Yeah, you get public keys/curve type from hex (of appldr.elf), you get initialization vector & encrypted round key from an Interactive Disassembler using a PS3 CELL SPU analyzer module and various .idc scripts to bypass Advanced Encryption Standard (AES) on the appldr.elf (decrypted via chain of trust/LV0 keys). These keys (public, curve, erk, riv) will decrypt eboot, from eboot.elf you get klicensee key via IDA as well going to call functions NP values and looking at their parameter for decrypting sprx/self files. So get to work!
Originally Posted by Brishon
Because unSANE is former N0DRM.
Originally Posted by nadheeh
PS3 Slim 4.21.2 Rebug REX 4.31 Spoof (external 1TB/3TB), PS2 Fat w/ Internal HD