He also plans to dump the PS3 Service Jig's master key soon. He has recently received two fat 3.15 firmware PS3's to do the job. The hold up now, is the fact that he needs a development board, so he can perform the classic geohot exploit. Once performed he will ultimately uncover the PS3 Service Jig's master key.
While waiting for the hardware, he has been very busy on another project, that devs will find very handy. He has announced his work on a self decrypter which he will be releasing to the public very soon. This is most likely the tool he used to decrypt lv2diag.self.
Teaser Sample of Lv2diag.self Decryption: http://pastie.org/1333833
November 30, 2010 at 9:54 am
Here is a “small” teaser of decrypted Lv2diag.self from service JIG :-)
November 30, 2010 at 9:22 am
Guys, i know you are waiting for the USB Dongle Master Key from me :-) I have got now 2 fat PS3 with HV 3.15 but unfortunately no SX28 development board yet to exploit it :-)
But i was not idle and the last and this week i was working on reversing of self decryption. And now i’m able to decrypt SELFs and SPRXs on my exploited GameOS by using HV calls only and no GameOS functions at all :-) I reversed the interface to appldr which decrypts SELFs on GameOS 3.41.
So you wont’ get bored until i get the USB Dongle Master Key, i will make my findings and my source code public very soon and you will be able to decrypt your favourite games and programs by yourself :-) Let the fun begin, guys :-)