Originally posted by xxmcvapourxx
1: SAMU <-- unable to decrypt on 1.76 via software need to find exploit for it best way Unsigned.
2: after 1.76 all keys got changed so it's even more difficult to get them.
3: spend 10-30k on decapping the chips get the keys and behold you will have your keys inc private keys
if your wondering why if you have got 1.76 the kernel is not fully dumped it's only 15mb it should be around 40-50mb and it's only functions and symbols, you still have a long way to get anything.
A couple of things;
The elf size of the kernel dump is full 0xEAC180 bytes ( just over 15mb ).
There are people who have decrypted eboots etc using samu commands.
And to answer OP's question.
Firmware spoofing is already possible, by patching a value sysctl returns.
There is a lot that's currently possible, just requires work.
If your just waiting for CFW, you may be waiting awhile. as there is plenty more useful things for developers to look into for the time being.
Now is a good time to spend doing your own research, on things like FreeBSD, Objective C, x86-64 the 1.76 kernel or other dumps.