worst bump ever!Just remember...
It's hip to fuck bees
We cant use BGSCREEN, but it isn't all we can use to attack TWL FIRM (or any firm). People are already on it and will explain it if they pull what they aim for off.There's three ways to get PTC today, either have it purchased before, or have a Japanese DSi/3DS (PTC was only removed from the NA & EU eShop and DSi Shop). Or uo can just get it from the CDN. (ew.)
But yeah, there's no point in getting PTC (except nostalgia and some cool programs the community made), since BGSCREEN doesn't exist.
I did put air quotes around it, and I was the one who started discussing it on this thread.
How do you get it from CDN without kernel or arm9 kernel? Is it a legit game (like other legit cia files)?There's three ways to get PTC today, either have it purchased before, or have a Japanese DSi/3DS (PTC was only removed from the NA & EU eShop and DSi Shop). Or uo can just get it from the CDN. (ew.)
But yeah, there's no point in getting PTC (except nostalgia and some cool programs the community made), since BGSCREEN doesn't exist.
BGSCREEN isn't at all what can attack TWL_FIRM because it simply doesn't exist in Petit Computer.BGSCREEN isn't all we can use to attack TWL FIRM. People are already on it and will explain it if they pull what they aim for off.
Typo. I meant it as in we can't use it, but that isn't the only thing there that could attack.BGSCREEN isn't at all what can attack TWL_FIRM because it simply doesn't exist in Petit Computer.
You don't... dsiware is signed just like most other 3ds games, excluding legit CIA files.How do you get it from CDN without kernel or arm9 kernel? Is it a legit game (like other legit cia files)?
@MarcusD made a few changes to "b2bin.c" to make them compatible with your dumps. I'm just posting it here for him.Here's a more complete RAM dumper for SB.
http://pastebin.com/383D1Bug
This one doesn't have an on-3ds viewer, but that doesn't make sense anyway since there's about 15MBs of RW-able data accessible from BGSCREEN. Not practical to browse on the 3ds's tiny screen.
This program works by dumping 4MB files - one at a time - to extdata. I can't dump it all in one file because of the 8MB limit of interpreter RAM. The files are named BDUMP(0-3) on your 3ds's extdata (0000016de) which you can dump with various tools and view on a PC.
Interesting fact: the new3ds can actually RW about 75MBs but it seems only the same 15MBs are actually used (all zeros past 15MB).
Anyway, the actual script is attached if you want to add it to extdata. It will show as "SRD" on your smilebasic menu.
and thanks pastebin for adding 'bug' to my link - nice touch ;p
I think it is working too, buy it. pic.twitter.com/Zicz7ugujM
— nba::yoh (@MrNbaYoh) July 4, 2016
WOOT WOOT!
Yeah, that was dumb af. However, there is a good reason to believe that dsi mode could lead to an arm9 exploit... including NAND access. We don't even need an arm9 exploit because we can use the plaintext attack to downgrade through that method...Seriously? The thread devolved from a secondary SmileBASIC exploit discussion to noobs saying "petitcomputer runs in arm9 we can exploit it to get 11.0 kernhax" without realizing it's in DSi mode, off the eShop, and doesn't have BGSCREEN?
They basically thought that SmileBasic == PetitComputer, yeah.Seriously? The thread devolved from a secondary SmileBASIC exploit discussion to noobs saying "petitcomputer runs in arm9 we can exploit it to get 11.0 kernhax" without realizing it's in DSi mode, off the eShop, and doesn't have BGSCREEN?
