− | I'm the author of [[Nintendo_Zone#Exploits|nzoneurlstacksmash]]. I'm Yellows8 from [http://wiibrew.org/wiki/User:Yellows8 Wiibrew]. On July 16th someone will capture NYC N World Store NZone AP SSID and beacons. Once that capture is obtained it might be possible to test nzoneurlstacksmash on DSi. The NZone main screen index html uses HTTPS like DS Station, but it was moved to the index.cgi HTTPS-only system. This probably means all html on the server is HTTPS only now, but that won't be known for certain until I get server access with a NZone SSID. If all html is only HTTPS now on the server, the only way to exploit NZone is with a SSID from any NZone except for N World Store NZone since that AP is run by Nintendo. Only the external third-party server content could be exploited as that's transferred over HTTP. | + | I'm the author of [[Nintendo_Zone#Exploits|nzoneurlstacksmash]]. I'm Yellows8 from [http://wiibrew.org/wiki/User:Yellows8 Wiibrew]. Sometime roughly a week from July 16th John_K can capture a Best Buy NZone AP SSID and beacons. Once that capture is obtained it might be possible to test nzoneurlstacksmash on DSi. |