Well, kinda pointless if you can install a CFW with the BR check removed? And well, you will be able to downgrade every existing PS3 (and install CFW as result), the way the PS3 is serviceable and secured theres no way a future firmware can ever stop that.
Or if you could just turn the game into a "PSN downloadable" then copy it to the HDD (using compromised keys).
There really is no easy way out for Sony, the hardware is fully compromised - actually more so than the PSP ever was (the pirates just dont have full grip on the firmware yet).
It will be a cat and mouse game with OFW updates and hacked CFW, if you think that time is on Sonys side then consider that games newer ship with brandnew OFWs, they all are atleast 2 months old to allow testing and production of the disc. Enough time to hack them for dedicated guys in their basement (on the PSP, once the first CFW was figured out it only took a couple days after the OFW to release).
The games released dont have unique disc-based checks, I would guess that this is the best option for disc releases. Add securom-like protection (with checks thorough the game)and atleast each game has to be cracked, giving it atleast a breather after release/each update
The service mode call is in the lv0,which is up datable,as I see .
there is minimal information about it,but the only one that I found sound like this:
metldr is the first loader in the system, and it's in ROM on the CPU die. It decrypts and executes lv0ldr, which is in flash. Watch http://www.youtube.com/watch?v=eVXfgg7otJw#t=11m37
for a complete description by experts.
Using the metldr private key, I can decrypt Sony's lv0ldr code, write my own based on that, re-encrypt and sign it with the metldr key and start up all the PS3 hardware however I like.
Sony might stop me burning a new lv0ldr with a future firmware update (by issuing a new firmware with the old key, saying not to accept firmware updates using the old key), but if they do I can still piggy back on the flash chip and write my signed lv0ldr to it it while the PS3 is switched off.
http://www.reddit.com/r/programming/comments/evl86/ps3_root_key_found/?limit=500
So,the lv0 decrypted with the metdlr key,and that hard wired in the cpu.
so,the update have to encrypt the lv0 with the compromised metdlr,but after that the console can decide what type of key it will accept for update (even in service mode)
So now software mod,later ASIC chip .
If you have more information about the lv0/lv1,and the service mode initialisation,then it is more than welcome.