diff --git a/_pages/en_US/bannerbomb3.txt b/_pages/en_US/bannerbomb3.txt index bfe879f2f7..c7726e3834 100644 --- a/_pages/en_US/bannerbomb3.txt +++ b/_pages/en_US/bannerbomb3.txt @@ -3,17 +3,14 @@ title: "BannerBomb3" --- {% include toc title="Table of Contents" %} -{% include text-expand.html %}
Technical Details (optional) -

To dump system DSiWare, we exploit a flaw in the DSiWare Data Management window of the Settings application.

-

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to dump the DSi Internet Settings application to the SD root.

-

For a more technical explanation, see here.

+{: .notice--info} ### Compatibility Notes diff --git a/_pages/en_US/finalizing-setup.txt b/_pages/en_US/finalizing-setup.txt index 9c4232828d..5ee61efa32 100644 --- a/_pages/en_US/finalizing-setup.txt +++ b/_pages/en_US/finalizing-setup.txt @@ -3,7 +3,6 @@ title: "Finalizing Setup" --- {% include toc title="Table of Contents" %} -{% include text-expand.html %} ### Required Reading diff --git a/_pages/en_US/homebrew-launcher-(pichaxx).txt b/_pages/en_US/homebrew-launcher-(pichaxx).txt index 7fa4739dd6..c1258e4381 100644 --- a/_pages/en_US/homebrew-launcher-(pichaxx).txt +++ b/_pages/en_US/homebrew-launcher-(pichaxx).txt @@ -3,13 +3,12 @@ title: "Homebrew Launcher (PicHaxx)" --- {% include toc title="Table of Contents" %} -{% include text-expand.html %}
Technical Details (optional) - This method of using Seedminer for further exploitation uses your movable.sed file to write a custom save file for Pokémon Picross, which can then be used with unSAFE_MODE (via Homebrew Launcher) to run SafeB9SInstaller.
+{: .notice--info} ### Compatibility Notes diff --git a/_pages/en_US/installing-boot9strap-(fredtool).txt b/_pages/en_US/installing-boot9strap-(fredtool).txt index 4b547bfd8d..f3eb429354 100644 --- a/_pages/en_US/installing-boot9strap-(fredtool).txt +++ b/_pages/en_US/installing-boot9strap-(fredtool).txt @@ -3,15 +3,13 @@ title: "Installing boot9strap (Fredtool)" --- {% include toc title="Table of Contents" %} -{% include text-expand.html %}
Technical Details (optional) -

This method of using Seedminer for further exploitation uses your movable.sed file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. This requires you to have a DSiWare backup, which you should have gotten in the previous section.

-

This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed here.

+{: .notice--info} ### What You Need diff --git a/_pages/en_US/installing-boot9strap-(hbl-usm).txt b/_pages/en_US/installing-boot9strap-(hbl-usm).txt index d69b75fd97..d452c43e51 100644 --- a/_pages/en_US/installing-boot9strap-(hbl-usm).txt +++ b/_pages/en_US/installing-boot9strap-(hbl-usm).txt @@ -3,19 +3,15 @@ title: "Installing boot9strap (HBL-USM)" --- {% include toc title="Table of Contents" %} -{% include text-expand.html %}
Technical Details (optional) -

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

-

As we already have Homebrew access, we can use slotTool to do this.

-

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

-

For a more technical explanation, see here for information about the unSAFE_MODE exploit.

+{: .notice--info} ### Compatibility Notes diff --git a/_pages/en_US/installing-boot9strap-(soundhax).txt b/_pages/en_US/installing-boot9strap-(soundhax).txt index e1fc92a6fd..9f626db337 100644 --- a/_pages/en_US/installing-boot9strap-(soundhax).txt +++ b/_pages/en_US/installing-boot9strap-(soundhax).txt @@ -3,13 +3,12 @@ title: "Installing boot9strap (Soundhax)" --- {% include toc title="Table of Contents" %} -{% include text-expand.html %}
Technical Details (optional) -

For technical details on the exploits that you will be using on this page, see here (Soundhax) and here (universal-otherapp).

+{: .notice--info} ### Compatibility Notes diff --git a/_pages/en_US/installing-boot9strap-(usm).txt b/_pages/en_US/installing-boot9strap-(usm).txt index 7d4b89fb2b..aa40d29363 100644 --- a/_pages/en_US/installing-boot9strap-(usm).txt +++ b/_pages/en_US/installing-boot9strap-(usm).txt @@ -3,22 +3,16 @@ title: "Installing boot9strap (USM)" --- {% include toc title="Table of Contents" %} -{% include text-expand.html %}
Technical Details (optional) -

In order to exploit the SAFE_MODE firmware of our system, we need to inject an exploited WiFi profile.

-

We can do this using an existing exploit, BannerBomb3.

-

To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system in order to inject the exploited WiFi profile into your connections list.

-

Once the WiFi profile has been injected, we will use SAFE_MODE, which is a recovery feature present on all 3DS consoles, to activate the exploited WiFi profile.

-

For a more technical explanation, see the following links for information on the BannerBomb3 and unSAFE_MODE exploits: BannerBomb3, unSAFE_MODE.

-
+{: .notice--info} ### Compatibility Notes diff --git a/_pages/en_US/seedminer.txt b/_pages/en_US/seedminer.txt index 04f7687749..822364e82b 100644 --- a/_pages/en_US/seedminer.txt +++ b/_pages/en_US/seedminer.txt @@ -3,17 +3,14 @@ title: "Seedminer" --- {% include toc title="Table of Contents" %} -{% include text-expand.html %}
Technical Details (optional) -

To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device.

-

For information on how Seedminer works, see this presentation.

-

This method uses a powerful graphics card to perform the calculations needed. A volunteer-run website is used for the purpose of assisting you with this method.

+{: .notice--info} ### Section I - Prep Work