Finally joined GBATemp because I've been lurking long enough and this post was inviting, so here's my setup...
- BOOT0/BOOT1/NAND (backup of my Switch in airplane mode with no wireless networks—before any hacking)
- CTCaer Hekate bootloader
- AutoRCM enabled
- Memloader payload (slightly more convenient than taking the SD card out)
- Atmosphere 0.7.3
- EasyPower (faster than holding the power button)
- EdiZon (best save manager in my opinion)
- RetroArch
Now for the good stuff:
Obviously, AutoRCM can be a pain in the ass if you power down (be it intentionally or kernel panic), so I am turning a Raspberry Pi Zero W (the model with wireless capabilities) into your not-so-average-payload-injector. Since the Pi Zero supports being powered over both USB ports, I'm able to then use software to take care of the rest—all over a single USB cable (no power banks or being tethered anywhere).
That software is this: (gitlab's website)/relatived/rpi-nx-rcm
In summary, it just pushes your payload.bin in the vFAT partition (/boot, readable by most OSes) as soon as it is able to detect that a Switch in RCM mode is plugged in. This is a very nice alternative to the commercial products available, and it's a tier above all the other injectors in luxury because it's live-programmable (as opposed to flashing an Arduino).
...but it doesn't stop there.
I also run hostapd on it to create a wireless access point for the Switch. I actually store this on another SD card because I need the USB port for something else. The way I have Raspbian configured is to accept wireless connections and bridge them to the USB Ethernet device that my Pi Zero emulates. I do this because I want to FTP into my Switch so I can make testing my own software go a little bit faster. I have full control over the Switch's Internet access, kind of like a walled garden — such as those you'd find in hotels. I can easily serve up DNS and reject attempts that the Switch makes to phone home, and can conditionally enable/disable outside services. It's also useful for viewing the packets being sent to-and-fro, possibly opening the door for 443 SSL/TLS blocking and live data spoofing, all from a cheap "$5.00" computer.
If other RCM payload injectors aren't doing this, they're losing! So yeah, that's my setup. I haven't went online AT ALL since hacking, no changes in fuse burning, so hopefully that NAND dump I made is all I need to make this all just a bad dream.
Edit:
I also pledge to never pirate a single Switch game until all of it becomes abandonware.