I would hold my horses until this exploit is more mature. But for a future release a pathcher would be nice. Seems that many people are concerned about this hexing of Bert. Remember this hexing is only needed for tuning Bert for different prelive dash versions - the exploit is still in a development phase! The are only a limited number of prelive dashes, and once the optimal address and value dwords (0x40,0x44) have been found for each dash one could distribute this exploit with a number of berts for each prelive dash - Bert is small! Or make a small "Bert generator" that pathes the two dwords for your specific dash. This is the reason Rmenhal encouraged us to post the two dwords for each dash version as we find them.
With respect to hosting a future package. Xbins could host this package without the prelive dash, and with a Bert generator, this would be noob-friendly. I'm quite sure a package with a dash could be hosted elsewhere. Slayers is being downloaded frequently!
IMHO this would be the best hack availabe if the final issues are resolved. The audio hack is great yes. But lets face it. The reason the font hack is still popular is that people are lazy and dont like typing the button-combo. This hack would have the safety of the audio hack, but the ease of use of the font hack. And using this with live (even the dashboard live functions) should not be more difficult than using a font/audio switcher now. Simply have Evox, or another dash, rename some fonts like you do with present audio/font switchers but
also rename/replace xonlinedash.xbe
Finally, Rmenhal has done/is doing an amazing job. He succeeded where many others have failed. But it's not black magic. He didn't stumble upon some magic way of hexing bert and the hexing is not random, afon :-). He rewrote the fonts to suit this new setup, something that requires an understanding of the font hack and knowledge of assembler, but the techniques are the same as in the original font hack. To my understanding Bert makes a buffer overflow and utilizes this to overwrite the SEH (Structured Exception Handler) address with a pointer to the memory space where ernie is loaded. When an exception is made due to the messed up memory (made by berts overflow) the "landingzone" of Ernie catches this and performs a series of jumbs until the actual exploit code of ernie is reached, which patch in the public key and launches an xbe. The bytes in Bert that needs tuning for each dash, set up the address and pointer to the SEH. Someone with a deeper understanding of this please expand on this if needed... (I'm still learning

)
digisatman (an others). For an understanding of the basic concepts of this exploit did you read the first post on this thread?