@blujay you show proof yet? I not believe you
auto
Is no problem show more for proof:
0x8000: 21 32 A0 E3 00 10 D3 E5 01 10 C1 E3 00 10 C3 E5 D3 00 A0 E3 00 F0 2F E1 4C D0 9F E5 D2 00 A0 E3
My friend is decap doctor.
He say many bootrom in 3ds.
First bytes of a9 bootrom for proof:
0A 00 00 EA 24 00 00 EA 21 00 00 EA 24 00 00 EA 25 00 00 EA FE FF FF EA 1A 00 00 EA 1A 00 00 EA 46 80 00 00 DC 00 FF FF 00 00 00 08 30 5D FF FF
Look here: http://3dbrew.org/wiki/3DS_System_Flaws#arm9loader
With this trick you can run a9 code with N3DS 9.6 AES keys not cleared! This mean you can decrypt any 9.6 N3DS title... But you can only do it if you have NAND mod. I hope I make sense
1. My friend, 3dbrew says:
If bootrom was dumped, they would know exactly when ARM9 memory get initialized -> this means bootrom is not dumped?
2. I not talking about disable NAND, I talking 2 physical NAND which can be switched by HW mod. Maybe there are other ways to do it, but this is my...
I think these N3DS-only 9.6 titles were decrypted by using HW NAND swap on softreboot (because no key clear). This is different flaw from bootrom fault glitch.
It's not the movies or games downloads that I would worry about, like breaking into networks, downloading encrypted things, spying on network traffic. I have seen so many "Top Secret" seals on files when I was a kid
I was obsessed with finding UFOs, a surprising amount of US files where stashed on computers in other countries, China back in the early 90s omg sooo much