No, not Take Two Interactive, but Warhawk.

Months ago, we were able to replace files on the PS3 HDD using the Warhawk Beta PKG, and some interesting network trickery, by hijacking the update procedure. Within the past week, we came across some more update files, these were interesting.

They were "fake SELF's". Basically SELF's, without the encryption. These are used (and runnable) on DEV boxes, but not on retail machines.

Whats so good you might wonder?

This gives many people a real first peek at PS3 executables, as this is the first without any encryption all over it. Sure, some people have been privileged to have seen and used Development compiled stuff, but nothing that was an actual game.

Now, this file has a ton of information. Aside from the fun strings, there are system calls to the hypervisor many have never seen before, information on how Warhawk communicates with its online server, information about filepaths in the PS3, and the actual code itself. Another tidbit, the file disappeared off the update servers yesterday. I wonder if someone realized their mistake.

I will leave you with the picture. Take note the highlighted string. Every PS3 executable that is run from HDD needs this string, its really important when it comes to making and encrypting a PKG. Namely, change that string, the whole package changes. Can anyone say part of the PKG encryption key?