Weird, I'm having error 202 but I decrypted the save with Python. It can read the encrypted file but not the decrypted one....
I'm using --yw2 because I have the US version 1.x, it should work
edit: nvm next time i'll read better :glare:
Actually you have done pretty much nothing. It's like downloading Ida pro and thinking you can hack everything because you have the right tool. But hey if you know what you're doing, as you say... good luck
I'm surprised there are no bug bounty applications for their web services... I found a xss vulnerability on a nintendo domain a while ago, and I know some companies like Google rewards you for these kind of vulnerabilities, but unfortunatly, nintendo don't.
Lol I just told that yes, he gave same files to some people, and different to others. Why ? I don't know, but he seems capable of generating seeds... How ? No idea
This has been proven false, yes he gave some shared seeds to some people as a temporary fix so they can play online meanwhile, but he also gave unique and private ones. Just saying...
Yes, until the deviceID is properly randomized. It's really easy for Nintendo right now to tell whos using the payload and then ban their mac adress or stuff like that