isn't the whole hack "LOLZ THE PRIVATE KEY DOESN'T USE ANY RANDOM NUMBER SO WE REVERSE ENGINERED IT!"
i don't have any idea what you need to do to reverse engineering a private key but i seems to understand any monkey could have figured the "doesn't use a random number" part
hehe yeah
all the monkey had to do was
* get a jailbroken PS3
* HW hack it enough to be able to dump the memory in realtime to figure out the boot process
* write a bootloader which replaces GameOS and supports external scripting from a PC
* write a script for the PPE which asks the secure SPE to decrypt something
* dump this process and reverse engineer the instructions to reveal the command that copies the encrypted file into restricted SPE memspace for decryption
* use this command to buffer overflow the secure memspace to reveal the plaintext SELF for the loader and its AES keys
* look at the SELF and understand its components
* look at the hashed signature in the header, and have enough crypto knowledge to know that it is an ECDSA signature
* compare this signature with a signature for another file and realise that the R in these sigs are constant
* calculate k
private key get!