Status
Not open for further replies.
Tutorial  Updated

Fusée Gelée FAQ by Kate Temkin

http://www.ktemkin.com/faq-fusee-gelee/

Kate has collected and answered the most common questions she's gotten regarding Fusée Gelée. Most notably she explains the three "types" of FG hacks, software, hardware (temporary) and hardware (permanent).

Enjoy!

Kate herself responded to this thread on page 26, thanks Kate!

There's a lot more here than I can easily respond to, so apologies if I miss posts or gloss over points.



This is correct-- while there likely will be software chains around for these things in the future, I don't see them as coming along as quickly as f-g. We don't have a non-coldboot exploit chain at all for 5.0.0-- and we haven't looked yet, as we've had other things to focus on and coldboot works. We do have one for 4.1.0, but it's centered around a couple of exploits that we don't want to burn-- we're hoping to use them to get an opportunity to poke around inside T214/Mariko.



I don't view you as particularly hostile, no. I don't know if challenge is generally a good thing-- sometimes you do have to accept that other people have different ethics or viewpoints from yourself and let that pass, especially if they're just doing stuff for fun-- but I don't view your post as hostile.



Jamais Vu (1.0.0 TrustZone hack) isn't my bug, but has been written up, and is just awaiting someone with the skills to have time to do a public interpretation. Déjà Vu is currently centered around the exploit I mentioned above, and we definitely want to hold onto that for as long as it's applicable. It's entirely a Switch bug, too, so I don't see it as being something that needs responsible disclosure.



For Déjà Vu, absolutely. (explained in last quote)



I don't agree that things like tweeting are ego. This is something I work on because I find it a lot of fun to hack on things, and there's definitely an aspect in which it makes me happy when seeing the results of things makes other people happy. There's also an aspect in which I hope that showing these things are possible inspires people to want to learn e.g. reverse engineering. This stuff is cool; and I want to share the excitement with others and lift them up as much as I can.

You don't have to believe me on that or like that that's my goal. I won't hold it against you if you don't. :)



I honestly support people updating when it makes sense; and I recognize that there's a conflict between holding back information and enabling others to make reasonable decisions about that. I don't like or feel good about secrecy, and I know it has implications. I've tried to be as clear as I can about the costs regarding updating without crossing the line into giving things away.



I think we've been pretty clear that 4.1.0 will eventually see a non-coldboot, software-only exploit with the same level of power. That's actually been posted on the ReSwitched Discord's FAQ for months, but I know the message gets skewed as its gets communicated over to other places. That's part of why I'm here, now-- I want to help clear things up.

The interactions between the operating system and the bootloader-- say on reboot-- are actually fairly limited; and knowing what any of them are is enough to point people at the particular section of bootrom that's vulnerable. That's why I'm not commenting on Fusée Gelée and how it relates to software-only solutions right now. I have said e.g. above that since there's no public way of getting the privileges necessary to run things, 4.1.0 isn't going to see a pure software solution that the public can use at the time that f-g is released. Software exploits will likely come in time; and it's possible we'll come up with things that are even easier than f-g.



I'm not sure if they'll take it seriously enough. I don't know how they are internally-- but I can't just assume they'll fail to do anything and skip disclosure. Honestly, I don't think a "security advisory" is really a bad thing, either-- there are definitely applications of Tegra chips that I and/or the public don't know about. If giving NVIDIA notice gives them time to explain exactly what's dangerous and allow their customers to remove and replace units from places where the vulnerability can cause harm, I consider that a win, and well worth delaying some public switch hacks by a few months.

I'll also say that my fear that vendors won't take the vulnerability seriously is a huge reason I'm so keen to get things out there-- and why I provided a date after which I'll tell the public what's going on that I've said was non-negotiable. I want to make sure this doesn't get hidden, and that people understand exactly what f-g can and can't accomplish, to minimize FUD while also letting people understand the actual risks are associated with using a vulnerable device.



It changes this from an exploit that's going to be usable before the affected people know it's a thing to something that people may have a chance to react to. Making the vulnerability public without disclosure really increases the odds someone is capable of using it to do bad.

I didn't really give NVIDIA a chance to sell-off stock; though. I've said publicly multiple times that there are bugs in Tegra processors well before NVIDIA reached out to me seeking disclosure. If anything, I think telling the public that these vulnerabilities exist while pursuing disclosure helps developers interested in using Tegra chips in the future ask the right question.



I've already said that while pure-software stuff is doable on 4.1.0; it'll be a wait. As far as I'm remembering, the only part of the chain that could require multiple tries to work is PegaSwitch, which is our browser-based entry point, and I haven't even tried the browser entry point that'll eventually be public to see how reliable it is. SciresM did the work to get our non-coldboot exploit working on 4.1.0; not me. :)



Yeah, that's hard-- especially as everyone has a different view as to how inconvenient things are. I don't know of a way to communicate this better without more details.

Incidentally, the 'inconvenience' verbiage came from SciresM and I discussing our respective views on updating. I think SciresM is more towards the opinion that people should hold back more often, where I'm more of the opinion that updating can be a good and reasonable option sometimes. The way we wound up phrasing things is a compromise between views.



(I'm going to assume this meant "on the hacking side". If not I'm not sure what hacking site you're referring to.)

Updating to latest just closes the possibility of using software exploits launched from Horizon, which can make setup more difficult. I know you'd like to know how much, but I unfortunately don't have a good way of qualifying that. As I've mentioned, if you're suffering from not being able to use your 3.0.1+ Switch, you probably do want to upgrade and just risk things being more inconvenient in the future. Worst comes to worst, if you decide you can't tolerate the inconvenience, you upgrade and then wind up having to figure out a modchip.

The downgrade protection fuses literally mean nothing to a system with f-g, which can entirely skip the downgrade check. Incidentally, SciresM actually accidentally bricked one of his systems in a way such that it was always failing the downgrade checks, and he's been able to use f-g to get that system up and running again.



I don't think that's clear at all, nor do I want to confirm or deny this. Sorry.



I think you're making a bunch of assumptions here, and that's maybe not a great idea. I'm not saying you're necessarily right or wrong; just that I don't think your assumptions are founded.



I don't think this contradicts. This is talking about vulnerabilities that aren't f-g; not because f-g doesn't work on 4.1.0, but because it's possible we may come up with vulnerabilities that are even nicer on 4.1.0 in the future.



I'm being as clear as I feel I can, and adding clarifications e.g. here where I think it helps. There will be different names for the the ways you can use f-g eventually; and I'll be fully open about everything once the summer rolls around and I'm not putting the disclosure timeline in jeopardy.



I know and have said about that this "bring your own exploit" business makes development exclusive, and that's exclusionary and I really don't like it-- I just don't see a way around it. I would love to get more developers and more perspective, and that's why my release date for f-g is tied to my disclosure timeline and not in particular to Atmosphère's release.




I've tried to point out approximately what the difficulty would be for some of the options to kind of provide this, but this is a hard thing to accomplish. In this case, providing details that are more specific really points a finger at vulnerability details, so there's not much I'm comfortable sharing. I've shared what I could-- as a data point, some of the other teams have outright stated that they think I've shared too much already and made things obvious. I don't agree or necessarily care about their opinons, but c'est la vie.



Well, this isn't the case. This has been disclosed to Nintendo, too-- as NVIDIA shares their vulnerability findings with downstream customers. It's more general malicious actors that I'd be worried about.



See above-- but I don't think I'd advise specifically updating to 4.1.0 unless that gives you enough access to the games you want.



I'm also super glad that we can do a lot of our work in the open. I hope there's a lot more of it in the future-- and I'd love to stream some of it. :)



I find the requirement disheartening as well, but I think this is the right way to do things, for now. I've explained my rationale above; feel free to ask questions.



I'm not sure why people are against communication, here. There were definite benefits to talking about f-g in the first place; including that it demonstrates that Tegra chips are vulnerable-- which hopefully influences buying decisions in the future and puts pressure on NVIDIA to seek as much of a fix as they can. After that there seemed to be definitely benefits to talking about more details, even in the limited sense that I'm able to. I've tried to give people more information than the nothing they would have had so they could have more of an idea whether it's be a good idea to e.g. pre-order a modchip or update their system. I know it can be frustrating to not get full disclosure, and that more information would help people to make a better or more conclusive decision, but full disclosure isn't an option until this summer. I don't think that's a reason to hold back information.



I don't have specific answers to your questions, unfortunately-- but I think it sounds like the main purpose of this Switch is as a gaming device and maybe you should upgrade and enjoy playing games with your son.



I don't think that asking for clarification is criticism. It might be rude to push me to answer something I said I wouldn't, but I don't think there's harm in answer.



I don't think I've said anything about opening the console or not. See above for my views on updating?



I'm not sure where you got this impression, or why you're confident about things enough to claim you know about the internal values or working of ReSwitched. This is also easily disprovable just from public information--Hedgeberg has tested out f-g on stream. I don't see it as great opsec to enumerate how many people have access to the vulnerability, but we've long had a policy of only giving exploit details to those who actually want to know them and are in a position where they can use them to help. This is a basic security precaution and not about trust.

I'm actually not sure how this is relevant to the broader discussion. Based on your post history, I can tell that you strongly support TX and the option they're providing, and you're welcome to that, but I think throwing around generic unfounded criticism of RS doesn't do much good and distracts from me answering community questions. :)



I don't think they're obviously more convenient, as they exist right now. They're both inherently however-tethered-you-consider-PegaSwitch, take a bunch of time to run, and rely on a pegaswitch entry point.



That's not correct-- everyone on a current hardware revision will be able to install and use CFW the day it's released, if they're willing to put in the effort and potentially take on some minor risk.



I'm actually not sure what you mean by this entire post? Sorry about that-- I'd love to address your ideas, but unfortunately I can't figure out your meaning. :(



That was about me having fun by trying to see if a DIY, cheap modchip option is reasonable. It turns out it is. As you've noted, it's not necessary on any firmware. I just really like the idea that the open exchange of knowledge -- especially when profit's not a motive -- can result in creation of neat options for the community. ^-^



Yep; that's exactly what it means. :)



I don't think this has been at all implied-- and you'd be hard pressed to find a way to make a solder-less Arduino option that even remotely fits in the Switch case. :)

I should also clarify that the DIY option isn't solderless. :)


If you have or are going to get the game anyway, you can. Those versions are pretty much interchangeable in the long-term. :)



Yep-- and it's possible at some point that we'll allow you to install Fake News without Puyo using f-g/Atmosphère. The original plan was to release Atmosphère for 1.0.0 first while we tried to figure out how to deal with Fusée Gelée, but we actually wound up with a disclosure schedule that was faster than we'd thought. :)
 
Last edited by Salazar-DE,

isoboy

Well-Known Member
Member
Joined
Dec 23, 2016
Messages
1,224
Trophies
0
XP
2,676
Country
United States
There's no point in having a release date because it's going to be delayed no matter what. Not that I care, I'm fine with whatever.
 

Quantumcat

Dead and alive
Member
Joined
Nov 23, 2014
Messages
15,144
Trophies
0
Location
Canberra, Australia
Website
boot9strap.com
XP
11,094
Country
Australia
Mitigate and fix are two different things. I explained that in my previous post so no need to go over old ground.

Hardmod can circumvent it by the sounds of it yes possibly but that's for the switch. How easy and realistic is that for other tegra bearing devices we simply do not know. For a car that might not be an issue as you can't GET to it unlike a switch.

The whole point of this conversation was about the disclosure window and why it's important. This is why. So other customers can decide how to handle it and actually investigate to see if it's a viable threat or issue to them.
There's no mitigation to be done, they literally cannot do anything about it. Not sure why that is hard to understand. CyberQuake made a point that they can use the time to buy back any critical devices (like if used in a hospital or something) and replace them. Nothing can be done for the existing devices though.
 
  • Like
Reactions: TotalInsanity4

subcon959

@!#?@!
Member
Joined
Dec 24, 2008
Messages
5,845
Trophies
4
XP
10,109
Country
United Kingdom
There's no mitigation to be done, they literally cannot do anything about it. Not sure why that is hard to understand. CyberQuake made a point that they can use the time to buy back any critical devices (like if used in a hospital or something) and replace them. Nothing can be done for the existing devices though.
You have more patience than I do for carrying on trying to explain :wacko: It's excruciating trying to discuss things like this without being face to face.
 

andijames

Well-Known Member
Member
Joined
Jan 28, 2016
Messages
428
Trophies
0
Age
43
Location
Manchester
XP
759
Country
United Kingdom
I GET you CANNOT FIX the MAIN exploit that is in the ROM (Read Only Memory). That is UNFIXABLE. Not denying that point at all. Right. That is sorted. I get that .

The point (or angle) I'm coming from is probably best described via how the CFW has been developed and this approach would apply to other devices. Ok (deep breath).

Up to 4.1 it's been said there is a software solution to run CFW. Yes? From then up at the moment it's a hardmod (I.e physical access) to actually ACCESS the bootrom to exploit the non patchable vulnerability. What Nintendo have done 4.1 and above is close other exploits making it more difficult to GET to the non patchable vuln. This is them mitigating against the non patchable vuln. They close off vectors in the exploit chain making it tougher (although not impossible) to actually exploit the thing that is non patchable.

This approach COULD be used by other vendors. If they can harden their solutions via software and they consider this adequate then this is much cheaper than buying devices back / replacing them. If they can't mitigate against it then they will most likely have to go down the hardware replacement route yes.

All of this investigation takes a bit of time. The vendors all have to look at their implementations and decide on the best course to take. This is where I see the disclosure window timeframe sitting and why it's an appropriate and responsible approach to take.

I hope that helps. And you're right it is hard explaining your thought process via a keyboard. It's like pulling teeth sometimes!
 
Last edited by andijames,
  • Like
Reactions: subcon959

subcon959

@!#?@!
Member
Joined
Dec 24, 2008
Messages
5,845
Trophies
4
XP
10,109
Country
United Kingdom
I GET you CANNOT FIX the MAIN exploit that is in the ROM (Read Only Memory). That is UNFIXABLE. Not denying that point at all. Right. That is sorted. I get that .

The point (or angle) I'm coming from is probably best described via how the CFW has been developed and this approach would apply to other devices. Ok (deep breath).

Up to 4.1 it's been said there is a software solution to run CFW. Yes? From then up at the moment it's a hardmod (I.e physical access) to actually ACCESS the bootrom to exploit the non patchable vulnerability. What Nintendo have done 4.1 and above is close other exploits making it more difficult to GET to the non patchable vuln. This is them mitigating against the non patchable vuln. They close off vectors in the exploit chain making it tougher (although not impossible) to actually exploit the thing that is non patchable.

This approach COULD be used by other vendors. If they can harden their solutions via software and they consider this adequate then this is much cheaper than buying devices back / replacing them. If they can't mitigate against it then they will most likely have to go down the hardware replacement route yes.

All of this investigation takes a bit of time. The vendors all have to look at their implementations and decide on the best course to take. This is where I see the disclosure window timeframe sitting and why it's an appropriate and responsible approach to take.

I hope that helps. And you're right it is hard explaining your thought process via a keyboard. It's like pulling teeth sometimes!
Ok, I think we're on the same page here. My initial objection to the window was taking all the above into consideration and then postulating would the companies actually do the "right thing" in this situation, or would they be far more inclined to do so if they were put under pressure by a more immediate threat (not day zero, just "uncomfortably" short).
 

andijames

Well-Known Member
Member
Joined
Jan 28, 2016
Messages
428
Trophies
0
Age
43
Location
Manchester
XP
759
Country
United Kingdom
Yeah ultimately this puts the ownus(?) on the vendors themselves to get their act together really. Disclose windows are typically 3-6 months and that fits nicely with when this was first mentioned and a 'summer' release that's been mooted. Long enough for people to do something about it without it being rushed and causing more damage but short enough to apply pressure in the sense they have to act now.

Looking forward to summer :)
 
  • Like
Reactions: TotalInsanity4

Quantumcat

Dead and alive
Member
Joined
Nov 23, 2014
Messages
15,144
Trophies
0
Location
Canberra, Australia
Website
boot9strap.com
XP
11,094
Country
Australia
I GET you CANNOT FIX the MAIN exploit that is in the ROM (Read Only Memory). That is UNFIXABLE. Not denying that point at all. Right. That is sorted. I get that .

The point (or angle) I'm coming from is probably best described via how the CFW has been developed and this approach would apply to other devices. Ok (deep breath).

Up to 4.1 it's been said there is a software solution to run CFW. Yes? From then up at the moment it's a hardmod (I.e physical access) to actually ACCESS the bootrom to exploit the non patchable vulnerability. What Nintendo have done 4.1 and above is close other exploits making it more difficult to GET to the non patchable vuln. This is them mitigating against the non patchable vuln. They close off vectors in the exploit chain making it tougher (although not impossible) to actually exploit the thing that is non patchable.

This approach COULD be used by other vendors. If they can harden their solutions via software and they consider this adequate then this is much cheaper than buying devices back / replacing them. If they can't mitigate against it then they will most likely have to go down the hardware replacement route yes.

All of this investigation takes a bit of time. The vendors all have to look at their implementations and decide on the best course to take. This is where I see the disclosure window timeframe sitting and why it's an appropriate and responsible approach to take.

I hope that helps. And you're right it is hard explaining your thought process via a keyboard. It's like pulling teeth sometimes!
OK, I get what you're saying - that companies should use this time to look for entrypoints in their own software/OS and fix them. However, that doesn't really factor into the disclosure period. Entrypoints could already exist in other devices for hackers to do what they like. The fact that there's a bootrom flaw that might allow them to make them permanent is kind of here nor there. ReSwitched isn't interested in hunting down all software entrypoints in each Tegra device and telling the companies about it - they're only telling companies it can be accessed directly through this bootrom flaw and that they should do what they can (buy back affected devices? only thing I can think of).

For example, think of the 3DS. Pretend the thing that let us install A9LH had just been discovered as part of a wide range of devices. Situation A) we already had ARM9 access through software and Situation B) we didn't. In Situation A, either Nintendo knows about it or they don't. If they know about it, they've already fixed it. Being told that hackers will now be able to make their modifications permanentl won't really come into it. Say Nintendo doesn't know - maybe software ARM9 access hasn't been discovered yet or isn't released. In this case, how will the disclosure window help them? They can't suddenly discover something and patch it because they've been told of something unrelated. All they know is it will be installable by hardmod, and they can either recall all existing consoles (very expensive) or sigh and hope they make plenty of game sales over the next few months since they can't do anything else. Now Situation B) - well that's the same as when it exists but Nintendo doesn't know about it. They can't patch something they don't know. If they knew it already they'd have patched it. If they didn't care enough to patch it, the news probably won't make them care more.

In the other devices' case, if there is a software exploit that will allow permanent installation with the bootrom flaw, then if companies cared and they knew about it they would have patched it already and the disclosure window won't affect them in any way. If they don't know the exploit yet then the disclosure window isn't going to help them discover it either. All they can do with the extra time is recall or buy back the affected devices, since they know it will be installable by hardmod when released.
 
  • Like
Reactions: subcon959

jabz10

Well-Known Member
Newcomer
Joined
Apr 19, 2009
Messages
45
Trophies
1
XP
357
Country
New Zealand
I had a question about CFW. While I'm looking forward to it, I want to know when using CFW, will it be possible to keep using the Switch with newer game releases and go online etc? Additionally will Nintendo be able to detect you used CFW and ban your account etc?
 

notimp

Well-Known Member
Member
Joined
Sep 18, 2007
Messages
5,779
Trophies
1
XP
4,420
Country
Laos
I had a question about CFW. While I'm looking forward to it, I want to know when using CFW, will it be possible to keep using the Switch with newer game releases and go online etc? Additionally will Nintendo be able to detect you used CFW and ban your account etc?
The principle of linear time progression (edit: from a constant viewpoint. ;) ) is not strong in this one.. ;)

Let me introduce you to the concepts of "cause" and "effect".

One usually happens after the other.

So while we can say, that "people are thinking about that stuff - and there will be attempts made to do what you *want*" - the proof is in the pudding - and the eating. This makes it hard to tell if Nintendo will be able to detect stuff, that they havent even seen yet, because it doesn't exist - in a public form.

If done right, they might not be able to detect it. But then thats theory - at this point. Why not wait a few months, and see how stuff unfolds?

I understand that to you this makes no difference, as all you do is ask the same question at another point in time, but trust me - it makes a really huge difference to the people that you seek to provide you with answers.

"Are we there yet? Not yet. And now? Not yet. And now?"
"How is it? Is it cool? Yep I will I haz fun? Yep. "Will it last forever?!"
 
Last edited by notimp,

Absintu

Well-Known Member
Member
Joined
Feb 2, 2018
Messages
232
Trophies
0
XP
815
Country
Portugal
I had a question about CFW. While I'm looking forward to it, I want to know when using CFW, will it be possible to keep using the Switch with newer game releases and go online etc? Additionally will Nintendo be able to detect you used CFW and ban your account etc?
newer game releases? Yes, u should be fine.
go online? Tricky.... When it arrives, dont go online. Wait for reviews and see if Nintendo will use the ban hammer. and even if u do this, u will never know, because that hammer is instant too alot of users, and by the time u realise it, u could already be banned.
so, wait for CFW, read the documentation they will release, and wait too see how Nintendo will ban.
personaly, im gonna risk online to see shop, and buy some titles if i want, but hell. Im not gonna play online until e see some good review of OPs
 

TotalInsanity4

GBAtemp Supreme Overlord
Member
Joined
Dec 1, 2014
Messages
10,800
Trophies
0
Location
Under a rock
XP
9,814
Country
United States
OK, I get what you're saying - that companies should use this time to look for entrypoints in their own software/OS and fix them. However, that doesn't really factor into the disclosure period. Entrypoints could already exist in other devices for hackers to do what they like. The fact that there's a bootrom flaw that might allow them to make them permanent is kind of here nor there. ReSwitched isn't interested in hunting down all software entrypoints in each Tegra device and telling the companies about it - they're only telling companies it can be accessed directly through this bootrom flaw and that they should do what they can (buy back affected devices? only thing I can think of).

For example, think of the 3DS. Pretend the thing that let us install A9LH had just been discovered as part of a wide range of devices. Situation A) we already had ARM9 access through software and Situation B) we didn't. In Situation A, either Nintendo knows about it or they don't. If they know about it, they've already fixed it. Being told that hackers will now be able to make their modifications permanentl won't really come into it. Say Nintendo doesn't know - maybe software ARM9 access hasn't been discovered yet or isn't released. In this case, how will the disclosure window help them? They can't suddenly discover something and patch it because they've been told of something unrelated. All they know is it will be installable by hardmod, and they can either recall all existing consoles (very expensive) or sigh and hope they make plenty of game sales over the next few months since they can't do anything else. Now Situation B) - well that's the same as when it exists but Nintendo doesn't know about it. They can't patch something they don't know. If they knew it already they'd have patched it. If they didn't care enough to patch it, the news probably won't make them care more.

In the other devices' case, if there is a software exploit that will allow permanent installation with the bootrom flaw, then if companies cared and they knew about it they would have patched it already and the disclosure window won't affect them in any way. If they don't know the exploit yet then the disclosure window isn't going to help them discover it either. All they can do with the extra time is recall or buy back the affected devices, since they know it will be installable by hardmod when released.
I don't think that you quite understand that the disclosure window here isn't for Nintendo, it's for the vendor of the "wide range of devices" (in this case, the Tegra chip, in your case, the 3DS chip) to research the issue and either distribute "duct tape on the Hoover Dam" type hotfixes to the companies they vend to (which, as you already understand, would do next to nothing to fix the issue other than potentially closing software entrypoints) or to announce the issue to said companies along with a complete technical analysis and recommend some form of device recall if the issue affects safety
 

mendezagus

Well-Known Member
Member
Joined
Aug 29, 2017
Messages
159
Trophies
0
Age
44
XP
423
Country
Argentina
Watching the amazing predisposition of @ktamkin i´ll ask a possible stupid question: Is F-G reversible? i mean: if i install F-G can i reverse the switch to the original factory state if i want to play a game online but i´m afraid of getting banned?

This is just out of curiosity. I´m almost sure i´ll go online to play smash bros when the time comes and risk the ban.
 

Rune

Well-Known Member
Member
Joined
Feb 15, 2017
Messages
693
Trophies
0
XP
2,457
Country
United Kingdom
The principle of linear time progression (edit: from a constant viewpoint. ;) ) is not strong in this one.. ;)

Let me introduce you to the concepts of "cause" and "effect".

One usually happens after the other.

So while we can say, that "people are thinking about that stuff - and there will be attempts made to do what you *want*" - the proof is in the pudding - and the eating. This makes it hard to tell if Nintendo will be able to detect stuff, that they havent even seen yet, because it doesn't exist - in a public form.

If done right, they might not be able to detect it. But then thats theory - at this point. Why not wait a few months, and see how stuff unfolds?

I understand that to you this makes no difference, as all you do is ask the same question at another point in time, but trust me - it makes a really huge difference to the people that you seek to provide you with answers.

"Are we there yet? Not yet. And now? Not yet. And now?"
"How is it? Is it cool? Yep I will I haz fun? Yep. "Will it last forever?!"
A simple "we don't know yet" would've been fine. :rofl:
 

oibaffus

Member
Newcomer
Joined
Jan 27, 2011
Messages
13
Trophies
1
XP
1,042
Country
Gambia, The
Is the translation meant to be missile jelly or rocket jelly? Thats funny, like lube

I think it's something like "frozen fuse", a play on the fact that the Switch burns fuses when updating (to prevent downgrades), but beeing this a coldboot (=> frozen?) exploit, it circumvents the fuses entirely.
 

Classicgamer

Well-Known Member
Member
Joined
Aug 20, 2012
Messages
646
Trophies
1
XP
983
Country
United States
I find all this information fancinating. Thanks Kate! It’ll be great when the time comes. I’m sitting on a few switches adequate for testing if need be ;)
 
Status
Not open for further replies.

Site & Scene News

Popular threads in this forum

General chit-chat
Help Users
    Psionic Roshambo @ Psionic Roshambo: https://m.youtube.com/watch?v=_NTF5_qgH0o