Following his last update, PlayStation 4 developer ZiL0G80 tweeted today alerting other developers that SAMU which handles PS4 encryption is documented a little bit in GnbSmuInitLibV7.c of the coreboot GIT. 
Recently in the PSXHAX Shoutbox @Fimo noted as well that SAMU is called in the early boot process, and can be seen in GfxSamuInitKB.c on the coreboot GIT.
@Fimo further speculates that if PlayStation 4 exploiters including Chaitin Tech have not hacked SAMU this may explain why despite PS4 1.76 OFW being exploited over 6 months ago there is no iSOLoader to mount a disk for 1.76 and only unsigned code can be ran on jailbroken PS4 consoles.
If any rogue PlayStation 4 developers or hackers out there are able to share a bit more on SAMU encryption or reverse-engineering feel free to reply in the comments below, drop us an email or send us a DM on Twitter and thanks!
serials for AMD tools:
Recently in the PSXHAX Shoutbox @Fimo noted as well that SAMU is called in the early boot process, and can be seen in GfxSamuInitKB.c on the coreboot GIT.
@Fimo further speculates that if PlayStation 4 exploiters including Chaitin Tech have not hacked SAMU this may explain why despite PS4 1.76 OFW being exploited over 6 months ago there is no iSOLoader to mount a disk for 1.76 and only unsigned code can be ran on jailbroken PS4 consoles.
If any rogue PlayStation 4 developers or hackers out there are able to share a bit more on SAMU encryption or reverse-engineering feel free to reply in the comments below, drop us an email or send us a DM on Twitter and thanks!
serials for AMD tools:
Code:
20FBC6A1-4F25-476F-9C52-97A9220DAC27 BIOS SUITE
SD3T-W1R7-FEC2-4GQ9-8V04-25UY-BM90-0A0L HDT