DSi exploits: Difference between revisions
mNo edit summary |
mNo edit summary |
||
| Line 35: | Line 35: | ||
-a program that detects if usb cord is attached or has a manual ability called 'select a usb port'. it then sends a virus that enter's the dsi and deletes by force all security patches and replaces them with fakes/replacements.all security certificate's however are left untouched. | -a program that detects if usb cord is attached or has a manual ability called 'select a usb port'. it then sends a virus that enter's the dsi and deletes by force all security patches and replaces them with fakes/replacements.all security certificate's however are left untouched. | ||
- | -Different program then described above. This program deletes everything and replaces all of the files with any force neccesary. It also should have all of the known unencryption keys, certificate's, and signature's in case it needs them. It would also have the administrative power [though something fake,though hacking, or legit/real]. basicly, it replaces the system with already hacked files, menu, etc. | ||
- | -Hack a game download from the dsi store . Replace the file thats downloaded from the dsi store with a dsi exploiting file, plus the game. | ||