[Discussion] Mount/Dump Cardridges via Powersaves Dongle

Discussion in '3DS - Homebrew Development and Emulators' started by adrifcastr, Sep 17, 2018.

  1. adrifcastr
    OP

    adrifcastr GBAtemp Addict

    Member
    8
    Sep 12, 2016
    Germany
    So I don't know the exact hardware of the dongle, so I dunno if it actually can access the rom or just the saves.
    But it would be really convenient to be able to just mount cardridges on the fly to access the ROM via Emulators (Citra, DesMuMe, melonDS) any opinions?
     
  2. Lglaplante

    Lglaplante Pkmn Rom Hacker

    Member
    3
    Feb 12, 2017
    Canada
    Quebec
    Powersave only access the save file, otherwise I think that feature would’ve existed
     
    Itzumi likes this.
  3. ghjfdtg

    ghjfdtg GBAtemp Fan

    Member
    5
    Jul 13, 2014
    Older versions can actually access the ROM but it's still unknown how the protocol encryption works. Datel worked around this by using a replay attack + xorpads.
     
  4. adrifcastr
    OP

    adrifcastr GBAtemp Addict

    Member
    8
    Sep 12, 2016
    Germany
    I mean, if the dongle can read the rom, there should be a way to be able to mount the raw data to a drive
     
  5. Lglaplante

    Lglaplante Pkmn Rom Hacker

    Member
    3
    Feb 12, 2017
    Canada
    Quebec
    i think the problem is the gamecart itself as you cannot write on it
    You could read (like RomFS explorer on the 3ds) but not write
     
  6. adrifcastr
    OP

    adrifcastr GBAtemp Addict

    Member
    8
    Sep 12, 2016
    Germany
    Ya, just mount the raw data as read only, Citra/Desmume can load encrypted roms, I mean It shouldn't be that hard to write a driver for the device that just mounts all raw data it reads to a disk drive, like HacDiskMount does w/ the switch emmc.
     
  7. ghjfdtg

    ghjfdtg GBAtemp Fan

    Member
    5
    Jul 13, 2014
    The problem is the protocol encryption as said. The powersaves handles nothing. You send commands to the gamecart purely in software which means you have to deal with this. Using xorpads is infeasible here since you would need xorpads as big as the ROM itself to be able to decrypt the data fully.
     
Loading...