boot9strap을 설치하려면 우선 각 기기의 고유 암호화 키를 알아내야 합니다. To accomplish this, we use the Homebrew Launcher to launch nimhax and dump the data encryption key (movable.sed) from your device.
For a more technical explanation, see [here](https://github.com/luigoalma/nimhax/) for information about the nimhax exploit.
Once you have your device's encryption key (`movable.sed`), you can use it in conjunction with Frogtool, which uses your `movable.sed` file to inject and take advantage of JPN Flipnote Studio. \
While this method is faster, it requires downloading a file with a torrent client. Do not follow this method if you're unable to use a torrent client.