Well, when/if the keys get exposed, it's the end of KIRK. That means we can decrypt manually everything and reverse engineer any single piece of data from the PSP. Of course, this can help us analyzing and finding everything we want from it, but this could also be done before, to some extent, with a PSP, just like Darth stated.
What this will introduce is the ability to emulate the PSP's crypto functions, which can lead to loading encrypted EBOOT.BIN boot modules directly or even emulating modules on a LLE level.
I already have a bunch of patches I've worked on a long time ago for some of these purposes, and if the keys do get public, I don't see any problem on finally emulating this properly.
However, piracy is obviously a concern, but after this is exposed it will become quite simple for anyone to build a simple external application that mimics KIRK (and all you would have to do would be drag-and-drop encrypted files and get decrypted ones).
What this will introduce is the ability to emulate the PSP's crypto functions, which can lead to loading encrypted EBOOT.BIN boot modules directly or even emulating modules on a LLE level.
I already have a bunch of patches I've worked on a long time ago for some of these purposes, and if the keys do get public, I don't see any problem on finally emulating this properly.
However, piracy is obviously a concern, but after this is exposed it will become quite simple for anyone to build a simple external application that mimics KIRK (and all you would have to do would be drag-and-drop encrypted files and get decrypted ones).