Check PM.

I have no idea why it isn't working for those 2 images either...
Well, Decrypt9 tried to load the unmount GFX after the SD card was unmounted, and the debug background GFX was loaded before the screen was cleared. Now, why didn't this work?

Anyways, I already fixed it in my Github, just take over my changes.
Riku isn't interested in fixing his way of creating .CIA, where every file created is icon.bin 0x2018 offset 0x7fffffff RegionFree and uses the same key.
If you have any .CIA created by Simple, create your ticket.db and decode it with printKeys.py.
You will see all of the files from Simple have the same key. ( seems like an easy target to detect.

)
You wouldn't believe but I actually wondered which key Riku uses. I was just too lazy to try and find out. And yup, easy target. I'm pretty sure Nintendo could easily wipe out all of Riku's stuff (with user savegames and all) with the next FW update. Make this timed with a random timer, and no one (but N3DS users, cause we can't update the EmuNAND anyways

) will be safe.
Also, the problem of not being able to "fix" the User Manual problem occurs on true RegionFree Games too (any Game Serial ending in "A", like CTR-N-JFJA). They have the same issue with the Manuals as do RegionFixed games.
That can only mean that these manuals have in a way or another been tampered with (ie. that the signature doesn't match). I'll see about an easy fix, but this truely is an annoying issue. I really don't want to throw away perfectly good data. What I could offer pretty fast would be a small command line utility that you'd have to use on the .3DS before converting it with Riku's tool. You could also do this manually - actually it would be a good thing if you tried. Just zero out offsets 0x128 till 0x160 (including 0x128 but excluding 0x160, to make that clear) in the 3DS rom, then process it with Riku's tool.
Edit: Oh yeah, one more little thing that does needs your expertise to look at.
If I create a decTitleKeys_emu.bin and a ticket_emu.db from Decrypt9WIP, the decTitleKeys_enu.bin is missing the last key in the set.
Example:
If I create a encTitleKeys.bin from the ticket_emu.db using dumpTicketKeys.py, then use decrypt9wip to create a new decTitleKeys.db, it is one key longer.
Okay, one moment. Not sure if I got that right. You mean if you decrypt titlekeys directly from EmuNAND, one key is missing, vs the old manual method of using dumpTicketKeys.py, correct? Good catch, btw. Is that title key a special one? And can you make absolutely sure it is not a duplicate? The NAND ticketkey decryptor has duplicate checking, but dumpTicketKeys.py most likely does not.
Also, since I'm being my usual pita today, is there any way to enable the clock for file timestamps while in ARM9, or was this already asked/answered and I missed it?
Sorry, but no, I don't know of any way. It may as well not be possible. By the way, since you first brought up that idea - what do you think about ZIP3DSFX - is that what you had in mind? The EmuNAND format feature in Decrypt9 needs some work so that it could actually take a file over, and I hope you will help me testing again once that is finished

.
It's 2 VC Games (NES). (made with 3DS Simple CIA converter)
How are you using simple CIA converter (which converts only .3ds files into .CIA files) to make VC titles?
Yeah, that's what I like to know, too

. I need more information! Normally, the shallow CIA decryptor is not required for Riku's converted CIAs (they don't even have shallow encryption). VC NES games can't be deep decrypted (cause they are not in NCCH format). Still, the error message is weird. As I said, I need more info.
@d0k3 , just want to throw this out there: do you think decrypting DSi TADs (sd
exports) is possible with decrypt9?
It's a feature I've always wanted - thought I'd take a chance and ask. Don't mind me if it's any big trouble, you've accomplished a hell of a lot already. This would just be icing on the cake. : ) Thanks.
I'd need more info on these files, more specifically on the keyslots and / or keys used. The TAD files themselves seem to have
a pretty simple file structure but the info on DSibrew is not enough to be able to actually decrypt them. Also, you'd only be able to decrypt these files on the 3DS they were first installed on. No way to do anything with old TAD files.