diff --git a/_pages/en_US/seedminer.txt b/_pages/en_US/seedminer.txt index 152286d4b8..2daef68a91 100644 --- a/_pages/en_US/seedminer.txt +++ b/_pages/en_US/seedminer.txt @@ -6,9 +6,7 @@ title: "Seedminer" ### Required Reading -To install boot9strap on your device, we derive your device's unique encryption key. - -To accomplish this, we use a tool called Seedminer to calculate the DSiWare encryption key (`movable.sed`) for your device. We then use this DSiWare encryption key to decrypt a compatible DSiWare application and inject an exploit into it to run our own code (the exact exploit used will depend on your device's region). +To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device, which we can then use to create a custom save file or DSiWare backup to further exploit your device. If this key were completely random, the encryption key would be impossible to break on current computing hardware. Fortunately, the first half of the key (`movable_part1.sed`) is actually mathematically related to your device's Friend Code, allowing us to break the encryption. For information on how Seedminer works, please see [this presentation](https://zoogie.github.io/web/34⅕c3).