So forgive me if this is a stupid question, but does this have any bearing on being able to decrypt the 3DS roms? Not to play them, but to inspect the file structure as, if I'm correct in my reading of this thread, you now could with the decrypted firmware?
I'm also curious about it.
I think the firmware was dump encrypted as a .bin file, then decrypted with ctrtool using the keys found in it by analyzing the RAM. (stop me if I'm wrong).
To decrypt a cartridge content, I guess it would need either:
- Read it's content directly on the consoles (RAM reading). But it would required a full read, there's no way we can command the console to read the game data like a dump tool. we see only the files while they are accessed while playing.
- Decrypt the dumped ROMs. The key should be in the firmware (not in the ROM itself, it would be to easy to hack).
If it's on the firmware, there are a lot of chance that they can be decrypted now that they can check the firmware content.
The more possible hack with only the common key (decryption) is emulation, like said on previous post.
But it still require a lot of analyzing process to see how arm 9 and 11, and the hardware are working.