I think a new update was just released for the Wii U. Luckily my internet was crappy so it failed to download, can someone check if it's safe? (btw I was already on 5.3.2.)
... When Hykem backports the Webkit exploit to 3.0.1...
Don't ask me, probably just for compatibility's sake, because then ours will work on 3.X through 5.1.0.What exactly needs to be backported? The webkit exploit that Comex used on 3.x has already been leaked [https://www.mediafire.com/?dgtm8ue4o89j9fr] This is the ArrayBufferView overflow bug that Comex talks about in his CCC presentation, which he used to dump CafeOS and develop his IOSU exploit to get the common key.
im guessing hykem is receiving it today or he already got it yesterday? second question i was wondering if we would see a video of the kernel exploit in action? no worrys if not though as im sure you guys are busy enough
I was going to record one once I got my hands on Caffiine, because otherwise it's not that exciting, you just go to a url, browser exits, do it again, and then go to whatever program you want.
I can't wait for you to demonstrate. Hopefully you add some great music like Gateway does ! LOL!I was going to record one once I got my hands on Caffiine, because otherwise it's not that exciting, you just go to a url, browser exits, do it again, and then go to whatever program you want.
Don't ask me, probably just for compatibility's sake, because then ours will work on 3.X through 5.1.0.
I don't know the details, but he called somethine called CreateTitle, i.e. a function which performs permanent modifications on the NAND. I suppose the system software has protection against creating random titles, hence why the console didn't boot anymore. As long as you don't call functions which modify anything on your NAND, you should be safe.I'd imagine that the IOSU exploit(s) will carry a risk of bricking. I am still very confused as to how Comex "called a function" and it bricked his Wii U (could not be recovered, right?). That is the type of crap that had me looking for a guide from somebody reliable to hardware flash a Wii U. The ultimate protection as there is probably never going to be a "bootmii" or "priiloader." Oh well, others can test the waters first, lol.
Thanks for that. Haha, if there was a way to recover a nand via hardware flashing I guess people could poke around. No real reason to do so now though given the scope of the hack (what we are being told).I don't know the details, but he called somethine called CreateTitle, i.e. a function which performs permanent modifications on the NAND. I suppose the system software has protection against creating random titles, hence why the console didn't boot anymore. As long as you don't call functions which modify anything on your NAND, you should be safe.
Same here, looking forward to the expoit video!
Also, is it possible to inject DS games into the Brain Training VC with the exploit like the 3DS Game Boy VC does? Or can it do even more like installing VCs, Homebrew Channel U or whatever the name will be for Wii U Homebrew Channel XD
(I'm on 5.3.2E btw.)
Same here, looking forward to the expoit video!
Also, is it possible to inject DS games into the Brain Training VC with the exploit like the 3DS Game Boy VC does? Or can it do even more like installing VCs, Homebrew Channel U or whatever the name will be for Wii U Homebrew Channel XD
(I'm on 5.3.2E btw.)
Would have to finish another Webkit exploit to see how the files work. I'm pretty sure they hand converted the game instead of just slapping a DS game in an emulator, hence having a new layout. Also, until a loader exploit is made nothing is installable. Neither kernel nor IOSU alone can do that.
HomebrU channel?
Homebrii U LoaderNo, not for a very long time. Clever name though, I like it
Maybe "HomebrU Loader"?