Changes

236 bytes removed ,  04:56, 26 September 2012
That requires RSA private keys as well.
Line 30: Line 30:  
→You must research whether your idea will work or not
 
→You must research whether your idea will work or not
   −
-A simulator/emulator, like the one for ipod [speeds-up exploition development].
+
-An emulator.
 
  −
-Hack a game download from the dsi store . Replace the file thats downloaded from the dsi store, with a dsi exploiting file, plus the game.
  −
 
  −
-A DSi download-play hack.
      
-This will help speed development of a hack. A full decryption of the entire dsi system[this is for hardcore devs].
 
-This will help speed development of a hack. A full decryption of the entire dsi system[this is for hardcore devs].