Do even more skill-sharpening with three new entries to the new Infobomb series on the Cell/B.E. Security SDK 3.0:
The introduction tells you what the Cell/B.E. Security SDK 3.0 does, how it does it, and whether you should use it, including the two available versions, the emulated isolation mode, and how keys and storage are handled.
The overview acquaints you with the four SDK components and how they work together, secure memory mapping and the SPE Secure Loader, return error codes, and which tools you can use in the emulated isolation mode (and any special instructions on using them).
NEW | The key hierarchy overview introduces the Security SDK 3.0 key hierarchy, detail key naming conventions, and provides an first quick look at the application trust chain, the application encryption chain, and the application visible keys.
NEW | The details on the application trust chain provides a diagram of the trust chain; details on the three major components of the chain; information on the roles root, Certificate Authorities, and application developers play; a summary of keys and functions; and how to use the Application Authentication Keys.
NEW | The details on the application encryption chain explains the ways the application can be encrypted at build time, the ways it can be decrypted at execution time, and provides a list of en-/decrypt keys and their functions.
And if these skill-builders intrigue you, you don't have to wait for the rest of the series -- you can get it all, right now, in the original documentation.