But then hasn't GW released its new GW.3dsx?
And there is still spider, too.I mean using old Launcher.dat that rely on that old ARM9 exploit.
And there is still spider, too.
You mean payloads you need to install with a DS flashcard ?No I believe you don't get what I mean.
There still exist ARM9 homebrews that where made in the 4.5 times, so it uses 4.5 exploits that are patched in 9.2. Someone could want to use them, but there most of the times is a better app for 9.2 has been made, so there's no point.
You mean payloads you need to install with a DS flashcard ?
Disregard that this seems random. How goes progress on memchunkhax2?
I know one guy on 1.0.0@JustPingo How is your development? Hope it goes well.
@Mrrraou There is many keyslots that less than 2 keys could be found when no leaked.
But even with arm9loaderhax, the OTP on N3DS is disabled already (before it ever try to jump to garbage). And don't forget the low possibility and
On page "3ds System Flaws" section "Kernel9" tells me on O3DS <3.x it is possible to dump the OTP. But no useful information could be recovered (say, no plaintext, or encrypted, and keys may only be in the bootrom.. Wait..?), and needless to say how many guys are still on such a low version.
So if no more key is leaked the only hope to get more is corrupt the bootrom execution. Might need external hardware to provide timing assitant.
And yes in fact that doesn't require such hard technical works to pirate games, or downgrading the console. Orz.
EDIT: oh @d0k3. I just remembered one thing. If OTP section is encrypted, then the key should be set in bootrom, thus same key for all consoles (O3DS) - and (LIKELY) same xorpad for those. Please contact Normatt or other elites for the OTP dumps from O3DS and the corresponding keys, hope they still keep this. It should be difficult to decrypt the OTP section without bootrom dump, but it is not that hard to ensure the console-unique keys are there or not. Hope that is just encrypted, and I'm not dreaming once more.
Thanks telling me that. That's.. WTF. Too good sometimes. However only Normatt may know how to dump that.I know one guy on 1.0.0
I am not sure if that was sarcasm but if it wasn't, he made a thread here. If I can find it I will link it.Thanks telling me that. That's.. WTF. Too good sometimes. However only Normatt may know how to dump that.
If he personally want these (including NAND dump, OTP dump) he might contact the elite hackers to ask how to (run/write).
A 1.0.0 NAND could be splendid since there should be no such content on Ninty CDN.
Even this version itself sounds useless, it is so rare that he can make a backup for celebration (Orz).
If that i can recall one that written a thread claiming having the 1.0, but after Normatt told him that is not useful he took advice of getting a CFW.I am not sure if that was sarcasm but if it wasn't, he made a thread here. If I can find it I will link it.
I saw a few pages back that someone wrote that Steveice10 and the rest of the crew are about 65% done with MemChunkHax2, so does that mean we'll be seeing the release around next week?
I saw a few pages back that someone wrote that Steveice10 and the rest of the crew are about 65% done with MemChunkHax2, so does that mean we'll be seeing the release around next week?
I thought so too, I don't mind waiting. I was just stumped by the fact that they managed to get it to 65% in just 3 days hahaPossibly but I'd give them the generous estimate of a month or two.
I thought so too, I don't mind waiting. I was just stumped by the fact that they managed to get it to 65% in just 3 days haha
Even if it takes months, I think that people should still be happy because they are getting free piracy on all firmwares, and the developers aren't getting paid for doing it during their free time. They are doing it for the community. So, please, be patient.Months?
