<Mathieulh> all the decryptions and checks are performed by the code running on the isolated spus
<ppcasm> Correct, and it has an encrypt in->encrypt out method, with blocked read/write to the spe 256kb local store ram.
<Mathieulh> so there are no keys in lv1 or lv0
<Mathieulh> this alone makes the ps3 security architecture in theory far stronger than the one of the 360
<ppcasm> yes, because the keyvault was able to be read
<Mathieulh> the problem is that the security design is incredibly good, it was done by IBM
<ppcasm> it wasnt blocked from read/write
<Mathieulh> but sony used this implementation like shit
<ffdsh0w> but xbox360 is hacked - thanks to dvdrom weakness
<ppcasm> ffdsh0w no
<Mathieulh> so they run buggy code
<ppcasm> thanks to hv syscall handler
<Mathieulh> on an uber secure architecture
<ppcasm> and open jtag
<Mathieulh> and that never leads to much good
<Mathieulh> for instance
<Mathieulh> just the fact that they didn't clear the ram
<Mathieulh> after lv1 was loaded
<ffdsh0w> what about same attack in ps3 world
<Mathieulh> was incredibly stupid
<Mathieulh> and led geohot or any other
<Mathieulh> to dump lv0
<Mathieulh> along with it
<Mathieulh> especially as both aren't loaded at the same addresses
<Mathieulh> that's just one exemple of some stupid shit sony did
<Mathieulh> also the lv1 is HUGE