Maybe that was just a contact pin error, or a header read error.
i donno how it would be a contact error, i was playing online with others worldwide for a good 30 minutes before i paused it and that happened.Maybe that was just a contact pin error, or a header read error.
Although that would be super interesting if something came of that..
I'm guessing that's your own personal copy doing that? Is it reproducible?
Care to state your legitimate reason to facepalm at him, sir?
*facepalm* :-/
im not posting an already posted theory so thats what i didnt mention it. im messing around my 3ds by myself and wanted to know that and it is for hacking purposes. if i get results i always post them, as long as no one else has posted the same thing.Perhaps he's suggesting that the 3DS writes DSi data to the SD card after encrypting it using the 3DS's key, so if we hacked a DSi game that wrote encrypted data to the SD card, we'd be able to encrypt data using the 3DS's console key. However, I don't think there are any DSi games that need to write encrypted data to the SD card and we'd also need to know the plaintext of some encrypted data used by the 3DS so we could modify it. Also, I don't think that's what he was suggestingWhy would we crash it in DSi mode?Okay then, can DSi cards do anything with the SD card?
Yes, sir! I've tested... MPO files only. This thread is for hacking theories, state your theory or kindly GTFOOne question. What files have you tested that can be downloaded by 3ds browser? This is for my own reasearch. Please just limit to answer the question.
why facepalm he found a glitch and is curious if it can be exploitable
Care to state your legitimate reason to facepalm at him, sir?
umm...what?why facepalm he found a glitch and is curious if it can be exploitable
Care to state your legitimate reason to facepalm at him, sir?
It's not exploitable.
This is a dev 3ds with an installed application which was made by someone has the sdk, so it's uninteresting.
Read this: http://www.3dbrew.org/wiki/CIA
Do you know how you did it?umm...what?why facepalm he found a glitch and is curious if it can be exploitable
Care to state your legitimate reason to facepalm at him, sir?
It's not exploitable.
This is a dev 3ds with an installed application which was made by someone has the sdk, so it's uninteresting.
Read this: http://www.3dbrew.org/wiki/CIA
the picture i posted was from a retail Mario Kart 7 cartridge, and a retail 3DS system...so, i dont know how you thought i was using a dev 3DS
I have an idea - we can just make a 3DS from scratch! Or we could just follow the last post's advice since this thread is nearly dead. When someone hacks the firmware or creates a mod chip, we'll see what happens. I'm thinking that Nintendo does additional checks now, even after a cart is loaded. The old trick on the DS of booting a legit game then swapping out the data in exploitable areas of the game's code won't work now? It makes sense that it works for DS mode because they emulate a DSi, it seems. For 3DS games, that won't work probably because of checking it randomly or on intervals/every load from ROM to RAM.