From 4c82df4d0dde66d08925746063a76cc796b2910f Mon Sep 17 00:00:00 2001 From: Lily Date: Mon, 9 Oct 2023 20:30:51 +0200 Subject: [PATCH] mset9: consistency & grammar fix --- _pages/en_US/installing-boot9strap-(mset9).txt | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/_pages/en_US/installing-boot9strap-(mset9).txt b/_pages/en_US/installing-boot9strap-(mset9).txt index 8ded243ffc..846515f41d 100644 --- a/_pages/en_US/installing-boot9strap-(mset9).txt +++ b/_pages/en_US/installing-boot9strap-(mset9).txt @@ -6,7 +6,7 @@ title: "Installing boot9strap (MSET9)" {% capture technical_info %} Technical Details (optional) -[MSET9](https://github.com/zoogie/MSET9) is an exploit for the System Settings application developed by [zoogie](https://github.com/zoogie). It exploits a flaw where the ID1 (the second 32-character folder name inside of the Nintendo 3DS folder, inside of the ID0) can be *any* name as long as it is 32 characters. Performing a specific sequence of actions results in the 3DS executing the instructions are encoded into the ID1 folder name, which can be used to grant full control over the 3DS. +[MSET9](https://github.com/zoogie/MSET9) is an exploit for the System Settings application developed by [zoogie](https://github.com/zoogie). It exploits a flaw where the ID1 (the second 32-character folder name inside of the Nintendo 3DS folder, inside of the ID0) can be *any* name as long as it is 32 characters. Performing a specific sequence of actions results in the console executing the instructions that are encoded into the ID1 folder name, which can be used to grant full control over the 3DS. {% endcapture %}
{{ technical_info | markdownify }}