The UDE exploit is different from other dashboard exploits in that is doesn't actually use the xboxdash.xbe to gain control over the xbox, and the MS dashboard is not nessecarely reached on boot like with the Mech fonts. The UDE exploit uses the update.xbe. So on boot update.xbe is loaded (since this is renamed to xboxdash.xbe). This looks for *.xtf fonts. Finds Bert-ate-Ernie. The exploit trickers -> patches the kernel in memory to use the habibi key and loads a habibi signed xbe.
This can be Evox or PBL depending on what you choose in the installer.
Loading Evox directly we still run the retail BIOS, only the key has been replaced with the habibi key. So if we wanted to run MS dash from Evox we would have to hexedit the MS dash to look for the original fonts and sign it with the habibi key. xbedump doesn't seem to want to sign the MS dash
![smile.gif](http://forums.xboxscene.org/html/emoticons/smile.gif)
so this is not possible in this setup.
If we run PBL from the UDE exploit we load a hacked bios that has the signature check disabled entirely. Therefore from PBL any unsigned xbe can be run. The replacement BIOS has a default dashboard it will load. In your case Evox. From Evox we can run the hexed MS dash since signature checks have been disabled.
Hope I answered some of your questions
![smile.gif](http://forums.xboxscene.org/html/emoticons/smile.gif)