- Joined
- Nov 26, 2012
- Messages
- 2,568
- Trophies
- 2
- Location
- United States
- Website
- sites.google.com
- XP
- 3,915
- Country
it's actually full-width characters. I'm lazy to change the keyboard mode.what is up with the font? it's hard to read
it's actually full-width characters. I'm lazy to change the keyboard mode.what is up with the font? it's hard to read
not a font, they are probably just doing the A E S T H E T I C S meme. (incorrectly I might add)what is up with the font? it's hard to read
I don't recommend doing it until people who don't have to worry about bricking try it.
i knew it wasn't a font, but i wasn't sure if it was full-width or notnot a font, they are probably just doing the A E S T H E T I C S meme. (incorrectly I might add)
Sighax and ARM9LoaderHax are two different exploits with similar ends.
ARM9LoaderHax uses a secret processor password called the OTP to gain code execution extremely early in the boot process.
Sighax on the other hand, uses cryptography exploits to set up a scenario where it views code we want to execute as properly signed, simply booting it instead of a normal firmware. So we'd gain execution where we'd normally get a firmware, and then boot into the normal firmware.
This is why a Bootmii like solution is fairly likely.
Please only test with hardmods or arm9loaderhax for now
Uhhm...no. OTP is used only once to allow altering the secret sector on NAND that stores the n3DS keys for the arm9 encryption of NATIVE_FIRM. (for o3DS it installs the secret sector since it doesn't exist on o3DS). This allows altering a key in the secret sector keystore to intentionally corrupt decryption of arm9 of NATIVE_FIRM. This results in a controlled jump to a payload elsewhere on NAND. OTP is not used after the key is installed.
So long story short....OTP isn't directly used as an exploit. It's used only once to gain access to something. After that it serves no further use.
...How exactly would one test with ARM9LoaderHax? lol
Like...doesn't it already grant ARM 9 Access? So how would I know if I get ARM 9 Access or not?
Turn off firm patches
tfw people think i made a bricktool
you can never be too cautious.tfw people think i made a bricktool
You could always read the code and compile yourself, though...you can never be too cautious.
Since it looks like this includes waithax, I'll throw an arm9 payload on my card and try it.I checked out commit one from HEAD.
Here's the result: https://u.nya.is/tsqfxn.zip
I had to run 3dsxtool in lldb for the 3dsx to build e_e
luma reboot patches break safehaxSince it looks like this includes waithax, I'll throw an arm9 payload on my card and try it.
I have A9LH, but if I turn off the SVC check patches I should be able to run it, theoretically.
Ah, damn.luma reboot patches break safehax