Changes

Jump to navigation Jump to search
312 bytes added ,  00:12, 11 November 2017
ugopwn stuff
Line 8: Line 8:  
'''Q:''' Any progress?
 
'''Q:''' Any progress?
   −
'''A:''' The DSi Common key was found ages ago by hackers, but was leaked to the public in January 2011. Now we can decrypt DSi specific code, but only system software and '''free''' DSiWare only. And [[Team Twiizers]] has managed to execute some form of unsigned code by directing the save file area of a DSi-mode game to an Arudino chip. This will lead to further - and easier to replicate - exploits, such as [[Sudokuhax]].
+
'''A:''' The DSi Common key was found ages ago by hackers, but was released/leaked to the public in January 2011. Now we can decrypt DSi specific code, but only system software and '''free''' DSiWare only. And [[Team Twiizers]] has managed to execute some form of unsigned code by directing the save file area of a DSi-mode game to an Arudino chip. This will lead to further - and easier to replicate - exploits, such as [[Sudokuhax]]. For people on the latest firware 1.4.5, ther is [[Ugopwn]]
      Line 34: Line 34:     
'''A:''' Magic.
 
'''A:''' Magic.
 +
 +
 +
'''Q:''' If DSi mode hybrid games have exploit, you are able to boot from sd card, aren't you?
 +
 +
'''A:''' Hybrid card games do not have SD card MMC bus access. We would've used those exploits to boot from SD card ages ago if those had access.
9

edits

Navigation menu