Changes

Jump to navigation Jump to search
186 bytes added ,  00:12, 11 November 2017
ugopwn stuff
Line 8: Line 8:  
'''Q:''' Any progress?
 
'''Q:''' Any progress?
   −
'''A:''' The DSi Common key was found ages ago by hackers, but was released/leaked to the public in January 2011. Now we can decrypt DSi specific code, but only system software and '''free''' DSiWare only. And [[Team Twiizers]] has managed to execute some form of unsigned code by directing the save file area of a DSi-mode game to an Arudino chip. This will lead to further - and easier to replicate - exploits, such as [[Sudokuhax]].
+
'''A:''' The DSi Common key was found ages ago by hackers, but was released/leaked to the public in January 2011. Now we can decrypt DSi specific code, but only system software and '''free''' DSiWare only. And [[Team Twiizers]] has managed to execute some form of unsigned code by directing the save file area of a DSi-mode game to an Arudino chip. This will lead to further - and easier to replicate - exploits, such as [[Sudokuhax]]. For people on the latest firware 1.4.5, ther is [[Ugopwn]]
      Line 34: Line 34:     
'''A:''' Magic.
 
'''A:''' Magic.
'''Q:''' Can I ask you a favor? If DSi mode hybrid games have exploit,you are able to
+
 
boot from sd card,are'nt you?
+
 
 +
'''Q:''' If DSi mode hybrid games have exploit, you are able to boot from sd card, aren't you?
 +
 
 +
'''A:''' Hybrid card games do not have SD card MMC bus access. We would've used those exploits to boot from SD card ages ago if those had access.
9

edits

Navigation menu