To quote: This release is a tool that will decrypt (and then also re-encrypt) the SIG files that were leaked in the CEX-DEX packages earlier this year and also the files released by an0nymous a month or so ago. The SIG files have not gotten a lot of attention, maybe because no one could read them. However, that's about to change.
Why should you care about this release?
Because the SIG files are a list of instructions for the objective suites application to interface to the lv2diag.self files that were leaked with the previous Objective Suites stuff. Very low level stuff, for the most part, that will actually let you modify settings in the PS3 firmware.
157w ago - A few days back graf_chokoloreleased a PS3 SELF Decrypter PSGroove payload, and today Heden of DeLiGhT has released at PSGroove (linked above) a PlayStation 3 SELF / SPRX Decrypter application followed by an update below.
To quote: Unlike graf_chokolo's method, DeLiGhT's application does not require a special payload to decrypt.
Simply place the SELF/SPRX you want decrypted into /dev_hdd0/game/DCRY00001/USRDIR/SOURCE/ Then run the SELF/SPRX DECRYPTER from the XMB, and finally retrieve the decrypted files from /dev_hdd0/game/DCRY00001/USRDIR/DESTINATION/
From the ReadMe File: SELF/SPRX DECRYPTER - V0.5 BETA
12/04/10 - V0.5B - Initial BETA Release
- Decrypting internal PS3's SELF/SPRX files
[BETA - The decrypter hangs on some files]
GameOS utilizes files to make the console work (I won't give details) These files (SELF = EXE, SPRX = DLL) are stored in /dev_flash. This tool enables to decrypt...