now i'm not too familiar with the cell phone roms and such but could we do something like we did with the xbox 360, where we would flash the roms or just completely do a hard erase on them? its prob a noob question but i thought it might be worth asking
While I'm just taking a gander at this, it would be akin to trying to flash the BIOS on a sophisticated computer, if the BIOS has a long, encrypted, password, protecting itself.
There would be only three main ways that I know of (and I'm no expert, so feel free to flame away).
1. Brute force -- Have a program run a crap load of password attempts at cracking it. Any solid modern encryption will make this nearly impossible, because of the length of time it would take to run all of the possible combines. Of course cycles and time will theoretically always beat this method, you might very well have a neurologically implanted phone by the time you break it, even if you're a cryptologist trained by the NSA, using supercomputers. Sure, it works fine for the average porn site, but that's because users use predictable passwords.
2. Crack the encryption method. This could be harder or not, than brute forcing the key, depending on how complex the encryption is, and if you can get leaked data to tip you off from internal sources. A leak would be key to getting access, and is also a reason why many PC games are cracked prior to 0-day (aside from major holes in the programming [see 3]). If Motorola had a change of heart, they could release this type of information, and make the phone accessible to devs whenever they decided to.
3. Find an exploit to bypass the whole system, before it takes control. This appears to be how ROMs were loaded onto another Motorola device that had a hole. On a PC, this would be similar to a root-kit, except embedded into the firmware, thus bypassing the BIOS protection altogether. Far beyond my knowledge, but certainly not beyond the realm of possibility. The W95.CIH virus exploited this type of method before CMOS' could be better protected, and some variants would literally wipe your CMOS on a specific payload date, requiring a battery pull and CMOS jumper clear, if not a complete motherboard replacement (I got infected by this one years ago; very nasty, though I was able to remove it by doing the above method).
Of course, literally gutting the hardware would be the best method in terms of success, but it's highly unlikely that a phone community is going to go through all of that. This is what we did on the old playstation, when we modded in a chip, and soldered it onto the circuit board itself, in order to play games that were burned to CDs.
So, option 3 is the best case scenario. The problem is that once a hole is discovered, it will likely be patched. So, in the case that you can bypass the initial firmware completely, you will need to always use that hole to bypass the system. If the firmware is updated in any way, you run the risk of losing the exploit. This is what seems to cause delays in new jailbreaks for the iPhone.
/TL-DR? Only time will tell how difficult it will be to crack the DX to the core, but it's possibly going to be very difficult, especially if you update the phone using official upgrades.