Note that the .ipa file you can just re-name to .zip and then you can unzip it as a normal zip file. This extracts to Payload/Quicksilver-TiVo.app with a whole lot of files under that, including many png image files. Interestingly there is a "tivo.cer" SSL certificate file there which can be converted to PEM format (using openssl) and used with wireshark to decrypt SSL communications. I do have a hub and wireshark setup, however I'm missing the key piece to the puzzle - the iPad. I used "grep" and various other utilities to look through the .ipa set of files but didn't find any interesting http/https/telnet looking entries.