I know this probably sounds ridiculous, but why don't you figure out how the 3DS functions 100%. Wouldn't that bring us one step closer to fingering it out? Study it inside and out, but I guess that's just my opinion!~
Sorry, couldn't resist.I know this probably sounds ridiculous, but why don't you figure out how the 3DS functions 100%. Wouldn't that bring us one step closer to fingering it out? Study it inside and out, but I guess that's just my opinion!~
Yeah, but that was newer the reason not to try. If nothing, it will be fun (that's why people play lottery)
ok, but how do we start doing that?
There are no hybrid games. The unit sends the cart some data, and gets a response in return. If the response matches a DS cart, it does some stuff. If the response matches a 3DS cart, it does other stuff.What about the DS-3DS handling?
Does anyone know how the DS to 3DS mode works?
If the 3DS cartridges are different than the DS one, a modded card could bug the system.
(By modded card I mean like half DS half 3DS code)
We can dump 3DS and DS games(both encrypted), what happens if they're both in a card?
That's what they're trying to do.I know this probably sounds ridiculous, but why don't you figure out how the 3DS functions 100%. Wouldn't that bring us one step closer to fingering it out? Study it inside and out, but I guess that's just my opinion!~
Haha! xD It's cool!~Sorry, couldn't resist.
http://p.bfram.es/captain-obvious-there-is-one-in-every-anime.jpg
I knew it sounded stupid! :/ I know there isn't an infinite supply of 3DS just to open up and screw with the MotherBoard, but it was just an opinion. A ridiculous one at that!There are no hybrid games. The unit sends the cart some data, and gets a response in return. If the response matches a DS cart, it does some stuff. If the response matches a 3DS cart, it does other stuff.
If the response is mixed or matches neither, it doesn't do anything.
That's what they're trying to do.
Yeah, those are expectations, to earn money, but it all depends on how you look on lottery..I thought people played the lottery to get large sums of money?
Hi just wanted to tell you when you post something, try to put it in one post. Just use "edit" button.
http://gbatemp.net/help/terms
Yeah, those are expectations, to earn money, but it all depends on how you look on lottery..
No, because it won't do anything with it if it's not signed.If it downloads it, then checks if it's signed, we can make use of this in some way, right?
No, because it won't do anything with it if it's not signed.
Like, you can stick some porn on your SD card and put it in the 3DS, but it's not going to do anything with it.
That's what the people hacking the damn system are trying to figure out.Now what does it use to check if the data is signed? Even that process might have a flaw that'll lead to the key... Or kernel acess, don't you think?
I'm not. The issue with finding the private key is that in order to test the private key, you need to try encrypting something with what you think the private key is, and then decrypting it with the public key to see if it works.
But the public key isn't known yet. It exists, but still inside the 3DS, so in order to test a guess for a key, people would need to feed it to the 3DS and try to run it each time, which means that mass-guessing of 50,000 keys a second and numbers like that are impossible.
Compare this to the Wii and DSi, who have their common keys known already, and thus brute-force programs against them are possible (just not feasible). Hell, somebody actually did this for the DSi already (resulting in failure and nobody else caring to run the program after a few weeks of course).
That's what the people hacking the damn system are trying to figure out.
I mean that theory is about as broad as "hey maybe if we hack it and give it the hack, it'll be hacked!"
No fucking duh.
It was the common key people tried to bruteforce for the DSi, not the private key. I was never 100% clear on how a valid decryption was verified, but I guess it is a case of decrypting the signature (i.e. encrypted hashes) and checking these against the hashes of the content. If they match, common key has been found (but private key is still secure).Compare this to the Wii and DSi, who have their common keys known already, and thus brute-force programs against them are possible (just not feasible). Hell, somebody actually did this for the DSi already (resulting in failure and nobody else caring to run the program after a few weeks of course).
As soon as we know how to observe the system at work, we can then try to understand it...
Was it? I thought the DSi common key was already found, while the brute forcing was a failure.It was the common key people tried to bruteforce for the DSi, not the private key. I was never 100% clear on how a valid decryption was verified, but I guess it is a case of decrypting the signature (i.e. encrypted hashes) and checking these against the hashes of the content. If they match, common key has been found (but private key is still secure).
It was the common key people tried to bruteforce for the DSi, not the private key. I was never 100% clear on how a valid decryption was verified, but I guess it is a case of decrypting the signature (i.e. encrypted hashes) and checking these against the hashes of the content. If they match, common key has been found (but private key is still secure).
http://www.flickr.com/photos/neimod/8298047673/in/photostream
http://www.flickr.com/photos/neimod/6487818901/in/photostream
http://www.flickr.com/photos/neimod/6487815875/in/photostream
http://www.flickr.com/photos/neimod/6487813587/in/photostream
http://www.flickr.com/photos/neimod/6487810819/in/photostream
neimod has been observing the system "at work" for a long time, and does understand a lot of stuff (see: 3dbrew.org).
What if we capture a 3DS and force it to sign some 3DS software, then we just have to shove it into the 3DS on a SD card.
Although, that would only work for that 3DS...
We could mass produce 3DS 'hacking' kits that consist of a modified 3DS charger that shocks the 3DS every time it refuses to sign data, eventually we could train them to always sign stuff