Changes

Jump to navigation Jump to search
839 bytes added ,  00:12, 11 November 2017
ugopwn stuff
Line 8: Line 8:  
'''Q:''' Any progress?
 
'''Q:''' Any progress?
   −
'''A:''' Not much as this project just started. However, [[Team Twiizers]] has managed to execute some form of unsigned code by directing the save file area of a DSi-mode game to an Arudino chip. This will lead to further - and easier to replicate - exploits.  
+
'''A:''' The DSi Common key was found ages ago by hackers, but was released/leaked to the public in January 2011. Now we can decrypt DSi specific code, but only system software and '''free''' DSiWare only. And [[Team Twiizers]] has managed to execute some form of unsigned code by directing the save file area of a DSi-mode game to an Arudino chip. This will lead to further - and easier to replicate - exploits, such as [[Sudokuhax]]. For people on the latest firware 1.4.5, ther is [[Ugopwn]]
      Line 22: Line 22:     
'''Q:''' How can we know DSiware title code?
 
'''Q:''' How can we know DSiware title code?
 +
 +
'''A:''' If you mean title IDs, see the title list. If you want to download DSiWare from NUS, you can't without the ticket which isn't available on NUS.
 +
 +
 
'''Q:''' What is FATFS? /PXI
 
'''Q:''' What is FATFS? /PXI
 +
 +
'''A:''' PXI is the TWL SDK inter-processor communication system over the FIFO. FATFS is the TWL SDK Arm7 FAT interface for NAND, SD, etc.
 +
 +
 +
'''Q:''' How does Team Twiizers dump dsiware?
 +
 +
'''A:''' Magic.
 +
 +
 +
'''Q:''' If DSi mode hybrid games have exploit, you are able to boot from sd card, aren't you?
 +
 +
'''A:''' Hybrid card games do not have SD card MMC bus access. We would've used those exploits to boot from SD card ages ago if those had access.
9

edits

Navigation menu