Ok point to draw to attention
it says in the caption of the picture of the NAND flash that it contains the encrypted bootcode
Where the F*CK did they pull that from
anyone who has been snooping around would know that the bootcode and kernal are "burned" into the cpu along with all the keys and other important security info, not to mention that information is thrown around inside the cpu under a 4-way lockable cache (ie: to keep it away from prying eyes), and those of you who seem to think anything is hackable, it would be easier to break into the mint and steal a large sum of money then what it would be to crack open the cache when its locked, not to mention once its cracked then decrypting it,
next point they have a plee to infion (or how ever you spell it) for a TPM (Trusted Platform Module for those who dont know anything about Paladium or Trusted Computing its a 8bit secure processor that holds important keys and operates the security of Paladium or Trusted Computing). What use would anyone have in researching a TPM, i have done alot of research into it but i dont need one in my hands. Just the datasheets are fine. These TPM's are designed to be secure so the TPM is no entry point unless your some genious hacker who can get information out of devices which are made in such a way that they will never in a million years disclose there contents.
I cannot see the "Man-in-the-Middle" attack working either. Communication to the drive is handled by SATA, which is a Hi-Speed Communication port. The time it would take to A) decrypt the information,

figure out what the xbox360 needs to know, and C) re-encrypt it and send it to the console, dont you think the kernal would be processing a WTF command, to elaborate on that, decryption takes time unless we know the key that it is encrypted with. The encryption key is randomly generated every time you turn on the console so the device cant have it stored in memory because it changes. so when the conole starts a challenge/responce protocal communtication with the drive and the device decrypts reads sends the kernal most likely would of paniced.. it would be a WTF the dvd-drive should have replied by now it musnt be present (thus why i call it the WTF command)
on another note i hope that Devil360 team can produce something that works (even though they dont seem to know some of the basics [not talking about the last point that was in responce to people on this board] of how the consoles security is built). i have been activly experementing with ideas on how to compromise the security of the xbox360, anyone who has any information on Paladium or the Bootsrap and Kernal please P.M me as im always looking for new information and possible vulnerabilities that i may have overlooked, credit will be given where due if anything does come out of information that is shared
Thanks in Advance,
Littlestevie360