Christmas Nintendo Gigaleak reportedly contains Mariko BootRom source code and Let's Go beta

d.png

Merry Christmas, GBAtemp! Today may be a very Merry Christmas for those that like to dig into leaked data, as the latest files from the ongoing Gigaleak--part 8, to be exact--have made their way online, supposedly. According to those who have already gotten their hands on the illegally-obtained files, within the .zips lurks a beta build for Pokemon: Let's Go Eevee as well as a major bit of data: the source code for the Mariko BootRom, with classified files straight from NVIDIA. As always, sharing these files is against GBAtemp's ToS, but feel free to discuss them!
 

ZachyCatGames

Well-Known Member
Member
Joined
Jun 19, 2018
Messages
3,398
Trophies
1
Location
Hell
XP
4,209
Country
United States
ok but the question is why even bring the first revision out ....why work on 2 revisions
Because they had already completed work on and were producing the original device?
There’s more to developing new devices than the SoC :P


There probably was a deal to use up the rest of nvidias stock of Tegra X1's sitting around to save $. keep in mind that nintendo went full on trying to profit off switch hardware sales. It was not being sold at a loss.
They weren’t using spare/old stock.
They were all newly manufactured chips from what I can tell.
 

GBADWB

Well-Known Member
Member
Joined
May 12, 2016
Messages
283
Trophies
0
Age
32
XP
1,803
Country
United States
can someone explain me quickly the concept of bootrom?

when you turn any computational device on, there needs to be an instruction that has to happen at the start. The bootrom is a piece of read only memory that contains the first set of instructions required for a device to boot. what the device does after depends on later design, but due to it being read only memory, its the part of the design that cannot be patched via conventional update.

A typical bootrom will usually load a bootloader in, which will load the OS onto memory. The bootrom itself however can be harddesigned to do this on its own, as it is just a piece of code written into fixed memory

so to take a switch example for instance, the bootrom of the switch when exploited can run code at some adress that makes it load a software bootloader(like Hekete) or w/e bootloader one designs it.
 
Last edited by GBADWB,

Ampersound

Well-Known Member
Member
Joined
Feb 4, 2018
Messages
276
Trophies
0
Age
37
XP
1,471
Country
Germany
Come one its their property. Nintendo has all the right to take any meassures. We know that most of people dont download CFW just for "Homebrew" When Nintendo trows a new update and CFW is not working, everyone is asking when a new update is going to be released so they can continue playing on CFW. People get angry because Nintendo take meassures to stop people using CFW games, that normally are bought on stores or Eshop. I do like CFW as well, but just blamimg Nintendo and all while people are using their services for free is not fair at all, is it.

"Nintendo has all the right to take any meassures"..
OK, guess it's ok for the Nintendo NInjas to burn your house down because of a suspicion you're connected to the homebrew scene.
Or kidnap you.
But by god let's make sure that nobody circumvents copyright protection!!!111!1
 

FAST6191

Techromancer
Editorial Team
Joined
Nov 21, 2005
Messages
36,798
Trophies
3
XP
28,321
Country
United Kingdom
i guess you didnt understood what i meant but ok.....there are allways people who say f...nintendo cfw needs update again and so on.....but many dont even bash at em in this case .....Nintendo can protect their property....they can take measurements against....but what not ok is...even if they are hackers......they dont have the right to get ANY PRIVATE INFO about em.....ok.....living place and work is ok (they actually need that info)..but....what tf they need releationship.....family and other crap?......thats what is concerning.....to force someone to work for em....i mean....WTF

Is it private info?
If it is gleaned from public sources and observations of you in public (as in the other thread this is a basic background info from a private investigator type deal, nothing radical really). Something you will also want to know if you are planning to take someone to court -- if they are a millionaire playboy hacker then that you approach far differently to average man on the street but with some computer skills. Know their routine, their support structure and their abilities/disposition -- know your enemy and all that.

Forcing is equally a strong term, though it could well end up as "offer you can't refuse" it is never the less a thing you can do and incentive to not have to deal with going to court is one aspect of it.

I am really still struggling to see why it rubs people the wrong way so seriously.
 

smf

Well-Known Member
Member
Joined
Feb 23, 2009
Messages
6,643
Trophies
2
XP
5,862
Country
United Kingdom
"Nintendo has all the right to take any meassures"..
OK, guess it's ok for the Nintendo NInjas to burn your house down because of a suspicion you're connected to the homebrew scene.
Or kidnap you.
But by god let's make sure that nobody circumvents copyright protection!!!111!1

If Nintendo got caught burning your house down or kidnapping you, then they would be in serious legal trouble.

Assuming the mariko bootrom is already available, the bootrom source is probably not going to make any difference.
 
Last edited by smf,

realtimesave

///AMG
Member
Joined
May 19, 2020
Messages
514
Trophies
0
Age
45
XP
978
Country
United States
Although I can't do anything with it, I just had to seek out and download the Mariko source code and documents lol. so damn easy to find.
 

ChibiMofo

Elon Musk is my dog
Member
Joined
Jan 29, 2019
Messages
700
Trophies
0
XP
2,853
Country
Canada
you exploit binaries not source code. this doesn't really get us anything we didn't already know.
Uh, yeah. You're clearly not an elite hacker. In fact you clearly aren't a hacker. In fact you clearly know very little if anything about the hacking process or writing code. No one who does would suggest that having the source code does not help in exploiting the resulting binaries.
LOL!
 

ShroomKing

Somebody
Member
Joined
Mar 3, 2017
Messages
470
Trophies
0
Age
29
Location
in bed
XP
1,965
Country
United States
Uh, yeah. You're clearly not an elite hacker. In fact you clearly aren't a hacker. In fact you clearly know very little if anything about the hacking process or writing code. No one who does would suggest that having the source code does not help in exploiting the resulting binaries.
LOL!
In this case it doesn't help much if at all.

WTF is an elite hacker?
 

Valery0p

Well-Known Member
Member
Joined
Jan 16, 2017
Messages
560
Trophies
0
XP
1,646
Country
Italy
Btw, does anyone know what's the key combination Nintendo uses to boot recovery mode on a switch lite? Is the "hidden button" even accessibile without opening the console in this revision? (Because if it is, that could have been a nice way to dissuade a lot of people from modding their consoles; IIRC that's what happens with WiiU SD boot)
I mean, it might not be that useful if this time the bug isn't in the RCM usb protocol, but you know :P
 

Adran_Marit

Walküre's Hacker
Member
Joined
Oct 3, 2015
Messages
3,781
Trophies
1
Location
42*South
XP
4,552
Country
Australia
i have 3 betabuilds of pokemon sword (patched for retail consoles)
Remember they are illegal to share here


Btw, does anyone know what's the key combination Nintendo uses to boot recovery mode on a switch lite? Is the "hidden button" even accessibile without opening the console in this revision? (Because if it is, that could have been a nice way to dissuade a lot of people from modding their consoles; IIRC that's what happens with WiiU SD boot)
I mean, it might not be that useful if this time the bug isn't in the RCM usb protocol, but you know :P

I doubt it but I'm no expert on the lite
 

FAST6191

Techromancer
Editorial Team
Joined
Nov 21, 2005
Messages
36,798
Trophies
3
XP
28,321
Country
United Kingdom
Uh, yeah. You're clearly not an elite hacker. In fact you clearly aren't a hacker. In fact you clearly know very little if anything about the hacking process or writing code. No one who does would suggest that having the source code does not help in exploiting the resulting binaries.
LOL!

I don't know.

If I was given a Windows box, told to hack it and said "fancy having source code" then all day long will I take source.

Source may well reveal things that a basic disassembly, especially if assembly skills are anything less than http://www.catb.org/jargon/html/story-of-mel.html (which is going to be most even self styled hackers these days), might well miss, though I have also caught things in assembly that I might not have spotted in source (especially if is a language or revision thereof I don't know. This also says nothing of the compiler maybe having a fault).

If it is a boot ROM then if it is the usual burned in a few hundred bytes of something at die level (which would be a sweet place to exploit as... burned into something at die level as they will likely not issue a recall for that) then that has maybe a basic power on self test, failure/recovery boot option and normal boot option guarded by basic crypto (public-private or HMAC... really does not matter) with no special bells and whistles that might lead to interesting exploits then that is the sort of thing you can pretty thoroughly vet with manual analysis of a disassembly, and as such that renders source code as cool to see but not much else.
 

Jhyrachy

Well-Known Member
Member
Joined
Jul 25, 2011
Messages
262
Trophies
1
XP
1,003
Country
Italy
Uh, yeah. You're clearly not an elite hacker. In fact you clearly aren't a hacker. In fact you clearly know very little if anything about the hacking process or writing code. No one who does would suggest that having the source code does not help in exploiting the resulting binaries.
LOL!

What you are suggesting is called "security trough obscurity" and has been disproved multiple times.

The source code of pretty much all cryptographical process is public, but they haven't been broken.

That's because a well designed system does not rely on the lack of knowledge of its protections to be safe.

What the source code will do, is help the people who understand cybersecurity to find if there is any pre existing exploit not yet discovered.

This is done pretty much every time any system is updated (even computer OS like windows and linux):
Check what the updates change, study why it has been changed, exploit on the systems not up to date.
 

Site & Scene News

Popular threads in this forum

General chit-chat
Help Users
  • No one is chatting at the moment.
    SylverReZ @ SylverReZ: @OctoAori20, Cool. Same here.