Originally Posted by Disane
I guess this was answered a few times. I thought I might take my turn and answer this one my self.
Yes, you can run your own user land code and dumb the system memory on DEX. The only problem is that when you open it on your computer you won't be seeing any nice PPC/SPU code but a random set of characters with random spaces between them.
And YES, you are right this means there's something wrong with the dump, so you repeat the dump process but it yields the same mish-mash of bytes which don't make sense.
Now, you could actually suspect that the memory is probably encrypted and it can only be decrypted with the current system private keys. This also means that you can not reverse engineer any part of the newer firmwares.
Which brings us to your question, in order to find these tokens you would have to be able to reverse the whole system software. Which alone could take a while and use up lots of brain (man) power.
You can't dump the system memory.
Else it would be a catwalk to work around the system. At the moment it is just a big blackbox a very big one let's say 1000 square kilometers and we search with a little candle haha xD. The big guys aren't working anymore on this. They had flashlights xD