The whole point I'm trying to make is that this kernel exploit, assuming it has not already been patched, will work on latest firmware. The only way that this exploit won't work on 3.0.1+ is if nintendo patched it at the same time as smhax. If I'm misinterpreting your claims please correct me, but this is what I can respond to what you say right now ^^;
The convo you quoted just says what is factually true: kexploit is an advanced and better alternative of smhax. It does everything smhax does but better because its not as limited as smhax is (which doesn't have arb rw privileges, for example).
The question is if the kexploit was or wasn't for <3.0.0, and that isn't in any capacity answered by the conversation. Actually, if anything, its answered that it isn't on new firmware because a kexploit on current firmware wouldn't need to decrypt then patch a game to run, since it has access to all current decryption in theory (though not necessarily in practice yet) through controlling the kernel. Much as how the <3.0.0 switches already had access to fully decrypted <3.0.0 software.
As I said, if it was a current firmware exploit, I'd be surprised if everyone was completely mum on "do not update" when 4.0.0 hit because they'd have had no knowledge of what was patched in 4.0.0. Warnings to not go past 3.0.0 were loud and clear long before smhax came to public fruition, the reason was because they had no idea what would or would not be patched and, much to the chagrin of many, 3.0.1 closed the hole.
--------------------- MERGED ---------------------------
Actually kernel exploit doesn't guarantee you'll get keys. Clearly you don't know about exploits if you think a mere kernel exploit guarantees we get the keys. You'll more likely need trustzone without a bug like smhax.
Plus no devs have officially confirmed they do or don't have kernel 3.0.0+ nor keys. And we likely won't hear anything about that until whatever vulnerability they used got patched (if it is true)
I think he means the software decryption bypassing which in theory is "having the keys" just that you are never handling them, and just letting the Switch handle it and then intercept the packet/data and then dump it in its decrypted state. At which point, you don't need the keys. Just let the Switch do it for you.