I'm totally innocent and bewildered how you seriously clever guys that are into 'hacking scenes' do it. It's a mystery and dark art I could never wrap my ageing brain around.
But I had a thought and it's in all probability a completely stupid one and ludicrous to the educated. But I'll put it up for flaming anyway.
The 3DS ROM's are encrypted and digitally signed...okay I'm already at the end of my microcosmic knowledge. So how do people/hackers plug away at breaking the encryption ?
Is it the same idea as running algorithmic programmes and hoping to eventually hit on a character or number or whatever it is that's alien to me ?
And now for my silly (sillier) question....
You know how there's all these kinds of Distributed Computing Projects like say...Folding @ Home and Seti @ Home, would it even be possible for some coder to write such a thing to bash away at cracking the encryption of ROM's. Would it even be legal ?
You may now commence my flaming....
But I had a thought and it's in all probability a completely stupid one and ludicrous to the educated. But I'll put it up for flaming anyway.
The 3DS ROM's are encrypted and digitally signed...okay I'm already at the end of my microcosmic knowledge. So how do people/hackers plug away at breaking the encryption ?
Is it the same idea as running algorithmic programmes and hoping to eventually hit on a character or number or whatever it is that's alien to me ?
And now for my silly (sillier) question....
You know how there's all these kinds of Distributed Computing Projects like say...Folding @ Home and Seti @ Home, would it even be possible for some coder to write such a thing to bash away at cracking the encryption of ROM's. Would it even be legal ?
You may now commence my flaming....