38
edits
(some of 2016) |
(finished 2016, still some wording changes that could be made) |
||
Line 1: | Line 1: | ||
{{#approvable_by: users = Wariohax}}<!-- remove this when the page is moved to 3DS namespace --> | {{#approvable_by: users = Wariohax}}<!-- remove this when the page is moved to 3DS namespace --> | ||
<references />(Note that this is still being worked on, and this is basically a heavy adaption of zoogie's "A Pretty Brief History of the 3ds Hacking/Homebrew Scene" from the "3DS hacking scene history" section on GBAtemp) | <references />another site used https://wololo.net/2016/12/28/33c3-3ds-bootrom-cracked-sign-firmwares/, make this better later | ||
(Note that this is still being worked on, and this is basically a heavy adaption of zoogie's "A Pretty Brief History of the 3ds Hacking/Homebrew Scene" from the "3DS hacking scene history" section on GBAtemp) | |||
== 2011 == | == 2011 == | ||
Line 98: | Line 101: | ||
=== March === | === March === | ||
The release of memchunkhax2.1 by Aliaspider, allowed downgrades to 9.2 to resume, and would last through 10.7. | |||
=== May === | |||
(Not sure if it should be put here) | |||
=== July === | |||
A user reveals the DSiWare firm downgrade method after it being hinted for months, this allowed downgrading to 9.2 to continue on firms 11.0 - 11.2. | |||
=== September === | |||
Arm9loaderhax dominates the scene even more due to CTRNand Transfer (shortening the install time of both new and old 3DS) and OTPless ( instant N3DS install), though OTPless was later removed (from 3ds.guide) due to random bricking. | |||
=== December === | |||
Another big CCC, specifically 33c3. The announcement of Soundhax, which is a free (as opposed to ninjhax, which required Cubic Ninja, a paid game) userland primary for a system app (NIntendo 3DS Sound). This made it so almost all 3DS's were vulnerable. 33c3 also announced Fasthax, which is another k11 (arm11 kernel) exploit, also made by nedwill (creator of Soundhax). Also, at this event, scene veteran derrekr revealed sighax, which is a bootrom vulnerability that allows one to sign arbitrary firmware code, he also reveals vague detail about how he dumped the 3DS ARM9/ARM11 bootroms, no code releases. (Maybe reword this as it is close to original) | |||
Nintendo launches a bug bounty program for the 3DS, the bounties being $100 - $20,000 per exploit, this would have an affect of exploit developers moving away from public releases (probably reword this) | |||
== 2017 == |
edits