y̶e̶s̶Ah so is this how we will boot ReinandNX?
(I will never give up!)
y̶e̶s̶Ah so is this how we will boot ReinandNX?
(I will never give up!)
the switch is getting love from all these talented devsAlways love Rei's work
That's how all current known exploits work. We're not gonna see usb-free exploits on any FW other than 1.0.0 for a while.Yet another RCM hack that requires some kind of USB-C connection or some type of jig.
AutoRCM requires a USB-C connection, but it only requires a jig one time to install AutoRCM. After it's installed, you don't need a jig anymore, and you don't have to press Volume+.Yet another RCM hack that requires some kind of USB-C connection or some type of jig.
but theres no release of it yes, is it?AutoRCM requires a USB-C connection, but it only requires a jig one time to install AutoRCM. After it's installed, you don't need a jig anymore, and you don't have to press Volume+.
It has been released.but theres no release of it yes, is it?
would like to test this on one of my switches
It has been released.
https://github.com/Reisyukaku/hekate/blob/master/ipl.bin?raw=true
It has been forked with an option to install AutoRCM. Keep in mind that this effectively "bricks" the Switch so it always boots into RCM. Your Switch OS cannot be booted unless it is done through an RCM payload.?? Hekate = Auto RCM?
It has been forked with an option to install AutoRCM. Keep in mind that this effectively "bricks" the Switch so it always boots into RCM. Your Switch OS cannot be booted unless it is done through an RCM payload.
Edit: To be clear, this also includes an option to uninstall AutoRCM and return your Switch to normal.
For what it does, it's a relatively safe process. If something happens to your USB-C port after the installation of AutoRCM though, I don't see any easy way to recover. Any risk is yours to take.are people making it sound like a risk because there may be a chance that disable may not work and your switch may be forever perma bricked?
For what it does, it's a relatively safe process. If something happens to your USB-C port after the installation of AutoRCM though, I don't see any easy way to recover. Any risk is yours to take.
If you didn't download the fork I linked to, you're not going to see the AutoRCM option.thanks...for whatever reason, I still dont' see (un)install AUTORCM on Hekate (i overwrite and even delete / transfered the files from today's download) but even then, I guess there's really no (C)OS or a a working payload for emulators yet that there's still not much for majority of end-users yet.
Is there any difference between this and Reisyukaku's?Oh, i was making one since you guys couldnt wait for my whole toolset to be available
if you want it, get briccmii from https://switchtools.sshnuke.net (source code at https://github.com/rajkosto/briccmii)
There's only so many ways to change an RSA modulus, family. I've mentioned all kinds of ideas in my private group so it's hard to say 1 person thought of it and everyone else copied.I just read their code after publishing mine and Rei did exactly what i suggested in that other thread yesterday, all the offsets are hardcoded while mine tries to do it more properly by detecting how many BCTs are used, trying bytes until the SHA256 matches, etc... but in practice it should be the same, except with mine you are SURE it got corrupted or fixed, it checks everything.