View Single Post
Old 05-07-2015, 08:41 AM   #5
knc1
Going Viral
knc1 ought to be getting tired of karma fortunes by now.knc1 ought to be getting tired of karma fortunes by now.knc1 ought to be getting tired of karma fortunes by now.knc1 ought to be getting tired of karma fortunes by now.knc1 ought to be getting tired of karma fortunes by now.knc1 ought to be getting tired of karma fortunes by now.knc1 ought to be getting tired of karma fortunes by now.knc1 ought to be getting tired of karma fortunes by now.knc1 ought to be getting tired of karma fortunes by now.knc1 ought to be getting tired of karma fortunes by now.knc1 ought to be getting tired of karma fortunes by now.
 
knc1's Avatar
 
Posts: 17,212
Karma: 18210809
Join Date: Feb 2012
Location: Central Texas
Device: No K1, PW2, KV, KOA
Quote:
Originally Posted by Akirainblack View Post
I've been wondering, how do you decrypt the image files without the key?
I can't find any documentation about how KindleTool works. But that may be because I'm blind. I've searched this forum and the Wiki.
If that info has to come via PM then fair enough.
They use a public key system - that is the key (no pun intended; key == crucial; here) phrase to google for.

That is: two keys (a key pair), one public (for decrypting) present on every Kindle and one private (for encrypting) stored in Amazon's I.P. security vault.

Just read the source of KindleTool for the details of how it works.
It has the Amazon public keys embedded in it for handling Amazon packages and our key-pair for handling our packages.
That is: no Amazon private key == can not create Amazon signed packages.

Last edited by knc1; 05-07-2015 at 08:48 AM.
knc1 is offline   Reply With Quote