FAQ: Difference between revisions
Matyapiro31 (talk | contribs) No edit summary |
WinterMute (talk | contribs) Tag: Rollback |
||
| (16 intermediate revisions by 8 users not shown) | |||
| Line 8: | Line 8: | ||
'''Q:''' Any progress? | '''Q:''' Any progress? | ||
'''A:''' The | '''A:''' The DSi Common key was found ages ago by hackers, but was released/leaked to the public in January 2011. Now we can decrypt DSi specific code, but only system software and '''free''' DSiWare only. And [[Team Twiizers]] has managed to execute some form of unsigned code by directing the save file area of a DSi-mode game to an Arudino chip. This will lead to further - and easier to replicate - exploits, such as [[Sudokuhax]]. For people on the latest firware 1.4.5, ther is [[Ugopwn]] | ||
| Line 29: | Line 29: | ||
'''A:''' PXI is the TWL SDK inter-processor communication system over the FIFO. FATFS is the TWL SDK Arm7 FAT interface for NAND, SD, etc. | '''A:''' PXI is the TWL SDK inter-processor communication system over the FIFO. FATFS is the TWL SDK Arm7 FAT interface for NAND, SD, etc. | ||
'''Q:''' How does Team Twiizers dump dsiware? | '''Q:''' How does Team Twiizers dump dsiware? | ||
'''A:''' Magic. | |||
'''Q:''' If DSi mode hybrid games have exploit, you are able to boot from sd card, aren't you? | |||
'''A:''' Hybrid card games do not have SD card MMC bus access. We would've used those exploits to boot from SD card ages ago if those had access. | |||