Line 19: |
Line 19: |
| == List of ideas for exploitation/hacking of latest dsi version == | | == List of ideas for exploitation/hacking of latest dsi version == |
| rules | | rules |
| + | |
| →do not remove ideas, only add | | →do not remove ideas, only add |
| | | |
| →do not delete this section | | →do not delete this section |
| | | |
− | -a simulator/emulator like the one for ipod [to help hacking development] | + | -A simulator/emulator, like the one for ipod [speeds-up hacking development] |
| | | |
− | -a costom headphone jack that plugs into computer [usb] and can access dsi files or softmod using a computer program | + | -A costom headphone jack that plugs into computer [usb] and can access dsi files or softmod it using a computer program |
| | | |
− | -there is 4 game [dsi shop] exploits that work on all system versions exept the latest.make more of them. | + | -There is 4 game [dsi shop] exploits that work on all system versions, exept the latest update. Make many more of them[about 10-15]. |
| | | |
− | -a costom charger cord with usb that plugs into computer and a program described below | + | -A costom charger cord with usb that plugs into computer, and a program described below |
| | | |
| -A program that detects if usb cord is attached or has a manual ability called 'select a usb port'. Then it sends a virus that enter's the dsi and deletes by force all security patches and replaces them with fakes/replacements. All security certificate's however, are left untouched. | | -A program that detects if usb cord is attached or has a manual ability called 'select a usb port'. Then it sends a virus that enter's the dsi and deletes by force all security patches and replaces them with fakes/replacements. All security certificate's however, are left untouched. |
| | | |
| -Hack a game download from the dsi store . Replace the file thats downloaded from the dsi store, with a dsi exploiting file, plus the game. | | -Hack a game download from the dsi store . Replace the file thats downloaded from the dsi store, with a dsi exploiting file, plus the game. |