Line 262: |
Line 262: |
| | | |
| ---- | | ---- |
| + | |
| + | Bejeweled Twist is on dsiware and as a ds cart, the cart can reconize what type of system its bieng played on. could it be a dsi-mode compatable game? |
| + | --[[User:Cheatfreak47|Cheatfreak47]] 19:39, 7 January 2011 (CET) |
| + | |
| + | ---- |
| + | |
| + | DSi-mode gamecards are fairly useless, those can't access the MMC bus for SD etc. If you want to help find exploitable dsiware(including that bejeweled dsiware if it has ascii/english-only input), just [[DSiWare_VulnList|contact]] us. --[[User:Yellows8|Yellows8]] 19:55, 7 January 2011 (CET) |
| | | |
| == dsi brew discussion chat == | | == dsi brew discussion chat == |
| | | |
| [http://dsibrew.chatango.com/] | | [http://dsibrew.chatango.com/] |
| + | |
| + | == dsi common key revealed! == |
| + | Well it finally happened, dsi common key have been leaked a few hours ago and users are saying its working with NUSD 1.2b (source=[http://gbatemp.net/t274343-dsi-common-key-revealed? click here] |
| + | [[User:supermariovb64|supermariovb64]]19:39, 13 January 2011 (CET) |
| + | |
| + | ==Recent Spam Assault == |
| + | |
| + | Whats wrong with DSibrew? There have been assaults by spambots daily and not much information, which is shocking especially since we discovered the common key recently... --[[User:Ireece1|Ireece1]] 05:12, 14 March 2011 (CET) |
| + | |
| + | The common key isn't as useful as most people think; the people that can use it have had it for awhile. I agree about the SPAM though, is there a way we can IP block this f*cker? |
| + | :Whoops, forgot to sign that last comment. --[[User:Winmaster|Winmaster]] 03:06, 20 March 2011 (CET) |
| + | |
| + | ==DSi Hacking dead == |
| + | |
| + | IMHO, with the 3ds out the dsi hacking scene is dead. |
| + | :No it is not dead yet --[[User:Ichfly|Ichfly]] 14:31, 5 October 2011 (CEST) |
| + | :GTFO, troll--[[User:Winmaster|Winmaster]] 17:33, 5 October 2011 (CEST) |
| + | |
| + | Then where are the exploits, or discussion of possibilities thereof? |
| + | No answer? |
| + | |
| + | ==Minor Bug== |
| + | When you edit a page, the wiki asks you to solve a simple math problem after clicking submit. When you do not provide a summary, the wiki also asks you to confirm your edit again. As a result, whenever you do not wish to provide a summary, the process of submitting a change becomes an endless cycle of "do this math problem" and then "confirm that you don't want a summary."--[[User:Winmaster|Winmaster]] 17:36, 5 October 2011 (CEST) |
| + | |
| + | ==DSi homebrew still dead== |
| + | Where are the exploits or news of possible exploits? |
| + | :Sign your comments. Sudokuhax was *never* publicly mentioned at all prior to release, and that's not going to change. Anyway, since flipnote and dsisound can't be exploited via SD card, that only leaves the photo/camera title. The JPG code I looked at so far is flawless, doubt I'll ever find anything exploitable in that. --[[User:Yellows8|Yellows8]] 19:31, 11 December 2011 (CET) |
| + | |
| + | ==What about a Browser exploit?== |
| + | I'm thinking on try something similar to the jailbreakme hak on iOS, but in this case using the boult-in browser of the DSi... Does anyone has tried it? "[[User:DjNeo|More than a n00b...]] 02:48, 28 December 2011 (CET)" |
| + | :Yes, that was suggested right away. No usable exploit for the DSi browser has ever been found, even exploits that have worked on Opera for other platforms have failed. |
| + | |
| + | == TLS? == |
| + | |
| + | I have a question concerning the security of this wiki (such as logins). Firefox will keep on annoying me about certificates. So could you have TLS on this website? |
| + | --Safan41 12:09 AM (CET) |