Changes

Jump to navigation Jump to search
498 bytes added ,  00:12, 11 November 2017
ugopwn stuff
Line 8: Line 8:  
'''Q:''' Any progress?
 
'''Q:''' Any progress?
   −
'''A:''' The Dsi Common key has been found! Now we can decrypt Dsi specific code. And [[Team Twiizers]] has managed to execute some form of unsigned code by directing the save file area of a DSi-mode game to an Arudino chip. This will lead to further - and easier to replicate - exploits, such as Sudohax.
+
'''A:''' The DSi Common key was found ages ago by hackers, but was released/leaked to the public in January 2011. Now we can decrypt DSi specific code, but only system software and '''free''' DSiWare only. And [[Team Twiizers]] has managed to execute some form of unsigned code by directing the save file area of a DSi-mode game to an Arudino chip. This will lead to further - and easier to replicate - exploits, such as [[Sudokuhax]]. For people on the latest firware 1.4.5, ther is [[Ugopwn]]
      Line 29: Line 29:     
'''A:''' PXI is the TWL SDK inter-processor communication system over the FIFO. FATFS is the TWL SDK Arm7 FAT interface for NAND, SD, etc.
 
'''A:''' PXI is the TWL SDK inter-processor communication system over the FIFO. FATFS is the TWL SDK Arm7 FAT interface for NAND, SD, etc.
 +
 +
 +
'''Q:''' How does Team Twiizers dump dsiware?
 +
 +
'''A:''' Magic.
 +
 +
 +
'''Q:''' If DSi mode hybrid games have exploit, you are able to boot from sd card, aren't you?
 +
 +
'''A:''' Hybrid card games do not have SD card MMC bus access. We would've used those exploits to boot from SD card ages ago if those had access.
9

edits

Navigation menu