DSi exploits: Difference between revisions
That requires RSA private keys as well. |
No edit summary |
||
| Line 33: | Line 33: | ||
-This will help speed development of a hack. A full decryption of the entire dsi system[this is for hardcore devs]. | -This will help speed development of a hack. A full decryption of the entire dsi system[this is for hardcore devs]. | ||
-If a dsi even has ports [the stuff firewalls protect] a port scan. | |||