How to decode indeni recording logs

Here’s what the wiki says:

“When you are recording device input using the collector the data is compressed and encrypted. There is a tool to “open” the reading. You can also use the command runner to re-code the device input which will be save as a plain text.”

Can we get this tool? Or, can someone explain the actual steps to use command-runner to “re-code” the device input?

Having asked around a bit, I think the consensus is that, whether or not this is possible, probably isn’t something that IKEs should be doing at this point, since it potentially gives public access to private customer data.

I’ll update the wiki. Moving on.