Anyway, lets really discuss something PS3 instead of my PC <img src='http://www.logic-sunrise.com/forums/public/style_emoticons/<#EMO_DIR#>/nem-laughing.gif' class='bbc_emoticon' alt='XD' />, lets start with Lv0, the most unknown level of the PS3. Lv0 initializes PS3 base hardware such as PowerPC/PPU portion of Cell/BE, SPU isolation for asecure_loader, and gelic ethernet/WLAN device. Lv0 also proudly proclaims itself as the Cell OS Bootloader. In older firmwares, 0.80-ish to 3.56, Lv0 initialized SPU isolation on one of the SPUs, then it loaded and decrypted asecure_loader. Asecure_loader or metldr then decrypts the isolated loader, in this case, lv1ldr, then lv1ldr decrypts lv1.self. In 3.60 this changed. Lv0 now has all of the loaders integrated into it as one large fat binary. All the keys one needs such as Public ECDSA key/AES CBC key and Initialization Vector and ECDSA curve type are in there. Just go ahead and grab them if you can get the ldrs out of the binary.
So, unless you can decrypt Lv0, no 3.60 CFW for you <img src='http://www.logic-sunrise.com/forums/public/style_emoticons/<#EMO_DIR#>/tongue.gif' class='bbc_emoticon' alt=':P' /> . Is there any need for it anyway?
Lv0 also does some more interesting stuff such as SPU mailbox handling, and eEID integrity checks. Lv0 also used to check for QA flag and proper token, that is now in a spu isolated self in Core OS. Now, if you did tamper with eEID, lv0 will panic out, and your console will then YLOD, and youd need a flasher for your PS3 to recover
Interessant tout ceci
ca aide à mieux comprendre la complexité du OFW 3.60 + QA-Flag: En fait, Sony a carrément ramené tout le process de boot des sécurités générales au niveau LV0 (Premier Boot de la console, comme sous Dos ^^). Ce qui coupe l'herbe sous les pieds des Eboots/Param.sfo... ==> Faudra aller les chercher les clés car elles sont juste cachées qque part dans le LV0! Chaud devant chaud ^^