DSi exploits: Difference between revisions
mNo edit summary |
That requires RSA private keys as well. |
||
| Line 30: | Line 30: | ||
→You must research whether your idea will work or not | →You must research whether your idea will work or not | ||
- | -An emulator. | ||
-This will help speed development of a hack. A full decryption of the entire dsi system[this is for hardcore devs]. | -This will help speed development of a hack. A full decryption of the entire dsi system[this is for hardcore devs]. | ||