This. Do this and you could theoretically exploit spreetpass, spotpass and any other wireless communication the 3ds uses. But the chance of someone doing that is extremely slim.Sure, if you find a vulnerability or decrypt their keys and encryption and whatever else they use, and then develop the software and payload for it.
Not unless you're aided by the power of BLACK MAGICThis. Do this and you could theoretically exploit spreetpass, spotpass and any other wireless communication the 3ds uses. But the chance of someone doing that is extremely slim.
Yep, I don't think someone wants to dedicate a significant portion of their lives to decrypting that crap. Unless they're really lucky and talented, they could spend years working on it.This. Do this and you could theoretically exploit spreetpass, spotpass and any other wireless communication the 3ds uses. But the chance of someone doing that is extremely slim.
and if you do this you should consider selling that information for millions of dollars as you invalidate millions of dollars of crypto techYep, I don't think someone wants to dedicate a significant portion of their lives to decrypting that crap. Unless they're really lucky and talented, they could spend years working on it.
Why are you asking? It seems to me like you heard something not yet to be heard by the public...Is there a way to send a signal to the 3DS from a PC to run boot.3dsx in Download Play?
Sure, if you find a vulnerability or decrypt their keys and encryption and whatever else they use, and then develop the software and payload for it.
Well, I mean without a vulnerability, but that was more meant to just convey how ridiculous of an undertaking it would be without stumbling across another vulnerability.No need to decrypt the keys. Thats the vulnerability and thats all that's known at this point.
Google have one don't they?All you need is a quantum computer and all of cryptography is a joke to you.
Unfortunately, Goohax was just blocked by the new 10.4 update. Here are the patch notes:Google have one don't they?
If we break into googles headquarters, we can hack everything
Wait... does that mean google could already have a 9.3+ kexploit?
Goohax confirmed!
Which i showed you the vulnerability stumbled upon.Well, I mean without a vulnerability, but that was more meant to just convey how ridiculous of an undertaking it would be without stumbling across another vulnerability.
Okay. I don't know what all has been found relating to that. I haven't messed with it at all, just spouting out the general rhetoric for what's needed for a usable exploit. Even with a vulnerability, assuming the vulnerability will give you access to everything you need to make it usable, there's still a lot of work that has to be done before it's usable.Which i showed you the vulnerability stumbled upon.
This. You can't just "make an exploit" Squiddo.Sure, if you find a vulnerability or decrypt their keys and encryption and whatever else they use, and then develop the software and payload for it.
This. You can't just "make an exploit" Squiddo.
Yep. I don't give any regard to stuff or peopleBecause he/she has no heart.
Yep. I don't give any regard to stuff or people
Anyways back on topic, can't we send a buffer overflow of packets ?
He used can't the exact way its supposed to in that sentence. You don't say "may we not send a buffer overflow of packets?".I don't know. Can we?
Go give it a shot.