exactly! this dude understandsSo if you not try to crack the SX OS it won't cause brick at all?
"still need a 2.0.0 raw nand dump (I had backups of all the important stuff, the rest is just re-encrypt with BIS key and write back)."Can you explain how we are "unaware of the extent"? Hexkyz has proven all it takes is a simple RCM payload to unlock and rebuild the eMMC.
Which is why you back all of that up from the get go. We have the tools to do so."still need a 2.0.0 raw nand dump (I had backups of all the important stuff, the rest is just re-encrypt with BIS key and write back)."
Hexkyz was able to recover because he had a backup of his BIS key. From what I understand, that's the console unique key. You can't get to that once your eMMC is locked so if you don't already have that backed up, it looks like it might not be recoverable entirely on your own (without help from TX - if that is even possible)
The console specific key can be recovered without a working eMMC. You just need to extract the TSEC firmware from any public eMMC dump/software update package, and use that to recover the SBK and others (bis keys)."still need a 2.0.0 raw nand dump (I had backups of all the important stuff, the rest is just re-encrypt with BIS key and write back)."
Hexkyz was able to recover because he had a backup of his BIS key. From what I understand, that's the console unique key. You can't get to that once your eMMC is locked so if you don't already have that backed up, it looks like it might not be recoverable entirely on your own (without help from TX - if that is even possible)
Which is why you back all of that up from the get go. We have the tools to do so.
"still need a 2.0.0 raw nand dump (I had backups of all the important stuff, the rest is just re-encrypt with BIS key and write back)."
Hexkyz was able to recover because he had a backup of his BIS key (to rebuild his NAND). From what I understand, that's the console unique key. You can't get to that once your eMMC is locked so if you don't already have that backed up, it looks like it might not be recoverable entirely on your own (without help from TX - if that is even possible)
ok, fair enough. If that's the case it should be recoverable even without a backup (which I am sure a lot of people that use SX OS don't have). This does sound very involved, though. Something that a lot of people might not be able to.The console specific key can be recovered without a working eMMC. You just need to extract the TSEC firmware from any public eMMC dump/software update package, and use that to recover the SBK and others (bis keys).
His avatar is a cuphead. Triggered much?How old are you? Resorting to insults (as hilariously bad as yours is) doesn't help anyone.
While it might sound quite involved, this can be automated pretty easily, to the point where the user only has to copy a few files to their sd card and run a payload. But this all is assuming the "bricking" occurs in the first place, which is quite improbable.ok, fair enough. If that's the case it should be recoverable even without a backup (which I am sure a lot of people that use SX OS don't have). This does sound very involved, though. Something that a lot of people might not be able to.
Yeah I noticed, just seemed a bit odd for you to call him a cuphead for no reason at all.you said it was irreversible
and you were wrong you cup head
exactly! this dude understands
no need to worry.
yeah don't get it. stay safe.Im somewhat hesistant to get SX OS License since they do have that brick code. Im an enduser but some people claim that there is a chanche for it to hit normal users under certain circumstances. -.-"
Hello ,
We are delighted to have now a massive SX OS userbase. We never had a single
report of a 'bricked' or damaged console caused by SX Pro or SX OS.
If people modify, hack and fiddle with their console, regardless of SX OS being
installed, they expose themselves to dangers such as 'bricking' their console.
We can't be held responsible for this.
We are a professional team, with a solid reputation for quality product and
support for many years.
We offer full commercial and technical support, updates for life and warranty on
our product, like we always did.
But obviously this is only valid if you do not use other modifications of hacks
that can damage your console.
Clearly, our customers do not want or need any other software and hardware than
Team Xecuter SX product. Please be careful who you trust when you use other
software or hardware on your valuable Nintendo Switch. Not everyone has a track
record like Team Xecuter, and they can disappear like they appeared.
Please also be careful with copies and clone of our software and hardware,
although as of today, we haven't seen any.
To sum all this up: You can be certain that you are safe when using original
Team Xecuter product such as SX OS. We not only state it, we guarantee it!
Thanks again to all our customers for their trust for the past 15 years already!
--
Best regards,
Team
Yes. You need to erase the NAND to get rid of the password, then restore the backup.autorcm = brick code
but yeah, as long as it's safe and won't ever trigger by accident, i'm fine with anti-tamper brick code.
is it recoverable if you have a nand dump?
they could do evil stuff, like burning all your fuses lol
I knew it that there's something fishy. Well, if you don't wanna risk a brick, just buy their product and don't steal it. They have the permission to protect their own product from thieves. But it seems that it's not that hard to recover your NAND, so maybe some people are still waiting for a crack.