-
Notifications
You must be signed in to change notification settings - Fork 2.3k
Dumped the Dutch version of Kidizoom Twist's user data #14653
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: master
Are you sure you want to change the base?
Conversation
It's Real, not fake, i dumped myself
|
it's real not fake |
vtarchive
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
i did test and it has user data so i might be real.
|
what did you use to dump it? |
|
HxD. |
|
So you dumped a NAND ROM with a Hex Editor? |
|
yes. |
|
Could you better explain the process. HxD is not a dumping tool. The closest HxD has in terms of functionality is the ability to open drives to view them. It is not even designed for imaging drives. None of that explains how you used it to dump a NAND ROM. |
|
i used a tool to dump the whole nand. i used hxd to open a drive and save as a file named "kidizoomtwistdutchfw.bin" |
|
again this process does not make any sense. why is HxD needed? any standard dumping tool would come with software what 'tool' are you using? |
|
im using HXD to rip NANDs from Kidizooms. |
|
That doesn't make any sense. How are you connecting the NAND to the PC to read it? |
|
i did manage to connect the NAND via PC and copied the RAW contents |
|
did you connect it to an ISA slot? |
|
Anyway, if you excuse my scepticism here, the last person we had trying to add a bunch of 'Dutch' Vtech sets, was doing nothing but adding fake entries with copy+paste data from other sets. When questioned they just gave nonsensical answers. They had to be banned from contributing to the project because they were making a mess. Your first attempt to add this was exactly the same. An objectively incorrect 'Dutch' Vtech set addition which was nothing but a fake entry copy and pasted from elsewhere. Your other 'Dutch Vtech' PR was deleting valid entries in tables without even mentioning it in the description, which looked like vandalism. Now you're providing answers to questions that make no sense at all to those with decades of experience in dumping this kind of thing. It feels like you're being evasive, not providing details that would help your cause. Trust in this PR is very low as a result. |
|
i finally submitting one that is real. |
|
So you admit the others were fake? |
|
could be. i have the kidizoom twist myself |
|
@vtarchive show us your tool please (the thing you used to read the NAND), a photo of it with your VTech toy. |
You’ve gone from saying it is real to might be real. This really doesn’t inspire confidence. |
|
it's real, checked my kidizoom twist |
|
You haven’t actually explained how you connected the NAND Flash to a PC. If you make one more comment without giving a straight answer, I’m closing this. |
HxD, it's free and can dump NANDs of VTech toys with a USB port. useful if you dont plan to open the system. |
|
What USB endpoints does the VTech toy present itself as? If it’s USB Mass Storage class, what steps are you taking to ensure Windows doesn’t automatically modify the content? Has it been confirmed that this actually gives a raw view of the NAND Flash in the device? |
|
unmodified after dumping and still works, its confirmed that this actually gives a raw view. |
How did you confirm it gives a raw view? What steps did you take to ensure Windows will not modify the content? |
|
i've confirmed, the first step is opening the toy using HXD and save as a bin file but nothing is modified since that point |
|
That doesn’t confirm that Windows didn’t write to it as soon as it was connected. |
|
i've confirmed, but i saved as a different location from the camera and nothing has changed. |
|
Even in this conversation we've gone from "Used a tool" none of this really builds any trust, the communication keeps changing. Is this even a technique likely to dump the firmware, or just a user storage area, which isn't a dump of the system at all. It would seem a bit strange if the entire firmware was exposed over USB. |
|
It doesn't sound implausible to be able to open the system partition as raw data and then extract the firmware from that. |
|
maybe, although other devices I have that connect to the PCB aren't exposing their entire internal firmware that way. why the OP didn't just explain this in the first place, rather than making up some story about a tool I don't know though. I'm still treating with scepticism though due to the admission that previous stuff they've sent has been fake. |
|
i didn't expose the NAND, |
|
@cuavas The solution to all of this nonsense is to take the ROM file (and only the ROM file), ignore the PR and someone add it and test it or put it in the archives until such time that someone can add it/test it. In other words treat it like the other 50000 devices that were added to MAME in the past. |
NEW NOT_WORKING machine addition:
Kidizoom Twist (Netherlands, blue camera) (VTArchive)