1/billion??? serious thats the whole fuss??
anyway, I just use the 3.s FW because the save files from 3.2 are not compatible with 3.3
Really? 3.3 savefiles arent compatible with 3.2 and viceversa?
1/billion??? serious thats the whole fuss??
anyway, I just use the 3.s FW because the save files from 3.2 are not compatible with 3.3
1/billion??? serious thats the whole fuss??
anyway, I just use the 3.s FW because the save files from 3.2 are not compatible with 3.3
You are all missing the point, it's not the launcher.dat file itself that is checked, but parts loaded from it. For instance the main bricking code will check the hash of the ARM9 payload in memory, which on its own can be corrupted even though the SD card is not. (You are loading this through an exploit, itself loading through a large ROP chain, that's hardly what one could call a safe and fully controlled environment)
Why do you think even gateway 2.0b2 won't load 100% of the time?
Don´t blame GW team, they are protecting their work, blame other clones who doesn´t test "their" firms and only wants easy money...
They will not save you
Sure, but none of those would send the message that "clone cards are dangerous", which I assume was Gateway's intent.but, a bad sd card, corrupted file download, fuck, even buggy code will cause this to trigger on a real GW card. Bricking the console is never a good idea. it would be better to do some of the stuff listed below.
Sure, but none of those would send the message that "clone cards are dangerous", which I assume was Gateway's intent.
Quoted because some people cant read or understand...
You are all missing the point, it's not the launcher.dat file itself that is checked, but parts loaded from it. For instance the main bricking code will check the hash of the ARM9 payload in memory, which on its own can be corrupted even though the SD card is not. (You are loading this through an exploit, itself loading through a large ROP chain, that's hardly what one could call a safe and fully controlled environment)
Why do you think even gateway 2.0b2 won't load 100% of the time?
Sure, but none of those would send the message that "clone cards are dangerous", which I assume was Gateway's intent.
So its ok to potentially brick their own users just to send a msg to the clones? Guess its the same for gw and clones. Money above everything else huh?
thank you all these ppl are fucken nutsThe fear mongering in this thread with no proof
Every second the "evidence" - that should be trivial to share - is withheld, strengthens my suspicion that this is a clever ploy from MT card team, which would then necessarily contain several well known members of these forums. We know from earlier occurrences that some of them, while skilled technically, aren't too bright (photographing and sharing on flickr evidence of facilitation of piracy) when it comes to keeping their illegal activities a secret.
Don´t blame GW team, they are protecting their work, blame other clones who doesn´t test "their" firms and only wants easy money...
They will not save you
Mechanical card reader glitch during the loading of ARM9 payload? Dunno, just an idea....
Does anyone with the actual ability have the time to speculate on possible ways that the ROP chain could load to the point it is functional and the user has no idea but still fails the hash and runs the risk of bricking.
...
For Mathieulh, people have clearly missed the point here that it is extremely unlikely that the rop chain is going to get randomly corrupted (at an SD level) and still function. The question is how stable is the payload? We know that the prior Gateway version wasn't particularly stable (it crashed in the past though at an early stage, which should have been safe) but the new one hasn't caused any obvious issues and I suspect it was introduced in this beta due to the perceived stability of the payload from the gateway team. That being said I don't have the ability to do memory dumps and try and evaluate whether the Payload is stable or what the odds are of it randomly loading to the point that it is still corrupted but functional enough for the exploit to work?
I get the feeling that it is extremely low and the Gateway team have spent a long time working on this hence the delay in the final 2.0. Does anyone with the actual ability have the time to speculate on possible ways that the ROP chain could load to the point it is functional and the user has no idea but still fails the hash and runs the risk of bricking.
I have to say I hope that in the next version the Gateway team make the anti-clone check a bit more advanced (although I am making assumptions they haven't put in or considered certain safety checks that would make the odds of a legit gateway payload bricking, like winning the lottery).