Graf Chokolo Decrypts OtherOS.self, PS3 Service JIG Lv2diag.self
A few weeks back graf_chokoloannounced that he decrypted PS3 Firmware 3.50 and work on a free public PS3 Downgrader was underway, followed by a PSGroove Payload update to decrypt PKGs from PlayStation 3 PUP Files with today's update including the OtherOS.self and Lv2diag.self from a PS3 Service JIG decrypted!
To quote via xorloser's blog, linked above, on the PS3 appldr interface reversal progress:
graf_chokolo says: Guys, i know you are waiting for the USB Dongle Master Key from me :) I have got now 2 fat PS3 with HV 3.15 but unfortunately no SX28 development board yet to exploit it :)
But i was not idle and the last and this week i was working on reversing of self decryption. And now i'm able to decrypt SELFs and SPRXs on my exploited GameOS by using HV calls only and no GameOS functions at all :) I reversed the interface to appldr which decrypts SELFs on GameOS 3.41.
So you won't get bored until i get the USB Dongle Master Key, i will make my findings and my source code public very soon and you will be able to decrypt your favourite games and programs by yourself :-) Let the fun begin, guys :)
Here is a "small" teaser of decrypted Lv2diag.self from service JIG :)
Someone give this guy some glitch hardware for his 2 PS3 systems - BRING ON THE MASTER KEY!
Only then will the fun start... just imagine... upgrade & downgrade to ANY firmware you want & have plenty of fun with homebrew. You could just walk into a shop without worrying what firmware your PS3 will have
Hey, excuse me for this type of post, but if you want to say that this is decrypted and copy pasted official Sony code pastie there, I can't believe that they can do some mistakes in the word like "blu-ray" on string 398 in the hex file. There is "bul-ray" instead of "blu-ray".