Indeed. OTP is fun.Alright, now am I doing this right?
1: Put the code.bin and load.bin into root of SD
2: Scan this QR https://imgur.com/7Q35Tuy with CN
3: OTP will be on SD card
Indeed. OTP is fun.Alright, now am I doing this right?
1: Put the code.bin and load.bin into root of SD
2: Scan this QR https://imgur.com/7Q35Tuy with CN
3: OTP will be on SD card
I scanned the QR code but it kinda froze after the top screen going black after displaying a bunch of garbage. Isn't it suppose to autoshutdown after getting the OTP or did I just freeze?Indeed. OTP is fun.
I'm assuming you can't just downgrade you emunand to 1.0 to dump the OTP?
The N3DS exclusive method I am aware of is brute-force, and requires a hardmod. Currently, it might still be faster than downgrading from 9.2, due to the number of soft-bricks. However, it is not recommended for anyone not ready to do some reverse engineering.Also there is a N3DS exclusive method I heard about in which you don't have to downgrade at all (so no brick risk) to get the OTP.
maybe arm9loader sets something up, the normal 3ds firmware has problems with, why it refuses do firmlaunch on o3DS. Maybe a key or something.I wouldn't say progressing lol
Can't get a9lh to boot anything on my o3ds and n3ds refuses to boot frankenNAND. haha
But still an experience all the same.
not sure on OoT but:Does anyone know if you can use OOT, after downgrade to 2.x, with a sysnand format then the A+B+X+Y+R launch into OOT and exploit to dump OTP
oot3dhax only has ARM9 support for 3.0-4.5. It could maybe work, if someone ported it down, but probably more effort than it's worth.Does anyone know if you can use OOT, after downgrade to 2.x, with a sysnand format then the A+B+X+Y+R launch into OOT and exploit to dump OTP
This. Browser is the way to go 100%, requires no fuckery other than loading a certain website with some files on the SD cardoot3dhax only has ARM9 support for 3.0-4.5. It could maybe work, if someone ported it down, but probably more effort than it's worth.
I'm not sure if the 2.x I'm running has the proper 2.x browser. I have browser version 1.7455. Does the browser version matter or can I run the browser exploit for 2.x even without the real 2.x browser?This. Browser is the way to go 100%, requires no fuckery other than loading a certain website with some files on the SD card
That IS the 2.1 browser, which is the one you need.I'm not sure if the 2.x I'm running has the proper 2.x browser. I have browser version 1.7455. Does the browser version matter or can I run the browser exploit for 2.x even without the real 2.x browser?
Lovely. I made a vine trying to run the 2.1 QR code with the supplied payloads but no OTP on my SD card. All it did was make some flashy colors.That IS the 2.1 browser, which is the one you need.
alright, here's what's missing: you need the NCSD header from an o3ds NAND injected in place of your NAND's for the NATIVE_FIRM to recognize itNope it just refuses to boot the frankenNAND.
It turns on but that's about it...
Anyway here's the process i was told and am following... someone chime in if something is missing...
Yep did that (as per the process i posted earlier)... i have both o3ds and n3ds remember.alright, here's what's missing: you need the NCSD header from an o3ds NAND injected in place of your NAND's for the NATIVE_FIRM to recognize it