Can someone quickly explain whether the reversing of this code in IDA leads to the decryption of the imposed DRM or the actual understanding of how TB Team are actually modifying 3.56+ titles to work on lower firmwares?
There has been plenty of speculation from many people, from the actual retrieval of new keys to the capturing of decrypted eboots on the fly. Obviously we need to understand how they are doing this, before they re-sign and implement their DRM, then we could 'amend' 3.56+ titles to suit ourselves. I find it odd that KDS is talking about not releasing any info. on this (if found it could hurt small developers...). What is TeamACID working towards if not this?
I own one of these, along with all available hardware hacks for the consoles out there, and i genuinely hope this thing gets ripped apart. But 'free' cloning of the device wont help us, understanding how they are decrypting the eboots will surely?