I was backing up my dad's SHSH for his 3G ipod touch. I thought I would back it up a couple times just to be safe. I looked at the MD5 for each file, and they're different. The files must obviously be slightly different somehow. Is this just a date or time stamp somewhere in it, so the whole MD5 reads differently? They do have different file names (being in the same folder) but I didn't think this would affect the MD5. Could we retrieve the SHSH for one device like 5000 times and somehow use this to crack the SHSH signing method? I can think of cracking other things on the computer, and you have to get the same thing, encrypted thousands of times, to actually decipher how it's being encrypted. What do you guys (and -lkv-, lol) think?