ISO16.RAW is 37,376 bytes. 37,376/16 = 2336, which is the size of a mode 2xa form 1 sector without its sync, address, and mode fields.MoeFoh wrote:After taking a second look, I'm highly suspicious the method described in post #282 of creating a bootable cd ever worked (at least with tools in 2023 - maybe it worked with a specific version of NERO way back in 2000). ISO16.RAW size should be a multiple of 2352 - it is not. It's missing the 1st 16 bytes of header data at the start. One would expect a size of 16 * 2352 = 36,632 from ISO16.RAW.
Sync field is always the same, no point in storing it.
Since the disc is not finished, sector addresses are not known, so no point in storing it.
Mode is 0x02, to indicate a mode 2 xa sector, but that's the way it's authored to be anyway, so no point in storing.
So you're left with 2336 bytes per sector, which is exactly how sectors are stored in the data tracks of Dreamcast DiscJuggler and Nero images.
of course it worked.SMiTH wrote:So if the miltemp method never worked what does that even mean?
That was what the beta testers used to create the different color bleem beta disks.
In the archive there is one single IP.BIN and there's a 1BLEEM.BIN for every color. How is it not painfully obvious that the locking is done in the 1BLEEM.BIN?SMiTH wrote:Looking at the bleem rainbow books it appears only one ip.bin is used. <--
So then the different beta color ip.bin theory of locking to different color dreamcast consoles is bs.
LOL
Only other scenario is 1bleem.bin has data to lock to each console or its bs.
because there was never any reason to re-crack them?SMiTH wrote:Well it was said all were cracked and all were the same.
So, why 20 years after the fact no1 has shown any proof of this?
Just a leaked "blue" and we have gone with the story since 2003.
Its hard to believe no1 since the original cracked beta leak has cracked each color.
there are other retail Dreamcast games with protection that was only cracked once by the original group in the early 00s -- even when these games were repacked by others years later, they still used the same cracked bin from Echelon or whatever. Is that a conspiracy theory too?
It's just basic CD authoring that you don't understand. There's no conspiracy.SMiTH wrote:If you modify the batch to keep files it adds 2 temp files which are what i assume is split from the ip.bin?
Maybe view hex data from the split files and find the same hex in ip.bin then remove those sections creates the proper ip.bin?
Or maybe those 2 temp files have other data needed to create a proper nrg file? because it does merge data as well.
Idk? some1 should take the time to figure wtf all of this means lol
"BURNING THE AUDIO TRACK" has you burn the first session of the disc.
"CREATING THE DATA IMAGE" has you generate a data track named IMAGE.NRG. But this data track has an empty 16 sectors where IP.BIN is.
SPLIT.EXE rips the first 16*2336 bytes from IMAGE.NRG. It saves them as "TEMP" which is the "empty" IP.BIN stored as 2336 bytes per sector. This is junk, which is why it gets deleted. The remainder of IMAGE.NRG is stored as TEMP.2.
Then it combines ISO16.RAW (the real IP.BIN, again, stored as 2336 bytes per sector) with the TEMP.2. It stores it as BLEEM.NRG. This is your second session data image. TEMP, TEMP.2, and IMAGE.NRG are obviously deleted because they aren't needed and are just data from intermediate steps.
If you want a "proper IP.BIN" from the ISO16.RAW, then just understand that it's 2336 bytes per sector, mode 2xa form 1 sectors.
that means each sector is 8 bytes of subheader, 2048 bytes of actual data, 4 bytes of error detection, 276 bytes of error correction.
Open ISO16.RAW, skip 8 bytes, copy 2048 bytes into another file, skip 280 bytes. Do this 16 times.
You'll end up with 32,768 bytes and that's your IP.BIN.
If I were Rand, I would have bought 5 Dreamcasts, labelled them each a different color, copied the serial number out of the partition 0 in the read only portion of flashrom, encrypted 1 binary with each serial number as the decryption key to produce 5 different binaries, then wrote an IP.BIN that descrambles+decrypts the 1BLEEM.BIN in memory after the BIOS scramble-loads it, using the console's serial number as decryption key.
Simple to do and there you have a disc that only runs on one Dreamcast. No idea if that's what's really going on, but would be trivial to implement for someone who knows what they are doing.