Results 1 to 4 of 4
  1.    #1  
    I recently had a problem and the people at palm had me type in a code in the phone app (didn't write down the code) and then create a support log and send it to them. Not sure what data was included in the support log, I sent it to myself first. In the tar file were two files:

    secretkey.ssl

    and

    20100826_144135.blowfish

    The first is obviously the encryption key for the second, but does anyone know how I can decrypt and view the contents of the .blowfish file?

    EDIT: THE CODE WAS: ##8011183#

    Thanks.

    P.S. I will be posting about the problem I contacted them about shortly. Hint: It involves being able to defraud people using the app catalog and loophole in the system. I will provide a step-by-step account of exactly how you too can swindle people out of their money with no repercussions from Palm.
    Last edited by ihatethisregistration; 08/26/2010 at 06:31 PM.
  2.    #2  
    No one has any ideas/advice?
  3. #3  
    you can't. the key to decrypt them is private to Palm's support and engineering.
  4.    #4  
    Now that you mention it, that does make sense. Thanks for the reply.

Posting Permissions