Okay, to the best of my knowledge
@ZachyCatGames or @SciresM(if you're around), please correct me if I'm wrong
1) Fusee-Gelee (exploit used to get into RCM) doesn't just affect the switch, rather everything that uses the x1 processor, thus nvidia and nintendo were told so they would be to fix it in future versions and the exploit would be made public on june 15
2) Nintendo upon been told implemented the changed to what we call Ipatched switches which won't boot the payload
3) Nintendo found out we were getting the keys from the x1 chip improved their security with the 6.2 firmware update moving the keygen process to the TSEC/falcon processor.
4) The devs came up with the smmu exploit to get the keys
5) Nintendo shortly after released 7.0 which countered the smmu tsec exploit (burned exploit) This won't be released due to the fact it is like rcm and effects a whole lotta devices
5.5) Scires found a way to get keys to sign a tsec payload,(make it official) which would be sept
6) Rei and Scires agreed to use sept, an encrypted payload used to generate the keys, keeping the actual exploit used to generate them hidden
7) Atmosphere, then hekate and the other day, reinx released updates to support 7.x firmware.
I think this was the basic process of events, the fact the new way of getting the keys is hidden.
If TX were to use a different exploit to get the keys to boot without sept, it would burn that exploit meaning a new way would need to be found if sept got burnt