Difference between revisions of "unsorted.7z"

From Rare Gaming Dump
Line 4: Line 4:
  
 
==Contents of the archive==
 
==Contents of the archive==
The archive contained dumps of the "bb" and "ng" development trees from [[Acer Cloud Technology|BroadOn]]'s servers, likely sent from [[Acer Cloud Technology|BroadOn]] to Nintendo. The "ng" tree, inside a TAR file named "depotrvl", contained a CVS repository with the source code for the Wii's [[IOS|input output system]], source code for Wii factory software, the source code for [[boot0]], [[boot1]], and [[boot2]], internal documents and PowerPoint presentations related to [[Acer Cloud Technology|BroadOn]] and Nintendo and the development of the Wii, and much more.
+
The archive contained dumps of the "bb" and "ng" development trees from [[Acer Cloud Technology|BroadOn]]'s servers, likely sent from [[Acer Cloud Technology|BroadOn]] to Nintendo. Here is a list of things that have been found in this data:
 +
 
 +
* Source code for [[boot0]], [[boot1]] and [[boot2]]
 +
* Source code for [[IOS]]
 +
* Source code for the [[DVD]] and [[EXI]] libraries from the [[Wii SDK]]
 +
* Block diagram/datasheets for every Wii system component & Verilog for AES/SHA
 +
* Documents from BroadOn describing feature planning and implementation, APIs, and documents relating to internal software
 +
* Documents from 2004-2006 describing plans for the implementation of the Wii
 +
* Miscellaneous Nintendo data, including an internal WPAD SDK from 2005 and a Wii Overview from RVL_SDK 1.0
 +
* Internal GameCube documents, including a physical disc layout
 +
* iQue related data, located in the "bb" tree, including various documents, tools, and huge CVS code repositories
 +
 
 +
People have claimed to have found partial Super Mario 64 source code inside the contents of the "bb" tree.
  
 
==sd_boot==
 
==sd_boot==
These leaked files led to the discovery of a software tool used in the [[Wii Factory Process]] called sd_boot. This contained a vulnerability, which was found by Fullmetal5 and could be used to install BootMii as boot2 on [[Bollywood]] Wii consoles with a patched boot1.
+
These leaked files also led to the discovery of a software tool used in the [[Wii Factory Process]] called sd_boot. This contained a vulnerability, which was found by Fullmetal5 and could be used to install BootMii as boot2 on [[Bollywood]] Wii consoles with a patched boot1.
  
 
{{DEFAULTSORT:unsorted.7z}}
 
{{DEFAULTSORT:unsorted.7z}}

Revision as of 22:20, 4 February 2021


unsorted.7z is the name of one of the leaked archives from the Zammis Clark Breach. It was leaked on May 2, 2020, on the 4chan board /ppg/. unsorted.7z was basically the first ever instance of a "gigaleak". It was the first of these leaks to gain widespread attention, including a video made about it by Modern Vintage Gamer, which gave it lots of attention, but also led to many misunderstandings, due to false claims made in the video.

Contents of the archive

The archive contained dumps of the "bb" and "ng" development trees from BroadOn's servers, likely sent from BroadOn to Nintendo. Here is a list of things that have been found in this data:

  • Source code for boot0, boot1 and boot2
  • Source code for IOS
  • Source code for the DVD and EXI libraries from the Wii SDK
  • Block diagram/datasheets for every Wii system component & Verilog for AES/SHA
  • Documents from BroadOn describing feature planning and implementation, APIs, and documents relating to internal software
  • Documents from 2004-2006 describing plans for the implementation of the Wii
  • Miscellaneous Nintendo data, including an internal WPAD SDK from 2005 and a Wii Overview from RVL_SDK 1.0
  • Internal GameCube documents, including a physical disc layout
  • iQue related data, located in the "bb" tree, including various documents, tools, and huge CVS code repositories

People have claimed to have found partial Super Mario 64 source code inside the contents of the "bb" tree.

sd_boot

These leaked files also led to the discovery of a software tool used in the Wii Factory Process called sd_boot. This contained a vulnerability, which was found by Fullmetal5 and could be used to install BootMii as boot2 on Bollywood Wii consoles with a patched boot1.