff=8838</id>
		<title>File:RockmanPhantomofNetwork.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.hackmanhattan.com/index.php?title=File:RockmanPhantomofNetwork.png&amp;diff=8838"/>
		<updated>2023-10-07T04:44:00Z</updated>

		<summary type="html">&lt;p&gt;LNRC: Rockman.exe Phantom of Network screenshot from https://www.rockman-corner.com/2021/09/rockman-exe-phantom-of-networklegend-of.html&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Summary ==&lt;br /&gt;
Rockman.exe Phantom of Network screenshot from https://www.rockman-corner.com/2021/09/rockman-exe-phantom-of-networklegend-of.html&lt;/div&gt;</summary>
		<author><name>LNRC</name></author>
	</entry>
	<entry>
		<id>https://wiki.hackmanhattan.com/index.php?title=File:RockmanDash5Islands.jpg&amp;diff=8837</id>
		<title>File:RockmanDash5Islands.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.hackmanhattan.com/index.php?title=File:RockmanDash5Islands.jpg&amp;diff=8837"/>
		<updated>2023-10-07T04:23:37Z</updated>

		<summary type="html">&lt;p&gt;LNRC: For Japanese Feature Phone Preservation a screenshot of Rockman Dash: Great Adventure on 5 Islands. 

Source: https://www.legends-station.com/?id=big-5-island-adventure&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Summary ==&lt;br /&gt;
For [[Japanese Feature Phone Preservation]] a screenshot of Rockman Dash: Great Adventure on 5 Islands. &lt;br /&gt;
&lt;br /&gt;
Source: https://www.legends-station.com/?id=big-5-island-adventure&lt;/div&gt;</summary>
		<author><name>LNRC</name></author>
	</entry>
	<entry>
		<id>https://wiki.hackmanhattan.com/index.php?title=File:Cprm-base110-20101215.pdf&amp;diff=8836</id>
		<title>File:Cprm-base110-20101215.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.hackmanhattan.com/index.php?title=File:Cprm-base110-20101215.pdf&amp;diff=8836"/>
		<updated>2023-10-07T04:15:51Z</updated>

		<summary type="html">&lt;p&gt;LNRC: Explanation of SD bind related to Japanese Feature Phone Preservation&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Summary ==&lt;br /&gt;
Explanation of SD bind related to Japanese Feature Phone Preservation&lt;/div&gt;</summary>
		<author><name>LNRC</name></author>
	</entry>
	<entry>
		<id>https://wiki.hackmanhattan.com/index.php?title=File:Cprm-sd-com097-20101215.pdf&amp;diff=8835</id>
		<title>File:Cprm-sd-com097-20101215.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.hackmanhattan.com/index.php?title=File:Cprm-sd-com097-20101215.pdf&amp;diff=8835"/>
		<updated>2023-10-07T04:15:43Z</updated>

		<summary type="html">&lt;p&gt;LNRC: Explanation of SD bind related to Japanese Feature Phone Preservation&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Summary ==&lt;br /&gt;
Explanation of SD bind related to Japanese Feature Phone Preservation&lt;/div&gt;</summary>
		<author><name>LNRC</name></author>
	</entry>
	<entry>
		<id>https://wiki.hackmanhattan.com/index.php?title=File:Cprm-sd-bind-part-092-2005-1212.pdf&amp;diff=8834</id>
		<title>File:Cprm-sd-bind-part-092-2005-1212.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.hackmanhattan.com/index.php?title=File:Cprm-sd-bind-part-092-2005-1212.pdf&amp;diff=8834"/>
		<updated>2023-10-07T04:15:06Z</updated>

		<summary type="html">&lt;p&gt;LNRC: Explanation of SD bind related to Japanese Feature Phone Preservation&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Summary ==&lt;br /&gt;
Explanation of SD bind related to Japanese Feature Phone Preservation&lt;/div&gt;</summary>
		<author><name>LNRC</name></author>
	</entry>
	<entry>
		<id>https://wiki.hackmanhattan.com/index.php?title=File:MKB.png&amp;diff=8833</id>
		<title>File:MKB.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.hackmanhattan.com/index.php?title=File:MKB.png&amp;diff=8833"/>
		<updated>2023-10-07T03:39:31Z</updated>

		<summary type="html">&lt;p&gt;LNRC: A chart showing the 26 CPRM MKBs that are used to encrypt data on an SD card, relevant to Japanese Feature Phones&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Summary ==&lt;br /&gt;
A chart showing the 26 CPRM MKBs that are used to encrypt data on an SD card, relevant to [[Japanese Feature Phones]]&lt;/div&gt;</summary>
		<author><name>LNRC</name></author>
	</entry>
	<entry>
		<id>https://wiki.hackmanhattan.com/index.php?title=Japanese_Feature_Phone_Preservation&amp;diff=8829</id>
		<title>Japanese Feature Phone Preservation</title>
		<link rel="alternate" type="text/html" href="https://wiki.hackmanhattan.com/index.php?title=Japanese_Feature_Phone_Preservation&amp;diff=8829"/>
		<updated>2023-10-04T02:12:21Z</updated>

		<summary type="html">&lt;p&gt;LNRC: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:JapaneseFeaturePhones.jpg |thumb]]&lt;br /&gt;
&lt;br /&gt;
'''''SD CARD BRUTE FORCE LIVE STREAM HERE: https://www.twitch.tv/goodtofufriday''''' '''''READ FIRST HEADER ON THIS PAGE FOR INFO ON LIVE STREAM'''''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Japanese feature phones is a category of mobile devices that were released (almost) exclusively in Japan between approximately 1999-2015. These phones contained many features that took over a decade to reach the rest of the world: game streaming, live TV, NFC tags, and more. These phones were developed by a variety of companies, each with their own proprietary hardware and software. Because of the diversity of phone models, the restrictive copyright protections, a separate set of proprietary internet protocols, and more, these phones and their games have been extremely challenging to preserve. &lt;br /&gt;
&lt;br /&gt;
==Brute Force Live Stream: Cracking the C2 Cipher==&lt;br /&gt;
The microSD cards in Japanese feature phones hide copyright protected data using a  C2 cryptomeria cipher. Cracking the C2 cipher requires three things: s-box, device keys, and a game-specific bind ID. Having the s-box and device keys allows us to find the bind ID. The s-box was discovered last year, but hackers are still searching for phone specific device keys. These device keys can be used across multiple game dumps, so it's not necessary to find each device's set of device keys for decryption to work. &lt;br /&gt;
&lt;br /&gt;
The user GoodTofuFriday is currently brute-forcing the C2 cipher with his GPU to obtain one device key that can be applied to encrypted SD game dumps. Once we have that device key, we will test it on the card that this particular MKB (a key inside DRM) came from. That has a 100% chance of working because that's literally where the device key came from. &lt;br /&gt;
&lt;br /&gt;
With that in tow, we'll now get to the games: finding the game-specific bind ID using the device key and s-box (which has already been acquired). It depends on how long that will take, but the device key will make things exponentially easier than if we didn't have it. Next is to combine the three to decrypt the game files... and nobody knows what will happen next.&lt;br /&gt;
&lt;br /&gt;
One of the main goals of this brute force effort is to access a specific SD card that contains Rockman DASH: Great Adventure on Five Islands! &lt;br /&gt;
&lt;br /&gt;
* [https://www.youtube.com/watch?v=fVtgixfBdDc Video footage of Rockman DASH: Great Adventure on Five Islands!]&lt;br /&gt;
*[https://www.twitch.tv/goodtofufriday Cracking Rockman DASH: Great Adventure on Five Islands! Livestream]&lt;br /&gt;
&lt;br /&gt;
== Game-Specific Preservation Projects ==&lt;br /&gt;
&lt;br /&gt;
=== [https://japanesefeaturephones.miraheze.org/wiki/Appli_Archives Appli Archives] for PlayStation Mobile ===&lt;br /&gt;
The Appli Archives are a series of feature phone re-releases. The PlayStation Mobile games contain [[DoJa]] files for each game, likely from original source. Game files and assets are drawn from a localhost server that runs within the PlayStation Mobile application. Because of use of localhost, these games cannot run directly in the DoJa SDK. However, some files have been made to run by hosting files on a localhost server on PC.&lt;br /&gt;
&lt;br /&gt;
PlayStation Mobile game packages use [https://www.psdevwiki.com/vita/PSSE PSSE encryption], which requires a game's original license key in order to perform decryption. Because of this, many of the Appli Archive files have not been decrypted, and their DoJa games have remained inaccessible. &lt;br /&gt;
&lt;br /&gt;
==== Currently Accessible Appli Archives Games ====&lt;br /&gt;
Any game not on this list lacks a publicly known license key in order to be decrypted.&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
!Appli Archive Game&lt;br /&gt;
!Games Included&lt;br /&gt;
!Release Date&lt;br /&gt;
|-&lt;br /&gt;
|'''アプリアーカイブス ジャレコ シティコネクション'''&lt;br /&gt;
Appli Archives: Jaleco City Connection&lt;br /&gt;
|&lt;br /&gt;
* City Connection DX&lt;br /&gt;
* City Connection: Rocket&lt;br /&gt;
|2014.12.17&lt;br /&gt;
|-&lt;br /&gt;
|'''アプリアーカイブス 日本一ソフトウェア デュオローグ'''&lt;br /&gt;
Appli Archives: Nippon Ichi Software Duologue&lt;br /&gt;
|&lt;br /&gt;
* Duologue&lt;br /&gt;
|2014.12.17&lt;br /&gt;
|-&lt;br /&gt;
|'''アプリアーカイブス ジャレコ モモコ1200%'''&lt;br /&gt;
Appli Archives: Jaleco Momoko 1200%&lt;br /&gt;
|&lt;br /&gt;
* Momoko 1200% Prequel&lt;br /&gt;
* Momoko 1200% Sequel&lt;br /&gt;
|2014.12.24&lt;br /&gt;
|-&lt;br /&gt;
|'''アプリアーカイブス 日本一ソフトウェア ミニゲームパック1'''&lt;br /&gt;
Appli Archives: Nippon Ichi Software Mini Game Pack 1&lt;br /&gt;
|&lt;br /&gt;
* Elingya Puzzle DX&lt;br /&gt;
* Going Down the Hill&lt;br /&gt;
* The Throwing Prinnies&lt;br /&gt;
|2015.01.14&lt;br /&gt;
|-&lt;br /&gt;
|'''アプリアーカイブス ジャレコ アーガス＆フィールドコンバット'''&lt;br /&gt;
Appli Archives: Jaleco Argus &amp;amp; Field Combat&lt;br /&gt;
|&lt;br /&gt;
* Argus&lt;br /&gt;
* Buta-san&lt;br /&gt;
* Exerion DX&lt;br /&gt;
* Field Combat DX&lt;br /&gt;
|2015.01.28&lt;br /&gt;
|-&lt;br /&gt;
|'''アプリアーカイブス ジー・モード バーガータイム'''&lt;br /&gt;
Appli Archives G-MODE Burger Time&lt;br /&gt;
|&lt;br /&gt;
* BurgerTime&lt;br /&gt;
* Pucchin Puzzle&lt;br /&gt;
* Snowboard Man&lt;br /&gt;
|2015.03.11&lt;br /&gt;
|-&lt;br /&gt;
|'''アプリアーカイブス 日本一ソフトウェア ミニゲームパック2'''&lt;br /&gt;
Appli Archives Nippon Ichi Software Mini Game Pack 2&lt;br /&gt;
|&lt;br /&gt;
* Disgaea: The Prinnies Strike Back&lt;br /&gt;
* Nyanko Panel DX|Nyanko Panels DX&lt;br /&gt;
* Nyanko Suberi DX|The Slipping Nyanko DX&lt;br /&gt;
|2015.04.28&lt;br /&gt;
|-&lt;br /&gt;
|'''アプリアーカイブス チームライズ HumanFly'''&lt;br /&gt;
Appli Archives Team Rise HumanFly&lt;br /&gt;
|&lt;br /&gt;
* HumanFly Kai&lt;br /&gt;
* HumanFly 2&lt;br /&gt;
* CIA Sniper Investigator DX&lt;br /&gt;
|2015.05.27&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== [https://japanesefeaturephones.miraheze.org/wiki/Mobile_Game_Deployer Mobile Game Deployer] (MGD) Games ===&lt;br /&gt;
Mobile Game Deployer was a software that could easily convert i-mode applis into Android, iOS, and Windows Phone programs. A number of prominent feature phone game publishers used this tool to bring their games to the smartphone generation.&lt;br /&gt;
&lt;br /&gt;
The game [https://japanesefeaturephones.miraheze.org/wiki/Flyhight_Cloudia Flyhight Cloudia] was successfully extracted from an Android APK in a fully playable version. &lt;br /&gt;
&lt;br /&gt;
So far, other games have not been converted due to the difficultly in finding original application files for early smartphone games. Not only are these games approximately 10 years old, but they were often distributed in provider-specific mobile game portals, rather than common application stores such as Google Play and the App Store.&lt;br /&gt;
&lt;br /&gt;
== Current Preservation and Data Extraction Projects ==&lt;br /&gt;
&lt;br /&gt;
===Sharp SH-10C===&lt;br /&gt;
The Sharp SH-10C is a DoCoMo phone released in 2011. Attempts have been made to read the NAND chip on this phone, in part because its schematics were made public by the [https://fcc.report/FCC-ID/APYHRO00145 FCC]. Currently, there are no chip programmers that support its NAND chip (Toshiba TY00D0021211KC) by default, and attempts at using a chip programmer have not reached past the bootloader. For more information, we recommend reading the report below. &lt;br /&gt;
&lt;br /&gt;
* [https://docs.google.com/document/d/1X3TN1QIvINPMDC6fmwo6vHCgAT377jOFM1zYkWZzdZY/edit?usp=sharing Report on Extraction of Data from DoCoMo Sharp SH-10C Mobile Phone] by Kraze&lt;br /&gt;
* [https://lpcwiki.miraheze.org/wiki/Sharp_SH-10C Sharp SH-10C] on the Legacy Portable Computer Wiki&lt;br /&gt;
&lt;br /&gt;
===Motorola M702iG and M702iS===&lt;br /&gt;
The Motorola M702iG and M702iS are based upon the Motorola Razr that was released internationally. Due to the availability of information about these phones, their firmware has successfully been accessed through USB. It's possible to browse the entire file system on these phones using a RMCDA General Program.&lt;br /&gt;
&lt;br /&gt;
* M702iS/M702iG USB Drivers are required.&lt;br /&gt;
* You will need RMCDA General Program. This will do something to the M702iS/G that open its file system up to P2K Commander. You will need information displayed on the screen to proceed to the next step.&lt;br /&gt;
* P2K Commander will be able to access file system after using RCDMA General.&lt;br /&gt;
* Java Games are located in KJAVA folder.&lt;br /&gt;
&lt;br /&gt;
===Panasonic P-01F===&lt;br /&gt;
The Panasonic P-01F successfully had its firmware extracted by unsoldering the eMMC and analyzing it with a chip programmer. This technique was also used for the '''Panasonic 301P''' and '''Panasonic 401PM'''.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Phones at Hack Manhattan==&lt;br /&gt;
===Panasonic P903iTV===&lt;br /&gt;
The Panasonic P903iTV is a mobile phone developed by Panasonic and released in 2007. There is currently a disassembled version of this phone at Hack Manhattan undergoing repairs.&lt;br /&gt;
&lt;br /&gt;
* [https://lpcwiki.miraheze.org/wiki/Panasonic_P903iTV Panasonic P903iTV] on Legacy Portable Computer Wiki&lt;br /&gt;
&lt;br /&gt;
== Notable Japanese Feature Phone Games ==&lt;br /&gt;
Some notable titles from recognizable game series include:&lt;br /&gt;
&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Before_Crisis_-Final_Fantasy_VII- Before Crisis -Final Fantasy VII-] and [https://japanesefeaturephones.miraheze.org/wiki/Dirge_of_Cerberus_Lost_Episode_-Final_Fantasy_VII- Dirge of Cerberus Lost Episode -Final Fantasy VII-]: Games in the Final Fantasy VII metaverse that greatly expand upon its lore&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Professor_Layton_and_the_Mansion_of_the_Deathly_Mirror Professor Layton and the Mansion of the Deathly Mirror]: A unique Professor Layton title released exclusively for Japanese mobile phones&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Kingdom_Hearts_coded Kingdom Hearts coded]: A story that covers events proceeding the finale of Kingdom Hearts II&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Persona_Mobile_Online Persona Mobile Online]: An entire Persona online MMORPG for cellphones&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Ni_no_Kuni:_Hotroit_Stories Ni no Kuni: Hotroit Stories]: A prologue to the Ni no Kuni series that takes place before Ni no Kuni: Dominion of the Dark Djinn&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Pok%C3%A9mate Pokémate]: The first Pokémon mobile game&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Nakayoshi_Chao! Nakayoshi Chao!]: A Chao virtual pet game for phones&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.youtube.com/watch?v=tKH0x21rj1Y Japan's Game Preservation Crisis] by Did You Know Gaming&lt;br /&gt;
* [https://hitsave.org/feature-phone-gaming/ Japanese Feature Phone Game Preservation: Uncovering a Forgotten Era of Gaming] on HitSave.org&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Main_Page Japanese Feature Phones Wiki] (made by HM member Ellen!)&lt;br /&gt;
* [https://docs.google.com/document/d/1fJdByYSfUPRFFAOixBX5BXx6sGkEc2uqX5verAgBhyc/edit?usp=sharing Feature Phone Preservation Resources] by Ellen&lt;br /&gt;
* [https://archive.org/details/@dekafire Japanese Feature Phone PC Downloads] posted on Archive.org&lt;/div&gt;</summary>
		<author><name>LNRC</name></author>
	</entry>
	<entry>
		<id>https://wiki.hackmanhattan.com/index.php?title=Japanese_Feature_Phone_Preservation&amp;diff=8828</id>
		<title>Japanese Feature Phone Preservation</title>
		<link rel="alternate" type="text/html" href="https://wiki.hackmanhattan.com/index.php?title=Japanese_Feature_Phone_Preservation&amp;diff=8828"/>
		<updated>2023-10-04T02:11:21Z</updated>

		<summary type="html">&lt;p&gt;LNRC: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:JapaneseFeaturePhones.jpg |thumb]]&lt;br /&gt;
&lt;br /&gt;
'''''SD CARD BRUTE FORCE LIVE STREAM HERE: https://www.twitch.tv/goodtofufriday''''' '''''READ FIRST HEADER ON THIS PAGE FOR INFO ON LIVE STREAM'''''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Japanese feature phones is a category of mobile devices that were released (almost) exclusively in Japan between approximately 1999-2015. These phones contained many features that took over a decade to reach the rest of the world: game streaming, live TV, NFC tags, and more. These phones were developed by a variety of companies, each with their own proprietary hardware and software. Because of the diversity of phone models, the restrictive copyright protections, a separate set of proprietary internet protocols, and more, these phones and their games have been extremely challenging to preserve. &lt;br /&gt;
&lt;br /&gt;
==Brute Force Live Stream: Cracking the C2 Cipher==&lt;br /&gt;
The microSD cards in Japanese feature phones hide copyright protected data using a  C2 cryptomeria cipher. Cracking the C2 cipher requires three things: s-box, device keys, and a game-specific bind ID. Having the s-box and device keys allows us to find the bind ID. The s-box was discovered last year, but hackers are still searching for phone specific device keys. These device keys can be used across multiple game dumps, so it's not necessary to find each device's set of device keys for decryption to work. &lt;br /&gt;
&lt;br /&gt;
The user GoodTofuFriday is currently brute-forcing the C2 cipher with his GPU to obtain one device key that can be applied to encrypted SD game dumps. Once we have that device key, we will test it on the card that this particular MKB (a key inside DRM) came from. That has a 100% chance of working because that's literally where the device key came from. &lt;br /&gt;
&lt;br /&gt;
With that in tow, we'll now get to the games: finding the game-specific bind ID using the device key and s-box (which has already been acquired). It depends on how long that will take, but the device key will make things exponentially easier than if we didn't have it. Next is to combine the three to decrypt the game files... and nobody knows what will happen next.&lt;br /&gt;
&lt;br /&gt;
One of the main goals of this brute force effort is to access a specific SD card that contains Rockman DASH: Great Adventure on Five Islands! &lt;br /&gt;
&lt;br /&gt;
* [https://www.youtube.com/watch?v=fVtgixfBdDc Video footage of Rockman DASH: Great Adventure on Five Islands!]&lt;br /&gt;
&lt;br /&gt;
== Game-Specific Preservation Projects ==&lt;br /&gt;
&lt;br /&gt;
=== [https://japanesefeaturephones.miraheze.org/wiki/Appli_Archives Appli Archives] for PlayStation Mobile ===&lt;br /&gt;
The Appli Archives are a series of feature phone re-releases. The PlayStation Mobile games contain [[DoJa]] files for each game, likely from original source. Game files and assets are drawn from a localhost server that runs within the PlayStation Mobile application. Because of use of localhost, these games cannot run directly in the DoJa SDK. However, some files have been made to run by hosting files on a localhost server on PC.&lt;br /&gt;
&lt;br /&gt;
PlayStation Mobile game packages use [https://www.psdevwiki.com/vita/PSSE PSSE encryption], which requires a game's original license key in order to perform decryption. Because of this, many of the Appli Archive files have not been decrypted, and their DoJa games have remained inaccessible. &lt;br /&gt;
&lt;br /&gt;
==== Currently Accessible Appli Archives Games ====&lt;br /&gt;
Any game not on this list lacks a publicly known license key in order to be decrypted.&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
!Appli Archive Game&lt;br /&gt;
!Games Included&lt;br /&gt;
!Release Date&lt;br /&gt;
|-&lt;br /&gt;
|'''アプリアーカイブス ジャレコ シティコネクション'''&lt;br /&gt;
Appli Archives: Jaleco City Connection&lt;br /&gt;
|&lt;br /&gt;
* City Connection DX&lt;br /&gt;
* City Connection: Rocket&lt;br /&gt;
|2014.12.17&lt;br /&gt;
|-&lt;br /&gt;
|'''アプリアーカイブス 日本一ソフトウェア デュオローグ'''&lt;br /&gt;
Appli Archives: Nippon Ichi Software Duologue&lt;br /&gt;
|&lt;br /&gt;
* Duologue&lt;br /&gt;
|2014.12.17&lt;br /&gt;
|-&lt;br /&gt;
|'''アプリアーカイブス ジャレコ モモコ1200%'''&lt;br /&gt;
Appli Archives: Jaleco Momoko 1200%&lt;br /&gt;
|&lt;br /&gt;
* Momoko 1200% Prequel&lt;br /&gt;
* Momoko 1200% Sequel&lt;br /&gt;
|2014.12.24&lt;br /&gt;
|-&lt;br /&gt;
|'''アプリアーカイブス 日本一ソフトウェア ミニゲームパック1'''&lt;br /&gt;
Appli Archives: Nippon Ichi Software Mini Game Pack 1&lt;br /&gt;
|&lt;br /&gt;
* Elingya Puzzle DX&lt;br /&gt;
* Going Down the Hill&lt;br /&gt;
* The Throwing Prinnies&lt;br /&gt;
|2015.01.14&lt;br /&gt;
|-&lt;br /&gt;
|'''アプリアーカイブス ジャレコ アーガス＆フィールドコンバット'''&lt;br /&gt;
Appli Archives: Jaleco Argus &amp;amp; Field Combat&lt;br /&gt;
|&lt;br /&gt;
* Argus&lt;br /&gt;
* Buta-san&lt;br /&gt;
* Exerion DX&lt;br /&gt;
* Field Combat DX&lt;br /&gt;
|2015.01.28&lt;br /&gt;
|-&lt;br /&gt;
|'''アプリアーカイブス ジー・モード バーガータイム'''&lt;br /&gt;
Appli Archives G-MODE Burger Time&lt;br /&gt;
|&lt;br /&gt;
* BurgerTime&lt;br /&gt;
* Pucchin Puzzle&lt;br /&gt;
* Snowboard Man&lt;br /&gt;
|2015.03.11&lt;br /&gt;
|-&lt;br /&gt;
|'''アプリアーカイブス 日本一ソフトウェア ミニゲームパック2'''&lt;br /&gt;
Appli Archives Nippon Ichi Software Mini Game Pack 2&lt;br /&gt;
|&lt;br /&gt;
* Disgaea: The Prinnies Strike Back&lt;br /&gt;
* Nyanko Panel DX|Nyanko Panels DX&lt;br /&gt;
* Nyanko Suberi DX|The Slipping Nyanko DX&lt;br /&gt;
|2015.04.28&lt;br /&gt;
|-&lt;br /&gt;
|'''アプリアーカイブス チームライズ HumanFly'''&lt;br /&gt;
Appli Archives Team Rise HumanFly&lt;br /&gt;
|&lt;br /&gt;
* HumanFly Kai&lt;br /&gt;
* HumanFly 2&lt;br /&gt;
* CIA Sniper Investigator DX&lt;br /&gt;
|2015.05.27&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== [https://japanesefeaturephones.miraheze.org/wiki/Mobile_Game_Deployer Mobile Game Deployer] (MGD) Games ===&lt;br /&gt;
Mobile Game Deployer was a software that could easily convert i-mode applis into Android, iOS, and Windows Phone programs. A number of prominent feature phone game publishers used this tool to bring their games to the smartphone generation.&lt;br /&gt;
&lt;br /&gt;
The game [https://japanesefeaturephones.miraheze.org/wiki/Flyhight_Cloudia Flyhight Cloudia] was successfully extracted from an Android APK in a fully playable version. &lt;br /&gt;
&lt;br /&gt;
So far, other games have not been converted due to the difficultly in finding original application files for early smartphone games. Not only are these games approximately 10 years old, but they were often distributed in provider-specific mobile game portals, rather than common application stores such as Google Play and the App Store.&lt;br /&gt;
&lt;br /&gt;
== Current Preservation and Data Extraction Projects ==&lt;br /&gt;
&lt;br /&gt;
===Sharp SH-10C===&lt;br /&gt;
The Sharp SH-10C is a DoCoMo phone released in 2011. Attempts have been made to read the NAND chip on this phone, in part because its schematics were made public by the [https://fcc.report/FCC-ID/APYHRO00145 FCC]. Currently, there are no chip programmers that support its NAND chip (Toshiba TY00D0021211KC) by default, and attempts at using a chip programmer have not reached past the bootloader. For more information, we recommend reading the report below. &lt;br /&gt;
&lt;br /&gt;
* [https://docs.google.com/document/d/1X3TN1QIvINPMDC6fmwo6vHCgAT377jOFM1zYkWZzdZY/edit?usp=sharing Report on Extraction of Data from DoCoMo Sharp SH-10C Mobile Phone] by Kraze&lt;br /&gt;
* [https://lpcwiki.miraheze.org/wiki/Sharp_SH-10C Sharp SH-10C] on the Legacy Portable Computer Wiki&lt;br /&gt;
&lt;br /&gt;
===Motorola M702iG and M702iS===&lt;br /&gt;
The Motorola M702iG and M702iS are based upon the Motorola Razr that was released internationally. Due to the availability of information about these phones, their firmware has successfully been accessed through USB. It's possible to browse the entire file system on these phones using a RMCDA General Program.&lt;br /&gt;
&lt;br /&gt;
* M702iS/M702iG USB Drivers are required.&lt;br /&gt;
* You will need RMCDA General Program. This will do something to the M702iS/G that open its file system up to P2K Commander. You will need information displayed on the screen to proceed to the next step.&lt;br /&gt;
* P2K Commander will be able to access file system after using RCDMA General.&lt;br /&gt;
* Java Games are located in KJAVA folder.&lt;br /&gt;
&lt;br /&gt;
===Panasonic P-01F===&lt;br /&gt;
The Panasonic P-01F successfully had its firmware extracted by unsoldering the eMMC and analyzing it with a chip programmer. This technique was also used for the '''Panasonic 301P''' and '''Panasonic 401PM'''.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Phones at Hack Manhattan==&lt;br /&gt;
===Panasonic P903iTV===&lt;br /&gt;
The Panasonic P903iTV is a mobile phone developed by Panasonic and released in 2007. There is currently a disassembled version of this phone at Hack Manhattan undergoing repairs.&lt;br /&gt;
&lt;br /&gt;
* [https://lpcwiki.miraheze.org/wiki/Panasonic_P903iTV Panasonic P903iTV] on Legacy Portable Computer Wiki&lt;br /&gt;
&lt;br /&gt;
== Notable Japanese Feature Phone Games ==&lt;br /&gt;
Some notable titles from recognizable game series include:&lt;br /&gt;
&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Before_Crisis_-Final_Fantasy_VII- Before Crisis -Final Fantasy VII-] and [https://japanesefeaturephones.miraheze.org/wiki/Dirge_of_Cerberus_Lost_Episode_-Final_Fantasy_VII- Dirge of Cerberus Lost Episode -Final Fantasy VII-]: Games in the Final Fantasy VII metaverse that greatly expand upon its lore&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Professor_Layton_and_the_Mansion_of_the_Deathly_Mirror Professor Layton and the Mansion of the Deathly Mirror]: A unique Professor Layton title released exclusively for Japanese mobile phones&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Kingdom_Hearts_coded Kingdom Hearts coded]: A story that covers events proceeding the finale of Kingdom Hearts II&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Persona_Mobile_Online Persona Mobile Online]: An entire Persona online MMORPG for cellphones&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Ni_no_Kuni:_Hotroit_Stories Ni no Kuni: Hotroit Stories]: A prologue to the Ni no Kuni series that takes place before Ni no Kuni: Dominion of the Dark Djinn&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Pok%C3%A9mate Pokémate]: The first Pokémon mobile game&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Nakayoshi_Chao! Nakayoshi Chao!]: A Chao virtual pet game for phones&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.youtube.com/watch?v=tKH0x21rj1Y Japan's Game Preservation Crisis] by Did You Know Gaming&lt;br /&gt;
* [https://hitsave.org/feature-phone-gaming/ Japanese Feature Phone Game Preservation: Uncovering a Forgotten Era of Gaming] on HitSave.org&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Main_Page Japanese Feature Phones Wiki] (made by HM member Ellen!)&lt;br /&gt;
* [https://docs.google.com/document/d/1fJdByYSfUPRFFAOixBX5BXx6sGkEc2uqX5verAgBhyc/edit?usp=sharing Feature Phone Preservation Resources] by Ellen&lt;br /&gt;
* [https://archive.org/details/@dekafire Japanese Feature Phone PC Downloads] posted on Archive.org&lt;/div&gt;</summary>
		<author><name>LNRC</name></author>
	</entry>
	<entry>
		<id>https://wiki.hackmanhattan.com/index.php?title=Japanese_Feature_Phone_Preservation&amp;diff=8823</id>
		<title>Japanese Feature Phone Preservation</title>
		<link rel="alternate" type="text/html" href="https://wiki.hackmanhattan.com/index.php?title=Japanese_Feature_Phone_Preservation&amp;diff=8823"/>
		<updated>2023-10-03T03:00:33Z</updated>

		<summary type="html">&lt;p&gt;LNRC: /* Mobile Game Deployer (MGD) Games */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:JapaneseFeaturePhones.jpg |thumb]]&lt;br /&gt;
&lt;br /&gt;
'''''SD CARD BRUTE FORCE LIVE STREAM HERE: https://www.twitch.tv/goodtofufriday'''''&lt;br /&gt;
&lt;br /&gt;
Japanese feature phones is a category of mobile devices that were released (almost) exclusively in Japan between approximately 1999-2015. These phones contained many features that took over a decade to reach the rest of the world: game streaming, live TV, NFC tags, and more. These phones were developed by a variety of companies, each with their own proprietary hardware and software. Because of the diversity of phone models, the restrictive copyright protections, a separate set of proprietary internet protocols, and more, these phones and their games have been extremely challenging to preserve. &lt;br /&gt;
&lt;br /&gt;
== Game-Specific Preservation Projects ==&lt;br /&gt;
&lt;br /&gt;
=== [https://japanesefeaturephones.miraheze.org/wiki/Appli_Archives Appli Archives] for PlayStation Mobile ===&lt;br /&gt;
The Appli Archives are a series of feature phone re-releases. The PlayStation Mobile games contain [[DoJa]] files for each game, likely from original source. Game files and assets are drawn from a localhost server that runs within the PlayStation Mobile application. Because of use of localhost, these games cannot run directly in the DoJa SDK. However, some files have been made to run by hosting files on a localhost server on PC.&lt;br /&gt;
&lt;br /&gt;
PlayStation Mobile game packages use [https://www.psdevwiki.com/vita/PSSE PSSE encryption], which requires a game's original license key in order to perform decryption. Because of this, many of the Appli Archive files have not been decrypted, and their DoJa games have remained inaccessible. &lt;br /&gt;
&lt;br /&gt;
==== Currently Accessible Appli Archives Games ====&lt;br /&gt;
Any game not on this list lacks a publicly known license key in order to be decrypted.&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
!Appli Archive Game&lt;br /&gt;
!Games Included&lt;br /&gt;
!Release Date&lt;br /&gt;
|-&lt;br /&gt;
|'''アプリアーカイブス ジャレコ シティコネクション'''&lt;br /&gt;
Appli Archives: Jaleco City Connection&lt;br /&gt;
|&lt;br /&gt;
* City Connection DX&lt;br /&gt;
* City Connection: Rocket&lt;br /&gt;
|2014.12.17&lt;br /&gt;
|-&lt;br /&gt;
|'''アプリアーカイブス 日本一ソフトウェア デュオローグ'''&lt;br /&gt;
Appli Archives: Nippon Ichi Software Duologue&lt;br /&gt;
|&lt;br /&gt;
* Duologue&lt;br /&gt;
|2014.12.17&lt;br /&gt;
|-&lt;br /&gt;
|'''アプリアーカイブス ジャレコ モモコ1200%'''&lt;br /&gt;
Appli Archives: Jaleco Momoko 1200%&lt;br /&gt;
|&lt;br /&gt;
* Momoko 1200% Prequel&lt;br /&gt;
* Momoko 1200% Sequel&lt;br /&gt;
|2014.12.24&lt;br /&gt;
|-&lt;br /&gt;
|'''アプリアーカイブス 日本一ソフトウェア ミニゲームパック1'''&lt;br /&gt;
Appli Archives: Nippon Ichi Software Mini Game Pack 1&lt;br /&gt;
|&lt;br /&gt;
* Elingya Puzzle DX&lt;br /&gt;
* Going Down the Hill&lt;br /&gt;
* The Throwing Prinnies&lt;br /&gt;
|2015.01.14&lt;br /&gt;
|-&lt;br /&gt;
|'''アプリアーカイブス ジャレコ アーガス＆フィールドコンバット'''&lt;br /&gt;
Appli Archives: Jaleco Argus &amp;amp; Field Combat&lt;br /&gt;
|&lt;br /&gt;
* Argus&lt;br /&gt;
* Buta-san&lt;br /&gt;
* Exerion DX&lt;br /&gt;
* Field Combat DX&lt;br /&gt;
|2015.01.28&lt;br /&gt;
|-&lt;br /&gt;
|'''アプリアーカイブス ジー・モード バーガータイム'''&lt;br /&gt;
Appli Archives G-MODE Burger Time&lt;br /&gt;
|&lt;br /&gt;
* BurgerTime&lt;br /&gt;
* Pucchin Puzzle&lt;br /&gt;
* Snowboard Man&lt;br /&gt;
|2015.03.11&lt;br /&gt;
|-&lt;br /&gt;
|'''アプリアーカイブス 日本一ソフトウェア ミニゲームパック2'''&lt;br /&gt;
Appli Archives Nippon Ichi Software Mini Game Pack 2&lt;br /&gt;
|&lt;br /&gt;
* Disgaea: The Prinnies Strike Back&lt;br /&gt;
* Nyanko Panel DX|Nyanko Panels DX&lt;br /&gt;
* Nyanko Suberi DX|The Slipping Nyanko DX&lt;br /&gt;
|2015.04.28&lt;br /&gt;
|-&lt;br /&gt;
|'''アプリアーカイブス チームライズ HumanFly'''&lt;br /&gt;
Appli Archives Team Rise HumanFly&lt;br /&gt;
|&lt;br /&gt;
* HumanFly Kai&lt;br /&gt;
* HumanFly 2&lt;br /&gt;
* CIA Sniper Investigator DX&lt;br /&gt;
|2015.05.27&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== [https://japanesefeaturephones.miraheze.org/wiki/Mobile_Game_Deployer Mobile Game Deployer] (MGD) Games ===&lt;br /&gt;
Mobile Game Deployer was a software that could easily convert i-mode applis into Android, iOS, and Windows Phone programs. A number of prominent feature phone game publishers used this tool to bring their games to the smartphone generation.&lt;br /&gt;
&lt;br /&gt;
The game [https://japanesefeaturephones.miraheze.org/wiki/Flyhight_Cloudia Flyhight Cloudia] was successfully extracted from an Android APK in a fully playable version. &lt;br /&gt;
&lt;br /&gt;
So far, other games have not been converted due to the difficultly in finding original application files for early smartphone games. Not only are these games approximately 10 years old, but they were often distributed in provider-specific mobile game portals, rather than common application stores such as Google Play and the App Store.&lt;br /&gt;
&lt;br /&gt;
== Current Preservation and Data Extraction Projects ==&lt;br /&gt;
&lt;br /&gt;
===Sharp SH-10C===&lt;br /&gt;
The Sharp SH-10C is a DoCoMo phone released in 2011. Attempts have been made to read the NAND chip on this phone, in part because its schematics were made public by the [https://fcc.report/FCC-ID/APYHRO00145 FCC]. Currently, there are no chip programmers that support its NAND chip (Toshiba TY00D0021211KC) by default, and attempts at using a chip programmer have not reached past the bootloader. For more information, we recommend reading the report below. &lt;br /&gt;
&lt;br /&gt;
* [https://docs.google.com/document/d/1X3TN1QIvINPMDC6fmwo6vHCgAT377jOFM1zYkWZzdZY/edit?usp=sharing Report on Extraction of Data from DoCoMo Sharp SH-10C Mobile Phone] by Kraze&lt;br /&gt;
* [https://lpcwiki.miraheze.org/wiki/Sharp_SH-10C Sharp SH-10C] on the Legacy Portable Computer Wiki&lt;br /&gt;
&lt;br /&gt;
===C2 Cipher Code Decryption on SD Cards===&lt;br /&gt;
The microSD cards in Japanese feature phones hide copyright protected data using a  C2 cryptomeria cipher. Cracking the C2 cipher requires three things: s-box, device keys, and a game-specific bind ID. Having the s-box and device keys allows us to find the bind ID. The s-box was discovered last year, but hackers are still searching for phone specific device keys. These device keys can be used across multiple game dumps, so it's not necessary to find each device's set of device keys for decryption to work. &lt;br /&gt;
&lt;br /&gt;
Currently, one of the members on the Rockman preservation team is executing the brute forcing. Results are expected within about a month.&lt;br /&gt;
&lt;br /&gt;
It's important to note that we don't know what the decrypted data looks like. There's a chance that it's fragmented (bad) or Java game files (good).&lt;br /&gt;
&lt;br /&gt;
* [https://gitlab.com/usernameak/mkb_bruteforce MKB Bruteforce] repo on GitLab&lt;br /&gt;
&lt;br /&gt;
===Motorola M702iG and M702iS===&lt;br /&gt;
The Motorola M702iG and M702iS are based upon the Motorola Razr that was released internationally. Due to the availability of information about these phones, their firmware has successfully been accessed through USB. It's possible to browse the entire file system on these phones using a RMCDA General Program.&lt;br /&gt;
&lt;br /&gt;
* M702iS/M702iG USB Drivers are required.&lt;br /&gt;
* You will need RMCDA General Program. This will do something to the M702iS/G that open its file system up to P2K Commander. You will need information displayed on the screen to proceed to the next step.&lt;br /&gt;
* P2K Commander will be able to access file system after using RCDMA General.&lt;br /&gt;
* Java Games are located in KJAVA folder.&lt;br /&gt;
&lt;br /&gt;
===Panasonic P-01F===&lt;br /&gt;
The Panasonic P-01F successfully had its firmware extracted by unsoldering the eMMC and analyzing it with a chip programmer. This technique was also used for the '''Panasonic 301P''' and '''Panasonic 401PM'''.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Phones at Hack Manhattan==&lt;br /&gt;
===Panasonic P903iTV===&lt;br /&gt;
The Panasonic P903iTV is a mobile phone developed by Panasonic and released in 2007. There is currently a disassembled version of this phone at Hack Manhattan undergoing repairs.&lt;br /&gt;
&lt;br /&gt;
* [https://lpcwiki.miraheze.org/wiki/Panasonic_P903iTV Panasonic P903iTV] on Legacy Portable Computer Wiki&lt;br /&gt;
&lt;br /&gt;
== Notable Japanese Feature Phone Games ==&lt;br /&gt;
Some notable titles from recognizable game series include:&lt;br /&gt;
&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Before_Crisis_-Final_Fantasy_VII- Before Crisis -Final Fantasy VII-] and [https://japanesefeaturephones.miraheze.org/wiki/Dirge_of_Cerberus_Lost_Episode_-Final_Fantasy_VII- Dirge of Cerberus Lost Episode -Final Fantasy VII-]: Games in the Final Fantasy VII metaverse that greatly expand upon its lore&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Professor_Layton_and_the_Mansion_of_the_Deathly_Mirror Professor Layton and the Mansion of the Deathly Mirror]: A unique Professor Layton title released exclusively for Japanese mobile phones&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Kingdom_Hearts_coded Kingdom Hearts coded]: A story that covers events proceeding the finale of Kingdom Hearts II&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Persona_Mobile_Online Persona Mobile Online]: An entire Persona online MMORPG for cellphones&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Ni_no_Kuni:_Hotroit_Stories Ni no Kuni: Hotroit Stories]: A prologue to the Ni no Kuni series that takes place before Ni no Kuni: Dominion of the Dark Djinn&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Pok%C3%A9mate Pokémate]: The first Pokémon mobile game&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Nakayoshi_Chao! Nakayoshi Chao!]: A Chao virtual pet game for phones&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.youtube.com/watch?v=tKH0x21rj1Y Japan's Game Preservation Crisis] by Did You Know Gaming&lt;br /&gt;
* [https://hitsave.org/feature-phone-gaming/ Japanese Feature Phone Game Preservation: Uncovering a Forgotten Era of Gaming] on HitSave.org&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Main_Page Japanese Feature Phones Wiki] (made by HM member Ellen!)&lt;br /&gt;
* [https://docs.google.com/document/d/1fJdByYSfUPRFFAOixBX5BXx6sGkEc2uqX5verAgBhyc/edit?usp=sharing Feature Phone Preservation Resources] by Ellen&lt;br /&gt;
* [https://archive.org/details/@dekafire Japanese Feature Phone PC Downloads] posted on Archive.org&lt;/div&gt;</summary>
		<author><name>LNRC</name></author>
	</entry>
	<entry>
		<id>https://wiki.hackmanhattan.com/index.php?title=Japanese_Feature_Phone_Preservation&amp;diff=8822</id>
		<title>Japanese Feature Phone Preservation</title>
		<link rel="alternate" type="text/html" href="https://wiki.hackmanhattan.com/index.php?title=Japanese_Feature_Phone_Preservation&amp;diff=8822"/>
		<updated>2023-10-03T02:59:30Z</updated>

		<summary type="html">&lt;p&gt;LNRC: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:JapaneseFeaturePhones.jpg |thumb]]&lt;br /&gt;
&lt;br /&gt;
'''''SD CARD BRUTE FORCE LIVE STREAM HERE: https://www.twitch.tv/goodtofufriday'''''&lt;br /&gt;
&lt;br /&gt;
Japanese feature phones is a category of mobile devices that were released (almost) exclusively in Japan between approximately 1999-2015. These phones contained many features that took over a decade to reach the rest of the world: game streaming, live TV, NFC tags, and more. These phones were developed by a variety of companies, each with their own proprietary hardware and software. Because of the diversity of phone models, the restrictive copyright protections, a separate set of proprietary internet protocols, and more, these phones and their games have been extremely challenging to preserve. &lt;br /&gt;
&lt;br /&gt;
== Game-Specific Preservation Projects ==&lt;br /&gt;
&lt;br /&gt;
=== [https://japanesefeaturephones.miraheze.org/wiki/Appli_Archives Appli Archives] for PlayStation Mobile ===&lt;br /&gt;
The Appli Archives are a series of feature phone re-releases. The PlayStation Mobile games contain [[DoJa]] files for each game, likely from original source. Game files and assets are drawn from a localhost server that runs within the PlayStation Mobile application. Because of use of localhost, these games cannot run directly in the DoJa SDK. However, some files have been made to run by hosting files on a localhost server on PC.&lt;br /&gt;
&lt;br /&gt;
PlayStation Mobile game packages use [https://www.psdevwiki.com/vita/PSSE PSSE encryption], which requires a game's original license key in order to perform decryption. Because of this, many of the Appli Archive files have not been decrypted, and their DoJa games have remained inaccessible. &lt;br /&gt;
&lt;br /&gt;
==== Currently Accessible Appli Archives Games ====&lt;br /&gt;
Any game not on this list lacks a publicly known license key in order to be decrypted.&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
!Appli Archive Game&lt;br /&gt;
!Games Included&lt;br /&gt;
!Release Date&lt;br /&gt;
|-&lt;br /&gt;
|'''アプリアーカイブス ジャレコ シティコネクション'''&lt;br /&gt;
Appli Archives: Jaleco City Connection&lt;br /&gt;
|&lt;br /&gt;
* City Connection DX&lt;br /&gt;
* City Connection: Rocket&lt;br /&gt;
|2014.12.17&lt;br /&gt;
|-&lt;br /&gt;
|'''アプリアーカイブス 日本一ソフトウェア デュオローグ'''&lt;br /&gt;
Appli Archives: Nippon Ichi Software Duologue&lt;br /&gt;
|&lt;br /&gt;
* Duologue&lt;br /&gt;
|2014.12.17&lt;br /&gt;
|-&lt;br /&gt;
|'''アプリアーカイブス ジャレコ モモコ1200%'''&lt;br /&gt;
Appli Archives: Jaleco Momoko 1200%&lt;br /&gt;
|&lt;br /&gt;
* Momoko 1200% Prequel&lt;br /&gt;
* Momoko 1200% Sequel&lt;br /&gt;
|2014.12.24&lt;br /&gt;
|-&lt;br /&gt;
|'''アプリアーカイブス 日本一ソフトウェア ミニゲームパック1'''&lt;br /&gt;
Appli Archives: Nippon Ichi Software Mini Game Pack 1&lt;br /&gt;
|&lt;br /&gt;
* Elingya Puzzle DX&lt;br /&gt;
* Going Down the Hill&lt;br /&gt;
* The Throwing Prinnies&lt;br /&gt;
|2015.01.14&lt;br /&gt;
|-&lt;br /&gt;
|'''アプリアーカイブス ジャレコ アーガス＆フィールドコンバット'''&lt;br /&gt;
Appli Archives: Jaleco Argus &amp;amp; Field Combat&lt;br /&gt;
|&lt;br /&gt;
* Argus&lt;br /&gt;
* Buta-san&lt;br /&gt;
* Exerion DX&lt;br /&gt;
* Field Combat DX&lt;br /&gt;
|2015.01.28&lt;br /&gt;
|-&lt;br /&gt;
|'''アプリアーカイブス ジー・モード バーガータイム'''&lt;br /&gt;
Appli Archives G-MODE Burger Time&lt;br /&gt;
|&lt;br /&gt;
* BurgerTime&lt;br /&gt;
* Pucchin Puzzle&lt;br /&gt;
* Snowboard Man&lt;br /&gt;
|2015.03.11&lt;br /&gt;
|-&lt;br /&gt;
|'''アプリアーカイブス 日本一ソフトウェア ミニゲームパック2'''&lt;br /&gt;
Appli Archives Nippon Ichi Software Mini Game Pack 2&lt;br /&gt;
|&lt;br /&gt;
* Disgaea: The Prinnies Strike Back&lt;br /&gt;
* Nyanko Panel DX|Nyanko Panels DX&lt;br /&gt;
* Nyanko Suberi DX|The Slipping Nyanko DX&lt;br /&gt;
|2015.04.28&lt;br /&gt;
|-&lt;br /&gt;
|'''アプリアーカイブス チームライズ HumanFly'''&lt;br /&gt;
Appli Archives Team Rise HumanFly&lt;br /&gt;
|&lt;br /&gt;
* HumanFly Kai&lt;br /&gt;
* HumanFly 2&lt;br /&gt;
* CIA Sniper Investigator DX&lt;br /&gt;
|2015.05.27&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== [https://japanesefeaturephones.miraheze.org/wiki/Mobile_Game_Deployer Mobile Game Deployer] (MGD) Games ===&lt;br /&gt;
Mobile Game Deployer was a software that could easily convert i-mode applis into Android, iOS, and Windows Phone programs. A number of prominent feature phone game publishers used this tool to bring their games to the smartphone generation.&lt;br /&gt;
&lt;br /&gt;
The game [https://japanesefeaturephones.miraheze.org/wiki/Flyhight_Cloudia Flyhight Cloudia] was successfully extracted from an Android APK in a fully playable version. &lt;br /&gt;
&lt;br /&gt;
So far, other games have not been converted due to the difficult in finding original application files for early smartphone games. Not only are these games approximately 10 years old, but they were often distributed in provider-specific mobile game portals, rather than common application stores such as Google Play and the App Store.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Current Preservation and Data Extraction Projects ==&lt;br /&gt;
&lt;br /&gt;
===Sharp SH-10C===&lt;br /&gt;
The Sharp SH-10C is a DoCoMo phone released in 2011. Attempts have been made to read the NAND chip on this phone, in part because its schematics were made public by the [https://fcc.report/FCC-ID/APYHRO00145 FCC]. Currently, there are no chip programmers that support its NAND chip (Toshiba TY00D0021211KC) by default, and attempts at using a chip programmer have not reached past the bootloader. For more information, we recommend reading the report below. &lt;br /&gt;
&lt;br /&gt;
* [https://docs.google.com/document/d/1X3TN1QIvINPMDC6fmwo6vHCgAT377jOFM1zYkWZzdZY/edit?usp=sharing Report on Extraction of Data from DoCoMo Sharp SH-10C Mobile Phone] by Kraze&lt;br /&gt;
* [https://lpcwiki.miraheze.org/wiki/Sharp_SH-10C Sharp SH-10C] on the Legacy Portable Computer Wiki&lt;br /&gt;
&lt;br /&gt;
===C2 Cipher Code Decryption on SD Cards===&lt;br /&gt;
The microSD cards in Japanese feature phones hide copyright protected data using a  C2 cryptomeria cipher. Cracking the C2 cipher requires three things: s-box, device keys, and a game-specific bind ID. Having the s-box and device keys allows us to find the bind ID. The s-box was discovered last year, but hackers are still searching for phone specific device keys. These device keys can be used across multiple game dumps, so it's not necessary to find each device's set of device keys for decryption to work. &lt;br /&gt;
&lt;br /&gt;
Currently, one of the members on the Rockman preservation team is executing the brute forcing. Results are expected within about a month.&lt;br /&gt;
&lt;br /&gt;
It's important to note that we don't know what the decrypted data looks like. There's a chance that it's fragmented (bad) or Java game files (good).&lt;br /&gt;
&lt;br /&gt;
* [https://gitlab.com/usernameak/mkb_bruteforce MKB Bruteforce] repo on GitLab&lt;br /&gt;
&lt;br /&gt;
===Motorola M702iG and M702iS===&lt;br /&gt;
The Motorola M702iG and M702iS are based upon the Motorola Razr that was released internationally. Due to the availability of information about these phones, their firmware has successfully been accessed through USB. It's possible to browse the entire file system on these phones using a RMCDA General Program.&lt;br /&gt;
&lt;br /&gt;
* M702iS/M702iG USB Drivers are required.&lt;br /&gt;
* You will need RMCDA General Program. This will do something to the M702iS/G that open its file system up to P2K Commander. You will need information displayed on the screen to proceed to the next step.&lt;br /&gt;
* P2K Commander will be able to access file system after using RCDMA General.&lt;br /&gt;
* Java Games are located in KJAVA folder.&lt;br /&gt;
&lt;br /&gt;
===Panasonic P-01F===&lt;br /&gt;
The Panasonic P-01F successfully had its firmware extracted by unsoldering the eMMC and analyzing it with a chip programmer. This technique was also used for the '''Panasonic 301P''' and '''Panasonic 401PM'''.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Phones at Hack Manhattan==&lt;br /&gt;
===Panasonic P903iTV===&lt;br /&gt;
The Panasonic P903iTV is a mobile phone developed by Panasonic and released in 2007. There is currently a disassembled version of this phone at Hack Manhattan undergoing repairs.&lt;br /&gt;
&lt;br /&gt;
* [https://lpcwiki.miraheze.org/wiki/Panasonic_P903iTV Panasonic P903iTV] on Legacy Portable Computer Wiki&lt;br /&gt;
&lt;br /&gt;
== Notable Japanese Feature Phone Games ==&lt;br /&gt;
Some notable titles from recognizable game series include:&lt;br /&gt;
&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Before_Crisis_-Final_Fantasy_VII- Before Crisis -Final Fantasy VII-] and [https://japanesefeaturephones.miraheze.org/wiki/Dirge_of_Cerberus_Lost_Episode_-Final_Fantasy_VII- Dirge of Cerberus Lost Episode -Final Fantasy VII-]: Games in the Final Fantasy VII metaverse that greatly expand upon its lore&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Professor_Layton_and_the_Mansion_of_the_Deathly_Mirror Professor Layton and the Mansion of the Deathly Mirror]: A unique Professor Layton title released exclusively for Japanese mobile phones&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Kingdom_Hearts_coded Kingdom Hearts coded]: A story that covers events proceeding the finale of Kingdom Hearts II&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Persona_Mobile_Online Persona Mobile Online]: An entire Persona online MMORPG for cellphones&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Ni_no_Kuni:_Hotroit_Stories Ni no Kuni: Hotroit Stories]: A prologue to the Ni no Kuni series that takes place before Ni no Kuni: Dominion of the Dark Djinn&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Pok%C3%A9mate Pokémate]: The first Pokémon mobile game&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Nakayoshi_Chao! Nakayoshi Chao!]: A Chao virtual pet game for phones&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.youtube.com/watch?v=tKH0x21rj1Y Japan's Game Preservation Crisis] by Did You Know Gaming&lt;br /&gt;
* [https://hitsave.org/feature-phone-gaming/ Japanese Feature Phone Game Preservation: Uncovering a Forgotten Era of Gaming] on HitSave.org&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Main_Page Japanese Feature Phones Wiki] (made by HM member Ellen!)&lt;br /&gt;
* [https://docs.google.com/document/d/1fJdByYSfUPRFFAOixBX5BXx6sGkEc2uqX5verAgBhyc/edit?usp=sharing Feature Phone Preservation Resources] by Ellen&lt;br /&gt;
* [https://archive.org/details/@dekafire Japanese Feature Phone PC Downloads] posted on Archive.org&lt;/div&gt;</summary>
		<author><name>LNRC</name></author>
	</entry>
	<entry>
		<id>https://wiki.hackmanhattan.com/index.php?title=Japanese_Feature_Phone_Preservation&amp;diff=8803</id>
		<title>Japanese Feature Phone Preservation</title>
		<link rel="alternate" type="text/html" href="https://wiki.hackmanhattan.com/index.php?title=Japanese_Feature_Phone_Preservation&amp;diff=8803"/>
		<updated>2023-09-26T20:23:20Z</updated>

		<summary type="html">&lt;p&gt;LNRC: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:JapaneseFeaturePhones.jpg |thumb]]&lt;br /&gt;
&lt;br /&gt;
'''''SD CARD BRUTE FORCE LIVE STREAM HERE: https://www.twitch.tv/goodtofufriday'''''&lt;br /&gt;
&lt;br /&gt;
Japanese feature phones is a category of mobile devices that were released (almost) exclusively in Japan between approximately 1999-2015. These phones contained many features that took over a decade to reach the rest of the world: game streaming, live TV, NFC tags, and more. These phones were developed by a variety of companies, each with their own proprietary hardware and software. Because of the diversity of phone models, the restrictive copyright protections, a separate set of proprietary internet protocols, and more, these phones and their games have been extremely challenging to preserve. &lt;br /&gt;
&lt;br /&gt;
== Current Preservation and Data Extraction Projects ==&lt;br /&gt;
&lt;br /&gt;
===Sharp SH-10C===&lt;br /&gt;
The Sharp SH-10C is a DoCoMo phone released in 2011. Attempts have been made to read the NAND chip on this phone, in part because its schematics were made public by the [https://fcc.report/FCC-ID/APYHRO00145 FCC]. Currently, there are no chip programmers that support its NAND chip (Toshiba TY00D0021211KC) by default, and attempts at using a chip programmer have not reached past the bootloader. For more information, we recommend reading the report below. &lt;br /&gt;
&lt;br /&gt;
* [https://docs.google.com/document/d/1X3TN1QIvINPMDC6fmwo6vHCgAT377jOFM1zYkWZzdZY/edit?usp=sharing Report on Extraction of Data from DoCoMo Sharp SH-10C Mobile Phone] by Kraze&lt;br /&gt;
* [https://lpcwiki.miraheze.org/wiki/Sharp_SH-10C Sharp SH-10C] on the Legacy Portable Computer Wiki&lt;br /&gt;
&lt;br /&gt;
===C2 Cipher Code Decryption on SD Cards===&lt;br /&gt;
The microSD cards in Japanese feature phones hide copyright protected data using a  C2 cryptomeria cipher. Cracking the C2 cipher requires three things: s-box, device keys, and a game-specific bind ID. Having the s-box and device keys allows us to find the bind ID. The s-box was discovered last year, but hackers are still searching for phone specific device keys. These device keys can be used across multiple game dumps, so it's not necessary to find each device's set of device keys for decryption to work. &lt;br /&gt;
&lt;br /&gt;
Currently, one of the members on the Rockman preservation team is executing the brute forcing. Results are expected within about a month.&lt;br /&gt;
&lt;br /&gt;
It's important to note that we don't know what the decrypted data looks like. There's a chance that it's fragmented (bad) or Java game files (good).&lt;br /&gt;
&lt;br /&gt;
* [https://gitlab.com/usernameak/mkb_bruteforce MKB Bruteforce] repo on GitLab&lt;br /&gt;
&lt;br /&gt;
===Motorola M702iG and M702iS===&lt;br /&gt;
The Motorola M702iG and M702iS are based upon the Motorola Razr that was released internationally. Due to the availability of information about these phones, their firmware has successfully been accessed through USB. It's possible to browse the entire file system on these phones using a RMCDA General Program.&lt;br /&gt;
&lt;br /&gt;
* M702iS/M702iG USB Drivers are required.&lt;br /&gt;
* You will need RMCDA General Program. This will do something to the M702iS/G that open its file system up to P2K Commander. You will need information displayed on the screen to proceed to the next step.&lt;br /&gt;
* P2K Commander will be able to access file system after using RCDMA General.&lt;br /&gt;
* Java Games are located in KJAVA folder.&lt;br /&gt;
&lt;br /&gt;
===Panasonic P-01F===&lt;br /&gt;
The Panasonic P-01F successfully had its firmware extracted by unsoldering the eMMC and analyzing it with a chip programmer. This technique was also used for the '''Panasonic 301P''' and '''Panasonic 401PM'''.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Phones at Hack Manhattan==&lt;br /&gt;
===Panasonic P903iTV===&lt;br /&gt;
The Panasonic P903iTV is a mobile phone developed by Panasonic and released in 2007. There is currently a disassembled version of this phone at Hack Manhattan undergoing repairs.&lt;br /&gt;
&lt;br /&gt;
* [https://lpcwiki.miraheze.org/wiki/Panasonic_P903iTV Panasonic P903iTV] on Legacy Portable Computer Wiki&lt;br /&gt;
&lt;br /&gt;
== Notable Japanese Feature Phone Games ==&lt;br /&gt;
Some notable titles from recognizable game series include:&lt;br /&gt;
&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Before_Crisis_-Final_Fantasy_VII- Before Crisis -Final Fantasy VII-] and [https://japanesefeaturephones.miraheze.org/wiki/Dirge_of_Cerberus_Lost_Episode_-Final_Fantasy_VII- Dirge of Cerberus Lost Episode -Final Fantasy VII-]: Games in the Final Fantasy VII metaverse that greatly expand upon its lore&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Professor_Layton_and_the_Mansion_of_the_Deathly_Mirror Professor Layton and the Mansion of the Deathly Mirror]: A unique Professor Layton title released exclusively for Japanese mobile phones&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Kingdom_Hearts_coded Kingdom Hearts coded]: A story that covers events proceeding the finale of Kingdom Hearts II&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Persona_Mobile_Online Persona Mobile Online]: An entire Persona online MMORPG for cellphones&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Ni_no_Kuni:_Hotroit_Stories Ni no Kuni: Hotroit Stories]: A prologue to the Ni no Kuni series that takes place before Ni no Kuni: Dominion of the Dark Djinn&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Pok%C3%A9mate Pokémate]: The first Pokémon mobile game&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Nakayoshi_Chao! Nakayoshi Chao!]: A Chao virtual pet game for phones&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.youtube.com/watch?v=tKH0x21rj1Y Japan's Game Preservation Crisis] by Did You Know Gaming&lt;br /&gt;
* [https://hitsave.org/feature-phone-gaming/ Japanese Feature Phone Game Preservation: Uncovering a Forgotten Era of Gaming] on HitSave.org&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Main_Page Japanese Feature Phones Wiki] (made by HM member Ellen!)&lt;br /&gt;
* [https://docs.google.com/document/d/1fJdByYSfUPRFFAOixBX5BXx6sGkEc2uqX5verAgBhyc/edit?usp=sharing Feature Phone Preservation Resources] by Ellen&lt;br /&gt;
* [https://archive.org/details/@dekafire Japanese Feature Phone PC Downloads] posted on Archive.org&lt;/div&gt;</summary>
		<author><name>LNRC</name></author>
	</entry>
	<entry>
		<id>https://wiki.hackmanhattan.com/index.php?title=File:HM_Release.pdf&amp;diff=8800</id>
		<title>File:HM Release.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.hackmanhattan.com/index.php?title=File:HM_Release.pdf&amp;diff=8800"/>
		<updated>2023-09-26T16:36:02Z</updated>

		<summary type="html">&lt;p&gt;LNRC: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Hack Manhattan's Release of Liability Form (Liability Waiver). Signers agree to Assumption of Risk, Release of Liability, Covenant Not to Sue, and Third Party Indemnification. This form must be signed in order to permit access to heavy equipment such as the band saw, soldering station, wooden lathe, etc.&lt;/div&gt;</summary>
		<author><name>LNRC</name></author>
	</entry>
	<entry>
		<id>https://wiki.hackmanhattan.com/index.php?title=File:HM_Release.pdf&amp;diff=8799</id>
		<title>File:HM Release.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.hackmanhattan.com/index.php?title=File:HM_Release.pdf&amp;diff=8799"/>
		<updated>2023-09-26T16:35:26Z</updated>

		<summary type="html">&lt;p&gt;LNRC: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Hack Manhattan's Release of Liability Form (Waiver). Signers agree to Assumption of Risk, Release of Liability, Covenant Not to Sue, and Third Party Indemnification. This form must be signed in order to permit access to heavy equipment such as the band saw, soldering station, wooden lathe, etc.&lt;/div&gt;</summary>
		<author><name>LNRC</name></author>
	</entry>
	<entry>
		<id>https://wiki.hackmanhattan.com/index.php?title=Japanese_Feature_Phone_Preservation&amp;diff=8793</id>
		<title>Japanese Feature Phone Preservation</title>
		<link rel="alternate" type="text/html" href="https://wiki.hackmanhattan.com/index.php?title=Japanese_Feature_Phone_Preservation&amp;diff=8793"/>
		<updated>2023-09-22T04:23:15Z</updated>

		<summary type="html">&lt;p&gt;LNRC: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:JapaneseFeaturePhones.jpg |thumb]]&lt;br /&gt;
&lt;br /&gt;
Japanese feature phones is a category of mobile devices that were released (almost) exclusively in Japan between approximately 1999-2015. These phones contained many features that took over a decade to reach the rest of the world: game streaming, live TV, NFC tags, and more. These phones were developed by a variety of companies, each with their own proprietary hardware and software. Because of the diversity of phone models, the restrictive copyright protections, a separate set of proprietary internet protocols, and more, these phones and their games have been extremely challenging to preserve. &lt;br /&gt;
&lt;br /&gt;
== Current Preservation and Data Extraction Projects ==&lt;br /&gt;
&lt;br /&gt;
===Sharp SH-10C===&lt;br /&gt;
The Sharp SH-10C is a DoCoMo phone released in 2011. Attempts have been made to read the NAND chip on this phone, in part because its schematics were made public by the [https://fcc.report/FCC-ID/APYHRO00145 FCC]. Currently, there are no chip programmers that support its NAND chip (Toshiba TY00D0021211KC) by default, and attempts at using a chip programmer have not reached past the bootloader. For more information, we recommend reading the report below. &lt;br /&gt;
&lt;br /&gt;
* [https://docs.google.com/document/d/1X3TN1QIvINPMDC6fmwo6vHCgAT377jOFM1zYkWZzdZY/edit?usp=sharing Report on Extraction of Data from DoCoMo Sharp SH-10C Mobile Phone] by Kraze&lt;br /&gt;
* [https://lpcwiki.miraheze.org/wiki/Sharp_SH-10C Sharp SH-10C] on the Legacy Portable Computer Wiki&lt;br /&gt;
&lt;br /&gt;
===C2 Cipher Code Decryption on SD Cards===&lt;br /&gt;
The microSD cards in Japanese feature phones hide copyright protected data using a  C2 cryptomeria cipher. Cracking the C2 cipher requires three things: s-box, device keys, and a game-specific bind ID. Having the s-box and device keys allows us to find the bind ID. The s-box was discovered last year, but hackers are still searching for phone specific device keys. These device keys can be used across multiple game dumps, so it's not necessary to find each device's set of device keys for decryption to work. &lt;br /&gt;
&lt;br /&gt;
Currently, one of the members on the Rockman preservation team is executing the brute forcing. Results are expected within about a month.&lt;br /&gt;
&lt;br /&gt;
It's important to note that we don't know what the decrypted data looks like. There's a chance that it's fragmented (bad) or Java game files (good).&lt;br /&gt;
&lt;br /&gt;
* [https://gitlab.com/usernameak/mkb_bruteforce MKB Bruteforce] repo on GitLab&lt;br /&gt;
&lt;br /&gt;
===Motorola M702iG and M702iS===&lt;br /&gt;
The Motorola M702iG and M702iS are based upon the Motorola Razr that was released internationally. Due to the availability of information about these phones, their firmware has successfully been accessed through USB. It's possible to browse the entire file system on these phones using a RMCDA General Program.&lt;br /&gt;
&lt;br /&gt;
* M702iS/M702iG USB Drivers are required.&lt;br /&gt;
* You will need RMCDA General Program. This will do something to the M702iS/G that open its file system up to P2K Commander. You will need information displayed on the screen to proceed to the next step.&lt;br /&gt;
* P2K Commander will be able to access file system after using RCDMA General.&lt;br /&gt;
* Java Games are located in KJAVA folder.&lt;br /&gt;
&lt;br /&gt;
===Panasonic P-01F===&lt;br /&gt;
The Panasonic P-01F successfully had its firmware extracted by unsoldering the eMMC and analyzing it with a chip programmer. This technique was also used for the '''Panasonic 301P''' and '''Panasonic 401PM'''.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Phones at Hack Manhattan==&lt;br /&gt;
===Panasonic P903iTV===&lt;br /&gt;
The Panasonic P903iTV is a mobile phone developed by Panasonic and released in 2007. There is currently a disassembled version of this phone at Hack Manhattan undergoing repairs.&lt;br /&gt;
&lt;br /&gt;
* [https://lpcwiki.miraheze.org/wiki/Panasonic_P903iTV Panasonic P903iTV] on Legacy Portable Computer Wiki&lt;br /&gt;
&lt;br /&gt;
== Notable Japanese Feature Phone Games ==&lt;br /&gt;
Some notable titles from recognizable game series include:&lt;br /&gt;
&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Before_Crisis_-Final_Fantasy_VII- Before Crisis -Final Fantasy VII-] and [https://japanesefeaturephones.miraheze.org/wiki/Dirge_of_Cerberus_Lost_Episode_-Final_Fantasy_VII- Dirge of Cerberus Lost Episode -Final Fantasy VII-]: Games in the Final Fantasy VII metaverse that greatly expand upon its lore&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Professor_Layton_and_the_Mansion_of_the_Deathly_Mirror Professor Layton and the Mansion of the Deathly Mirror]: A unique Professor Layton title released exclusively for Japanese mobile phones&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Kingdom_Hearts_coded Kingdom Hearts coded]: A story that covers events proceeding the finale of Kingdom Hearts II&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Persona_Mobile_Online Persona Mobile Online]: An entire Persona online MMORPG for cellphones&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Ni_no_Kuni:_Hotroit_Stories Ni no Kuni: Hotroit Stories]: A prologue to the Ni no Kuni series that takes place before Ni no Kuni: Dominion of the Dark Djinn&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Pok%C3%A9mate Pokémate]: The first Pokémon mobile game&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Nakayoshi_Chao! Nakayoshi Chao!]: A Chao virtual pet game for phones&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.youtube.com/watch?v=tKH0x21rj1Y Japan's Game Preservation Crisis] by Did You Know Gaming&lt;br /&gt;
* [https://hitsave.org/feature-phone-gaming/ Japanese Feature Phone Game Preservation: Uncovering a Forgotten Era of Gaming] on HitSave.org&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Main_Page Japanese Feature Phones Wiki] (made by HM member Ellen!)&lt;br /&gt;
* [https://docs.google.com/document/d/1fJdByYSfUPRFFAOixBX5BXx6sGkEc2uqX5verAgBhyc/edit?usp=sharing Feature Phone Preservation Resources] by Ellen&lt;br /&gt;
* [https://archive.org/details/@dekafire Japanese Feature Phone PC Downloads] posted on Archive.org&lt;/div&gt;</summary>
		<author><name>LNRC</name></author>
	</entry>
	<entry>
		<id>https://wiki.hackmanhattan.com/index.php?title=Japanese_Feature_Phone_Preservation&amp;diff=8786</id>
		<title>Japanese Feature Phone Preservation</title>
		<link rel="alternate" type="text/html" href="https://wiki.hackmanhattan.com/index.php?title=Japanese_Feature_Phone_Preservation&amp;diff=8786"/>
		<updated>2023-09-20T00:59:32Z</updated>

		<summary type="html">&lt;p&gt;LNRC: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:JapaneseFeaturePhones.jpg |thumb]]&lt;br /&gt;
&lt;br /&gt;
Japanese feature phones is a category of mobile devices that were released (almost) exclusively in Japan between approximately 1999-2015. These phones contained many features that took over a decade to reach the rest of the world: game streaming, live TV, NFC tags, and more. These phones were developed by a variety of companies, each with their own proprietary hardware and software. Because of the diversity of phone models, the restrictive copyright protections, a separate set of proprietary internet protocols, and more, these phones and their games have been extremely challenging to preserve. &lt;br /&gt;
&lt;br /&gt;
== Current Preservation and Data Extraction Projects ==&lt;br /&gt;
&lt;br /&gt;
===**TOP PRIORITY** C2 Cipher Code Decryption on SD Cards===&lt;br /&gt;
The microSD cards in Japanese feature phones hide copyright protected data using a  C2 cryptomeria cipher. Cracking the C2 cipher requires three things: s-box, device keys, and a game-specific bind ID. Having the s-box and device keys allows us to find the bind ID. The s-box was discovered last year, but hackers are still searching for phone specific device keys. These device keys can be used across multiple game dumps, so it's not necessary to find each device's set of device keys for decryption to work. &lt;br /&gt;
&lt;br /&gt;
Right now, plans are underway to attempt a collective brute forcing of device keys by combining the power of multiple GPUs on a Java-based server. The mechanism for accomplishing this is currently under development.&lt;br /&gt;
&lt;br /&gt;
It's important to note that we don't know what the decrypted data looks like. There's a chance that it's fragmented (bad) or Java game files (good).&lt;br /&gt;
&lt;br /&gt;
* [https://gitlab.com/usernameak/mkb_bruteforce MKB Bruteforce] repo on GitLab&lt;br /&gt;
&lt;br /&gt;
===Sharp SH-10C===&lt;br /&gt;
The Sharp SH-10C is a DoCoMo phone released in 2011. Attempts have been made to read the NAND chip on this phone, in part because its schematics were made public by the [https://fcc.report/FCC-ID/APYHRO00145 FCC]. Currently, there are no chip programmers that support its NAND chip (Toshiba TY00D0021211KC) by default, and attempts at using a chip programmer have not reached past the bootloader. For more information, we recommend reading the report below. &lt;br /&gt;
&lt;br /&gt;
* [https://docs.google.com/document/d/1X3TN1QIvINPMDC6fmwo6vHCgAT377jOFM1zYkWZzdZY/edit?usp=sharing Report on Extraction of Data from DoCoMo Sharp SH-10C Mobile Phone] by Kraze&lt;br /&gt;
* [https://lpcwiki.miraheze.org/wiki/Sharp_SH-10C Sharp SH-10C] on the Legacy Portable Computer Wiki&lt;br /&gt;
&lt;br /&gt;
===Motorola M702iG and M702iS===&lt;br /&gt;
The Motorola M702iG and M702iS are based upon the Motorola Razr that was released internationally. Due to the availability of information about these phones, their firmware has successfully been accessed through USB. It's possible to browse the entire file system on these phones using a RMCDA General Program.&lt;br /&gt;
&lt;br /&gt;
* M702iS/M702iG USB Drivers are required.&lt;br /&gt;
* You will need RMCDA General Program. This will do something to the M702iS/G that open its file system up to P2K Commander. You will need information displayed on the screen to proceed to the next step.&lt;br /&gt;
* P2K Commander will be able to access file system after using RCDMA General.&lt;br /&gt;
* Java Games are located in KJAVA folder.&lt;br /&gt;
&lt;br /&gt;
===Panasonic P-01F===&lt;br /&gt;
The Panasonic P-01F successfully had its firmware extracted by unsoldering the eMMC and analyzing it with a chip programmer. This technique was also used for the '''Panasonic 301P''' and '''Panasonic 401PM'''.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Phones at Hack Manhattan==&lt;br /&gt;
===Panasonic P903iTV===&lt;br /&gt;
The Panasonic P903iTV is a mobile phone developed by Panasonic and released in 2007. There is currently a disassembled version of this phone at Hack Manhattan undergoing repairs.&lt;br /&gt;
&lt;br /&gt;
* [https://lpcwiki.miraheze.org/wiki/Panasonic_P903iTV Panasonic P903iTV] on Legacy Portable Computer Wiki&lt;br /&gt;
&lt;br /&gt;
== Notable Japanese Feature Phone Games ==&lt;br /&gt;
Some notable titles from recognizable game series include:&lt;br /&gt;
&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Before_Crisis_-Final_Fantasy_VII- Before Crisis -Final Fantasy VII-] and [https://japanesefeaturephones.miraheze.org/wiki/Dirge_of_Cerberus_Lost_Episode_-Final_Fantasy_VII- Dirge of Cerberus Lost Episode -Final Fantasy VII-]: Games in the Final Fantasy VII metaverse that greatly expand upon its lore&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Professor_Layton_and_the_Mansion_of_the_Deathly_Mirror Professor Layton and the Mansion of the Deathly Mirror]: A unique Professor Layton title released exclusively for Japanese mobile phones&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Kingdom_Hearts_coded Kingdom Hearts coded]: A story that covers events proceeding the finale of Kingdom Hearts II&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Persona_Mobile_Online Persona Mobile Online]: An entire Persona online MMORPG for cellphones&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Ni_no_Kuni:_Hotroit_Stories Ni no Kuni: Hotroit Stories]: A prologue to the Ni no Kuni series that takes place before Ni no Kuni: Dominion of the Dark Djinn&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Pok%C3%A9mate Pokémate]: The first Pokémon mobile game&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Nakayoshi_Chao! Nakayoshi Chao!]: A Chao virtual pet game for phones&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.youtube.com/watch?v=tKH0x21rj1Y Japan's Game Preservation Crisis] by Did You Know Gaming&lt;br /&gt;
* [https://hitsave.org/feature-phone-gaming/ Japanese Feature Phone Game Preservation: Uncovering a Forgotten Era of Gaming] on HitSave.org&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Main_Page Japanese Feature Phones Wiki] (made by HM member Ellen!)&lt;br /&gt;
* [https://docs.google.com/document/d/1fJdByYSfUPRFFAOixBX5BXx6sGkEc2uqX5verAgBhyc/edit?usp=sharing Feature Phone Preservation Resources] by Ellen&lt;br /&gt;
* [https://archive.org/details/@dekafire Japanese Feature Phone PC Downloads] posted on Archive.org&lt;/div&gt;</summary>
		<author><name>LNRC</name></author>
	</entry>
	<entry>
		<id>https://wiki.hackmanhattan.com/index.php?title=User:LNRC&amp;diff=8782</id>
		<title>User:LNRC</title>
		<link rel="alternate" type="text/html" href="https://wiki.hackmanhattan.com/index.php?title=User:LNRC&amp;diff=8782"/>
		<updated>2023-09-13T21:30:08Z</updated>

		<summary type="html">&lt;p&gt;LNRC: /* Unabandonware */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;My name is Ellen. I like retro gaming and tech. Nice to meet you!&lt;br /&gt;
&lt;br /&gt;
==My Projects==&lt;br /&gt;
&lt;br /&gt;
===[https://japanesefeaturephones.miraheze.org/wiki/Main_Page Japanese Feature Phone Wiki]===&lt;br /&gt;
Wiki dedicated to flip phone games from Japan during the 2000s.&lt;br /&gt;
&lt;br /&gt;
===Unabandonware===&lt;br /&gt;
The name I occasionally use when posting about retro games.&lt;br /&gt;
* [https://unabandonware.com/ Unabandonware.com]&lt;br /&gt;
* [https://archive.org/details/@unabandonware Unabandonware] on Archive.org&lt;br /&gt;
* [https://www.thingiverse.com/unabandonware/designs  Unabandonware] on Thingiverse&lt;/div&gt;</summary>
		<author><name>LNRC</name></author>
	</entry>
	<entry>
		<id>https://wiki.hackmanhattan.com/index.php?title=User:LNRC&amp;diff=8781</id>
		<title>User:LNRC</title>
		<link rel="alternate" type="text/html" href="https://wiki.hackmanhattan.com/index.php?title=User:LNRC&amp;diff=8781"/>
		<updated>2023-09-13T02:53:41Z</updated>

		<summary type="html">&lt;p&gt;LNRC: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;My name is Ellen. I like retro gaming and tech. Nice to meet you!&lt;br /&gt;
&lt;br /&gt;
==My Projects==&lt;br /&gt;
&lt;br /&gt;
===[https://japanesefeaturephones.miraheze.org/wiki/Main_Page Japanese Feature Phone Wiki]===&lt;br /&gt;
Wiki dedicated to flip phone games from Japan during the 2000s.&lt;br /&gt;
&lt;br /&gt;
===Unabandonware===&lt;br /&gt;
The name I occasionally use when posting about retro games.&lt;br /&gt;
* [https://unabandonware.com/ Unabandonware.com]&lt;br /&gt;
* [https://archive.org/details/@unabandonware Unabandonware] on Archive.org&lt;/div&gt;</summary>
		<author><name>LNRC</name></author>
	</entry>
	<entry>
		<id>https://wiki.hackmanhattan.com/index.php?title=Japanese_Feature_Phone_Preservation&amp;diff=8778</id>
		<title>Japanese Feature Phone Preservation</title>
		<link rel="alternate" type="text/html" href="https://wiki.hackmanhattan.com/index.php?title=Japanese_Feature_Phone_Preservation&amp;diff=8778"/>
		<updated>2023-09-09T02:49:06Z</updated>

		<summary type="html">&lt;p&gt;LNRC: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:JapaneseFeaturePhones.jpg |thumb]]&lt;br /&gt;
&lt;br /&gt;
Japanese feature phones is a category of mobile devices that were released (almost) exclusively in Japan between approximately 1999-2015. These phones contained many features that took over a decade to reach the rest of the world: game streaming, live TV, NFC tags, and more. These phones were developed by a variety of companies, each with their own proprietary hardware and software. Because of the diversity of phone models, the restrictive copyright protections, a separate set of proprietary internet protocols, and more, these phones and their games have been extremely challenging to preserve. &lt;br /&gt;
&lt;br /&gt;
== Current Preservation and Data Extraction Projects ==&lt;br /&gt;
&lt;br /&gt;
===Sharp SH-10C===&lt;br /&gt;
The Sharp SH-10C is a DoCoMo phone released in 2011. Attempts have been made to read the NAND chip on this phone, in part because its schematics were made public by the [https://fcc.report/FCC-ID/APYHRO00145 FCC]. Currently, there are no chip programmers that support its NAND chip (Toshiba TY00D0021211KC) by default, and attempts at using a chip programmer have not reached past the bootloader. For more information, we recommend reading the report below. &lt;br /&gt;
&lt;br /&gt;
* [https://docs.google.com/document/d/1X3TN1QIvINPMDC6fmwo6vHCgAT377jOFM1zYkWZzdZY/edit?usp=sharing Report on Extraction of Data from DoCoMo Sharp SH-10C Mobile Phone] by Kraze&lt;br /&gt;
* [https://lpcwiki.miraheze.org/wiki/Sharp_SH-10C Sharp SH-10C] on the Legacy Portable Computer Wiki&lt;br /&gt;
&lt;br /&gt;
===Motorola M702iG and M702iS===&lt;br /&gt;
The Motorola M702iG and M702iS are based upon the Motorola Razr that was released internationally. Due to the availability of information about these phones, their firmware has successfully been accessed through USB. It's possible to browse the entire file system on these phones using a RMCDA General Program.&lt;br /&gt;
&lt;br /&gt;
* M702iS/M702iG USB Drivers are required.&lt;br /&gt;
* You will need RMCDA General Program. This will do something to the M702iS/G that open its file system up to P2K Commander. You will need information displayed on the screen to proceed to the next step.&lt;br /&gt;
* P2K Commander will be able to access file system after using RCDMA General.&lt;br /&gt;
* Java Games are located in KJAVA folder.&lt;br /&gt;
&lt;br /&gt;
===Panasonic P-01F===&lt;br /&gt;
The Panasonic P-01F successfully had its firmware extracted by unsoldering the eMMC and analyzing it with a chip programmer. This technique was also used for the '''Panasonic 301P''' and '''Panasonic 401PM'''.&lt;br /&gt;
&lt;br /&gt;
===C2 Cipher Code Decryption on SD Cards===&lt;br /&gt;
The microSD cards in Japanese feature phones hide copyright protected data using a  C2 cryptomeria cipher. Cracking the C2 cipher requires three things: s-box, device keys, and a game-specific bind ID. Having the s-box and device keys allows us to find the bind ID. The s-box was discovered last year, but hackers are still searching for phone specific device keys. These device keys can be used across multiple game dumps, so it's not necessary to find each device's set of device keys for decryption to work. &lt;br /&gt;
&lt;br /&gt;
Right now, plans are underway to attempt a collective brute forcing of device keys by combining the power of multiple GPUs on a Java-based server. The mechanism for accomplishing this is currently under development.&lt;br /&gt;
&lt;br /&gt;
It's important to note that we don't know what the decrypted data looks like. There's a chance that it's fragmented (bad) or Java game files (good).&lt;br /&gt;
&lt;br /&gt;
* [https://gitlab.com/usernameak/mkb_bruteforce MKB Bruteforce] repo on GitLab&lt;br /&gt;
&lt;br /&gt;
==Phones at Hack Manhattan==&lt;br /&gt;
===Panasonic P903iTV===&lt;br /&gt;
The Panasonic P903iTV is a mobile phone developed by Panasonic and released in 2007. There is currently a disassembled version of this phone at Hack Manhattan undergoing repairs.&lt;br /&gt;
&lt;br /&gt;
* [https://lpcwiki.miraheze.org/wiki/Panasonic_P903iTV Panasonic P903iTV] on Legacy Portable Computer Wiki&lt;br /&gt;
&lt;br /&gt;
== Notable Japanese Feature Phone Games ==&lt;br /&gt;
Some notable titles from recognizable game series include:&lt;br /&gt;
&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Before_Crisis_-Final_Fantasy_VII- Before Crisis -Final Fantasy VII-] and [https://japanesefeaturephones.miraheze.org/wiki/Dirge_of_Cerberus_Lost_Episode_-Final_Fantasy_VII- Dirge of Cerberus Lost Episode -Final Fantasy VII-]: Games in the Final Fantasy VII metaverse that greatly expand upon its lore&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Professor_Layton_and_the_Mansion_of_the_Deathly_Mirror Professor Layton and the Mansion of the Deathly Mirror]: A unique Professor Layton title released exclusively for Japanese mobile phones&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Kingdom_Hearts_coded Kingdom Hearts coded]: A story that covers events proceeding the finale of Kingdom Hearts II&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Persona_Mobile_Online Persona Mobile Online]: An entire Persona online MMORPG for cellphones&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Ni_no_Kuni:_Hotroit_Stories Ni no Kuni: Hotroit Stories]: A prologue to the Ni no Kuni series that takes place before Ni no Kuni: Dominion of the Dark Djinn&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Pok%C3%A9mate Pokémate]: The first Pokémon mobile game&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Nakayoshi_Chao! Nakayoshi Chao!]: A Chao virtual pet game for phones&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.youtube.com/watch?v=tKH0x21rj1Y Japan's Game Preservation Crisis] by Did You Know Gaming&lt;br /&gt;
* [https://hitsave.org/feature-phone-gaming/ Japanese Feature Phone Game Preservation: Uncovering a Forgotten Era of Gaming] on HitSave.org&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Main_Page Japanese Feature Phones Wiki] (made by HM member Ellen!)&lt;br /&gt;
* [https://docs.google.com/document/d/1fJdByYSfUPRFFAOixBX5BXx6sGkEc2uqX5verAgBhyc/edit?usp=sharing Feature Phone Preservation Resources] by Ellen&lt;br /&gt;
* [https://archive.org/details/@dekafire Japanese Feature Phone PC Downloads] posted on Archive.org&lt;/div&gt;</summary>
		<author><name>LNRC</name></author>
	</entry>
	<entry>
		<id>https://wiki.hackmanhattan.com/index.php?title=File:JapaneseFeaturePhones.jpg&amp;diff=8777</id>
		<title>File:JapaneseFeaturePhones.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.hackmanhattan.com/index.php?title=File:JapaneseFeaturePhones.jpg&amp;diff=8777"/>
		<updated>2023-09-09T02:47:01Z</updated>

		<summary type="html">&lt;p&gt;LNRC: Image from https://hitsave.org/feature-phone-gaming/&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Summary ==&lt;br /&gt;
Image from https://hitsave.org/feature-phone-gaming/&lt;/div&gt;</summary>
		<author><name>LNRC</name></author>
	</entry>
	<entry>
		<id>https://wiki.hackmanhattan.com/index.php?title=Japanese_Feature_Phone_Preservation&amp;diff=8776</id>
		<title>Japanese Feature Phone Preservation</title>
		<link rel="alternate" type="text/html" href="https://wiki.hackmanhattan.com/index.php?title=Japanese_Feature_Phone_Preservation&amp;diff=8776"/>
		<updated>2023-09-09T02:45:51Z</updated>

		<summary type="html">&lt;p&gt;LNRC: /* C2 Cipher Code Decryption on SD Cards */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Japanese feature phones is a category of mobile devices that were released (almost) exclusively in Japan between approximately 1999-2015. These phones contained many features that took over a decade to reach the rest of the world: game streaming, live TV, NFC tags, and more. These phones were developed by a variety of companies, each with their own proprietary hardware and software. Because of the diversity of phone models, the restrictive copyright protections, a separate set of proprietary internet protocols, and more, these phones and their games have been extremely challenging to preserve. &lt;br /&gt;
&lt;br /&gt;
== Current Preservation and Data Extraction Projects ==&lt;br /&gt;
&lt;br /&gt;
===Sharp SH-10C===&lt;br /&gt;
The Sharp SH-10C is a DoCoMo phone released in 2011. Attempts have been made to read the NAND chip on this phone, in part because its schematics were made public by the [https://fcc.report/FCC-ID/APYHRO00145 FCC]. Currently, there are no chip programmers that support its NAND chip (Toshiba TY00D0021211KC) by default, and attempts at using a chip programmer have not reached past the bootloader. For more information, we recommend reading the report below. &lt;br /&gt;
&lt;br /&gt;
* [https://docs.google.com/document/d/1X3TN1QIvINPMDC6fmwo6vHCgAT377jOFM1zYkWZzdZY/edit?usp=sharing Report on Extraction of Data from DoCoMo Sharp SH-10C Mobile Phone] by Kraze&lt;br /&gt;
* [https://lpcwiki.miraheze.org/wiki/Sharp_SH-10C Sharp SH-10C] on the Legacy Portable Computer Wiki&lt;br /&gt;
&lt;br /&gt;
===Motorola M702iG and M702iS===&lt;br /&gt;
The Motorola M702iG and M702iS are based upon the Motorola Razr that was released internationally. Due to the availability of information about these phones, their firmware has successfully been accessed through USB. It's possible to browse the entire file system on these phones using a RMCDA General Program.&lt;br /&gt;
&lt;br /&gt;
* M702iS/M702iG USB Drivers are required.&lt;br /&gt;
* You will need RMCDA General Program. This will do something to the M702iS/G that open its file system up to P2K Commander. You will need information displayed on the screen to proceed to the next step.&lt;br /&gt;
* P2K Commander will be able to access file system after using RCDMA General.&lt;br /&gt;
* Java Games are located in KJAVA folder.&lt;br /&gt;
&lt;br /&gt;
===Panasonic P-01F===&lt;br /&gt;
The Panasonic P-01F successfully had its firmware extracted by unsoldering the eMMC and analyzing it with a chip programmer. This technique was also used for the '''Panasonic 301P''' and '''Panasonic 401PM'''.&lt;br /&gt;
&lt;br /&gt;
===C2 Cipher Code Decryption on SD Cards===&lt;br /&gt;
The microSD cards in Japanese feature phones hide copyright protected data using a  C2 cryptomeria cipher. Cracking the C2 cipher requires three things: s-box, device keys, and a game-specific bind ID. Having the s-box and device keys allows us to find the bind ID. The s-box was discovered last year, but hackers are still searching for phone specific device keys. These device keys can be used across multiple game dumps, so it's not necessary to find each device's set of device keys for decryption to work. &lt;br /&gt;
&lt;br /&gt;
Right now, plans are underway to attempt a collective brute forcing of device keys by combining the power of multiple GPUs on a Java-based server. The mechanism for accomplishing this is currently under development.&lt;br /&gt;
&lt;br /&gt;
It's important to note that we don't know what the decrypted data looks like. There's a chance that it's fragmented (bad) or Java game files (good).&lt;br /&gt;
&lt;br /&gt;
* [https://gitlab.com/usernameak/mkb_bruteforce MKB Bruteforce] repo on GitLab&lt;br /&gt;
&lt;br /&gt;
==Phones at Hack Manhattan==&lt;br /&gt;
===Panasonic P903iTV===&lt;br /&gt;
The Panasonic P903iTV is a mobile phone developed by Panasonic and released in 2007. There is currently a disassembled version of this phone at Hack Manhattan undergoing repairs.&lt;br /&gt;
&lt;br /&gt;
* [https://lpcwiki.miraheze.org/wiki/Panasonic_P903iTV Panasonic P903iTV] on Legacy Portable Computer Wiki&lt;br /&gt;
&lt;br /&gt;
== Notable Japanese Feature Phone Games ==&lt;br /&gt;
Some notable titles from recognizable game series include:&lt;br /&gt;
&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Before_Crisis_-Final_Fantasy_VII- Before Crisis -Final Fantasy VII-] and [https://japanesefeaturephones.miraheze.org/wiki/Dirge_of_Cerberus_Lost_Episode_-Final_Fantasy_VII- Dirge of Cerberus Lost Episode -Final Fantasy VII-]: Games in the Final Fantasy VII metaverse that greatly expand upon its lore&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Professor_Layton_and_the_Mansion_of_the_Deathly_Mirror Professor Layton and the Mansion of the Deathly Mirror]: A unique Professor Layton title released exclusively for Japanese mobile phones&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Kingdom_Hearts_coded Kingdom Hearts coded]: A story that covers events proceeding the finale of Kingdom Hearts II&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Persona_Mobile_Online Persona Mobile Online]: An entire Persona online MMORPG for cellphones&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Ni_no_Kuni:_Hotroit_Stories Ni no Kuni: Hotroit Stories]: A prologue to the Ni no Kuni series that takes place before Ni no Kuni: Dominion of the Dark Djinn&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Pok%C3%A9mate Pokémate]: The first Pokémon mobile game&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Nakayoshi_Chao! Nakayoshi Chao!]: A Chao virtual pet game for phones&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.youtube.com/watch?v=tKH0x21rj1Y Japan's Game Preservation Crisis] by Did You Know Gaming&lt;br /&gt;
* [https://hitsave.org/feature-phone-gaming/ Japanese Feature Phone Game Preservation: Uncovering a Forgotten Era of Gaming] on HitSave.org&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Main_Page Japanese Feature Phones Wiki] (made by HM member Ellen!)&lt;br /&gt;
* [https://docs.google.com/document/d/1fJdByYSfUPRFFAOixBX5BXx6sGkEc2uqX5verAgBhyc/edit?usp=sharing Feature Phone Preservation Resources] by Ellen&lt;br /&gt;
* [https://archive.org/details/@dekafire Japanese Feature Phone PC Downloads] posted on Archive.org&lt;/div&gt;</summary>
		<author><name>LNRC</name></author>
	</entry>
	<entry>
		<id>https://wiki.hackmanhattan.com/index.php?title=Japanese_Feature_Phone_Preservation&amp;diff=8775</id>
		<title>Japanese Feature Phone Preservation</title>
		<link rel="alternate" type="text/html" href="https://wiki.hackmanhattan.com/index.php?title=Japanese_Feature_Phone_Preservation&amp;diff=8775"/>
		<updated>2023-09-09T02:45:31Z</updated>

		<summary type="html">&lt;p&gt;LNRC: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Japanese feature phones is a category of mobile devices that were released (almost) exclusively in Japan between approximately 1999-2015. These phones contained many features that took over a decade to reach the rest of the world: game streaming, live TV, NFC tags, and more. These phones were developed by a variety of companies, each with their own proprietary hardware and software. Because of the diversity of phone models, the restrictive copyright protections, a separate set of proprietary internet protocols, and more, these phones and their games have been extremely challenging to preserve. &lt;br /&gt;
&lt;br /&gt;
== Current Preservation and Data Extraction Projects ==&lt;br /&gt;
&lt;br /&gt;
===Sharp SH-10C===&lt;br /&gt;
The Sharp SH-10C is a DoCoMo phone released in 2011. Attempts have been made to read the NAND chip on this phone, in part because its schematics were made public by the [https://fcc.report/FCC-ID/APYHRO00145 FCC]. Currently, there are no chip programmers that support its NAND chip (Toshiba TY00D0021211KC) by default, and attempts at using a chip programmer have not reached past the bootloader. For more information, we recommend reading the report below. &lt;br /&gt;
&lt;br /&gt;
* [https://docs.google.com/document/d/1X3TN1QIvINPMDC6fmwo6vHCgAT377jOFM1zYkWZzdZY/edit?usp=sharing Report on Extraction of Data from DoCoMo Sharp SH-10C Mobile Phone] by Kraze&lt;br /&gt;
* [https://lpcwiki.miraheze.org/wiki/Sharp_SH-10C Sharp SH-10C] on the Legacy Portable Computer Wiki&lt;br /&gt;
&lt;br /&gt;
===Motorola M702iG and M702iS===&lt;br /&gt;
The Motorola M702iG and M702iS are based upon the Motorola Razr that was released internationally. Due to the availability of information about these phones, their firmware has successfully been accessed through USB. It's possible to browse the entire file system on these phones using a RMCDA General Program.&lt;br /&gt;
&lt;br /&gt;
* M702iS/M702iG USB Drivers are required.&lt;br /&gt;
* You will need RMCDA General Program. This will do something to the M702iS/G that open its file system up to P2K Commander. You will need information displayed on the screen to proceed to the next step.&lt;br /&gt;
* P2K Commander will be able to access file system after using RCDMA General.&lt;br /&gt;
* Java Games are located in KJAVA folder.&lt;br /&gt;
&lt;br /&gt;
===Panasonic P-01F===&lt;br /&gt;
The Panasonic P-01F successfully had its firmware extracted by unsoldering the eMMC and analyzing it with a chip programmer. This technique was also used for the '''Panasonic 301P''' and '''Panasonic 401PM'''.&lt;br /&gt;
&lt;br /&gt;
===C2 Cipher Code Decryption on SD Cards===&lt;br /&gt;
The microSD cards in Japanese feature phones hide copyright protected data using a  C2 cryptomeria cipher. Cracking the C2 cipher requires three things: s-box, device keys, and a game-specific bind ID. Having the s-box and device keys allows us to find the bind ID. The s-box was discovered last year, but hackers are still searching for phone specific device keys. These device keys can be used across multiple game dumps, so it's not necessary to find each device's set of device keys for decryption to work. &lt;br /&gt;
&lt;br /&gt;
Right now, plans are underway to attempt a collective brute forcing of device keys by combining the power of multiple GPUs on a Java-based server. The mechanism for accomplishing this is currently in development.&lt;br /&gt;
&lt;br /&gt;
It's important to note that we don't know what the decrypted data looks like. There's a chance that it's fragmented (bad) or Java game files (good).&lt;br /&gt;
&lt;br /&gt;
* [https://gitlab.com/usernameak/mkb_bruteforce MKB Bruteforce] repo on GitLab&lt;br /&gt;
&lt;br /&gt;
==Phones at Hack Manhattan==&lt;br /&gt;
===Panasonic P903iTV===&lt;br /&gt;
The Panasonic P903iTV is a mobile phone developed by Panasonic and released in 2007. There is currently a disassembled version of this phone at Hack Manhattan undergoing repairs.&lt;br /&gt;
&lt;br /&gt;
* [https://lpcwiki.miraheze.org/wiki/Panasonic_P903iTV Panasonic P903iTV] on Legacy Portable Computer Wiki&lt;br /&gt;
&lt;br /&gt;
== Notable Japanese Feature Phone Games ==&lt;br /&gt;
Some notable titles from recognizable game series include:&lt;br /&gt;
&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Before_Crisis_-Final_Fantasy_VII- Before Crisis -Final Fantasy VII-] and [https://japanesefeaturephones.miraheze.org/wiki/Dirge_of_Cerberus_Lost_Episode_-Final_Fantasy_VII- Dirge of Cerberus Lost Episode -Final Fantasy VII-]: Games in the Final Fantasy VII metaverse that greatly expand upon its lore&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Professor_Layton_and_the_Mansion_of_the_Deathly_Mirror Professor Layton and the Mansion of the Deathly Mirror]: A unique Professor Layton title released exclusively for Japanese mobile phones&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Kingdom_Hearts_coded Kingdom Hearts coded]: A story that covers events proceeding the finale of Kingdom Hearts II&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Persona_Mobile_Online Persona Mobile Online]: An entire Persona online MMORPG for cellphones&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Ni_no_Kuni:_Hotroit_Stories Ni no Kuni: Hotroit Stories]: A prologue to the Ni no Kuni series that takes place before Ni no Kuni: Dominion of the Dark Djinn&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Pok%C3%A9mate Pokémate]: The first Pokémon mobile game&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Nakayoshi_Chao! Nakayoshi Chao!]: A Chao virtual pet game for phones&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.youtube.com/watch?v=tKH0x21rj1Y Japan's Game Preservation Crisis] by Did You Know Gaming&lt;br /&gt;
* [https://hitsave.org/feature-phone-gaming/ Japanese Feature Phone Game Preservation: Uncovering a Forgotten Era of Gaming] on HitSave.org&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Main_Page Japanese Feature Phones Wiki] (made by HM member Ellen!)&lt;br /&gt;
* [https://docs.google.com/document/d/1fJdByYSfUPRFFAOixBX5BXx6sGkEc2uqX5verAgBhyc/edit?usp=sharing Feature Phone Preservation Resources] by Ellen&lt;br /&gt;
* [https://archive.org/details/@dekafire Japanese Feature Phone PC Downloads] posted on Archive.org&lt;/div&gt;</summary>
		<author><name>LNRC</name></author>
	</entry>
	<entry>
		<id>https://wiki.hackmanhattan.com/index.php?title=Japanese_Feature_Phone_Preservation&amp;diff=8774</id>
		<title>Japanese Feature Phone Preservation</title>
		<link rel="alternate" type="text/html" href="https://wiki.hackmanhattan.com/index.php?title=Japanese_Feature_Phone_Preservation&amp;diff=8774"/>
		<updated>2023-09-09T02:39:51Z</updated>

		<summary type="html">&lt;p&gt;LNRC: /* Motorola M702iG and M702iS */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Japanese feature phones is a category of mobile devices that were released (almost) exclusively in Japan between approximately 1999-2015. These phones contained many features that took over a decade to reach the rest of the world: game streaming, live TV, NFC tags, and more. These phones were developed by a variety of companies, each with their own proprietary hardware and software. Because of the diversity of phone models, the restrictive copyright protections, a separate set of proprietary internet protocols, and more, these phones and their games have been extremely challenging to preserve. &lt;br /&gt;
&lt;br /&gt;
== Current Preservation and Data Extraction Projects ==&lt;br /&gt;
&lt;br /&gt;
===Sharp SH-10C===&lt;br /&gt;
The Sharp SH-10C is a DoCoMo phone released in 2011. Attempts have been made to read the NAND chip on this phone, in part because its schematics were made public by the [https://fcc.report/FCC-ID/APYHRO00145 FCC]. Currently, there are no chip programmers that support its NAND chip (Toshiba TY00D0021211KC) by default, and attempts at using a chip programmer have not reached past the bootloader. For more information, we recommend reading the report below. &lt;br /&gt;
&lt;br /&gt;
* [https://docs.google.com/document/d/1X3TN1QIvINPMDC6fmwo6vHCgAT377jOFM1zYkWZzdZY/edit?usp=sharing Report on Extraction of Data from DoCoMo Sharp SH-10C Mobile Phone] by Kraze&lt;br /&gt;
* [https://lpcwiki.miraheze.org/wiki/Sharp_SH-10C Sharp SH-10C] on the Legacy Portable Computer Wiki&lt;br /&gt;
&lt;br /&gt;
===Motorola M702iG and M702iS===&lt;br /&gt;
The Motorola M702iG and M702iS are based upon the Motorola Razr that was released internationally. Due to the availability of information about these phones, their firmware has successfully been accessed through USB. It's possible to browse the entire file system on these phones using a RMCDA General Program.&lt;br /&gt;
&lt;br /&gt;
* M702iS/M702iG USB Drivers are required.&lt;br /&gt;
* You will need RMCDA General Program. This will do something to the M702iS/G that open its file system up to P2K Commander. You will need information displayed on the screen to proceed to the next step.&lt;br /&gt;
* P2K Commander will be able to access file system after using RCDMA General.&lt;br /&gt;
* Java Games are located in KJAVA folder.&lt;br /&gt;
&lt;br /&gt;
===Panasonic P-01F===&lt;br /&gt;
The Panasonic P-01F successfully had its firmware extracted by unsoldering the eMMC and analyzing it with a chip programmer. This technique was also used for the '''Panasonic 301P''' and '''Panasonic 401PM'''.&lt;br /&gt;
&lt;br /&gt;
===C2 Cipher Code Decryption on SD Cards===&lt;br /&gt;
The microSD cards in Japanese feature phones hide copyright protected data using a  C2 cryptomeria cipher. Cracking the C2 cipher requires three things: s-box, device keys, and a game-specific bind ID. Having the s-box and device keys allows us to find the bind ID. The s-box was discovered last year, but hackers are still searching for phone specific device keys. These device keys can be used across multiple game dumps, so it's not necessary to find each device's set of device keys for decryption to work. &lt;br /&gt;
&lt;br /&gt;
Right now, plans are underway to attempt a collective brute forcing of device keys by combining the power of multiple GPUs on a Java-based server. The mechanism for accomplishing this is currently in development.&lt;br /&gt;
&lt;br /&gt;
It's important to note that we don't know what the decrypted data looks like. There's a chance that it's fragmented (bad) or Java game files (good).&lt;br /&gt;
&lt;br /&gt;
* [https://gitlab.com/usernameak/mkb_bruteforce MKB Bruteforce] repo on GitLab&lt;br /&gt;
&lt;br /&gt;
==Phones at Hack Manhattan==&lt;br /&gt;
===Panasonic P903iTV===&lt;br /&gt;
The Panasonic P903iTV is a mobile phone developed by Panasonic and released in 2007. There is currently a disassembled version of this phone at Hack Manhattan undergoing repairs.&lt;br /&gt;
&lt;br /&gt;
* [https://lpcwiki.miraheze.org/wiki/Panasonic_P903iTV Panasonic P903iTV] on Legacy Portable Computer Wiki&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.youtube.com/watch?v=tKH0x21rj1Y Japan's Game Preservation Crisis] by Did You Know Gaming&lt;br /&gt;
* [https://hitsave.org/feature-phone-gaming/ Japanese Feature Phone Game Preservation: Uncovering a Forgotten Era of Gaming] on HitSave.org&lt;br /&gt;
* [https://japanesefeaturephones.miraheze.org/wiki/Main_Page Japanese Feature Phones Wiki] (made by HM member Ellen!)&lt;br /&gt;
* [https://docs.google.com/document/d/1fJdByYSfUPRFFAOixBX5BXx6sGkEc2uqX5verAgBhyc/edit?usp=sharing Feature Phone Preservation Resources] by Ellen&lt;br /&gt;
* [https://archive.org/details/@dekafire Japanese Feature Phone PC Downloads] posted on Archive.org&lt;/div&gt;</summary>
		<author><name>LNRC</name></author>
	</entry>
</feed>