OVERALL:
1-is it hacked ?
2-can it be hacked? or is this a lead to go on?
This thread can be summed up in five words: the hack is a lie.
Thanks..... please let me know when there is something new so i do not have to go thru pages of crap & nonsense
http://gbatemp.net/threads/3ds-firmware-has-been-decrypted.332624someone may have decrypted the system or whatever
They're already at that point, its just that they can't display graphics, just text.But is it useful, can it be used to run unsigned code?
region free would be sweet. and some nice video playback app that is 3D and supports a wide range of formats!
What's going on with this picture Neimod uploaded?
http://www.3dbrew.org/wiki/File:CustomNotification.jpg
It wasn't Neimod, it was Xcution -- who's a couple of tiers below Neimod.What's going on with this picture Neimod uploaded?
http://www.3dbrew.org/wiki/File:CustomNotification.jpg
this wasn't neimod, it was xcutionJust looking at that picture makes me all excited. I can see future exploits on the horizon!
http://cgi.ebay.fr/ws/eBayISAPI.dll?ViewItem&item=130771803197It wasn't Neimod, it was Xcution -- who's a couple of tiers below Neimod.
And I think that system he's running is a dev unit. Although it is a 3dsXL, so I could be wrong (haven't seen any XL dev units).
i seem to cant find where the save is on 3dbrewWoah, all the 3DS brew recent changes reminds me of my operational system classes.
Mutex? Semaphores? Thread? Cool. So cool, man, I think I will try to learn more about these exploits. I heard it used stack smash or something like that, concepts I learned on classes applied to real life .
Edit: I looked at the changes there, and Yellows8 uploaded a crashmo save file... maybe the exploit is related to that, if we think about it, they found the exploit after crashmo launch. Plus, before that they tried to exploit pushmo QR Code, trying to read big string from it and causing a segmentation fault (or something like that, idk, but it doesn't work). Maybe they didn't protected it on crashmo, or maybe for some reason they can exploit the other crash.
more than likely notI've got an original 3DS running 1.0.0 firmware. I haven't connected it to wifi yet...
Wonder if there's a way to exploit with connecting to the eShop.
The exploit is not related to that save file, yellows8 has confirmed the exploit is a cart based game, not a downloaded one. At the time the image of the exploit was released, I don't think yellows8 had even fully figured out the SD savedata stuff.Edit: I looked at the changes there, and Yellows8 uploaded a crashmo save file... maybe the exploit is related to that, if we think about it, they found the exploit after crashmo launch. Plus, before that they tried to exploit pushmo QR Code, trying to read big string from it and causing a segmentation fault (or something like that, idk, but it doesn't work). Maybe they didn't protected it on crashmo, or maybe for some reason they can exploit the other crash.
wait dint niemod say that it was card base in he flicker not yellows8The exploit is not related to that save file, yellows8 has confirmed the exploit is a cart based game, not a downloaded one. At the time the image of the exploit was released, I don't think yellows8 had even fully figured out the SD savedata stuff.
It is also known that it is not possible to replace SD savedata without some file from the NAND of your own specific 3DS, which means that SD savedata can't be exploited.