I just have some quick questions about Ninjhax, Ironhax, and OOThax.
- How do each of these exploits work?
- Are they related in anyway?
- Why are Ironhax and OOThax secondary exploits but Ninjhax isn't?
- Why did Ninjhax have kernel 9.2 and below but not after?