The problem here is three-fold (at least).
First of all you need a tool that can read and dump the eeprom on a v1.6 xbox. This has new hardware (new mobo), so this probably needs some changes in the software that is suppose to access the eeprom. In the xbox_tool case the i2c-bus drivers probably need updating. I'm sure the xbox-linux team will do this in a future release of the xbox-kernel. I think Gentoox was recently run on a 1.6 for the first time.
Second, the eeprom could be encrypted differently. I doubt it. So I would think xbox_tool (in my updated version) would be able to decrypt the eeprom. If it doesn't it might only be minor changes that would be needed. And EthanHunt_IMF, this linux tool doesn't use the eeprom key. It's able to decrypt the eeprom without any keys using the "Friday 13th attack" hack.
Thirdly, the eeprom layout could be changed. Also that should mean minor changes in present tools. And it's not only the HD key that needs extraction, it's also the "Confounder" entry that goes into the HDD password generation (along with the HDD model and serial number).
So, can any tool presently even dump the eeprom to a file? If so, does it look reasonable
