Changes

37 bytes added ,  17:01, 19 October 2024
m
Reverted edits by Cluestorm (talk) to last revision by Safan41
Line 8: Line 8:  
'''Q:''' Any progress?
 
'''Q:''' Any progress?
   −
'''A:''' The DSi Common key was found ages ago by hackers, but was released/leaked to the public in January 2011. Now we can decrypt DSi specific code, but only system software and '''free''' DSiWare only. And [[Team Twiizers]] has managed to execute some form of unsigned code by directing the save file area of a DSi-mode game to an Arudino chip. This will lead to further - and easier to replicate - exploits, such as [[Sudokuhax]].
+
'''A:''' The DSi Common key was found ages ago by hackers, but was released/leaked to the public in January 2011. Now we can decrypt DSi specific code, but only system software and '''free''' DSiWare only. And [[Team Twiizers]] has managed to execute some form of unsigned code by directing the save file area of a DSi-mode game to an Arudino chip. This will lead to further - and easier to replicate - exploits, such as [[Sudokuhax]]. For people on the latest firware 1.4.5, ther is [[Ugopwn]]
      Line 36: Line 36:       −
'''Q:''' Can I ask you a favor? If DSi mode hybrid games have exploit,you are able to
+
'''Q:''' If DSi mode hybrid games have exploit, you are able to boot from sd card, aren't you?
boot from sd card,are'nt you?
      
'''A:''' Hybrid card games do not have SD card MMC bus access. We would've used those exploits to boot from SD card ages ago if those had access.
 
'''A:''' Hybrid card games do not have SD card MMC bus access. We would've used those exploits to boot from SD card ages ago if those had access.