@vb_encryption_vb , your video is already available to see! The fact that this is really possible is crazy! What started as a simple hypothesis from @Apache Thunder became an actual process under a day!
This is awesome! confirmed success that this works, and a video to go with it. This makes me extremely happy, though sad as I turned my ds into a paperweight lifting a pad :ohnoes:. I did get a new motherboard for it though. Hopefully a way to write directly to nand in software becomes...
Would putting the ds in sleep mode then switching up the game with an almost identical copy keep it from ceasing up? I recall doing something similar on my original ds; not sure if it would be the same.
I understand. What I'm asking is if physical 3ds games require direct arm9/arm11 support. If so, we could always try the back in the day solution of swapping a game while it's running (in this case do it while the ds is in sleep mode, and run a fake version of that game with injected code...
ah, okay. Didn't understand how sysupdater worked with directly downgrading. Thanks.
When would someone gain direct arm9 or arm11 access? Would certain 3ds games need direct access? If so, couldn't we inject said games and hijack from there, just like the good old ps2 days with elfloader...
No, I already know that this needs a hardmod. I sacrified my ds to find out if this would work, as in a previous thread I was the one who instigated all this madness. What I'm saying is that we would need to find an exploit to write to the nand so the general mass could use this, or a...
This is amazing seeing that a simple hypothesis from @Apache Thunder became an, although highly untested, and non-noobfiendly, became something that we could work with! Its reasons like this that I'm glad to become part of the community.
On the 3ds homebrew wiki, It has specifics on hex addresses and points in which the fw partition is available. I believe I read somewhere that there was a tool to extract partitions in this thread.
It would be a good idea to use someone elses, though if you try to achieve it through the...
If it seems right, page 2 has a batch file that automatically does this process. All you need is any nand.bin of your 10.4.0.30u or 10.5.0.30u Nand.bin, and extract the fw partition of both your Nand.bin and a Nand.bin of 10.3.0.28u/10.2.0.28u. The batch should automatically do the work from...
Bad news... I'll have to pass work down to other people with the 10.5 firmware that could do a hardmod or have a way of backing up and writing to nand. While attempting to resolder on wires, I lifted up and destroyed the cmd pad. I cannot continue, as I will need a completely new motherboard...
I would love one! I would email the link to [email protected] , as this website does not condone the act of sharing dumped nands, and honestly for good reason.
Just checking, is it a 28u or 28e or 28j ?
10.2.0.28u and 10.3.0.28u have the same firmware revision in them , which is shown by the suffix '.28u' . This is also why the process to anything post 10.2.0.28u homebrew-wise is the exact same procedure on 10.4.0.30u or 10.5.0.30u- both have the '.30u' suffix, indicating it has the same...
Amazing! That is amazing detail apache. If I can get a 10.3.0.28u/10.2.0.28u nand dump I'll attempt it tomorrow. If it works the next step is finding a kernal exploit we could use.
Would you be able to decrypt said nand dump of other persons' dump and decrypt your own, and only flash the firmware partitions of each? would there be an issue? If so, I propose a hypothesis of there being a key on the firmware partition. I will try to find another dump of 10.5.0.30u and...
would it be illegal for someone to pm me with a link towards one (nobody would know) or email me at [email protected] with a link of a nand dump of 10.3.0.28u? I would continue looking, but I'm on my way home from work and haven't had sleep for about 2 days.