Not only the browser, but another app or game too!The 3ds Friend Service makes the version checks for the YT app before it makes any http requests itself.
I'm just hoping they can't do the same for the browser.
I doubt it can. The browser isn't like other apps. It can only be updated via a system update.The 3ds Friend Service makes the version checks for the YT app before it makes any http requests itself.
here let yellows fill you in:
I'm just hoping they can't do the same for the browser.
If we can update single apps via cia installs I don't see why Nintendo couldn't.I doubt it can. The browser isn't like other apps. It can only be updated via a system update.
Yes, I should have been more clear. The browser is a multitasking app vs a regular app. It doesn't launch or run like a regular app does.If we can update single apps via cia installs I don't see why Nintendo couldn't.
The dsi had it's browser installed (and updated) from the eshop, so if Nintendo wanted to do that with the 3ds, I'm sure they could. It's a good idea from a security standpoint.
Can't, the app stops you at the door.What if you manually go to smea.mtheall.com through the google trick?
Oh. What if you turn off your router, open the app, then turn on your router?Can't, the app stops you at the door.
If it can't connect to the internet it will return an error. If it can, it will see it's outdated. Checkmate.Oh. What if you turn off your router, open the app, then turn on your router?
Oh. Well then. I still have Ironhax, Ninjhax, and Themehax thoughIf it can't connect to the internet it will also return an error. If it can, it will see it's outdated. Checkmate.
That seems like a lot of work and reverse engineering when we already have other exploits.Someone has tried to setup a dns that bypass the "friend service" check requests ? Like it would redirects the requests to a malicious server that will send back an "ok" code and the application would run again because it needs no update according to the (malicious) server response
Good point. But other apps won't need it. If the hack works offline you could just turn off wifi and start it.Yeah, you're right, but as a "tubehax maniac" I would really love to see it resurrected. Plus it would also work for other applications blocked by that friend service, so it's not a total waste of time and effort..
The custom dns is just for manipulating yt app so YouTube.com will refer to smea's hax page which trigger hb payload. The friend service is done before http request happen, so the only way is to bypass it to fake friend service so it think it's the last update, but this data likely to be encrypted, and using ssl. The only thing can bypass it is kernel exploit.Someone has tried to setup a dns that bypass the "friend service" check requests ? Like it would redirects the requests to a malicious server that will send back an "ok" code and the application would run again because it needs no update according to the (malicious) server response
