I've been using the private seed of another 3ds since the Pokemon S/M bans and haven't been banned since.
LocalFriendCodeSeed_B, it's the identification file for a 3ds that connects to online services.
They dumped the kernel, that's it. Not sure why anyone thinks this is even remotely close to finding an exploit. Is it a step towards an exploit? Yes, but a small one. Nobody should expect news of a solid exploit for months, maybe even a year. Also, without proper understanding of how the switch...
So I can start with a completely clean SD card, and follow this: https://3ds.guide/finalizing-setup , and be able to do it? I'm assuming I must need some other files if it isn't working.
I do get brought to the Luma config, and I have a boot.firm on the SD card. My problem is how do I go about reinstalling CIAs onto my system after I formatted the SD?
I'm renaming the .firms but they still don't open when I hold the button down and boot.
I'm talking about starting from an empty SD card, but I'd imagine Luma needs b9s files too? I can't load into any menu except normal Luma config.
Long story short; had to format my micro SD because it got corrupted. My system version is "Sys 11.4.0-37U", I previously had installed boot9strap but I am lost now that my microSD card is completely clean. What steps can I take to get CFW back?
I finally modeled and 3d printed the new HDD cages I need in order to build my 2nd NAS. Original ones don't fit the mounting holes on the hdds I'm using. Been sitting on this project for over 2 years smfh
Also another 70TB going in the front mount drive bays of this server. 182tb raw, going to probably use a zfs RAID-Z3 for 3 parity disks, so 140TB usable
I could claw back 14tb by only doing 2 parity disks but I feel like with 13 disks in the RAID I'd be kind of pushing my luck on rebuild time if I encounter a disk failure