There are multiple masterkeys, each big update added one, so far there are 4 (or more?). Hence you can play older Games but not new onesOke. I would love to know more about how masterkey works in gaming/console. Any place I can read about it?
I know masterkey from encryption/decryption. If I encrypt my data with masterkey and change the masterkey all the older records need to be updated. How come Nintendo can change masterkey, yet older games keep working?
Are there more masterkeys stored inside the console?
i really wonder how nintendo goes and can do to block a hardware flaw with firmware (software) i do not see how stuck a game cartridge that would need firmware 6.0 the cartridge will have the included maj no? without speaking of choi du jour... I think .
If they can't block a hardware flaw (I'm assuming you're talking about RCM), then they can't block it from loading payloads.They can't block a hardware flaw with a patch. HOWEVER they can make it impossible for you to load payloads. There are some patched units in the wild already that, for the time being, throw an error when you try to load any payload
If they can't block a hardware flaw (I'm assuming you're talking about RCM), then they can't block it from loading payloads.
You're talking about new hardware. I thought you meant existing Switch devices that can already load payloads. They'll always load payloads from now on.They can and they have. The payload loading is a SOFTWARE issue, not a HARDWARE issue. The HARDWARE issue is just enabling you to enter RCM, nothing more. Loading payloads is done via SOFTWARE that can be patched. In fact, current units(As in the most, MOST recent ones) are patched against running payloads. You can still enter RCM obviously but it throws an error and blocks any payloads from being ran
Hmm so hacks are becoming not so future proof like the claims always were by cough cough without emunand. Emunand was always that should have happened at the beginning and not this late !
You're talking about new hardware. I thought you meant existing Switch devices that can already load payloads. They'll always load payloads from now on.
the payload before being executed goes through the rcm, uses the gpu flaw then loads the payload, as long as the flaw exists before the injection of payload, any attempt of nintendo is doomed to the failure that's why the mariko switches are created , hardware correction, new revision soc gpu nvidia.is my point of view
Those are still new devices. If you have a device right now that can currently load payloads, a software can't patch that AFAIK. RCM accepts payloads from cold boot before any other software code is read. Nintendo can't patch your device in any way that overrides this.No i'm talking about new SOFTWARE, not HARDWARE. The Switch models i'm referring to aren't the Mariko ones with the new boards, those aren't out yet. The ones i'm referring to have a SOFTWARE PATCH that blocks payloads from loading. Check out the pinned thread called "Switch information by Serial number" all the info is there
Those are still new devices. If you have a device right now that can currently load payloads, a software can't patch that AFAIK. RCM accepts payloads from cold boot before any other software code is read. Nintendo can't patch your device in any way that overrides this.
Yeah, I get what you mean. Having said that, TX claim to have a work around for those newly patched devices as well. Mariko devices are the real problem, whenever they come out.Not on the OLDER systems, no, sorry for the confusion. But they have on the more recent ones, i think those started coming out 2, maybe 3 months ago? Something like that
Yes and it is deja vu (don't trust them when they are saying a coldboot exploit for 4.x+, they didn't really specify anyways, and the fact that tou need the rcm exploit to read ipatch was a lie in itself).Yeah, I get what you mean. Having said that, TX claim to have a work around for those newly patched devices as well. Mariko devices are the real problem, whenever they come out.
Deja Vu is a trustzone exploit (that only works up to 4.1.0 currently), not an rcm exploit. Similar to Jamais Vu:Yes and it is deja vu (don't trust them when they are saying a coldboot exploit for 4.x+, they didn't really specify anyways, and the fact that tou need the rcm exploit to read ipatch was a lie in itself).
I don't think they will create it by themself since they know other people already have it. And it would be stupid to burn it before mariko.