I've wondered this too. I think I know how the bricking is done. I think one of the blocks (63?) gives the file full access of the file system. doing this manually seems like a lot of work. I don't own a hacked switch, but I've read that tinfoil (is that it?) can determine if it's been tampered with. what I usually do is just verify with nsp verify on the pc. not really sure, but it may be able to tell if the file has been tampered with.