No. Is not that method. Just use your mind, I already said "I will create a Proof of this concept fro your own vita". So, what comes to your mind with that said? PM me for more details.Is it, by any chance, the PKG spoofing method? (The one where you replace a PKG you are downloading with your own PKG through a proxy)