FAQ: Difference between revisions

No edit summary
m Reverted edits by Cluestorm (talk) to last revision by Safan41
Tag: Rollback
 
(16 intermediate revisions by 8 users not shown)
Line 8: Line 8:
'''Q:''' Any progress?
'''Q:''' Any progress?


'''A:''' The Dsi Common key has been found! Now we can decrypt Dsi specific code. And [[Team Twiizers]] has managed to execute some form of unsigned code by directing the save file area of a DSi-mode game to an Arudino chip. This will lead to further - and easier to replicate - exploits, such as [[Sudokuhax]].
'''A:''' The DSi Common key was found ages ago by hackers, but was released/leaked to the public in January 2011. Now we can decrypt DSi specific code, but only system software and '''free''' DSiWare only. And [[Team Twiizers]] has managed to execute some form of unsigned code by directing the save file area of a DSi-mode game to an Arudino chip. This will lead to further - and easier to replicate - exploits, such as [[Sudokuhax]]. For people on the latest firware 1.4.5, ther is [[Ugopwn]]




Line 29: Line 29:


'''A:''' PXI is the TWL SDK inter-processor communication system over the FIFO. FATFS is the TWL SDK Arm7 FAT interface for NAND, SD, etc.
'''A:''' PXI is the TWL SDK inter-processor communication system over the FIFO. FATFS is the TWL SDK Arm7 FAT interface for NAND, SD, etc.


'''Q:''' How does Team Twiizers dump dsiware?
'''Q:''' How does Team Twiizers dump dsiware?
'''A:''' Magic.
'''Q:''' If DSi mode hybrid games have exploit, you are able to boot from sd card, aren't you?
'''A:''' Hybrid card games do not have SD card MMC bus access. We would've used those exploits to boot from SD card ages ago if those had access.