I just spent $30 for a Teensy++2.0 and games will cost $5 max to rent. 1 game and I've saved $25. every one after that I save $55. What are these tightasses gonna do when they have to buy a 1/1.5/2 TB hard drive to save all these "free" games on?
It would seem like backup manager itself decrypts the eboot.bin as the file is dumped to the drive since playing an OLD Other OS dumped ISO doesn't work meaning it's not decrypting on the fly. Can't someone just reverse engineer the backup manager decrypt part of the code?
lv2: Sends the encrypted eboot.bin to a PPU
PPU: does basic initialization
PPU: requests SPU to start up in isolation mode
SPU: decrypts lv0 and puts in somewhere PPU can access it
PPU: waits for SPU to finish decrypting lv0
PPU: executes decrypted lv0 code
PPU: lv0 sends message to still running metldr SPU to decrypt lv1
SPU: decrypts lv1 and puts in somewhere PPU can access it
PPU: waits for SPU to finish decrypting lv1
PPU: executes decrypted lv1 code
PPU: lv1 sends message to still running metldr SPU to decrypt lv2
SPU: decrypts lv2 and puts in somewhere PPU can access it
PPU: waits for SPU to finish decrypting lv2
PPU: executes decrypted lv2 code
So, in reality, backup manager isn't doing any decryption, but rather grabbing the already decrypted eboot.bin from somewhere on memory/hdd.
to decrypt (or encrypt) i believe that you would need to know the hardware root keys, which is something that no one knows and probably will never know.