After releasing 3k3y firmware v2.11 beta (with OFW 4.55 support) and losing interest in the ODE 'cat and mouse' game with Sony (OFW 4.60 and 4.65), I have spent the past few weeks researching and dumping raw data in an ongoing project to extract lv0.2 keys via bootldr. My dumps include data from most of the PS3 4k chipsets, this was *NOT* collected by sniffing a bus (or several) in a conventional way, so even if targeted key is embedded in silicon, as long as it is processed/executed internally by any kind of microcode I might be able to catch it. At this point I don't want to reveal how the data was obtained exactly, it is a method of my own design based on several known side channel attacks. The intention is to release the method eventually. Check the project forum topic for more info, and you are welcome to join what could be the most interesting PS3 project since the lv0 keys were leaked.

http://www.eurasia.nu/modules.php?na...ticle&sid=3331