After the lv0 keys in the wild, we can extract and decrypt loaders.
Now, we need to see in appldr or lv2_kernel for others keys.
I'm working to reverse the appldr and if someone with skill can help and share his work, I'm here.
For now, I've seen that there is only two functions that look at the key table.
And the key table is repeated twice in the appldr.
Someone that is doing the same here?