Recent content by JimmyZ

  1. J

    Hacking Will installing NSP to SD on emuMMC taint sysMMC OFW?

    Thanks for the quick reply, but could you elaborate more on the NNID issue? I searched a bit and found this: https://www.reddit.com/r/SwitchHacks/comments/c9xfhy/psa_if_youre_not_careful_with_emummc_you_could/?utm_medium=android_app&utm_source=share Are you referring to this? From what I could...
  2. J

    Hacking Will installing NSP to SD on emuMMC taint sysMMC OFW?

    For the record I've never ran CFW on sysMMC, I actually deleted that entry from hekate, will NSPs installed on SD show up on sysMMC OFW though? I fear I might get banned from this. I remember back in the 3DS emuNAND days we have a step(format once or something like that?) to make emuNAND use a...
  3. J

    Homebrew So, I just got a DSi, but it doesn't have any exploitable games...

    If you can get hardmod, then you can install the exploitable dsiware, like @Multimegamander already told you. old guides will say you need a exploited game to get EMMC CID, with bfCL that's not required anymore.
  4. J

    Homebrew [WIP] twlnf, DSi NAND File ... thing ... testers with hardmod wanted

    Like what I said, I didn't touch the FAT handling code, so I'm not able to fix this. Update: is this tool still considered somehow useful in anyway? I've been away for a bit and apparently there's a lot to catch up with like unlaunch and stuff, so I'm not sure if it's worthwhile to invest time...
  5. J

    Homebrew [WIP] twlnf, DSi NAND File ... thing ... testers with hardmod wanted

    I've no idea what's causing this, I didn't write any FAT handling code, I simply called fatMount from libnds: https://github.com/Jimmy-Z/twlnf/blob/master/arm9/source/nand.c#L250 I provided an encryption/decryption layer: https://github.com/Jimmy-Z/twlnf/blob/master/arm9/source/nandio.c If the...
  6. J

    Homebrew TWLbf - a tool to brute force DSi Console ID or EMMC CID

    That list is only a guideline, it's not complete.
  7. J

    Homebrew TWLbf - a tool to brute force DSi Console ID or EMMC CID

    Good to hear it works for you. If anyone would like to help with document, feel free to send me a pull request on github.
  8. J

    Hacking seedminer (single system DSiWare injection)

    The issue tracker is just like a forum, you login, write your comment and hit the button.
  9. J

    Hacking seedminer (single system DSiWare injection)

    seedminer ran fine on 965/1060 but not 730, bfcl ran fine on 730, is that right?
  10. J

    Hacking seedminer (single system DSiWare injection)

    Thanks, OS version? driver version? Also preferably report on github, I don't want to clutter this thread. auto Thanks but no need to test that test build of bfcl if seedminer runs fine for you.
  11. J

    Hacking seedminer (single system DSiWare injection)

    Anyone interested in helping with the "out of resource" error, see this: https://github.com/Jimmy-Z/bfCL/issues/3 If you'd like to make a report, reply to that github issue instead of cluttering this thread.
  12. J

    Homebrew TWLbf - a tool to brute force DSi Console ID or EMMC CID

    Yes you should, we've gathered some samples, but that's really not a very large collection, I suggest you start with the missing hole 08a17, then expand out on the edges 08a14, 08a22, 08200, 08205... As for the connection between date of the console/emmc, this is really a good point but I...
  13. J

    Homebrew TWLbf - a tool to brute force DSi Console ID or EMMC CID

    Try this one, I lowered queue length from ~100,000,000 to ~1,000,000 in console_id_bcd mode, again this is a blind fix and I don't know if it will work.
  14. J

    Homebrew TWLbf - a tool to brute force DSi Console ID or EMMC CID

    No need to do that, even if it works, it's too much trouble.
General chit-chat
Help Users
  • No one is chatting at the moment.
    KenniesNewName @ KenniesNewName: Afrocandy looks like a good movie