Hm...
I have deciphered the Samsung SNE-60/60K firmware format.
It consists of a header, followed by an XOR encrypted U-Boot uImage, followed by an XOR encrypted squashfs file system.
There are two XOR keys in the header. One is used for the uImage and the other is used to decrypt the filesystem.
I have also written a program for Windows .NET which will extract the two sections and decrypt them. It will also compute the firmware file's CRC and validate it against the CRC stored in the firmware header.
The program can be downloaded
here.
To use it, just run the program then drag and drop a firmware update .bin file onto the window.
A screenshot of operation:
I hope this will allow people to start hacking away at the linux base OS and software that this thing runs.
I can provide source code as well, but need a little bit of time for some clean up and basic code commenting.
pb