I've always been fascinated by this. What actually happens when a game save exploit (or QR code exploit in the case of ninjhax) is initiated? How do they bypass the system's security and allow the payload to execute? And how to people find the exploits?! I'm sure the answers to these questions is more complicated than I could possibly realise, but I'm hoping somebody can shed some light.