---
title: "BannerBomb3"
{% include toc title="Cuprins" %}
{% capture technical_info %}
<summary><em>Technical Details (optional)</em></summary>
To launch custom code, we exploit a flaw in the DSiWare Data Management window of the Settings application.
To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system.
For a more technical explanation, see [here](https://github.com/zoogie/Bannerbomb3).
{% endcapture %}
<details>{{ technical_info | markdownify }}</details>
{: .notice--info}
### Compatibility Notes
Aceste instrucțiuni funcționează pe consolele din regiunea SUA, Europa, Japonia și Coreea, indicate de literele U, E, J, sau K după versiunea de sistem.
If you have a Taiwanese console (indicated by a T after the system version), follow [this page](bannerbomb3-fredtool-(twn)) instead.
{: .notice--warning}
### Ce aveți nevoie
* Your `movable.sed` file from completing Seedminer or nimhax
#### Secțiunea I - Preparații
{% include_relative include/bb3-prep.txt %}
#### Section II - Hardware Button Check
{% include_relative include/safemodecheck.txt %}
___
### Next steps: Choose an exploit
If the camera appeared in the previous section, Safe Mode is likely to be working on your device.
If the camera appeared, continue to [Installing boot9strap (USM)](installing-boot9strap-(usm))
{: .notice--primary}
If the camera did NOT appear, continue to [Installing boot9strap (Fredtool)](installing-boot9strap-(fredtool))