They might contribute a little, when the source code to SNShax is released. (They won't release the source for memchunkhax2, because of it not being patched yet)
lol derekk just explained exactly how it works so it WILL get patched
They might contribute a little, when the source code to SNShax is released. (They won't release the source for memchunkhax2, because of it not being patched yet)
My bad. >_<lol derekk just explained exactly how it works so it WILL get patched
They will just have downgrading first, and for 10.1 and lower.You lucky n3ds users...
that's exactly what I did. get any brand new 2DS except Yo-Kai Watch bundles. my MK7 bundle came with 6.0.0-12U.Better buy a brand new 2DS, most, if not all of the old bundle ones are under firmware 9.2
Same. Cant wait to downgrade! <3I have a N3DS on 10.1. And I'm not joking!
if I'm reading it correctly, "memchunkhax2" will allow for downgrading the system as well.I shouldn't have updated my n3DS to 10.3. But mah eShop.
Well, better dust off that "patience".
Yes it will, but it'll come later than snshax.if I'm reading it correctly, "memchunkhax2" will allow for downgrading the system as well.
Yes, indeed.if I'm reading it correctly, "memchunkhax2" will allow for downgrading the system as well.
1. Yes, because the vulnerability is in the ARM9 kernel.Questions:
1. Since ntrcardhax is hardware based exploit, can it be patched?
2. What can we do after we calculate AES key of the console?
2. What can we do after we calculate AES key of the console?
Same here! That's what I'm worried about the most. I don't want to ruin my O3DS by downgrading.So i can safely buy the cheapest n3ds i find on the internet. Im waiting for this, I hope there's no bricking issue when you downgrade.
If you're not voluntarily stupid it should be fine.
Bootrom isn't messed with, firmware0 has a hax payload put into it, since it fails the hash check firmware1 is put into memory and, since its smaller, the hax payload stays in memory and is (hopefully) executed... Also one of the keys in NAND is replaced so firm0 and 1 decrypt to garbage
- arm9loaderhax is a way to inject a payload directly into a N3DS bootrom (just after the the firm boot). This is like a CFW coldboot N3DS-only.
Only the N3DS can do it, because only the N3DS has that arm9loader modification.Also one of the keys in NAND is replaced so firm0 and 1 decrypt to garbage