To do that, might you wanna report a post like this to the mods? Just giving some pointers here.OP is just an entitled, non-contributing member. Please lock/delete thread.
Good for you! Although I'm on 7.0.1 and if Deja Vu doesn't support that firmware it might take longer to me to get it :'(Man, it sure feels good owning a hacked, non patched Switch! I'm happy I went out and bought my Switch early!
Deja Vu is a warmboot exploit chain. Warmboot means it is applied while the console is still on. The current exploit, Fusee Gelee, is coldboot as it is triggered before the system is turned on.Good for you! Although I'm on 7.0.1 and if Deja Vu doesn't support that firmware it might take longer to me to get it :'(
I wonder what Deja Vu does anyway, CFW on boot?
Oh ok! So Deja Vu injects something to the Switch, and on the next boot it loads the injected exploit? If so, that's actually cool! Wish it could work for 7.0.1, but I think I heard it works for firmwares below 5.0, right? I'm not sureDeja Vu is a warmboot exploit chain. Warmboot means it is applied while the console is still on. The current exploit, Fusee Gelee, is coldboot as it is triggered before the system is turned on.
Er, no. If you're familiar with PS4 hacking or Mocha for the Wii U, that is how Deja Vu is launched. I posted a video on the first page. And Deja Vu has been fully patched as of firmware 8.0. Parts of it got patched on lower firmwares that hackers could replace however the final nail in the coffin was delivered in the most recent firmware. The issue is higher firmwares won't be able to boot Deja Vu as early as lower firmwares.Oh ok! So Deja Vu injects something to the Switch, and on the next boot it loads the injected exploit? If so, that's actually cool! Wish it could work for 7.0.1, but I think I heard it works for firmwares below 5.0, right? I'm not sure
I didn't update to 8.0.0, which I'm lucky I didn't.Er, no. If you're familiar with PS4 hacking or Mocha for the Wii U, that is how Deja Vu is launched. I posted a video on the first page. And Deja Vu has been fully patched as of firmware 8.0. Parts of it got patched on lower firmwares that hackers could replace however the final nail in the coffin was delivered in the most recent firmware. The issue is higher firmwares won't be able to boot Deja Vu as early as lower firmwares.
so does this mean that older FW will be able to get homebrew or emunand on lower FWDeja Vu is semi-old. It uses diffrent kind of bugs as far as I can tell. Deja Vu is totally patched in Firmware 8.0, and until some one of the hackers finds a way to "keep the bugs" in even when upgrading your CFW. You are SOL. Else Emunand is the only thing that will save you.
So no, RCM is the most convenient since it isn't patchable on a software level.
what about self hosting like with an esp8266 board?Its not completely untethered though, you'll need a wifi connection to use the exploit
so does this mean that older FW will be able to get homebrew or emunand on lower FW
without a RCM jig or payload inject from dongle/phone ?
will this be a cold boot or warm boot exploit that replaces RCM payload injection via USB?
so basically like ps4 exploitIt's basically
Turn on switch in stock
Open web browser that points to a specific address
Switch eventually reboots into cfw
so basically like ps4 exploit
i wonder if we can cache it like with ps4
shame it got patched now right before new hardware
never heard something with emuand but your answer is not very helpful cuz i guess he dont works so 2 months straight xd
It's basically
Turn on switch in stock
Change DNS settings to a specific address
Open web browser
Switch eventually reboots into cfw
never heard something with emuand but your answer is not very helpful cuz i guess he dont works so 2 months straight xd