within the controller (an 8 pin security chip with XBOX written in it) which replies challenges from the XBOX360 kernel and if the kernel does not like the answers the device is denied connection.
Thanks xboxbreaker, d4m4n, neonpolaris, peshkohacka
, and l_oliveira for your useful answers!
That's why I asked HERE and NOW. Here, because this forum is full of awesome and talented hackers who know what they're doing. Now, because now reversing the kernel is not an impossible task, thanks to the JTAG/RGH exploits.
My question for kernel reversing guys (i.e. c0z and others) who are really familiar with kernel as if it is their town!, is it possible to know what does this security chip do without reversing the chip itself, I mean if we can reverse the kernel, can't we know what is expected from that chip and how it works, to use MC instead of that chip?