DSi exploits: Difference between revisions

That requires RSA private keys as well.
Iwantfun (talk | contribs)
No edit summary
Line 33: Line 33:


-This will help speed development of a hack. A full decryption of the entire dsi system[this is for hardcore devs].
-This will help speed development of a hack. A full decryption of the entire dsi system[this is for hardcore devs].
-If a dsi even has ports [the stuff firewalls protect] a port scan.