38
edits
(content done, rewording and other stuff left) |
m (wording) Tags: Mobile edit Mobile web edit |
||
Line 13: | Line 13: | ||
=== December === | === December === | ||
Release of tools that convert video to stereographic 3D video that is compatible with the 3DS | Release of tools that convert video to stereographic 3D video that is compatible with the app Nintendo 3DS Camera. | ||
== 2012 == | == 2012 == | ||
Line 75: | Line 75: | ||
=== September === | === September === | ||
The release of Menuhax, a secondary home menu exploit which allows | The release of Menuhax, a secondary home menu exploit which allows home menu userland execution. | ||
The release of Browserhax, which are primary exploits that used the browser for the N3DS and O3DS that would be updated every so often in the coming months. | The release of Browserhax, which are primary exploits that used the browser for the N3DS and O3DS that would be updated every so often in the coming months. | ||
Line 82: | Line 82: | ||
Sky3ds+ released. bypassing cart-based AP in recent games and adds a filesystem-based game loading feature among others. | Sky3ds+ released. bypassing cart-based AP in recent games and adds a filesystem-based game loading feature among others. | ||
The CCC hosts [https://gbatemp.net/threads/32c3-console-hacking-3ds-talk-dec-27-smea-derrek-plutoo.405640/ 32c3] in Hamburg, Germany, where snshax, [[arm9loaderhax]], memchunkhax2, and ntrcardhax are revealed. The userland exploits Menuhax and Ironhax | The CCC hosts [https://gbatemp.net/threads/32c3-console-hacking-3ds-talk-dec-27-smea-derrek-plutoo.405640/ 32c3] in Hamburg, Germany, where snshax, [[arm9loaderhax]], memchunkhax2, and ntrcardhax are revealed. The userland exploits Menuhax and Ironhax are updated as well. | ||
== 2016 == | == 2016 == | ||
Line 100: | Line 100: | ||
=== May === | === May === | ||
R11 | |||
=== July === | === July === | ||
Line 106: | Line 106: | ||
=== September === | === September === | ||
Arm9loaderhax dominates the scene even more due to CTRNand Transfer (shortening the install time of both new and old 3DS) and OTPless ( instant N3DS install), though OTPless was later removed (from 3ds.guide) due to random bricking. | Arm9loaderhax dominates the scene even more due to CTRNand Transfer (shortening the install time of both new and old 3DS) and OTPless (instant N3DS install), though OTPless was later removed (from 3ds.guide) due to random bricking. | ||
=== December === | === December === | ||
Another big CCC, specifically 33c3. The announcement of Soundhax, which is a free (as opposed to ninjhax, which required Cubic Ninja, a paid game) userland primary for a system app (NIntendo 3DS Sound). This made it so almost all 3DS's were vulnerable. 33c3 also announced Fasthax, which is another k11 (arm11 kernel) exploit, also made by nedwill (creator of Soundhax). Also, at this event, scene veteran derrekr revealed sighax, which is a bootrom vulnerability that allows one to sign arbitrary firmware code, he also reveals vague detail about how he dumped the 3DS ARM9/ARM11 bootroms, no code | Another big CCC, specifically 33c3. The announcement of Soundhax, which is a free (as opposed to ninjhax, which required Cubic Ninja, a paid game) userland primary for a system app (NIntendo 3DS Sound). This made it so almost all 3DS's were vulnerable. 33c3 also announced Fasthax, which is another k11 (arm11 kernel) exploit, also made by nedwill (creator of Soundhax). Also, at this event, scene veteran derrekr revealed sighax, which is a bootrom vulnerability that allows one to sign arbitrary firmware code, he also reveals vague detail about how he dumped the 3DS ARM9/ARM11 bootroms, though no detail about the code.<ref>https://wololo.net/2016/12/28/33c3-3ds-bootrom-cracked-sign-firmwares/</ref> | ||
Nintendo launches a bug bounty program for the 3DS, the bounties being $100 - $20,000 per exploit, this would have an affect of exploit developers moving away from public releases | Nintendo launches a bug bounty program for the 3DS, the bounties being $100 - $20,000 per exploit, this would have an affect of exploit developers moving away from public releases. | ||
== 2017 == | == 2017 == | ||
Line 122: | Line 122: | ||
=== April === | === April === | ||
11.4 is released, which fixes a previously unknown k11 (ARM11 kernel) vulnerability called udsploit, Smealum releases this exploit for those who are still on 11.3. Soon after this, AppleTinivi (creator of safehax and patcher of rxTools | 11.4 is released, which fixes a previously unknown k11 (ARM11 kernel) vulnerability called udsploit, Smealum releases this exploit for those who are still on 11.3. Soon after this, AppleTinivi (creator of safehax and patcher of rxTools) updates safehax for 11.3 due to an oversight in Nintendo's previous safehax fix. | ||
=== May === | === May === | ||
Another big CCC again, just kidding it's 33.5c3 (unofficial sequel). It revealed [[boot9strap]], a firmware loader that implements a FIRM sighax signature, and is able to dump the bootroms in software (?). [[Ntrboot]] is also theorized and privately confirmed. | Another big CCC again, just kidding it's 33.5c3 (unofficial sequel). It revealed [[boot9strap]], a firmware loader that implements a FIRM sighax signature, and is able to dump the bootroms in software (?). [[Ntrboot]] is also theorized and privately confirmed. | ||
Since firms can now be forged with nothing more than NAND access | Since firms can now be forged with nothing more than NAND access, the DSiWare trasnfer and hardmod methods of installing custom firmware resume on the latest firmware using the plaintext attack. (reword its basically copied) | ||
=== June === | === June === | ||
Line 133: | Line 133: | ||
=== August === | === August === | ||
[[Ntrboot]] is released, starting with support for just ak2i and R4 flashcards, but quickly grew to others. | [[Ntrboot]] is released, starting with support for just ak2i and R4 flashcards, but quickly grew to others. | ||
=== September === | === September === | ||
Line 141: | Line 141: | ||
=== January === | === January === | ||
A user reveals a method that brute-forces the movable.sed using only the Local Friend Code Seed (obtainable in userland). This method, called [[3DS:Seedminer|Seedminer]], allowed users to inject hacked DSiWare and install [[boot9strap]] with only one 3DS. | A user reveals a method that brute-forces the movable.sed using only the Local Friend Code Seed (obtainable in userland). This method, called [[3DS:Seedminer|Seedminer]], allowed users to inject hacked DSiWare and install [[boot9strap]] with only one 3DS. | ||
=== July === | === July === | ||
Line 227: | Line 227: | ||
=== October === | === October === | ||
Zoogie releases MSET9, which is a straight to arm9 exploit. This restores free homebrew for the O3DS, it also seems to work consistently and across many firmware | Zoogie releases MSET9, which is a straight to arm9 exploit. This restores free homebrew for the O3DS, it also seems to work consistently and across many different regions and firmware. | ||
=== December === | === December === | ||
Zoogie (?) calls it quits and is looking forward to future challenges whilst appreciating the time "he had helping people unlock their 3DSs!" -zoogie | Zoogie (?) calls it quits and is looking forward to future challenges whilst appreciating the time "he had helping people unlock their 3DSs!" -zoogie |
edits