` -> `Nintendo DSiWare` on your SD card
+1. Copy the `42383841.bin` file from the `clean` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder, replacing the existing one
+1. Reinsert your SD card into your device
+1. Power on your device
+1. Launch System Settings on your device
+1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png))
+1. Select the "Nintendo DSi™" title
+1. Select "Copy", then select "OK"
diff --git a/_pages/ar_SA/include/fredtool-write-flipnote.txt b/_pages/ar_SA/include/fredtool-write-flipnote.txt
new file mode 100644
index 0000000000..cb6f428624
--- /dev/null
+++ b/_pages/ar_SA/include/fredtool-write-flipnote.txt
@@ -0,0 +1,11 @@
+In this section, you will copy the hacked DS Connection Settings DSiWare to internal memory, which will temporarily replace it with Flipnote Studio.
+
+1. Launch System Settings on your device
+1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png))
+1. Select the "Haxxxxxxxxx!" title
+ + If you are unable to select the "Haxxxxxxxxx" title, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool)
+1. Select "Copy", then select "OK"
+1. Return to main menu of the System Settings
+1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" ([image](/images/screenshots/fredtool/dsconnection.png))
+1. If the exploit was successful, your device will have loaded the JPN version of Flipnote Studio
+ + If your device does not load the JPN version of Flipnote Studio, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool)
\ No newline at end of file
diff --git a/_pages/ar_SA/include/safemodecheck.txt b/_pages/ar_SA/include/safemodecheck.txt
index 43ebec6575..7035baace8 100644
--- a/_pages/ar_SA/include/safemodecheck.txt
+++ b/_pages/ar_SA/include/safemodecheck.txt
@@ -1,3 +1,5 @@
+In this section, you will see whether your shoulder buttons are working on your device. This will determine which method you will follow on the next page.
+
1. Power on your device
1. Once you see the HOME Menu, press the (Left Shoulder) and (Right Shoulder) buttons at the same time
+ The camera applet should appear
diff --git a/_pages/ar_SA/include/seedminer-base.txt b/_pages/ar_SA/include/seedminer-base.txt
index e3493c2f87..ad6697a5fa 100644
--- a/_pages/ar_SA/include/seedminer-base.txt
+++ b/_pages/ar_SA/include/seedminer-base.txt
@@ -15,10 +15,12 @@ This method uses a powerful graphics card to perform the calculations needed. A
In this section, you will get the necessary details from your 3DS that are required to figure out your device's encryption key.
+{% capture console_state_info %}
Before following this section:
+ Ensure that you have turned on your console with the SD card inserted at least once to generate the necessary data
+ Ensure that your console is connected to the Internet (you should see a blue "Internet" indicator on the top-left corner of the HOME screen)
-{: .notice--info}
+{% endcapture %}
+{{ console_state_info | markdownify }}
1. Power off your device
1. Insert your SD card into your computer
diff --git a/_pages/ar_SA/installing-boot9strap-(fredtool).txt b/_pages/ar_SA/installing-boot9strap-(fredtool).txt
index ea9d81c010..455c3317a3 100644
--- a/_pages/ar_SA/installing-boot9strap-(fredtool).txt
+++ b/_pages/ar_SA/installing-boot9strap-(fredtool).txt
@@ -15,11 +15,14 @@ This is a currently working implementation of the "FIRM partitions known-plainte
{{ technical_info | markdownify }}
{: .notice--info}
+You should only be able to get to this page if you are running version 11.16.0. If you are on any firmware other than 11.17.0 or 11.16.0, STOP as these instructions WILL LEAD TO A BRICK on other firmwares!!
+{: .notice--warning}
+
### What You Need
* Your `movable.sed` file from completing [Seedminer](seedminer)
* The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`)
-* The latest release of [b9sTool](https://github.com/zoogie/b9sTool/releases/download/v6.1.1/release_6.1.1.zip) (direct download)
+* **11.16.0 or 11.17.0 users**: The v6.1.1 release of [b9sTool](https://github.com/zoogie/b9sTool/releases/download/v6.1.1/release_6.1.1.zip) (direct download)
* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file)
#### Section I - CFW Check
@@ -42,49 +45,11 @@ In this section, you will trigger the BannerBomb3 exploit using the DSiWare Mana
#### Section III - Prep Work
-In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer.
-
-1. Insert your SD card into your computer
-1. Open the [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) website on your computer
-1. Under the "Username" field, enter any alphanumeric name (no spaces or special characters)
-1. Under the "DSiBin" field, upload your `42383841.bin` file from the root of your SD card using the first "Browse..." option
-1. Under the "MovableSed" field, upload your `movable.sed` file using the second "Browse..." option
-1. Under the "InjectionTarget" field, set the injection target to `DSinternet` (NOT memorypit)
-1. Click "Build"
- + Wait a few seconds for the build process to complete
-1. In the Build History section on the left, type the Username into the "Filter Builds" field
-1. Click on the first search result
- + This result should have the latest timestamp
-1. Click the "output_(name).zip" link
-1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card
- + `` is the 32-letter folder name that you copied in [Seedminer](seedminer)
- + `` is a 32-letter folder inside of the ``
-1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder
-1. Copy the `42383841.bin` file from the `hax` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder
- ![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info}
-1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card
- + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it
-1. Copy `boot.nds` (B9STool) from the release `.zip` to the root of your SD card
-1. Copy the `private` folder from the Frogminer_save `.zip` to the root of your SD card
-1. Reinsert your SD card into your device
-1. Power on your device
-
- ![]({{ "/images/screenshots/fredtool/fredtool-root-layout.png" | absolute_url }})
- {: .notice--info}
+{% include_relative include/fredtool-prep.txt %}
#### Section IV - Overwriting DS Connection Settings
-In this section, you will copy the hacked DS Connection Settings DSiWare to internal memory, which will temporarily replace it with Flipnote Studio.
-
-1. Launch System Settings on your device
-1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png))
-1. Select the "Haxxxxxxxxx!" title
- + If you are unable to select the "Haxxxxxxxxx" title, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool)
-1. Select "Copy", then select "OK"
-1. Return to main menu of the System Settings
-1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" ([image](/images/screenshots/fredtool/dsconnection.png))
-1. If the exploit was successful, your device will have loaded the JPN version of Flipnote Studio
- + If your device does not load the JPN version of Flipnote Studio, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool)
+{% include_relative include/fredtool-write-flipnote.txt %}
#### Section V - Flipnote Exploit
@@ -99,18 +64,10 @@ In this section, you will copy the hacked DS Connection Settings DSiWare to inte
#### Section VII - Restoring DS Connection Settings
-In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in Section IV.
-
-1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card
-1. Copy the `42383841.bin` file from the `clean` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder, replacing the existing one
-1. Reinsert your SD card into your device
-1. Power on your device
-1. Launch System Settings on your device
-1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png))
-1. Select the "Nintendo DSi™" title
-1. Select "Copy", then select "OK"
+{% include_relative include/fredtool-restore-dsconn.txt %}
___
+
### Continue to [Finalizing Setup](finalizing-setup)
{: .notice--primary}
diff --git a/_pages/ar_SA/installing-boot9strap-(fredtool-legacy).txt b/_pages/ar_SA/installing-boot9strap-(fredtool-legacy).txt
new file mode 100644
index 0000000000..1513694ebd
--- /dev/null
+++ b/_pages/ar_SA/installing-boot9strap-(fredtool-legacy).txt
@@ -0,0 +1,77 @@
+---
+title: "Installing boot9strap (Fredtool, Legacy)"
+---
+
+{% include toc title="Table of Contents" %}
+
+{% capture technical_info %}
+Technical Details (optional)
+
+To dump system DSiWare, we exploit a flaw in the DSiWare Data Management window of the Settings application.
+
+To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system to dump the DSi Internet Settings application to the SD root.
+
+Once we have a DSiWare backup, we can inject it into the DS Internet Settings application.
+
+This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws).
+
+{% endcapture %}
+{{ technical_info | markdownify }}
+{: .notice--info}
+
+You should only be able to get to this page if you are running version 11.15.0 or 11.14.0. If you are on any firmware other than 11.15.0 or 11.14.0, STOP as these instructions WILL LEAD TO A BRICK on other firmwares!!
+{: .notice--warning}
+
+### What You Need
+
+* Your `movable.sed` file from completing [Seedminer (Mii)](seedminer-(mii))
+* The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`)
+* **11.15.0 and 11.14.0 users only**: The v6.0.1 release of [b9sTool](https://github.com/zoogie/b9sTool/releases/tag/v6.0.1) (direct download)
+* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file)
+
+#### Section I - CFW Check
+
+{% include_relative include/cfw-check-fredtool.txt %}
+
+#### Section II - BannerBomb3
+
+In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next section.
+
+1. Reinsert your SD card into your device
+1. Power on your device
+1. Launch System Settings on your device
+1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png))
+ + Your device should show the BB3 multihax menu
+ + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool)
+1. Use the D-Pad to navigate and press the (A) button to select "Dump DSiWare"
+ + Your device will automatically reboot
+1. Power off your device
+
+#### Section III - Prep Work
+
+{% include_relative include/fredtool-prep.txt %}
+
+#### Section IV - Overwriting DS Connection Settings
+
+{% include_relative include/fredtool-write-flipnote.txt %}
+
+#### Section V - Flipnote Exploit
+
+{% include_relative include/install-boot9strap-b9stool.txt method="dsinternet" %}
+
+#### Section VI - Luma3DS Configuration
+
+1. Press and hold (Select), and while holding (Select), power on your device. This will launch Luma3DS configuration
+{% include_relative include/configure-luma3ds.txt %}
+
+{% include_relative include/luma3ds-installed-note.txt %}
+
+#### Section VII - Restoring DS Connection Settings
+
+{% include_relative include/fredtool-restore-dsconn.txt %}
+
+___
+
+
+### Continue to [Finalizing Setup](finalizing-setup)
+{: .notice--primary}
diff --git a/_pages/ar_SA/seedminer-(mii).txt b/_pages/ar_SA/seedminer-(mii).txt
new file mode 100644
index 0000000000..5faf224c22
--- /dev/null
+++ b/_pages/ar_SA/seedminer-(mii).txt
@@ -0,0 +1,84 @@
+---
+title: "Seedminer (Mii)"
+---
+
+{% include toc title="Table of Contents" %}
+
+{% capture gpu_warning %}
+This method requires a reasonably powerful GPU (any dedicated graphics card made in the last few years) and the ability to use a command line. If you don't know what those are or do not have the hardware necessary, you can ask someone to do this for you at [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp). You will need to have the following information ready:
++ Your Mii QR code, uploaded directly to Discord (do not take a screenshot or a photo of the image, just send the HNI_XXXX.JPG image itself)
++ Your console's ID0 (the name of the 32-character folder directly inside of Nintendo 3DS - see [this troubleshooting section](https://3ds.hacks.guide/troubleshooting#seedminer) if you have multiple)
++ Your console model (e.g. 3DS, 3DS XL, 2DS, New3DS, New3DS XL, New2DS XL)
++ Your console's approximate year of manufacturing (it may be present behind the frontplate or backplate; if you don't know, just guess - it's not super important)
+{% endcapture %}
+{{ gpu_warning | markdownify }}
+
+{% capture technical_info %}
+Technical Details (optional)
+
+To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device.
+
+Because we do not have access to the Friends List, we are deriving the first part of `movable.sed` using a Mii QR code instead of by performing a two-way friend exchange.
+
+For information on how Seedminer works, see [this presentation](https://zoogie.github.io/web/34⅕c3).
+
+{% endcapture %}
+{{ technical_info | markdownify }}
+{: .notice--info}
+
+## Instructions
+
+If you are on Linux or macOS, replace `py -3` with `python3` in all commands.
+{: .notice--info}
+
+### What you need
+
++ The latest release of [Seedminer](https://github.com/zoogie/seedminer/releases/latest) (the Seedminer .zip)
++ Any 3.x version of [Python](https://www.python.org/downloads/) installed
+ + If you are on Linux, you likely already have Python 3. Check by opening a terminal and entering `python3 -V`. If this returns a version number, it will work for this guide.
+
+### Section I - Prep Work
+
+In this section, you will set up Seedminer and obtain your console's files that are needed for mining.
+
+1. Extract the contents of the Seedminer `.zip` and move the folder with your operating systeem's name to anywhere on your PC
+ + Keep this location handy, as this Seedminer folder will be where multiple other files are placed
+1. In the Seedminer folder, hold SHIFT and right-click anywhere in the folder's empty space, then click the option that opens Terminal, PowerShell, or Command Prompt
+1. In the command line window, type `py -3 -mpip install pycryptodomex`, hit ENTER, and allow it to install
+ + If this command fails with the error `No module named pip`, you must manually install pip. The methods to do this can be found on [this page](https://pip.pypa.io/en/stable/installation/).
+1. Turn your console on while the SD card is inserted
+1. Open the Mii Maker app
+1. Tap the "QR Code/Image Options" button
+1. Tap "Save Mii as QR Code"
+1. Select any Mii Character (make a new one first if you don't have any), and press "OK"
+1. Turn the console off
+1. Put the console's SD card into your computer, navigate to the `Nintendo 3DS` folder on the SD, and copy the name of the 32-character-long folder directly inside
+ + This folder, known as the ID0, is system-specific. Only one should be present. If you see multiple, follow [these instructions](troubleshooting#seedminer)
+ + Once you have the ID0, paste it into a document so you can reference it later
+1. Navigate to the `DCIM` folder on the SD card
+1. Look for the QR Code, which will be a `.JPG` file starting with `HNI`
+ + You may have many other files in here already if you use the Nintendo 3DS Camera app
+1. Copy this file to the Seedminer folder on your PC
+
+### Section II - Processing Mii QR and Mining
+
+In this section, you will turn the Mii QR code into a usable file and mine `movable.sed` with it.
+
+1. Open the [editMii](https://zoogie.github.io/web/miiqr/) website on your computer
+1. Click on "Import from...", then select "QR Code" and upload the Mii QR code from earlier
+1. Click on "Export to...", then select "encrypted (.bin)"
+ + This will download a file named `input.bin`
+1. Copy this `input.bin` to the Seedminer folder
+1. Open the terminal/PowerShell/Command Prompt window from earlier
+1.Inside this window, enter the command `py -3 seedminer_launcher3.py id0 `
+ + Replace `` with the ID0 you copied into a document
+ + Do not include the angle brackets
+1. Once it completes, enter the command `py -3 seedminer_launcher3.py mii `
+ + Replace `` with the model of your console (`new` or `old`) - if you aren't sure, only models with the ZL/ZR buttons and C-Stick are new
+ + Replace `` with the year the 3DS was made (you often find this on the backplate) - leave this empty if you aren't sure, in which case it will start from the middle
+ + If this fails with an error of `input.bin is invalid size`, remake the `input.bin` using your QR Code. If it ''still'' fails, open a different browser and remake the `input.bin` there
+ + The mining process will usually take up to 90 minutes, depending on luck and your GPU's strength
+1. When it finishes, a file called `movable.sed` will appear in the Seedminer folder
+
+Continue to [BannerBomb3 (Legacy)](bannerbomb3-(legacy))
+{: .notice--primary}
diff --git a/_pages/ar_SA/site-navigation.txt b/_pages/ar_SA/site-navigation.txt
index a2135747ab..179a8a4b0b 100644
--- a/_pages/ar_SA/site-navigation.txt
+++ b/_pages/ar_SA/site-navigation.txt
@@ -18,6 +18,7 @@ sitemap: false
+ [A9LH to B9S](a9lh-to-b9s)
+ [BannerBomb3](bannerbomb3)
++ [Installing boot9strap (Fredtool, Legacy)](bannerbomb3-(legacy))
+ [BannerBomb3 + Fredtool (TWN)](bannerbomb3-fredtool-(twn))
+ [Credits](credits)
+ [Checking for CFW](checking-for-cfw)
@@ -44,6 +45,7 @@ sitemap: false
+ [Home](/)
+ [Homebrew Launcher (super-skaterhax)](homebrew-launcher-(super-skaterhax))
+ [Installing boot9strap (Fredtool)](installing-boot9strap-(fredtool))
++ [Installing boot9strap (Fredtool, Legacy)](installing-boot9strap-(fredtool-legacy))
+ [Installing boot9strap (Frogtool)](installing-boot9strap-(frogtool))
+ [Installing boot9strap (Hardmod)](installing-boot9strap-(hardmod))
+ [Installing boot9strap (HBL-USM)](installing-boot9strap-(hbl-usm))
@@ -59,6 +61,7 @@ sitemap: false
+ [Region Changing](region-changing)
+ [Restoring / Updating CFW](restoring-updating-cfw)
+ [Seedminer](seedminer)
++ [Seedminer](seedminer-(mii))
+ [Seedminer (TWN)](seedminer-(twn))
+ [Troubleshooting](troubleshooting)
+ [Uninstall CFW](uninstall-cfw)
diff --git a/_pages/ar_SA/updating-firmware-(kor-twn).md b/_pages/ar_SA/updating-firmware-(kor).txt
similarity index 89%
rename from _pages/ar_SA/updating-firmware-(kor-twn).md
rename to _pages/ar_SA/updating-firmware-(kor).txt
index 74a2b48f90..4b08786c27 100644
--- a/_pages/ar_SA/updating-firmware-(kor-twn).md
+++ b/_pages/ar_SA/updating-firmware-(kor).txt
@@ -1,5 +1,5 @@
---
-title: "Updating Firmware (KOR/TWN)"
+title: "Updating Firmware (KOR)"
---
### Required Reading
diff --git a/_pages/ar_SA/updating-firmware-(new-3ds).md b/_pages/ar_SA/updating-firmware-(new-3ds).txt
similarity index 100%
rename from _pages/ar_SA/updating-firmware-(new-3ds).md
rename to _pages/ar_SA/updating-firmware-(new-3ds).txt
diff --git a/_pages/ar_SA/updating-firmware-(twn).txt b/_pages/ar_SA/updating-firmware-(twn).txt
new file mode 100644
index 0000000000..83e6992b1b
--- /dev/null
+++ b/_pages/ar_SA/updating-firmware-(twn).txt
@@ -0,0 +1,18 @@
+---
+title: "Updating Firmware (TWN)"
+---
+
+### Required Reading
+
+To use the Seedminer exploit, you must update your device to the latest system version.
+
+### What you need
+
+* An internet connection on your device
+
+#### Section I - Updating the System
+
+{% include_relative include/sysupdate.txt cfw="false" %}
+
+Continue to [Seedminer (TWN)](seedminer-(twn))
+{: .notice--primary}
diff --git a/_pages/bg_BG/404.md b/_pages/bg_BG/404.txt
similarity index 100%
rename from _pages/bg_BG/404.md
rename to _pages/bg_BG/404.txt
diff --git a/_pages/bg_BG/bannerbomb3-(legacy).txt b/_pages/bg_BG/bannerbomb3-(legacy).txt
new file mode 100644
index 0000000000..503794c42a
--- /dev/null
+++ b/_pages/bg_BG/bannerbomb3-(legacy).txt
@@ -0,0 +1,50 @@
+---
+title: "BannerBomb3 (Legacy)"
+---
+
+{% include toc title="Table of Contents" %}
+
+{% capture technical_info %}
+Technical Details (optional)
+
+To launch custom code, we exploit a flaw in the DSiWare Data Management window of the Settings application.
+
+To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system.
+
+For a more technical explanation, see [here](https://github.com/zoogie/Bannerbomb3).
+{% endcapture %}
+
+{{ technical_info | markdownify }}
+{: .notice--info}
+
+### Compatibility Notes
+
+These instructions work on USA, Europe, Japan, and Korea region consoles as indicated by the letters U, E, J, or K after the system version.
+
+### What You Need
+
+* Your `movable.sed` file from completing Seedminer or nimhax
+
+#### Section I - Prep Work
+
+{% include_relative include/bb3-prep.txt %}
+
+#### Section II - Hardware Button Check
+
+In this section, you will see whether you can access Safe Mode on your device. This will determine which method you will follow on the next page.
+
+Your SD card should remain in your computer while you perform this check.
+
+{% include_relative include/safemodecheck.txt %}
+
+___
+
+### Next steps: Choose an exploit
+
+If the camera appeared in the previous section, Safe Mode is likely to be working on your device.
+
+If the camera appeared, continue to [Installing boot9strap (USM)](installing-boot9strap-(usm))
+{: .notice--primary}
+
+If the camera did NOT appear, continue to [Installing boot9strap (Fredtool, Legacy)](installing-boot9strap-(fredtool-legacy))
+{: .notice--info}
diff --git a/_pages/bg_BG/bannerbomb3.txt b/_pages/bg_BG/bannerbomb3.txt
index 7767c4aeb1..a8383926fd 100644
--- a/_pages/bg_BG/bannerbomb3.txt
+++ b/_pages/bg_BG/bannerbomb3.txt
@@ -30,36 +30,10 @@ If you have a Taiwanese console (indicated by a T after the system version), fol
#### Section I - Prep Work
-In this section, you will copy the files needed to trigger the BannerBomb3 exploit onto your device's SD card.
-
-1. Power off your device
-1. Insert your SD card into your computer
-1. Open [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen) on your computer
-1. Upload your movable.sed using the “Choose File” option
-1. Click “Build and Download”
- + This will download an exploit DSiWare called `F00D43D5.bin` and a payload called `bb3.bin` inside of a zip archive (`DSIWARE_EXPLOIT.zip`)
-1. Copy `bb3.bin` from `DSIWARE_EXPLOIT.zip` to the root of your SD card
- + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it
- + This file does not need to be opened or extracted
- ![]({{ "/images/screenshots/bb3/bb3-root-layout.png" | absolute_url }}){: .notice--info}
-1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card
- + `` is the 32-letter folder name that you copied in [Seedminer](seedminer)
- + `` is a 32-letter folder inside of the ``
- + If you have multiple `` folders, follow the instructions [here](troubleshooting#bannerbomb3)
- ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info}
-1. Create a folder named `Nintendo DSiWare` inside of the ``
- + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card
-1. Copy the `F00D43D5.bin` file from `DSIWARE_EXPLOIT.zip` to the `Nintendo DSiWare` folder
-
-![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }})
-{: .notice--info}
+{% include_relative include/bb3-prep.txt %}
#### Section II - Hardware Button Check
-In this section, you will see whether you can access Safe Mode on your device. This will determine which method you will follow on the next page.
-
-Your SD card should remain in your computer while you perform this check.
-
{% include_relative include/safemodecheck.txt %}
___
diff --git a/_pages/bg_BG/credits.md b/_pages/bg_BG/credits.txt
similarity index 100%
rename from _pages/bg_BG/credits.md
rename to _pages/bg_BG/credits.txt
diff --git a/_pages/bg_BG/donations.md b/_pages/bg_BG/donations.txt
similarity index 100%
rename from _pages/bg_BG/donations.md
rename to _pages/bg_BG/donations.txt
diff --git a/_pages/bg_BG/finalizing-setup.txt b/_pages/bg_BG/finalizing-setup.txt
index f16b13698a..e41bd44dcd 100644
--- a/_pages/bg_BG/finalizing-setup.txt
+++ b/_pages/bg_BG/finalizing-setup.txt
@@ -177,9 +177,6 @@ ___
You're done! Custom firmware is now fully configured on your device.
{: .notice--success}
-Hello! We're looking for feedback on the overall experience of following our guide. If you'd like to help out, check out the survey [here](https://forms.gle/vZNoc4QLCz5MEXCK7) (only available in English). Thanks!
-{: .notice--info}
-
### Information and Notes
{% capture notice-6 %}
diff --git a/_pages/bg_BG/homebrew-launcher-(super-skaterhax).txt b/_pages/bg_BG/homebrew-launcher-(super-skaterhax).txt
index ea288c3163..7b83fe0d7e 100644
--- a/_pages/bg_BG/homebrew-launcher-(super-skaterhax).txt
+++ b/_pages/bg_BG/homebrew-launcher-(super-skaterhax).txt
@@ -64,7 +64,7 @@ If you haven't already, make sure you have a working Internet connection set up
1. Select the "GO GO!" button on the top screen
+ If any prompts appear, approve all of them
+ If your device freezes on a yellow screen, hold the POWER button until it turns off, then retry this section
- + If your device freezes on a red screen, hold the POWER button until it turns off, redo step Step 3 of Section II, then retry this section
+ + If your device freezes on a red screen, hold the POWER button until it turns off, redo step 3 of Section II, then retry this section
+ If you get another error, try again up to 5 times, and if it still doesn't work, [follow this troubleshooting guide](troubleshooting#homebrew-launcher-super-skaterhax)
1. If the exploit was successful, your device will have booted into the Homebrew Launcher
1. Power off your device
diff --git a/_pages/bg_BG/include/bb3-prep.txt b/_pages/bg_BG/include/bb3-prep.txt
new file mode 100644
index 0000000000..0b0965f3de
--- /dev/null
+++ b/_pages/bg_BG/include/bb3-prep.txt
@@ -0,0 +1,23 @@
+In this section, you will copy the files needed to trigger the BannerBomb3 exploit onto your device's SD card.
+
+1. Power off your device
+1. Insert your SD card into your computer
+1. Open [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen) on your computer
+1. Upload your movable.sed using the “Choose File” option
+1. Click “Build and Download”
+ + This will download an exploit DSiWare called `F00D43D5.bin` and a payload called `bb3.bin` inside of a zip archive (`DSIWARE_EXPLOIT.zip`)
+1. Copy `bb3.bin` from `DSIWARE_EXPLOIT.zip` to the root of your SD card
+ + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it
+ + This file does not need to be opened or extracted
+ ![]({{ "/images/screenshots/bb3/bb3-root-layout.png" | absolute_url }}){: .notice--info}
+1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card
+ + `` is the 32-letter folder name that you copied in [Seedminer](seedminer)
+ + `` is a 32-letter folder inside of the ``
+ + If you have multiple `` folders, follow the instructions [here](troubleshooting#bannerbomb3)
+ ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info}
+1. Create a folder named `Nintendo DSiWare` inside of the ``
+ + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card
+1. Copy the `F00D43D5.bin` file from `DSIWARE_EXPLOIT.zip` to the `Nintendo DSiWare` folder
+
+![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }})
+{: .notice--info}
diff --git a/_pages/bg_BG/include/fredtool-prep.txt b/_pages/bg_BG/include/fredtool-prep.txt
new file mode 100644
index 0000000000..cff8aa806d
--- /dev/null
+++ b/_pages/bg_BG/include/fredtool-prep.txt
@@ -0,0 +1,29 @@
+In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer.
+
+1. Insert your SD card into your computer
+1. Open the [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) website on your computer
+1. Under the "Username" field, enter any alphanumeric name (no spaces or special characters)
+1. Under the "DSiBin" field, upload your DSiWare backup file (e.g. 42383841.bin) from the root of your SD card using the first "Browse..." option
+1. Under the "MovableSed" field, upload your `movable.sed` file using the second "Browse..." option
+1. Under the "InjectionTarget" field, set the injection target to `DSinternet` (NOT memorypit)
+1. Click "Build"
+ + Wait a few seconds for the build process to complete
+1. In the Build History section on the left, type the Username into the "Filter Builds" field
+1. Click on the first search result
+ + This result should have the latest timestamp
+1. Click the "output_(name).zip" link
+1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card
+ + `` is the 32-letter folder name that you copied in [Seedminer](seedminer)
+ + `` is a 32-letter folder inside of the ``
+1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder
+1. Copy the `42383841.bin` file from the `hax` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder
+ ![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info}
+1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card
+ + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it
+1. Copy `boot.nds` (B9STool) from the release `.zip` to the root of your SD card
+1. Copy the `private` folder from the Frogminer_save `.zip` to the root of your SD card
+1. Reinsert your SD card into your device
+1. Power on your device
+
+ ![]({{ "/images/screenshots/fredtool/fredtool-root-layout.png" | absolute_url }})
+ {: .notice--info}
\ No newline at end of file
diff --git a/_pages/bg_BG/include/fredtool-restore-dsconn.txt b/_pages/bg_BG/include/fredtool-restore-dsconn.txt
new file mode 100644
index 0000000000..3057b3ac9d
--- /dev/null
+++ b/_pages/bg_BG/include/fredtool-restore-dsconn.txt
@@ -0,0 +1,10 @@
+In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in an earlier section.
+
+1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card
+1. Copy the `42383841.bin` file from the `clean` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder, replacing the existing one
+1. Reinsert your SD card into your device
+1. Power on your device
+1. Launch System Settings on your device
+1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png))
+1. Select the "Nintendo DSi™" title
+1. Select "Copy", then select "OK"
diff --git a/_pages/bg_BG/include/fredtool-write-flipnote.txt b/_pages/bg_BG/include/fredtool-write-flipnote.txt
new file mode 100644
index 0000000000..cb6f428624
--- /dev/null
+++ b/_pages/bg_BG/include/fredtool-write-flipnote.txt
@@ -0,0 +1,11 @@
+In this section, you will copy the hacked DS Connection Settings DSiWare to internal memory, which will temporarily replace it with Flipnote Studio.
+
+1. Launch System Settings on your device
+1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png))
+1. Select the "Haxxxxxxxxx!" title
+ + If you are unable to select the "Haxxxxxxxxx" title, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool)
+1. Select "Copy", then select "OK"
+1. Return to main menu of the System Settings
+1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" ([image](/images/screenshots/fredtool/dsconnection.png))
+1. If the exploit was successful, your device will have loaded the JPN version of Flipnote Studio
+ + If your device does not load the JPN version of Flipnote Studio, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool)
\ No newline at end of file
diff --git a/_pages/bg_BG/include/safemodecheck.txt b/_pages/bg_BG/include/safemodecheck.txt
index 43ebec6575..7035baace8 100644
--- a/_pages/bg_BG/include/safemodecheck.txt
+++ b/_pages/bg_BG/include/safemodecheck.txt
@@ -1,3 +1,5 @@
+In this section, you will see whether your shoulder buttons are working on your device. This will determine which method you will follow on the next page.
+
1. Power on your device
1. Once you see the HOME Menu, press the (Left Shoulder) and (Right Shoulder) buttons at the same time
+ The camera applet should appear
diff --git a/_pages/bg_BG/include/seedminer-base.txt b/_pages/bg_BG/include/seedminer-base.txt
index e3493c2f87..ad6697a5fa 100644
--- a/_pages/bg_BG/include/seedminer-base.txt
+++ b/_pages/bg_BG/include/seedminer-base.txt
@@ -15,10 +15,12 @@ This method uses a powerful graphics card to perform the calculations needed. A
In this section, you will get the necessary details from your 3DS that are required to figure out your device's encryption key.
+{% capture console_state_info %}
Before following this section:
+ Ensure that you have turned on your console with the SD card inserted at least once to generate the necessary data
+ Ensure that your console is connected to the Internet (you should see a blue "Internet" indicator on the top-left corner of the HOME screen)
-{: .notice--info}
+{% endcapture %}
+{{ console_state_info | markdownify }}
1. Power off your device
1. Insert your SD card into your computer
diff --git a/_pages/bg_BG/installing-boot9strap-(fredtool).txt b/_pages/bg_BG/installing-boot9strap-(fredtool).txt
index ea9d81c010..455c3317a3 100644
--- a/_pages/bg_BG/installing-boot9strap-(fredtool).txt
+++ b/_pages/bg_BG/installing-boot9strap-(fredtool).txt
@@ -15,11 +15,14 @@ This is a currently working implementation of the "FIRM partitions known-plainte
{{ technical_info | markdownify }}
{: .notice--info}
+You should only be able to get to this page if you are running version 11.16.0. If you are on any firmware other than 11.17.0 or 11.16.0, STOP as these instructions WILL LEAD TO A BRICK on other firmwares!!
+{: .notice--warning}
+
### What You Need
* Your `movable.sed` file from completing [Seedminer](seedminer)
* The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`)
-* The latest release of [b9sTool](https://github.com/zoogie/b9sTool/releases/download/v6.1.1/release_6.1.1.zip) (direct download)
+* **11.16.0 or 11.17.0 users**: The v6.1.1 release of [b9sTool](https://github.com/zoogie/b9sTool/releases/download/v6.1.1/release_6.1.1.zip) (direct download)
* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file)
#### Section I - CFW Check
@@ -42,49 +45,11 @@ In this section, you will trigger the BannerBomb3 exploit using the DSiWare Mana
#### Section III - Prep Work
-In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer.
-
-1. Insert your SD card into your computer
-1. Open the [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) website on your computer
-1. Under the "Username" field, enter any alphanumeric name (no spaces or special characters)
-1. Under the "DSiBin" field, upload your `42383841.bin` file from the root of your SD card using the first "Browse..." option
-1. Under the "MovableSed" field, upload your `movable.sed` file using the second "Browse..." option
-1. Under the "InjectionTarget" field, set the injection target to `DSinternet` (NOT memorypit)
-1. Click "Build"
- + Wait a few seconds for the build process to complete
-1. In the Build History section on the left, type the Username into the "Filter Builds" field
-1. Click on the first search result
- + This result should have the latest timestamp
-1. Click the "output_(name).zip" link
-1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card
- + `` is the 32-letter folder name that you copied in [Seedminer](seedminer)
- + `` is a 32-letter folder inside of the ``
-1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder
-1. Copy the `42383841.bin` file from the `hax` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder
- ![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info}
-1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card
- + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it
-1. Copy `boot.nds` (B9STool) from the release `.zip` to the root of your SD card
-1. Copy the `private` folder from the Frogminer_save `.zip` to the root of your SD card
-1. Reinsert your SD card into your device
-1. Power on your device
-
- ![]({{ "/images/screenshots/fredtool/fredtool-root-layout.png" | absolute_url }})
- {: .notice--info}
+{% include_relative include/fredtool-prep.txt %}
#### Section IV - Overwriting DS Connection Settings
-In this section, you will copy the hacked DS Connection Settings DSiWare to internal memory, which will temporarily replace it with Flipnote Studio.
-
-1. Launch System Settings on your device
-1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png))
-1. Select the "Haxxxxxxxxx!" title
- + If you are unable to select the "Haxxxxxxxxx" title, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool)
-1. Select "Copy", then select "OK"
-1. Return to main menu of the System Settings
-1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" ([image](/images/screenshots/fredtool/dsconnection.png))
-1. If the exploit was successful, your device will have loaded the JPN version of Flipnote Studio
- + If your device does not load the JPN version of Flipnote Studio, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool)
+{% include_relative include/fredtool-write-flipnote.txt %}
#### Section V - Flipnote Exploit
@@ -99,18 +64,10 @@ In this section, you will copy the hacked DS Connection Settings DSiWare to inte
#### Section VII - Restoring DS Connection Settings
-In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in Section IV.
-
-1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card
-1. Copy the `42383841.bin` file from the `clean` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder, replacing the existing one
-1. Reinsert your SD card into your device
-1. Power on your device
-1. Launch System Settings on your device
-1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png))
-1. Select the "Nintendo DSi™" title
-1. Select "Copy", then select "OK"
+{% include_relative include/fredtool-restore-dsconn.txt %}
___
+
### Continue to [Finalizing Setup](finalizing-setup)
{: .notice--primary}
diff --git a/_pages/bg_BG/installing-boot9strap-(fredtool-legacy).txt b/_pages/bg_BG/installing-boot9strap-(fredtool-legacy).txt
new file mode 100644
index 0000000000..1513694ebd
--- /dev/null
+++ b/_pages/bg_BG/installing-boot9strap-(fredtool-legacy).txt
@@ -0,0 +1,77 @@
+---
+title: "Installing boot9strap (Fredtool, Legacy)"
+---
+
+{% include toc title="Table of Contents" %}
+
+{% capture technical_info %}
+Technical Details (optional)
+
+To dump system DSiWare, we exploit a flaw in the DSiWare Data Management window of the Settings application.
+
+To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system to dump the DSi Internet Settings application to the SD root.
+
+Once we have a DSiWare backup, we can inject it into the DS Internet Settings application.
+
+This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws).
+
+{% endcapture %}
+{{ technical_info | markdownify }}
+{: .notice--info}
+
+You should only be able to get to this page if you are running version 11.15.0 or 11.14.0. If you are on any firmware other than 11.15.0 or 11.14.0, STOP as these instructions WILL LEAD TO A BRICK on other firmwares!!
+{: .notice--warning}
+
+### What You Need
+
+* Your `movable.sed` file from completing [Seedminer (Mii)](seedminer-(mii))
+* The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`)
+* **11.15.0 and 11.14.0 users only**: The v6.0.1 release of [b9sTool](https://github.com/zoogie/b9sTool/releases/tag/v6.0.1) (direct download)
+* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file)
+
+#### Section I - CFW Check
+
+{% include_relative include/cfw-check-fredtool.txt %}
+
+#### Section II - BannerBomb3
+
+In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next section.
+
+1. Reinsert your SD card into your device
+1. Power on your device
+1. Launch System Settings on your device
+1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png))
+ + Your device should show the BB3 multihax menu
+ + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool)
+1. Use the D-Pad to navigate and press the (A) button to select "Dump DSiWare"
+ + Your device will automatically reboot
+1. Power off your device
+
+#### Section III - Prep Work
+
+{% include_relative include/fredtool-prep.txt %}
+
+#### Section IV - Overwriting DS Connection Settings
+
+{% include_relative include/fredtool-write-flipnote.txt %}
+
+#### Section V - Flipnote Exploit
+
+{% include_relative include/install-boot9strap-b9stool.txt method="dsinternet" %}
+
+#### Section VI - Luma3DS Configuration
+
+1. Press and hold (Select), and while holding (Select), power on your device. This will launch Luma3DS configuration
+{% include_relative include/configure-luma3ds.txt %}
+
+{% include_relative include/luma3ds-installed-note.txt %}
+
+#### Section VII - Restoring DS Connection Settings
+
+{% include_relative include/fredtool-restore-dsconn.txt %}
+
+___
+
+
+### Continue to [Finalizing Setup](finalizing-setup)
+{: .notice--primary}
diff --git a/_pages/bg_BG/seedminer-(mii).txt b/_pages/bg_BG/seedminer-(mii).txt
new file mode 100644
index 0000000000..5faf224c22
--- /dev/null
+++ b/_pages/bg_BG/seedminer-(mii).txt
@@ -0,0 +1,84 @@
+---
+title: "Seedminer (Mii)"
+---
+
+{% include toc title="Table of Contents" %}
+
+{% capture gpu_warning %}
+This method requires a reasonably powerful GPU (any dedicated graphics card made in the last few years) and the ability to use a command line. If you don't know what those are or do not have the hardware necessary, you can ask someone to do this for you at [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp). You will need to have the following information ready:
++ Your Mii QR code, uploaded directly to Discord (do not take a screenshot or a photo of the image, just send the HNI_XXXX.JPG image itself)
++ Your console's ID0 (the name of the 32-character folder directly inside of Nintendo 3DS - see [this troubleshooting section](https://3ds.hacks.guide/troubleshooting#seedminer) if you have multiple)
++ Your console model (e.g. 3DS, 3DS XL, 2DS, New3DS, New3DS XL, New2DS XL)
++ Your console's approximate year of manufacturing (it may be present behind the frontplate or backplate; if you don't know, just guess - it's not super important)
+{% endcapture %}
+{{ gpu_warning | markdownify }}
+
+{% capture technical_info %}
+Technical Details (optional)
+
+To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device.
+
+Because we do not have access to the Friends List, we are deriving the first part of `movable.sed` using a Mii QR code instead of by performing a two-way friend exchange.
+
+For information on how Seedminer works, see [this presentation](https://zoogie.github.io/web/34⅕c3).
+
+{% endcapture %}
+{{ technical_info | markdownify }}
+{: .notice--info}
+
+## Instructions
+
+If you are on Linux or macOS, replace `py -3` with `python3` in all commands.
+{: .notice--info}
+
+### What you need
+
++ The latest release of [Seedminer](https://github.com/zoogie/seedminer/releases/latest) (the Seedminer .zip)
++ Any 3.x version of [Python](https://www.python.org/downloads/) installed
+ + If you are on Linux, you likely already have Python 3. Check by opening a terminal and entering `python3 -V`. If this returns a version number, it will work for this guide.
+
+### Section I - Prep Work
+
+In this section, you will set up Seedminer and obtain your console's files that are needed for mining.
+
+1. Extract the contents of the Seedminer `.zip` and move the folder with your operating systeem's name to anywhere on your PC
+ + Keep this location handy, as this Seedminer folder will be where multiple other files are placed
+1. In the Seedminer folder, hold SHIFT and right-click anywhere in the folder's empty space, then click the option that opens Terminal, PowerShell, or Command Prompt
+1. In the command line window, type `py -3 -mpip install pycryptodomex`, hit ENTER, and allow it to install
+ + If this command fails with the error `No module named pip`, you must manually install pip. The methods to do this can be found on [this page](https://pip.pypa.io/en/stable/installation/).
+1. Turn your console on while the SD card is inserted
+1. Open the Mii Maker app
+1. Tap the "QR Code/Image Options" button
+1. Tap "Save Mii as QR Code"
+1. Select any Mii Character (make a new one first if you don't have any), and press "OK"
+1. Turn the console off
+1. Put the console's SD card into your computer, navigate to the `Nintendo 3DS` folder on the SD, and copy the name of the 32-character-long folder directly inside
+ + This folder, known as the ID0, is system-specific. Only one should be present. If you see multiple, follow [these instructions](troubleshooting#seedminer)
+ + Once you have the ID0, paste it into a document so you can reference it later
+1. Navigate to the `DCIM` folder on the SD card
+1. Look for the QR Code, which will be a `.JPG` file starting with `HNI`
+ + You may have many other files in here already if you use the Nintendo 3DS Camera app
+1. Copy this file to the Seedminer folder on your PC
+
+### Section II - Processing Mii QR and Mining
+
+In this section, you will turn the Mii QR code into a usable file and mine `movable.sed` with it.
+
+1. Open the [editMii](https://zoogie.github.io/web/miiqr/) website on your computer
+1. Click on "Import from...", then select "QR Code" and upload the Mii QR code from earlier
+1. Click on "Export to...", then select "encrypted (.bin)"
+ + This will download a file named `input.bin`
+1. Copy this `input.bin` to the Seedminer folder
+1. Open the terminal/PowerShell/Command Prompt window from earlier
+1.Inside this window, enter the command `py -3 seedminer_launcher3.py id0 `
+ + Replace `` with the ID0 you copied into a document
+ + Do not include the angle brackets
+1. Once it completes, enter the command `py -3 seedminer_launcher3.py mii `
+ + Replace `` with the model of your console (`new` or `old`) - if you aren't sure, only models with the ZL/ZR buttons and C-Stick are new
+ + Replace `` with the year the 3DS was made (you often find this on the backplate) - leave this empty if you aren't sure, in which case it will start from the middle
+ + If this fails with an error of `input.bin is invalid size`, remake the `input.bin` using your QR Code. If it ''still'' fails, open a different browser and remake the `input.bin` there
+ + The mining process will usually take up to 90 minutes, depending on luck and your GPU's strength
+1. When it finishes, a file called `movable.sed` will appear in the Seedminer folder
+
+Continue to [BannerBomb3 (Legacy)](bannerbomb3-(legacy))
+{: .notice--primary}
diff --git a/_pages/bg_BG/site-navigation.txt b/_pages/bg_BG/site-navigation.txt
index a2135747ab..179a8a4b0b 100644
--- a/_pages/bg_BG/site-navigation.txt
+++ b/_pages/bg_BG/site-navigation.txt
@@ -18,6 +18,7 @@ sitemap: false
+ [A9LH to B9S](a9lh-to-b9s)
+ [BannerBomb3](bannerbomb3)
++ [Installing boot9strap (Fredtool, Legacy)](bannerbomb3-(legacy))
+ [BannerBomb3 + Fredtool (TWN)](bannerbomb3-fredtool-(twn))
+ [Credits](credits)
+ [Checking for CFW](checking-for-cfw)
@@ -44,6 +45,7 @@ sitemap: false
+ [Home](/)
+ [Homebrew Launcher (super-skaterhax)](homebrew-launcher-(super-skaterhax))
+ [Installing boot9strap (Fredtool)](installing-boot9strap-(fredtool))
++ [Installing boot9strap (Fredtool, Legacy)](installing-boot9strap-(fredtool-legacy))
+ [Installing boot9strap (Frogtool)](installing-boot9strap-(frogtool))
+ [Installing boot9strap (Hardmod)](installing-boot9strap-(hardmod))
+ [Installing boot9strap (HBL-USM)](installing-boot9strap-(hbl-usm))
@@ -59,6 +61,7 @@ sitemap: false
+ [Region Changing](region-changing)
+ [Restoring / Updating CFW](restoring-updating-cfw)
+ [Seedminer](seedminer)
++ [Seedminer](seedminer-(mii))
+ [Seedminer (TWN)](seedminer-(twn))
+ [Troubleshooting](troubleshooting)
+ [Uninstall CFW](uninstall-cfw)
diff --git a/_pages/bg_BG/updating-firmware-(kor-twn).md b/_pages/bg_BG/updating-firmware-(kor).txt
similarity index 89%
rename from _pages/bg_BG/updating-firmware-(kor-twn).md
rename to _pages/bg_BG/updating-firmware-(kor).txt
index 74a2b48f90..4b08786c27 100644
--- a/_pages/bg_BG/updating-firmware-(kor-twn).md
+++ b/_pages/bg_BG/updating-firmware-(kor).txt
@@ -1,5 +1,5 @@
---
-title: "Updating Firmware (KOR/TWN)"
+title: "Updating Firmware (KOR)"
---
### Required Reading
diff --git a/_pages/bg_BG/updating-firmware-(new-3ds).md b/_pages/bg_BG/updating-firmware-(new-3ds).txt
similarity index 100%
rename from _pages/bg_BG/updating-firmware-(new-3ds).md
rename to _pages/bg_BG/updating-firmware-(new-3ds).txt
diff --git a/_pages/bg_BG/updating-firmware-(twn).txt b/_pages/bg_BG/updating-firmware-(twn).txt
new file mode 100644
index 0000000000..83e6992b1b
--- /dev/null
+++ b/_pages/bg_BG/updating-firmware-(twn).txt
@@ -0,0 +1,18 @@
+---
+title: "Updating Firmware (TWN)"
+---
+
+### Required Reading
+
+To use the Seedminer exploit, you must update your device to the latest system version.
+
+### What you need
+
+* An internet connection on your device
+
+#### Section I - Updating the System
+
+{% include_relative include/sysupdate.txt cfw="false" %}
+
+Continue to [Seedminer (TWN)](seedminer-(twn))
+{: .notice--primary}
diff --git a/_pages/ca_ES/404.md b/_pages/ca_ES/404.txt
similarity index 100%
rename from _pages/ca_ES/404.md
rename to _pages/ca_ES/404.txt
diff --git a/_pages/ca_ES/bannerbomb3-(legacy).txt b/_pages/ca_ES/bannerbomb3-(legacy).txt
new file mode 100644
index 0000000000..503794c42a
--- /dev/null
+++ b/_pages/ca_ES/bannerbomb3-(legacy).txt
@@ -0,0 +1,50 @@
+---
+title: "BannerBomb3 (Legacy)"
+---
+
+{% include toc title="Table of Contents" %}
+
+{% capture technical_info %}
+Technical Details (optional)
+
+To launch custom code, we exploit a flaw in the DSiWare Data Management window of the Settings application.
+
+To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system.
+
+For a more technical explanation, see [here](https://github.com/zoogie/Bannerbomb3).
+{% endcapture %}
+
+{{ technical_info | markdownify }}
+{: .notice--info}
+
+### Compatibility Notes
+
+These instructions work on USA, Europe, Japan, and Korea region consoles as indicated by the letters U, E, J, or K after the system version.
+
+### What You Need
+
+* Your `movable.sed` file from completing Seedminer or nimhax
+
+#### Section I - Prep Work
+
+{% include_relative include/bb3-prep.txt %}
+
+#### Section II - Hardware Button Check
+
+In this section, you will see whether you can access Safe Mode on your device. This will determine which method you will follow on the next page.
+
+Your SD card should remain in your computer while you perform this check.
+
+{% include_relative include/safemodecheck.txt %}
+
+___
+
+### Next steps: Choose an exploit
+
+If the camera appeared in the previous section, Safe Mode is likely to be working on your device.
+
+If the camera appeared, continue to [Installing boot9strap (USM)](installing-boot9strap-(usm))
+{: .notice--primary}
+
+If the camera did NOT appear, continue to [Installing boot9strap (Fredtool, Legacy)](installing-boot9strap-(fredtool-legacy))
+{: .notice--info}
diff --git a/_pages/ca_ES/bannerbomb3.txt b/_pages/ca_ES/bannerbomb3.txt
index 7767c4aeb1..a8383926fd 100644
--- a/_pages/ca_ES/bannerbomb3.txt
+++ b/_pages/ca_ES/bannerbomb3.txt
@@ -30,36 +30,10 @@ If you have a Taiwanese console (indicated by a T after the system version), fol
#### Section I - Prep Work
-In this section, you will copy the files needed to trigger the BannerBomb3 exploit onto your device's SD card.
-
-1. Power off your device
-1. Insert your SD card into your computer
-1. Open [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen) on your computer
-1. Upload your movable.sed using the “Choose File” option
-1. Click “Build and Download”
- + This will download an exploit DSiWare called `F00D43D5.bin` and a payload called `bb3.bin` inside of a zip archive (`DSIWARE_EXPLOIT.zip`)
-1. Copy `bb3.bin` from `DSIWARE_EXPLOIT.zip` to the root of your SD card
- + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it
- + This file does not need to be opened or extracted
- ![]({{ "/images/screenshots/bb3/bb3-root-layout.png" | absolute_url }}){: .notice--info}
-1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card
- + `` is the 32-letter folder name that you copied in [Seedminer](seedminer)
- + `` is a 32-letter folder inside of the ``
- + If you have multiple `` folders, follow the instructions [here](troubleshooting#bannerbomb3)
- ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info}
-1. Create a folder named `Nintendo DSiWare` inside of the ``
- + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card
-1. Copy the `F00D43D5.bin` file from `DSIWARE_EXPLOIT.zip` to the `Nintendo DSiWare` folder
-
-![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }})
-{: .notice--info}
+{% include_relative include/bb3-prep.txt %}
#### Section II - Hardware Button Check
-In this section, you will see whether you can access Safe Mode on your device. This will determine which method you will follow on the next page.
-
-Your SD card should remain in your computer while you perform this check.
-
{% include_relative include/safemodecheck.txt %}
___
diff --git a/_pages/ca_ES/credits.md b/_pages/ca_ES/credits.txt
similarity index 100%
rename from _pages/ca_ES/credits.md
rename to _pages/ca_ES/credits.txt
diff --git a/_pages/ca_ES/donations.md b/_pages/ca_ES/donations.txt
similarity index 100%
rename from _pages/ca_ES/donations.md
rename to _pages/ca_ES/donations.txt
diff --git a/_pages/ca_ES/finalizing-setup.txt b/_pages/ca_ES/finalizing-setup.txt
index f07a143549..7daf8451d1 100644
--- a/_pages/ca_ES/finalizing-setup.txt
+++ b/_pages/ca_ES/finalizing-setup.txt
@@ -177,9 +177,6 @@ ___
You're done! Custom firmware is now fully configured on your device.
{: .notice--success}
-Hello! We're looking for feedback on the overall experience of following our guide. If you'd like to help out, check out the survey [here](https://forms.gle/vZNoc4QLCz5MEXCK7) (only available in English). Thanks!
-{: .notice--info}
-
### Information and Notes
{% capture notice-6 %}
diff --git a/_pages/ca_ES/homebrew-launcher-(super-skaterhax).txt b/_pages/ca_ES/homebrew-launcher-(super-skaterhax).txt
index ea288c3163..7b83fe0d7e 100644
--- a/_pages/ca_ES/homebrew-launcher-(super-skaterhax).txt
+++ b/_pages/ca_ES/homebrew-launcher-(super-skaterhax).txt
@@ -64,7 +64,7 @@ If you haven't already, make sure you have a working Internet connection set up
1. Select the "GO GO!" button on the top screen
+ If any prompts appear, approve all of them
+ If your device freezes on a yellow screen, hold the POWER button until it turns off, then retry this section
- + If your device freezes on a red screen, hold the POWER button until it turns off, redo step Step 3 of Section II, then retry this section
+ + If your device freezes on a red screen, hold the POWER button until it turns off, redo step 3 of Section II, then retry this section
+ If you get another error, try again up to 5 times, and if it still doesn't work, [follow this troubleshooting guide](troubleshooting#homebrew-launcher-super-skaterhax)
1. If the exploit was successful, your device will have booted into the Homebrew Launcher
1. Power off your device
diff --git a/_pages/ca_ES/include/bb3-prep.txt b/_pages/ca_ES/include/bb3-prep.txt
new file mode 100644
index 0000000000..0b0965f3de
--- /dev/null
+++ b/_pages/ca_ES/include/bb3-prep.txt
@@ -0,0 +1,23 @@
+In this section, you will copy the files needed to trigger the BannerBomb3 exploit onto your device's SD card.
+
+1. Power off your device
+1. Insert your SD card into your computer
+1. Open [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen) on your computer
+1. Upload your movable.sed using the “Choose File” option
+1. Click “Build and Download”
+ + This will download an exploit DSiWare called `F00D43D5.bin` and a payload called `bb3.bin` inside of a zip archive (`DSIWARE_EXPLOIT.zip`)
+1. Copy `bb3.bin` from `DSIWARE_EXPLOIT.zip` to the root of your SD card
+ + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it
+ + This file does not need to be opened or extracted
+ ![]({{ "/images/screenshots/bb3/bb3-root-layout.png" | absolute_url }}){: .notice--info}
+1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card
+ + `` is the 32-letter folder name that you copied in [Seedminer](seedminer)
+ + `` is a 32-letter folder inside of the ``
+ + If you have multiple `` folders, follow the instructions [here](troubleshooting#bannerbomb3)
+ ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info}
+1. Create a folder named `Nintendo DSiWare` inside of the ``
+ + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card
+1. Copy the `F00D43D5.bin` file from `DSIWARE_EXPLOIT.zip` to the `Nintendo DSiWare` folder
+
+![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }})
+{: .notice--info}
diff --git a/_pages/ca_ES/include/fredtool-prep.txt b/_pages/ca_ES/include/fredtool-prep.txt
new file mode 100644
index 0000000000..cff8aa806d
--- /dev/null
+++ b/_pages/ca_ES/include/fredtool-prep.txt
@@ -0,0 +1,29 @@
+In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer.
+
+1. Insert your SD card into your computer
+1. Open the [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) website on your computer
+1. Under the "Username" field, enter any alphanumeric name (no spaces or special characters)
+1. Under the "DSiBin" field, upload your DSiWare backup file (e.g. 42383841.bin) from the root of your SD card using the first "Browse..." option
+1. Under the "MovableSed" field, upload your `movable.sed` file using the second "Browse..." option
+1. Under the "InjectionTarget" field, set the injection target to `DSinternet` (NOT memorypit)
+1. Click "Build"
+ + Wait a few seconds for the build process to complete
+1. In the Build History section on the left, type the Username into the "Filter Builds" field
+1. Click on the first search result
+ + This result should have the latest timestamp
+1. Click the "output_(name).zip" link
+1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card
+ + `` is the 32-letter folder name that you copied in [Seedminer](seedminer)
+ + `` is a 32-letter folder inside of the ``
+1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder
+1. Copy the `42383841.bin` file from the `hax` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder
+ ![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info}
+1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card
+ + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it
+1. Copy `boot.nds` (B9STool) from the release `.zip` to the root of your SD card
+1. Copy the `private` folder from the Frogminer_save `.zip` to the root of your SD card
+1. Reinsert your SD card into your device
+1. Power on your device
+
+ ![]({{ "/images/screenshots/fredtool/fredtool-root-layout.png" | absolute_url }})
+ {: .notice--info}
\ No newline at end of file
diff --git a/_pages/ca_ES/include/fredtool-restore-dsconn.txt b/_pages/ca_ES/include/fredtool-restore-dsconn.txt
new file mode 100644
index 0000000000..3057b3ac9d
--- /dev/null
+++ b/_pages/ca_ES/include/fredtool-restore-dsconn.txt
@@ -0,0 +1,10 @@
+In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in an earlier section.
+
+1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card
+1. Copy the `42383841.bin` file from the `clean` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder, replacing the existing one
+1. Reinsert your SD card into your device
+1. Power on your device
+1. Launch System Settings on your device
+1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png))
+1. Select the "Nintendo DSi™" title
+1. Select "Copy", then select "OK"
diff --git a/_pages/ca_ES/include/fredtool-write-flipnote.txt b/_pages/ca_ES/include/fredtool-write-flipnote.txt
new file mode 100644
index 0000000000..cb6f428624
--- /dev/null
+++ b/_pages/ca_ES/include/fredtool-write-flipnote.txt
@@ -0,0 +1,11 @@
+In this section, you will copy the hacked DS Connection Settings DSiWare to internal memory, which will temporarily replace it with Flipnote Studio.
+
+1. Launch System Settings on your device
+1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png))
+1. Select the "Haxxxxxxxxx!" title
+ + If you are unable to select the "Haxxxxxxxxx" title, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool)
+1. Select "Copy", then select "OK"
+1. Return to main menu of the System Settings
+1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" ([image](/images/screenshots/fredtool/dsconnection.png))
+1. If the exploit was successful, your device will have loaded the JPN version of Flipnote Studio
+ + If your device does not load the JPN version of Flipnote Studio, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool)
\ No newline at end of file
diff --git a/_pages/ca_ES/include/safemodecheck.txt b/_pages/ca_ES/include/safemodecheck.txt
index 43ebec6575..7035baace8 100644
--- a/_pages/ca_ES/include/safemodecheck.txt
+++ b/_pages/ca_ES/include/safemodecheck.txt
@@ -1,3 +1,5 @@
+In this section, you will see whether your shoulder buttons are working on your device. This will determine which method you will follow on the next page.
+
1. Power on your device
1. Once you see the HOME Menu, press the (Left Shoulder) and (Right Shoulder) buttons at the same time
+ The camera applet should appear
diff --git a/_pages/ca_ES/include/seedminer-base.txt b/_pages/ca_ES/include/seedminer-base.txt
index e3493c2f87..ad6697a5fa 100644
--- a/_pages/ca_ES/include/seedminer-base.txt
+++ b/_pages/ca_ES/include/seedminer-base.txt
@@ -15,10 +15,12 @@ This method uses a powerful graphics card to perform the calculations needed. A
In this section, you will get the necessary details from your 3DS that are required to figure out your device's encryption key.
+{% capture console_state_info %}
Before following this section:
+ Ensure that you have turned on your console with the SD card inserted at least once to generate the necessary data
+ Ensure that your console is connected to the Internet (you should see a blue "Internet" indicator on the top-left corner of the HOME screen)
-{: .notice--info}
+{% endcapture %}
+{{ console_state_info | markdownify }}
1. Power off your device
1. Insert your SD card into your computer
diff --git a/_pages/ca_ES/installing-boot9strap-(fredtool).txt b/_pages/ca_ES/installing-boot9strap-(fredtool).txt
index ea9d81c010..455c3317a3 100644
--- a/_pages/ca_ES/installing-boot9strap-(fredtool).txt
+++ b/_pages/ca_ES/installing-boot9strap-(fredtool).txt
@@ -15,11 +15,14 @@ This is a currently working implementation of the "FIRM partitions known-plainte
{{ technical_info | markdownify }}
{: .notice--info}
+You should only be able to get to this page if you are running version 11.16.0. If you are on any firmware other than 11.17.0 or 11.16.0, STOP as these instructions WILL LEAD TO A BRICK on other firmwares!!
+{: .notice--warning}
+
### What You Need
* Your `movable.sed` file from completing [Seedminer](seedminer)
* The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`)
-* The latest release of [b9sTool](https://github.com/zoogie/b9sTool/releases/download/v6.1.1/release_6.1.1.zip) (direct download)
+* **11.16.0 or 11.17.0 users**: The v6.1.1 release of [b9sTool](https://github.com/zoogie/b9sTool/releases/download/v6.1.1/release_6.1.1.zip) (direct download)
* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file)
#### Section I - CFW Check
@@ -42,49 +45,11 @@ In this section, you will trigger the BannerBomb3 exploit using the DSiWare Mana
#### Section III - Prep Work
-In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer.
-
-1. Insert your SD card into your computer
-1. Open the [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) website on your computer
-1. Under the "Username" field, enter any alphanumeric name (no spaces or special characters)
-1. Under the "DSiBin" field, upload your `42383841.bin` file from the root of your SD card using the first "Browse..." option
-1. Under the "MovableSed" field, upload your `movable.sed` file using the second "Browse..." option
-1. Under the "InjectionTarget" field, set the injection target to `DSinternet` (NOT memorypit)
-1. Click "Build"
- + Wait a few seconds for the build process to complete
-1. In the Build History section on the left, type the Username into the "Filter Builds" field
-1. Click on the first search result
- + This result should have the latest timestamp
-1. Click the "output_(name).zip" link
-1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card
- + `` is the 32-letter folder name that you copied in [Seedminer](seedminer)
- + `` is a 32-letter folder inside of the ``
-1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder
-1. Copy the `42383841.bin` file from the `hax` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder
- ![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info}
-1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card
- + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it
-1. Copy `boot.nds` (B9STool) from the release `.zip` to the root of your SD card
-1. Copy the `private` folder from the Frogminer_save `.zip` to the root of your SD card
-1. Reinsert your SD card into your device
-1. Power on your device
-
- ![]({{ "/images/screenshots/fredtool/fredtool-root-layout.png" | absolute_url }})
- {: .notice--info}
+{% include_relative include/fredtool-prep.txt %}
#### Section IV - Overwriting DS Connection Settings
-In this section, you will copy the hacked DS Connection Settings DSiWare to internal memory, which will temporarily replace it with Flipnote Studio.
-
-1. Launch System Settings on your device
-1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png))
-1. Select the "Haxxxxxxxxx!" title
- + If you are unable to select the "Haxxxxxxxxx" title, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool)
-1. Select "Copy", then select "OK"
-1. Return to main menu of the System Settings
-1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" ([image](/images/screenshots/fredtool/dsconnection.png))
-1. If the exploit was successful, your device will have loaded the JPN version of Flipnote Studio
- + If your device does not load the JPN version of Flipnote Studio, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool)
+{% include_relative include/fredtool-write-flipnote.txt %}
#### Section V - Flipnote Exploit
@@ -99,18 +64,10 @@ In this section, you will copy the hacked DS Connection Settings DSiWare to inte
#### Section VII - Restoring DS Connection Settings
-In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in Section IV.
-
-1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card
-1. Copy the `42383841.bin` file from the `clean` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder, replacing the existing one
-1. Reinsert your SD card into your device
-1. Power on your device
-1. Launch System Settings on your device
-1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png))
-1. Select the "Nintendo DSi™" title
-1. Select "Copy", then select "OK"
+{% include_relative include/fredtool-restore-dsconn.txt %}
___
+
### Continue to [Finalizing Setup](finalizing-setup)
{: .notice--primary}
diff --git a/_pages/ca_ES/installing-boot9strap-(fredtool-legacy).txt b/_pages/ca_ES/installing-boot9strap-(fredtool-legacy).txt
new file mode 100644
index 0000000000..1513694ebd
--- /dev/null
+++ b/_pages/ca_ES/installing-boot9strap-(fredtool-legacy).txt
@@ -0,0 +1,77 @@
+---
+title: "Installing boot9strap (Fredtool, Legacy)"
+---
+
+{% include toc title="Table of Contents" %}
+
+{% capture technical_info %}
+Technical Details (optional)
+
+To dump system DSiWare, we exploit a flaw in the DSiWare Data Management window of the Settings application.
+
+To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system to dump the DSi Internet Settings application to the SD root.
+
+Once we have a DSiWare backup, we can inject it into the DS Internet Settings application.
+
+This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws).
+
+{% endcapture %}
+{{ technical_info | markdownify }}
+{: .notice--info}
+
+You should only be able to get to this page if you are running version 11.15.0 or 11.14.0. If you are on any firmware other than 11.15.0 or 11.14.0, STOP as these instructions WILL LEAD TO A BRICK on other firmwares!!
+{: .notice--warning}
+
+### What You Need
+
+* Your `movable.sed` file from completing [Seedminer (Mii)](seedminer-(mii))
+* The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`)
+* **11.15.0 and 11.14.0 users only**: The v6.0.1 release of [b9sTool](https://github.com/zoogie/b9sTool/releases/tag/v6.0.1) (direct download)
+* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file)
+
+#### Section I - CFW Check
+
+{% include_relative include/cfw-check-fredtool.txt %}
+
+#### Section II - BannerBomb3
+
+In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next section.
+
+1. Reinsert your SD card into your device
+1. Power on your device
+1. Launch System Settings on your device
+1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png))
+ + Your device should show the BB3 multihax menu
+ + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool)
+1. Use the D-Pad to navigate and press the (A) button to select "Dump DSiWare"
+ + Your device will automatically reboot
+1. Power off your device
+
+#### Section III - Prep Work
+
+{% include_relative include/fredtool-prep.txt %}
+
+#### Section IV - Overwriting DS Connection Settings
+
+{% include_relative include/fredtool-write-flipnote.txt %}
+
+#### Section V - Flipnote Exploit
+
+{% include_relative include/install-boot9strap-b9stool.txt method="dsinternet" %}
+
+#### Section VI - Luma3DS Configuration
+
+1. Press and hold (Select), and while holding (Select), power on your device. This will launch Luma3DS configuration
+{% include_relative include/configure-luma3ds.txt %}
+
+{% include_relative include/luma3ds-installed-note.txt %}
+
+#### Section VII - Restoring DS Connection Settings
+
+{% include_relative include/fredtool-restore-dsconn.txt %}
+
+___
+
+
+### Continue to [Finalizing Setup](finalizing-setup)
+{: .notice--primary}
diff --git a/_pages/ca_ES/seedminer-(mii).txt b/_pages/ca_ES/seedminer-(mii).txt
new file mode 100644
index 0000000000..5faf224c22
--- /dev/null
+++ b/_pages/ca_ES/seedminer-(mii).txt
@@ -0,0 +1,84 @@
+---
+title: "Seedminer (Mii)"
+---
+
+{% include toc title="Table of Contents" %}
+
+{% capture gpu_warning %}
+This method requires a reasonably powerful GPU (any dedicated graphics card made in the last few years) and the ability to use a command line. If you don't know what those are or do not have the hardware necessary, you can ask someone to do this for you at [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp). You will need to have the following information ready:
++ Your Mii QR code, uploaded directly to Discord (do not take a screenshot or a photo of the image, just send the HNI_XXXX.JPG image itself)
++ Your console's ID0 (the name of the 32-character folder directly inside of Nintendo 3DS - see [this troubleshooting section](https://3ds.hacks.guide/troubleshooting#seedminer) if you have multiple)
++ Your console model (e.g. 3DS, 3DS XL, 2DS, New3DS, New3DS XL, New2DS XL)
++ Your console's approximate year of manufacturing (it may be present behind the frontplate or backplate; if you don't know, just guess - it's not super important)
+{% endcapture %}
+{{ gpu_warning | markdownify }}
+
+{% capture technical_info %}
+Technical Details (optional)
+
+To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device.
+
+Because we do not have access to the Friends List, we are deriving the first part of `movable.sed` using a Mii QR code instead of by performing a two-way friend exchange.
+
+For information on how Seedminer works, see [this presentation](https://zoogie.github.io/web/34⅕c3).
+
+{% endcapture %}
+{{ technical_info | markdownify }}
+{: .notice--info}
+
+## Instructions
+
+If you are on Linux or macOS, replace `py -3` with `python3` in all commands.
+{: .notice--info}
+
+### What you need
+
++ The latest release of [Seedminer](https://github.com/zoogie/seedminer/releases/latest) (the Seedminer .zip)
++ Any 3.x version of [Python](https://www.python.org/downloads/) installed
+ + If you are on Linux, you likely already have Python 3. Check by opening a terminal and entering `python3 -V`. If this returns a version number, it will work for this guide.
+
+### Section I - Prep Work
+
+In this section, you will set up Seedminer and obtain your console's files that are needed for mining.
+
+1. Extract the contents of the Seedminer `.zip` and move the folder with your operating systeem's name to anywhere on your PC
+ + Keep this location handy, as this Seedminer folder will be where multiple other files are placed
+1. In the Seedminer folder, hold SHIFT and right-click anywhere in the folder's empty space, then click the option that opens Terminal, PowerShell, or Command Prompt
+1. In the command line window, type `py -3 -mpip install pycryptodomex`, hit ENTER, and allow it to install
+ + If this command fails with the error `No module named pip`, you must manually install pip. The methods to do this can be found on [this page](https://pip.pypa.io/en/stable/installation/).
+1. Turn your console on while the SD card is inserted
+1. Open the Mii Maker app
+1. Tap the "QR Code/Image Options" button
+1. Tap "Save Mii as QR Code"
+1. Select any Mii Character (make a new one first if you don't have any), and press "OK"
+1. Turn the console off
+1. Put the console's SD card into your computer, navigate to the `Nintendo 3DS` folder on the SD, and copy the name of the 32-character-long folder directly inside
+ + This folder, known as the ID0, is system-specific. Only one should be present. If you see multiple, follow [these instructions](troubleshooting#seedminer)
+ + Once you have the ID0, paste it into a document so you can reference it later
+1. Navigate to the `DCIM` folder on the SD card
+1. Look for the QR Code, which will be a `.JPG` file starting with `HNI`
+ + You may have many other files in here already if you use the Nintendo 3DS Camera app
+1. Copy this file to the Seedminer folder on your PC
+
+### Section II - Processing Mii QR and Mining
+
+In this section, you will turn the Mii QR code into a usable file and mine `movable.sed` with it.
+
+1. Open the [editMii](https://zoogie.github.io/web/miiqr/) website on your computer
+1. Click on "Import from...", then select "QR Code" and upload the Mii QR code from earlier
+1. Click on "Export to...", then select "encrypted (.bin)"
+ + This will download a file named `input.bin`
+1. Copy this `input.bin` to the Seedminer folder
+1. Open the terminal/PowerShell/Command Prompt window from earlier
+1.Inside this window, enter the command `py -3 seedminer_launcher3.py id0 `
+ + Replace `` with the ID0 you copied into a document
+ + Do not include the angle brackets
+1. Once it completes, enter the command `py -3 seedminer_launcher3.py mii `
+ + Replace `` with the model of your console (`new` or `old`) - if you aren't sure, only models with the ZL/ZR buttons and C-Stick are new
+ + Replace `` with the year the 3DS was made (you often find this on the backplate) - leave this empty if you aren't sure, in which case it will start from the middle
+ + If this fails with an error of `input.bin is invalid size`, remake the `input.bin` using your QR Code. If it ''still'' fails, open a different browser and remake the `input.bin` there
+ + The mining process will usually take up to 90 minutes, depending on luck and your GPU's strength
+1. When it finishes, a file called `movable.sed` will appear in the Seedminer folder
+
+Continue to [BannerBomb3 (Legacy)](bannerbomb3-(legacy))
+{: .notice--primary}
diff --git a/_pages/ca_ES/site-navigation.txt b/_pages/ca_ES/site-navigation.txt
index a2135747ab..179a8a4b0b 100644
--- a/_pages/ca_ES/site-navigation.txt
+++ b/_pages/ca_ES/site-navigation.txt
@@ -18,6 +18,7 @@ sitemap: false
+ [A9LH to B9S](a9lh-to-b9s)
+ [BannerBomb3](bannerbomb3)
++ [Installing boot9strap (Fredtool, Legacy)](bannerbomb3-(legacy))
+ [BannerBomb3 + Fredtool (TWN)](bannerbomb3-fredtool-(twn))
+ [Credits](credits)
+ [Checking for CFW](checking-for-cfw)
@@ -44,6 +45,7 @@ sitemap: false
+ [Home](/)
+ [Homebrew Launcher (super-skaterhax)](homebrew-launcher-(super-skaterhax))
+ [Installing boot9strap (Fredtool)](installing-boot9strap-(fredtool))
++ [Installing boot9strap (Fredtool, Legacy)](installing-boot9strap-(fredtool-legacy))
+ [Installing boot9strap (Frogtool)](installing-boot9strap-(frogtool))
+ [Installing boot9strap (Hardmod)](installing-boot9strap-(hardmod))
+ [Installing boot9strap (HBL-USM)](installing-boot9strap-(hbl-usm))
@@ -59,6 +61,7 @@ sitemap: false
+ [Region Changing](region-changing)
+ [Restoring / Updating CFW](restoring-updating-cfw)
+ [Seedminer](seedminer)
++ [Seedminer](seedminer-(mii))
+ [Seedminer (TWN)](seedminer-(twn))
+ [Troubleshooting](troubleshooting)
+ [Uninstall CFW](uninstall-cfw)
diff --git a/_pages/ca_ES/updating-firmware-(kor-twn).md b/_pages/ca_ES/updating-firmware-(kor).txt
similarity index 89%
rename from _pages/ca_ES/updating-firmware-(kor-twn).md
rename to _pages/ca_ES/updating-firmware-(kor).txt
index 74a2b48f90..4b08786c27 100644
--- a/_pages/ca_ES/updating-firmware-(kor-twn).md
+++ b/_pages/ca_ES/updating-firmware-(kor).txt
@@ -1,5 +1,5 @@
---
-title: "Updating Firmware (KOR/TWN)"
+title: "Updating Firmware (KOR)"
---
### Required Reading
diff --git a/_pages/ca_ES/updating-firmware-(new-3ds).md b/_pages/ca_ES/updating-firmware-(new-3ds).txt
similarity index 100%
rename from _pages/ca_ES/updating-firmware-(new-3ds).md
rename to _pages/ca_ES/updating-firmware-(new-3ds).txt
diff --git a/_pages/ca_ES/updating-firmware-(twn).txt b/_pages/ca_ES/updating-firmware-(twn).txt
new file mode 100644
index 0000000000..83e6992b1b
--- /dev/null
+++ b/_pages/ca_ES/updating-firmware-(twn).txt
@@ -0,0 +1,18 @@
+---
+title: "Updating Firmware (TWN)"
+---
+
+### Required Reading
+
+To use the Seedminer exploit, you must update your device to the latest system version.
+
+### What you need
+
+* An internet connection on your device
+
+#### Section I - Updating the System
+
+{% include_relative include/sysupdate.txt cfw="false" %}
+
+Continue to [Seedminer (TWN)](seedminer-(twn))
+{: .notice--primary}
diff --git a/_pages/cs_CZ/404.md b/_pages/cs_CZ/404.txt
similarity index 100%
rename from _pages/cs_CZ/404.md
rename to _pages/cs_CZ/404.txt
diff --git a/_pages/cs_CZ/bannerbomb3-(legacy).txt b/_pages/cs_CZ/bannerbomb3-(legacy).txt
new file mode 100644
index 0000000000..503794c42a
--- /dev/null
+++ b/_pages/cs_CZ/bannerbomb3-(legacy).txt
@@ -0,0 +1,50 @@
+---
+title: "BannerBomb3 (Legacy)"
+---
+
+{% include toc title="Table of Contents" %}
+
+{% capture technical_info %}
+Technical Details (optional)
+
+To launch custom code, we exploit a flaw in the DSiWare Data Management window of the Settings application.
+
+To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system.
+
+For a more technical explanation, see [here](https://github.com/zoogie/Bannerbomb3).
+{% endcapture %}
+
+{{ technical_info | markdownify }}
+{: .notice--info}
+
+### Compatibility Notes
+
+These instructions work on USA, Europe, Japan, and Korea region consoles as indicated by the letters U, E, J, or K after the system version.
+
+### What You Need
+
+* Your `movable.sed` file from completing Seedminer or nimhax
+
+#### Section I - Prep Work
+
+{% include_relative include/bb3-prep.txt %}
+
+#### Section II - Hardware Button Check
+
+In this section, you will see whether you can access Safe Mode on your device. This will determine which method you will follow on the next page.
+
+Your SD card should remain in your computer while you perform this check.
+
+{% include_relative include/safemodecheck.txt %}
+
+___
+
+### Next steps: Choose an exploit
+
+If the camera appeared in the previous section, Safe Mode is likely to be working on your device.
+
+If the camera appeared, continue to [Installing boot9strap (USM)](installing-boot9strap-(usm))
+{: .notice--primary}
+
+If the camera did NOT appear, continue to [Installing boot9strap (Fredtool, Legacy)](installing-boot9strap-(fredtool-legacy))
+{: .notice--info}
diff --git a/_pages/cs_CZ/bannerbomb3.txt b/_pages/cs_CZ/bannerbomb3.txt
index 7767c4aeb1..a8383926fd 100644
--- a/_pages/cs_CZ/bannerbomb3.txt
+++ b/_pages/cs_CZ/bannerbomb3.txt
@@ -30,36 +30,10 @@ If you have a Taiwanese console (indicated by a T after the system version), fol
#### Section I - Prep Work
-In this section, you will copy the files needed to trigger the BannerBomb3 exploit onto your device's SD card.
-
-1. Power off your device
-1. Insert your SD card into your computer
-1. Open [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen) on your computer
-1. Upload your movable.sed using the “Choose File” option
-1. Click “Build and Download”
- + This will download an exploit DSiWare called `F00D43D5.bin` and a payload called `bb3.bin` inside of a zip archive (`DSIWARE_EXPLOIT.zip`)
-1. Copy `bb3.bin` from `DSIWARE_EXPLOIT.zip` to the root of your SD card
- + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it
- + This file does not need to be opened or extracted
- ![]({{ "/images/screenshots/bb3/bb3-root-layout.png" | absolute_url }}){: .notice--info}
-1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card
- + `` is the 32-letter folder name that you copied in [Seedminer](seedminer)
- + `` is a 32-letter folder inside of the ``
- + If you have multiple `` folders, follow the instructions [here](troubleshooting#bannerbomb3)
- ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info}
-1. Create a folder named `Nintendo DSiWare` inside of the ``
- + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card
-1. Copy the `F00D43D5.bin` file from `DSIWARE_EXPLOIT.zip` to the `Nintendo DSiWare` folder
-
-![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }})
-{: .notice--info}
+{% include_relative include/bb3-prep.txt %}
#### Section II - Hardware Button Check
-In this section, you will see whether you can access Safe Mode on your device. This will determine which method you will follow on the next page.
-
-Your SD card should remain in your computer while you perform this check.
-
{% include_relative include/safemodecheck.txt %}
___
diff --git a/_pages/cs_CZ/credits.md b/_pages/cs_CZ/credits.txt
similarity index 100%
rename from _pages/cs_CZ/credits.md
rename to _pages/cs_CZ/credits.txt
diff --git a/_pages/cs_CZ/donations.md b/_pages/cs_CZ/donations.txt
similarity index 100%
rename from _pages/cs_CZ/donations.md
rename to _pages/cs_CZ/donations.txt
diff --git a/_pages/cs_CZ/finalizing-setup.txt b/_pages/cs_CZ/finalizing-setup.txt
index f16b13698a..e41bd44dcd 100644
--- a/_pages/cs_CZ/finalizing-setup.txt
+++ b/_pages/cs_CZ/finalizing-setup.txt
@@ -177,9 +177,6 @@ ___
You're done! Custom firmware is now fully configured on your device.
{: .notice--success}
-Hello! We're looking for feedback on the overall experience of following our guide. If you'd like to help out, check out the survey [here](https://forms.gle/vZNoc4QLCz5MEXCK7) (only available in English). Thanks!
-{: .notice--info}
-
### Information and Notes
{% capture notice-6 %}
diff --git a/_pages/cs_CZ/homebrew-launcher-(super-skaterhax).txt b/_pages/cs_CZ/homebrew-launcher-(super-skaterhax).txt
index ea288c3163..7b83fe0d7e 100644
--- a/_pages/cs_CZ/homebrew-launcher-(super-skaterhax).txt
+++ b/_pages/cs_CZ/homebrew-launcher-(super-skaterhax).txt
@@ -64,7 +64,7 @@ If you haven't already, make sure you have a working Internet connection set up
1. Select the "GO GO!" button on the top screen
+ If any prompts appear, approve all of them
+ If your device freezes on a yellow screen, hold the POWER button until it turns off, then retry this section
- + If your device freezes on a red screen, hold the POWER button until it turns off, redo step Step 3 of Section II, then retry this section
+ + If your device freezes on a red screen, hold the POWER button until it turns off, redo step 3 of Section II, then retry this section
+ If you get another error, try again up to 5 times, and if it still doesn't work, [follow this troubleshooting guide](troubleshooting#homebrew-launcher-super-skaterhax)
1. If the exploit was successful, your device will have booted into the Homebrew Launcher
1. Power off your device
diff --git a/_pages/cs_CZ/include/bb3-prep.txt b/_pages/cs_CZ/include/bb3-prep.txt
new file mode 100644
index 0000000000..0b0965f3de
--- /dev/null
+++ b/_pages/cs_CZ/include/bb3-prep.txt
@@ -0,0 +1,23 @@
+In this section, you will copy the files needed to trigger the BannerBomb3 exploit onto your device's SD card.
+
+1. Power off your device
+1. Insert your SD card into your computer
+1. Open [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen) on your computer
+1. Upload your movable.sed using the “Choose File” option
+1. Click “Build and Download”
+ + This will download an exploit DSiWare called `F00D43D5.bin` and a payload called `bb3.bin` inside of a zip archive (`DSIWARE_EXPLOIT.zip`)
+1. Copy `bb3.bin` from `DSIWARE_EXPLOIT.zip` to the root of your SD card
+ + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it
+ + This file does not need to be opened or extracted
+ ![]({{ "/images/screenshots/bb3/bb3-root-layout.png" | absolute_url }}){: .notice--info}
+1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card
+ + `` is the 32-letter folder name that you copied in [Seedminer](seedminer)
+ + `` is a 32-letter folder inside of the ``
+ + If you have multiple `` folders, follow the instructions [here](troubleshooting#bannerbomb3)
+ ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info}
+1. Create a folder named `Nintendo DSiWare` inside of the ``
+ + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card
+1. Copy the `F00D43D5.bin` file from `DSIWARE_EXPLOIT.zip` to the `Nintendo DSiWare` folder
+
+![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }})
+{: .notice--info}
diff --git a/_pages/cs_CZ/include/fredtool-prep.txt b/_pages/cs_CZ/include/fredtool-prep.txt
new file mode 100644
index 0000000000..cff8aa806d
--- /dev/null
+++ b/_pages/cs_CZ/include/fredtool-prep.txt
@@ -0,0 +1,29 @@
+In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer.
+
+1. Insert your SD card into your computer
+1. Open the [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) website on your computer
+1. Under the "Username" field, enter any alphanumeric name (no spaces or special characters)
+1. Under the "DSiBin" field, upload your DSiWare backup file (e.g. 42383841.bin) from the root of your SD card using the first "Browse..." option
+1. Under the "MovableSed" field, upload your `movable.sed` file using the second "Browse..." option
+1. Under the "InjectionTarget" field, set the injection target to `DSinternet` (NOT memorypit)
+1. Click "Build"
+ + Wait a few seconds for the build process to complete
+1. In the Build History section on the left, type the Username into the "Filter Builds" field
+1. Click on the first search result
+ + This result should have the latest timestamp
+1. Click the "output_(name).zip" link
+1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card
+ + `` is the 32-letter folder name that you copied in [Seedminer](seedminer)
+ + `` is a 32-letter folder inside of the ``
+1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder
+1. Copy the `42383841.bin` file from the `hax` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder
+ ![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info}
+1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card
+ + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it
+1. Copy `boot.nds` (B9STool) from the release `.zip` to the root of your SD card
+1. Copy the `private` folder from the Frogminer_save `.zip` to the root of your SD card
+1. Reinsert your SD card into your device
+1. Power on your device
+
+ ![]({{ "/images/screenshots/fredtool/fredtool-root-layout.png" | absolute_url }})
+ {: .notice--info}
\ No newline at end of file
diff --git a/_pages/cs_CZ/include/fredtool-restore-dsconn.txt b/_pages/cs_CZ/include/fredtool-restore-dsconn.txt
new file mode 100644
index 0000000000..3057b3ac9d
--- /dev/null
+++ b/_pages/cs_CZ/include/fredtool-restore-dsconn.txt
@@ -0,0 +1,10 @@
+In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in an earlier section.
+
+1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card
+1. Copy the `42383841.bin` file from the `clean` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder, replacing the existing one
+1. Reinsert your SD card into your device
+1. Power on your device
+1. Launch System Settings on your device
+1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png))
+1. Select the "Nintendo DSi™" title
+1. Select "Copy", then select "OK"
diff --git a/_pages/cs_CZ/include/fredtool-write-flipnote.txt b/_pages/cs_CZ/include/fredtool-write-flipnote.txt
new file mode 100644
index 0000000000..cb6f428624
--- /dev/null
+++ b/_pages/cs_CZ/include/fredtool-write-flipnote.txt
@@ -0,0 +1,11 @@
+In this section, you will copy the hacked DS Connection Settings DSiWare to internal memory, which will temporarily replace it with Flipnote Studio.
+
+1. Launch System Settings on your device
+1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png))
+1. Select the "Haxxxxxxxxx!" title
+ + If you are unable to select the "Haxxxxxxxxx" title, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool)
+1. Select "Copy", then select "OK"
+1. Return to main menu of the System Settings
+1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" ([image](/images/screenshots/fredtool/dsconnection.png))
+1. If the exploit was successful, your device will have loaded the JPN version of Flipnote Studio
+ + If your device does not load the JPN version of Flipnote Studio, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool)
\ No newline at end of file
diff --git a/_pages/cs_CZ/include/safemodecheck.txt b/_pages/cs_CZ/include/safemodecheck.txt
index 43ebec6575..7035baace8 100644
--- a/_pages/cs_CZ/include/safemodecheck.txt
+++ b/_pages/cs_CZ/include/safemodecheck.txt
@@ -1,3 +1,5 @@
+In this section, you will see whether your shoulder buttons are working on your device. This will determine which method you will follow on the next page.
+
1. Power on your device
1. Once you see the HOME Menu, press the (Left Shoulder) and (Right Shoulder) buttons at the same time
+ The camera applet should appear
diff --git a/_pages/cs_CZ/include/seedminer-base.txt b/_pages/cs_CZ/include/seedminer-base.txt
index e3493c2f87..ad6697a5fa 100644
--- a/_pages/cs_CZ/include/seedminer-base.txt
+++ b/_pages/cs_CZ/include/seedminer-base.txt
@@ -15,10 +15,12 @@ This method uses a powerful graphics card to perform the calculations needed. A
In this section, you will get the necessary details from your 3DS that are required to figure out your device's encryption key.
+{% capture console_state_info %}
Before following this section:
+ Ensure that you have turned on your console with the SD card inserted at least once to generate the necessary data
+ Ensure that your console is connected to the Internet (you should see a blue "Internet" indicator on the top-left corner of the HOME screen)
-{: .notice--info}
+{% endcapture %}
+{{ console_state_info | markdownify }}
1. Power off your device
1. Insert your SD card into your computer
diff --git a/_pages/cs_CZ/installing-boot9strap-(fredtool).txt b/_pages/cs_CZ/installing-boot9strap-(fredtool).txt
index ea9d81c010..455c3317a3 100644
--- a/_pages/cs_CZ/installing-boot9strap-(fredtool).txt
+++ b/_pages/cs_CZ/installing-boot9strap-(fredtool).txt
@@ -15,11 +15,14 @@ This is a currently working implementation of the "FIRM partitions known-plainte
{{ technical_info | markdownify }}
{: .notice--info}
+You should only be able to get to this page if you are running version 11.16.0. If you are on any firmware other than 11.17.0 or 11.16.0, STOP as these instructions WILL LEAD TO A BRICK on other firmwares!!
+{: .notice--warning}
+
### What You Need
* Your `movable.sed` file from completing [Seedminer](seedminer)
* The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`)
-* The latest release of [b9sTool](https://github.com/zoogie/b9sTool/releases/download/v6.1.1/release_6.1.1.zip) (direct download)
+* **11.16.0 or 11.17.0 users**: The v6.1.1 release of [b9sTool](https://github.com/zoogie/b9sTool/releases/download/v6.1.1/release_6.1.1.zip) (direct download)
* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file)
#### Section I - CFW Check
@@ -42,49 +45,11 @@ In this section, you will trigger the BannerBomb3 exploit using the DSiWare Mana
#### Section III - Prep Work
-In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer.
-
-1. Insert your SD card into your computer
-1. Open the [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) website on your computer
-1. Under the "Username" field, enter any alphanumeric name (no spaces or special characters)
-1. Under the "DSiBin" field, upload your `42383841.bin` file from the root of your SD card using the first "Browse..." option
-1. Under the "MovableSed" field, upload your `movable.sed` file using the second "Browse..." option
-1. Under the "InjectionTarget" field, set the injection target to `DSinternet` (NOT memorypit)
-1. Click "Build"
- + Wait a few seconds for the build process to complete
-1. In the Build History section on the left, type the Username into the "Filter Builds" field
-1. Click on the first search result
- + This result should have the latest timestamp
-1. Click the "output_(name).zip" link
-1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card
- + `` is the 32-letter folder name that you copied in [Seedminer](seedminer)
- + `` is a 32-letter folder inside of the ``
-1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder
-1. Copy the `42383841.bin` file from the `hax` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder
- ![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info}
-1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card
- + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it
-1. Copy `boot.nds` (B9STool) from the release `.zip` to the root of your SD card
-1. Copy the `private` folder from the Frogminer_save `.zip` to the root of your SD card
-1. Reinsert your SD card into your device
-1. Power on your device
-
- ![]({{ "/images/screenshots/fredtool/fredtool-root-layout.png" | absolute_url }})
- {: .notice--info}
+{% include_relative include/fredtool-prep.txt %}
#### Section IV - Overwriting DS Connection Settings
-In this section, you will copy the hacked DS Connection Settings DSiWare to internal memory, which will temporarily replace it with Flipnote Studio.
-
-1. Launch System Settings on your device
-1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png))
-1. Select the "Haxxxxxxxxx!" title
- + If you are unable to select the "Haxxxxxxxxx" title, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool)
-1. Select "Copy", then select "OK"
-1. Return to main menu of the System Settings
-1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" ([image](/images/screenshots/fredtool/dsconnection.png))
-1. If the exploit was successful, your device will have loaded the JPN version of Flipnote Studio
- + If your device does not load the JPN version of Flipnote Studio, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool)
+{% include_relative include/fredtool-write-flipnote.txt %}
#### Section V - Flipnote Exploit
@@ -99,18 +64,10 @@ In this section, you will copy the hacked DS Connection Settings DSiWare to inte
#### Section VII - Restoring DS Connection Settings
-In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in Section IV.
-
-1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card
-1. Copy the `42383841.bin` file from the `clean` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder, replacing the existing one
-1. Reinsert your SD card into your device
-1. Power on your device
-1. Launch System Settings on your device
-1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png))
-1. Select the "Nintendo DSi™" title
-1. Select "Copy", then select "OK"
+{% include_relative include/fredtool-restore-dsconn.txt %}
___
+
### Continue to [Finalizing Setup](finalizing-setup)
{: .notice--primary}
diff --git a/_pages/cs_CZ/installing-boot9strap-(fredtool-legacy).txt b/_pages/cs_CZ/installing-boot9strap-(fredtool-legacy).txt
new file mode 100644
index 0000000000..1513694ebd
--- /dev/null
+++ b/_pages/cs_CZ/installing-boot9strap-(fredtool-legacy).txt
@@ -0,0 +1,77 @@
+---
+title: "Installing boot9strap (Fredtool, Legacy)"
+---
+
+{% include toc title="Table of Contents" %}
+
+{% capture technical_info %}
+Technical Details (optional)
+
+To dump system DSiWare, we exploit a flaw in the DSiWare Data Management window of the Settings application.
+
+To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system to dump the DSi Internet Settings application to the SD root.
+
+Once we have a DSiWare backup, we can inject it into the DS Internet Settings application.
+
+This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws).
+
+{% endcapture %}
+{{ technical_info | markdownify }}
+{: .notice--info}
+
+You should only be able to get to this page if you are running version 11.15.0 or 11.14.0. If you are on any firmware other than 11.15.0 or 11.14.0, STOP as these instructions WILL LEAD TO A BRICK on other firmwares!!
+{: .notice--warning}
+
+### What You Need
+
+* Your `movable.sed` file from completing [Seedminer (Mii)](seedminer-(mii))
+* The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`)
+* **11.15.0 and 11.14.0 users only**: The v6.0.1 release of [b9sTool](https://github.com/zoogie/b9sTool/releases/tag/v6.0.1) (direct download)
+* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file)
+
+#### Section I - CFW Check
+
+{% include_relative include/cfw-check-fredtool.txt %}
+
+#### Section II - BannerBomb3
+
+In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next section.
+
+1. Reinsert your SD card into your device
+1. Power on your device
+1. Launch System Settings on your device
+1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png))
+ + Your device should show the BB3 multihax menu
+ + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool)
+1. Use the D-Pad to navigate and press the (A) button to select "Dump DSiWare"
+ + Your device will automatically reboot
+1. Power off your device
+
+#### Section III - Prep Work
+
+{% include_relative include/fredtool-prep.txt %}
+
+#### Section IV - Overwriting DS Connection Settings
+
+{% include_relative include/fredtool-write-flipnote.txt %}
+
+#### Section V - Flipnote Exploit
+
+{% include_relative include/install-boot9strap-b9stool.txt method="dsinternet" %}
+
+#### Section VI - Luma3DS Configuration
+
+1. Press and hold (Select), and while holding (Select), power on your device. This will launch Luma3DS configuration
+{% include_relative include/configure-luma3ds.txt %}
+
+{% include_relative include/luma3ds-installed-note.txt %}
+
+#### Section VII - Restoring DS Connection Settings
+
+{% include_relative include/fredtool-restore-dsconn.txt %}
+
+___
+
+
+### Continue to [Finalizing Setup](finalizing-setup)
+{: .notice--primary}
diff --git a/_pages/cs_CZ/seedminer-(mii).txt b/_pages/cs_CZ/seedminer-(mii).txt
new file mode 100644
index 0000000000..5faf224c22
--- /dev/null
+++ b/_pages/cs_CZ/seedminer-(mii).txt
@@ -0,0 +1,84 @@
+---
+title: "Seedminer (Mii)"
+---
+
+{% include toc title="Table of Contents" %}
+
+{% capture gpu_warning %}
+This method requires a reasonably powerful GPU (any dedicated graphics card made in the last few years) and the ability to use a command line. If you don't know what those are or do not have the hardware necessary, you can ask someone to do this for you at [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp). You will need to have the following information ready:
++ Your Mii QR code, uploaded directly to Discord (do not take a screenshot or a photo of the image, just send the HNI_XXXX.JPG image itself)
++ Your console's ID0 (the name of the 32-character folder directly inside of Nintendo 3DS - see [this troubleshooting section](https://3ds.hacks.guide/troubleshooting#seedminer) if you have multiple)
++ Your console model (e.g. 3DS, 3DS XL, 2DS, New3DS, New3DS XL, New2DS XL)
++ Your console's approximate year of manufacturing (it may be present behind the frontplate or backplate; if you don't know, just guess - it's not super important)
+{% endcapture %}
+{{ gpu_warning | markdownify }}
+
+{% capture technical_info %}
+Technical Details (optional)
+
+To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device.
+
+Because we do not have access to the Friends List, we are deriving the first part of `movable.sed` using a Mii QR code instead of by performing a two-way friend exchange.
+
+For information on how Seedminer works, see [this presentation](https://zoogie.github.io/web/34⅕c3).
+
+{% endcapture %}
+{{ technical_info | markdownify }}
+{: .notice--info}
+
+## Instructions
+
+If you are on Linux or macOS, replace `py -3` with `python3` in all commands.
+{: .notice--info}
+
+### What you need
+
++ The latest release of [Seedminer](https://github.com/zoogie/seedminer/releases/latest) (the Seedminer .zip)
++ Any 3.x version of [Python](https://www.python.org/downloads/) installed
+ + If you are on Linux, you likely already have Python 3. Check by opening a terminal and entering `python3 -V`. If this returns a version number, it will work for this guide.
+
+### Section I - Prep Work
+
+In this section, you will set up Seedminer and obtain your console's files that are needed for mining.
+
+1. Extract the contents of the Seedminer `.zip` and move the folder with your operating systeem's name to anywhere on your PC
+ + Keep this location handy, as this Seedminer folder will be where multiple other files are placed
+1. In the Seedminer folder, hold SHIFT and right-click anywhere in the folder's empty space, then click the option that opens Terminal, PowerShell, or Command Prompt
+1. In the command line window, type `py -3 -mpip install pycryptodomex`, hit ENTER, and allow it to install
+ + If this command fails with the error `No module named pip`, you must manually install pip. The methods to do this can be found on [this page](https://pip.pypa.io/en/stable/installation/).
+1. Turn your console on while the SD card is inserted
+1. Open the Mii Maker app
+1. Tap the "QR Code/Image Options" button
+1. Tap "Save Mii as QR Code"
+1. Select any Mii Character (make a new one first if you don't have any), and press "OK"
+1. Turn the console off
+1. Put the console's SD card into your computer, navigate to the `Nintendo 3DS` folder on the SD, and copy the name of the 32-character-long folder directly inside
+ + This folder, known as the ID0, is system-specific. Only one should be present. If you see multiple, follow [these instructions](troubleshooting#seedminer)
+ + Once you have the ID0, paste it into a document so you can reference it later
+1. Navigate to the `DCIM` folder on the SD card
+1. Look for the QR Code, which will be a `.JPG` file starting with `HNI`
+ + You may have many other files in here already if you use the Nintendo 3DS Camera app
+1. Copy this file to the Seedminer folder on your PC
+
+### Section II - Processing Mii QR and Mining
+
+In this section, you will turn the Mii QR code into a usable file and mine `movable.sed` with it.
+
+1. Open the [editMii](https://zoogie.github.io/web/miiqr/) website on your computer
+1. Click on "Import from...", then select "QR Code" and upload the Mii QR code from earlier
+1. Click on "Export to...", then select "encrypted (.bin)"
+ + This will download a file named `input.bin`
+1. Copy this `input.bin` to the Seedminer folder
+1. Open the terminal/PowerShell/Command Prompt window from earlier
+1.Inside this window, enter the command `py -3 seedminer_launcher3.py id0 `
+ + Replace `` with the ID0 you copied into a document
+ + Do not include the angle brackets
+1. Once it completes, enter the command `py -3 seedminer_launcher3.py mii `
+ + Replace `` with the model of your console (`new` or `old`) - if you aren't sure, only models with the ZL/ZR buttons and C-Stick are new
+ + Replace `` with the year the 3DS was made (you often find this on the backplate) - leave this empty if you aren't sure, in which case it will start from the middle
+ + If this fails with an error of `input.bin is invalid size`, remake the `input.bin` using your QR Code. If it ''still'' fails, open a different browser and remake the `input.bin` there
+ + The mining process will usually take up to 90 minutes, depending on luck and your GPU's strength
+1. When it finishes, a file called `movable.sed` will appear in the Seedminer folder
+
+Continue to [BannerBomb3 (Legacy)](bannerbomb3-(legacy))
+{: .notice--primary}
diff --git a/_pages/cs_CZ/site-navigation.txt b/_pages/cs_CZ/site-navigation.txt
index a2135747ab..179a8a4b0b 100644
--- a/_pages/cs_CZ/site-navigation.txt
+++ b/_pages/cs_CZ/site-navigation.txt
@@ -18,6 +18,7 @@ sitemap: false
+ [A9LH to B9S](a9lh-to-b9s)
+ [BannerBomb3](bannerbomb3)
++ [Installing boot9strap (Fredtool, Legacy)](bannerbomb3-(legacy))
+ [BannerBomb3 + Fredtool (TWN)](bannerbomb3-fredtool-(twn))
+ [Credits](credits)
+ [Checking for CFW](checking-for-cfw)
@@ -44,6 +45,7 @@ sitemap: false
+ [Home](/)
+ [Homebrew Launcher (super-skaterhax)](homebrew-launcher-(super-skaterhax))
+ [Installing boot9strap (Fredtool)](installing-boot9strap-(fredtool))
++ [Installing boot9strap (Fredtool, Legacy)](installing-boot9strap-(fredtool-legacy))
+ [Installing boot9strap (Frogtool)](installing-boot9strap-(frogtool))
+ [Installing boot9strap (Hardmod)](installing-boot9strap-(hardmod))
+ [Installing boot9strap (HBL-USM)](installing-boot9strap-(hbl-usm))
@@ -59,6 +61,7 @@ sitemap: false
+ [Region Changing](region-changing)
+ [Restoring / Updating CFW](restoring-updating-cfw)
+ [Seedminer](seedminer)
++ [Seedminer](seedminer-(mii))
+ [Seedminer (TWN)](seedminer-(twn))
+ [Troubleshooting](troubleshooting)
+ [Uninstall CFW](uninstall-cfw)
diff --git a/_pages/cs_CZ/updating-firmware-(kor-twn).md b/_pages/cs_CZ/updating-firmware-(kor).txt
similarity index 89%
rename from _pages/cs_CZ/updating-firmware-(kor-twn).md
rename to _pages/cs_CZ/updating-firmware-(kor).txt
index 74a2b48f90..4b08786c27 100644
--- a/_pages/cs_CZ/updating-firmware-(kor-twn).md
+++ b/_pages/cs_CZ/updating-firmware-(kor).txt
@@ -1,5 +1,5 @@
---
-title: "Updating Firmware (KOR/TWN)"
+title: "Updating Firmware (KOR)"
---
### Required Reading
diff --git a/_pages/cs_CZ/updating-firmware-(new-3ds).md b/_pages/cs_CZ/updating-firmware-(new-3ds).txt
similarity index 100%
rename from _pages/cs_CZ/updating-firmware-(new-3ds).md
rename to _pages/cs_CZ/updating-firmware-(new-3ds).txt
diff --git a/_pages/cs_CZ/updating-firmware-(twn).txt b/_pages/cs_CZ/updating-firmware-(twn).txt
new file mode 100644
index 0000000000..83e6992b1b
--- /dev/null
+++ b/_pages/cs_CZ/updating-firmware-(twn).txt
@@ -0,0 +1,18 @@
+---
+title: "Updating Firmware (TWN)"
+---
+
+### Required Reading
+
+To use the Seedminer exploit, you must update your device to the latest system version.
+
+### What you need
+
+* An internet connection on your device
+
+#### Section I - Updating the System
+
+{% include_relative include/sysupdate.txt cfw="false" %}
+
+Continue to [Seedminer (TWN)](seedminer-(twn))
+{: .notice--primary}
diff --git a/_pages/de_DE/404.md b/_pages/de_DE/404.txt
similarity index 100%
rename from _pages/de_DE/404.md
rename to _pages/de_DE/404.txt
diff --git a/_pages/de_DE/bannerbomb3-(legacy).txt b/_pages/de_DE/bannerbomb3-(legacy).txt
new file mode 100644
index 0000000000..9c24ed8885
--- /dev/null
+++ b/_pages/de_DE/bannerbomb3-(legacy).txt
@@ -0,0 +1,50 @@
+---
+title: "BannerBomb3 (Legacy)"
+---
+
+{% include toc title="Inhalt" %}
+
+{% capture technical_info %}
+Technische Details (optional)
+
+To launch custom code, we exploit a flaw in the DSiWare Data Management window of the Settings application.
+
+To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system.
+
+For a more technical explanation, see [here](https://github.com/zoogie/Bannerbomb3).
+{% endcapture %}
+
+{{ technical_info | markdownify }}
+{: .notice--info}
+
+### Kompatibilitätshinweise
+
+Diese Anleitung funktioniert mit den folgenden Konsolenregionen: USA, Europa, Japan und Korea. Diese werden mit den Buchstaben U, E, J oder K nach der Systemversion angezeigt.
+
+### Was du brauchst
+
+* Your `movable.sed` file from completing Seedminer or nimhax
+
+#### Abschnitt I - Vorbereitungen
+
+{% include_relative include/bb3-prep.txt %}
+
+#### Abschnitt II - Tastenfunktionalität überprüfen
+
+In this section, you will see whether you can access Safe Mode on your device. This will determine which method you will follow on the next page.
+
+Your SD card should remain in your computer while you perform this check.
+
+{% include_relative include/safemodecheck.txt %}
+
+___
+
+### Nächste Schritte: Wähle einen Exploit
+
+If the camera appeared in the previous section, Safe Mode is likely to be working on your device.
+
+If the camera appeared, continue to [Installing boot9strap (USM)](installing-boot9strap-(usm))
+{: .notice--primary}
+
+If the camera did NOT appear, continue to [Installing boot9strap (Fredtool, Legacy)](installing-boot9strap-(fredtool-legacy))
+{: .notice--info}
diff --git a/_pages/de_DE/bannerbomb3.txt b/_pages/de_DE/bannerbomb3.txt
index fe50f02b16..f332fb1404 100644
--- a/_pages/de_DE/bannerbomb3.txt
+++ b/_pages/de_DE/bannerbomb3.txt
@@ -30,36 +30,10 @@ Falls du eine Taiwanesische Konsole besitzen solltest (gekennzeichnet durch ein
#### Abschnitt I - Vorbereitungen
-In diesem Schritt wirst du die Dateien, die zum Auslösen des Bannerbomb3 Exploits benutzt werden, auf die SD-Karte deiner Konsole kopieren.
-
-1. Schalte deine Konsole aus
-1. Stecke deine SD-Karte in deinen Computer
-1. Öffne den [BannerBomb3 Injector](https://3dstools.nhnarwhal.com/#/bb3gen) auf deinem Computer
-1. Lade deine movable.sed mit der "Choose File" Option hoch
-1. Klicke "Build and Download"
- + Dies wird ein DSiWare-Backup namens `F00D43D5.bin` und einen Payload namens `bb3.bin` in einer zip Datei herunterladen (`DSIWARE_EXPLOIT.zip`)
-1. Kopiere `bb3.bin` von der `DSIWARE_EXPLOIT.zip` in das Stammverzeichnis der SD-Karte
- + Das Stammverzeichnis der SD-Karte bezieht sich auf das ursprüngliche Verzeichnis deiner SD-Karte, wo du den Nintendo 3DS Ordner sehen kannst, aber nicht in ihm drin bist
- + This file does not need to be opened or extracted
- ![]({{ "/images/screenshots/bb3/bb3-root-layout.png" | absolute_url }}){: .notice--info}
-1. Gehe zu `Nintendo 3DS` -> `` -> `` auf deiner SD-Karte
- + Diese `` ist die, die du beim [Seedminer](seedminer) verwendet hast
- + Die `` ist ein 32 Zeichen langer Ordner in der ``
- + If you have multiple `` folders, follow the instructions [here](troubleshooting#bannerbomb3)
- ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info}
-1. Erstelle einen Ordner mit dem Namen `Nintendo DSiWare` innerhalb der ``
- Wenn du bereits den Ordner hattest, *und* du hast schon DSiWare Backup Dateien darin hast (`<8-Charakter-ID>.bin`), kopiere sie zu deinem Computer und lösche sie von deiner SD-Karte
-1. Kopiere die `F00D43D5.bin` Datei aus `DSIWARE_EXPLOIT.zip` in den `Nintendo DSiWare` Ordner
-
-![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }})
-{: .notice--info}
+{% include_relative include/bb3-prep.txt %}
#### Abschnitt II - Tastenfunktionalität überprüfen
-In this section, you will see whether you can access Safe Mode on your device. This will determine which method you will follow on the next page.
-
-Your SD card should remain in your computer while you perform this check.
-
{% include_relative include/safemodecheck.txt %}
___
diff --git a/_pages/el_GR/credits.md b/_pages/de_DE/credits.txt
similarity index 100%
rename from _pages/el_GR/credits.md
rename to _pages/de_DE/credits.txt
diff --git a/_pages/de_DE/donations.md b/_pages/de_DE/donations.txt
similarity index 100%
rename from _pages/de_DE/donations.md
rename to _pages/de_DE/donations.txt
diff --git a/_pages/de_DE/finalizing-setup.txt b/_pages/de_DE/finalizing-setup.txt
index a41379daa5..2c726c1925 100644
--- a/_pages/de_DE/finalizing-setup.txt
+++ b/_pages/de_DE/finalizing-setup.txt
@@ -69,7 +69,7 @@ The screenshots below indicate the minimum SD card layout that is required to fo
Als zusätzliche Sicherheitsmaßnahme führen wir eine zusätzliche Überprüfung auf Custom Firmware durch. If custom firmware is not installed by this point for any reason, the next section may render your console unable to be hacked without external hardware.
-1. Schalte deine Konsole aus
+1. Schalte dein Gerät aus
1. Halte den (Select)-Knopf
1. Schalte deine Konsole an während du den (Select) Knopf gedrückt hältst
1. If the check was successful, your device should have booted into the Luma3DS configuration menu
@@ -139,7 +139,7 @@ In this section, you will use a script to remove some unnecessary files from you
1. Select "Cleanup SD Card"
1. Drücke (A), wenn du dazu aufgefordert wirst, um fortzufahren
-1. Drücke (A) um fortzufahren
+1. Drücke (A), um fortzufahren
1. Drücke (B), um zum Hauptmenü zurückzukehren
#### Section IX - Backup Essential Files
@@ -159,7 +159,7 @@ In this section, you will make backups of files that can be used to recover from
1. Press (A) on `essential.exefs` to select it
1. Select "Copy to 0:/gm9/out"
+ If you see "Destination already exists", press (A) on "Overwrite file(s)"
-1. Drücke (A), um fortzufahren
+1. Drücke (A) um fortzufahren
1. Drücke (Home), um das Aktionsmenü aufzurufen
1. Select "Poweroff system" to power off your device
1. Stecke deine SD-Karte in deinen Computer
@@ -169,7 +169,7 @@ In this section, you will make backups of files that can be used to recover from
1. Delete `__sysnand_##.bin` and `__sysnand_##.bin.sha` from the `/gm9/out/` folder on your SD card after copying it
+ The other backup files are negligible in size and may be kept on your SD card for ease of access
1. If you have it, copy the `/luma/backups/` folder on your SD card to a safe location on your computer
-1. Stecke deine SD-Karte nun wieder in deinen 3DS
+1. Stecke deine SD-Karte wieder in dein Gerät
1. Schalte deine Konsole an
___
@@ -177,9 +177,6 @@ ___
You're done! Custom firmware is now fully configured on your device.
{: .notice--success}
-Hello! We're looking for feedback on the overall experience of following our guide. If you'd like to help out, check out the survey [here](https://forms.gle/vZNoc4QLCz5MEXCK7) (only available in English). Thanks!
-{: .notice--info}
-
### Information and Notes
{% capture notice-6 %}
diff --git a/_pages/de_DE/homebrew-launcher-(super-skaterhax).txt b/_pages/de_DE/homebrew-launcher-(super-skaterhax).txt
index 58575d007c..455eb5ca3f 100644
--- a/_pages/de_DE/homebrew-launcher-(super-skaterhax).txt
+++ b/_pages/de_DE/homebrew-launcher-(super-skaterhax).txt
@@ -64,7 +64,7 @@ If you haven't already, make sure you have a working Internet connection set up
1. Select the "GO GO!" button on the top screen
+ If any prompts appear, approve all of them
+ If your device freezes on a yellow screen, hold the POWER button until it turns off, then retry this section
- + If your device freezes on a red screen, hold the POWER button until it turns off, redo step Step 3 of Section II, then retry this section
+ + If your device freezes on a red screen, hold the POWER button until it turns off, redo step 3 of Section II, then retry this section
+ If you get another error, try again up to 5 times, and if it still doesn't work, [follow this troubleshooting guide](troubleshooting#homebrew-launcher-super-skaterhax)
1. If the exploit was successful, your device will have booted into the Homebrew Launcher
1. Schalte deine Konsole aus
diff --git a/_pages/de_DE/include/bb3-prep.txt b/_pages/de_DE/include/bb3-prep.txt
new file mode 100644
index 0000000000..51d6efaa1d
--- /dev/null
+++ b/_pages/de_DE/include/bb3-prep.txt
@@ -0,0 +1,23 @@
+In diesem Schritt wirst du die Dateien, die zum Auslösen des Bannerbomb3 Exploits benutzt werden, auf die SD-Karte deiner Konsole kopieren.
+
+1. Schalte deine Konsole aus
+1. Stecke deine SD-Karte in deinen Computer
+1. Open [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen) on your computer
+1. Lade deine movable.sed mit der "Choose File" Option hoch
+1. Klicke "Build and Download"
+ + This will download an exploit DSiWare called `F00D43D5.bin` and a payload called `bb3.bin` inside of a zip archive (`DSIWARE_EXPLOIT.zip`)
+1. Copy `bb3.bin` from `DSIWARE_EXPLOIT.zip` to the root of your SD card
+ + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it
+ + This file does not need to be opened or extracted
+ ![]({{ "/images/screenshots/bb3/bb3-root-layout.png" | absolute_url }}){: .notice--info}
+1. Gehe zu `Nintendo 3DS` -> `` -> ` auf deiner SD-Karte`
+ + `` is the 32-letter folder name that you copied in [Seedminer](seedminer)
+ + `` is a 32-letter folder inside of the ``
+ + If you have multiple `` folders, follow the instructions [here](troubleshooting#bannerbomb3)
+ ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info}
+1. Erstelle einen Ordner mit dem Namen `Nintendo DSiWare` innerhalb der ``
+ Wenn du bereits den Ordner hattest, *und* du hast schon DSiWare Backup Dateien darin hast (`<8-Charakter-ID>.bin`), kopiere sie zu deinem Computer und lösche sie von deiner SD-Karte
+1. Copy the `F00D43D5.bin` file from `DSIWARE_EXPLOIT.zip` to the `Nintendo DSiWare` folder
+
+![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }})
+{: .notice--info}
diff --git a/_pages/de_DE/include/fredtool-prep.txt b/_pages/de_DE/include/fredtool-prep.txt
new file mode 100644
index 0000000000..d53e87c2f6
--- /dev/null
+++ b/_pages/de_DE/include/fredtool-prep.txt
@@ -0,0 +1,29 @@
+In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer.
+
+1. Stecke deine SD-Karte in deinen Computer
+1. Öffne die [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) Webseite auf deinem Computer
+1. Bei dem "Username" Feld, gib irgendeinen normalen Namen (keine Leerzeichen oder Sonderzeichen) an
+1. Under the "DSiBin" field, upload your DSiWare backup file (e.g. 42383841.bin) from the root of your SD card using the first "Browse..." option
+1. Wähle beim "MovableSed" Feld deine `movable.sed` Datei mit der "Browse..." Option aus
+1. Under the "InjectionTarget" field, set the injection target to `DSinternet` (NOT memorypit)
+1. Drücke auf "Build"
+ + Warte ein paar Sekunden, bis der Erstellungsprozess abgeschlossen ist
+1. Gib im Abschnitt Build-Verlauf links den Benutzernamen in das "suchen" Feld ein
+1. Klicke das erste Suchergebnis
+ + Dieses Ergebnis sollte das neuste sein
+1. Drücke auf den "output_(name).zip" Link
+1. Navigiere zu `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` auf deiner SD-Karte
+ + `` is the 32-letter folder name that you copied in [Seedminer](seedminer)
+ + `` is a 32-letter folder inside of the ``
+1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder
+1. Copy the `42383841.bin` file from the `hax` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder
+ ![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info}
+1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card
+ + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it
+1. Copy `boot.nds` (B9STool) from the release `.zip` to the root of your SD card
+1. Kopiere den `private` Ordner von der Frogminer_save `.zip` in das Stammverzeichnis deiner SD-Karte
+1. Stecke deine SD-Karte nun wieder in deinen 3DS
+1. Schalte deine Konsole an
+
+ ![]({{ "/images/screenshots/fredtool/fredtool-root-layout.png" | absolute_url }})
+ {: .notice--info}
\ No newline at end of file
diff --git a/_pages/de_DE/include/fredtool-restore-dsconn.txt b/_pages/de_DE/include/fredtool-restore-dsconn.txt
new file mode 100644
index 0000000000..5a002114b7
--- /dev/null
+++ b/_pages/de_DE/include/fredtool-restore-dsconn.txt
@@ -0,0 +1,10 @@
+In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in an earlier section.
+
+1. Navigiere zu `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` auf deiner SD-Karte
+1. Copy the `42383841.bin` file from the `clean` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder, replacing the existing one
+1. Stecke deine SD-Karte nun wieder in deinen 3DS
+1. Schalte deine Konsole an
+1. Launch System Settings on your device
+1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png))
+1. Select the "Nintendo DSi™" title
+1. Select "Copy", then select "OK"
diff --git a/_pages/de_DE/include/fredtool-write-flipnote.txt b/_pages/de_DE/include/fredtool-write-flipnote.txt
new file mode 100644
index 0000000000..cb6f428624
--- /dev/null
+++ b/_pages/de_DE/include/fredtool-write-flipnote.txt
@@ -0,0 +1,11 @@
+In this section, you will copy the hacked DS Connection Settings DSiWare to internal memory, which will temporarily replace it with Flipnote Studio.
+
+1. Launch System Settings on your device
+1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png))
+1. Select the "Haxxxxxxxxx!" title
+ + If you are unable to select the "Haxxxxxxxxx" title, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool)
+1. Select "Copy", then select "OK"
+1. Return to main menu of the System Settings
+1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" ([image](/images/screenshots/fredtool/dsconnection.png))
+1. If the exploit was successful, your device will have loaded the JPN version of Flipnote Studio
+ + If your device does not load the JPN version of Flipnote Studio, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool)
\ No newline at end of file
diff --git a/_pages/de_DE/include/safemodecheck.txt b/_pages/de_DE/include/safemodecheck.txt
index 9395e90ac0..04e35c12e4 100644
--- a/_pages/de_DE/include/safemodecheck.txt
+++ b/_pages/de_DE/include/safemodecheck.txt
@@ -1,3 +1,5 @@
+In this section, you will see whether your shoulder buttons are working on your device. This will determine which method you will follow on the next page.
+
1. Schalte deine Konsole an
1. Once you see the HOME Menu, press the (Left Shoulder) and (Right Shoulder) buttons at the same time
+ The camera applet should appear
diff --git a/_pages/de_DE/include/seedminer-base.txt b/_pages/de_DE/include/seedminer-base.txt
index eb5c19fbda..fb2745b670 100644
--- a/_pages/de_DE/include/seedminer-base.txt
+++ b/_pages/de_DE/include/seedminer-base.txt
@@ -15,10 +15,12 @@ This method uses a powerful graphics card to perform the calculations needed. A
In this section, you will get the necessary details from your 3DS that are required to figure out your device's encryption key.
+{% capture console_state_info %}
Before following this section:
+ Ensure that you have turned on your console with the SD card inserted at least once to generate the necessary data
+ Ensure that your console is connected to the Internet (you should see a blue "Internet" indicator on the top-left corner of the HOME screen)
-{: .notice--info}
+{% endcapture %}
+{{ console_state_info | markdownify }}
1. Schalte deine Konsole aus
1. Stecke deine SD-Karte in deinen Computer
diff --git a/_pages/de_DE/installing-boot9strap-(fredtool).txt b/_pages/de_DE/installing-boot9strap-(fredtool).txt
index 29f9eb15e5..8afc1431c6 100644
--- a/_pages/de_DE/installing-boot9strap-(fredtool).txt
+++ b/_pages/de_DE/installing-boot9strap-(fredtool).txt
@@ -15,11 +15,14 @@ This is a currently working implementation of the "FIRM partitions known-plainte
{{ technical_info | markdownify }}
{: .notice--info}
+You should only be able to get to this page if you are running version 11.16.0. If you are on any firmware other than 11.17.0 or 11.16.0, STOP as these instructions WILL LEAD TO A BRICK on other firmwares!!
+{: .notice--warning}
+
### Was du brauchst
* Deine `movable.sed` Datei vom [Seedminer](seedminer)
* The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`)
-* The latest release of [b9sTool](https://github.com/zoogie/b9sTool/releases/download/v6.1.1/release_6.1.1.zip) (direct download)
+* **11.16.0 or 11.17.0 users**: The v6.1.1 release of [b9sTool](https://github.com/zoogie/b9sTool/releases/download/v6.1.1/release_6.1.1.zip) (direct download)
* Die neueste Version von [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (die Luma3DS `.zip` Datei)
#### Abschnitt I - CFW Check
@@ -42,49 +45,11 @@ In this section, you will trigger the BannerBomb3 exploit using the DSiWare Mana
#### Section III - Prep Work
-In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer.
-
-1. Stecke deine SD-Karte in deinen Computer
-1. Öffne die [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) Webseite auf deinem Computer
-1. Bei dem "Username" Feld, gib irgendeinen normalen Namen (keine Leerzeichen oder Sonderzeichen) an
-1. Under the "DSiBin" field, upload your `42383841.bin` file from the root of your SD card using the first "Browse..." option
-1. Wähle beim "MovableSed" Feld deine `movable.sed` Datei mit der "Browse..." Option aus
-1. Under the "InjectionTarget" field, set the injection target to `DSinternet` (NOT memorypit)
-1. Drücke auf "Build"
- + Warte ein paar Sekunden, bis der Erstellungsprozess abgeschlossen ist
-1. Gib im Abschnitt Build-Verlauf links den Benutzernamen in das "suchen" Feld ein
-1. Klicke das erste Suchergebnis
- + Dieses Ergebnis sollte das neuste sein
-1. Drücke auf den "output_(name).zip" Link
-1. Navigiere zu `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` auf deiner SD-Karte
- + Diese `` ist die, die du beim [Seedminer](seedminer) verwendet hast
- + Die `` ist ein 32 Zeichen langer Ordner in der ``
-1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder
-1. Copy the `42383841.bin` file from the `hax` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder
- ![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info}
-1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card
- + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it
-1. Copy `boot.nds` (B9STool) from the release `.zip` to the root of your SD card
-1. Copy the `private` folder from the Frogminer_save `.zip` to the root of your SD card
-1. Stecke deine SD-Karte nun wieder in deinen 3DS
-1. Schalte deine Konsole an
-
- ![]({{ "/images/screenshots/fredtool/fredtool-root-layout.png" | absolute_url }})
- {: .notice--info}
+{% include_relative include/fredtool-prep.txt %}
#### Section IV - Overwriting DS Connection Settings
-In this section, you will copy the hacked DS Connection Settings DSiWare to internal memory, which will temporarily replace it with Flipnote Studio.
-
-1. Launch System Settings on your device
-1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png))
-1. Select the "Haxxxxxxxxx!" title
- + If you are unable to select the "Haxxxxxxxxx" title, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool)
-1. Select "Copy", then select "OK"
-1. Return to main menu of the System Settings
-1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" ([image](/images/screenshots/fredtool/dsconnection.png))
-1. If the exploit was successful, your device will have loaded the JPN version of Flipnote Studio
- + If your device does not load the JPN version of Flipnote Studio, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool)
+{% include_relative include/fredtool-write-flipnote.txt %}
#### Abschnitt V - Flipnote Exploit
@@ -99,18 +64,10 @@ In this section, you will copy the hacked DS Connection Settings DSiWare to inte
#### Section VII - Restoring DS Connection Settings
-In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in Section IV.
-
-1. Navigiere zu `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` auf deiner SD-Karte
-1. Copy the `42383841.bin` file from the `clean` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder, replacing the existing one
-1. Stecke deine SD-Karte nun wieder in deinen 3DS
-1. Schalte deine Konsole an
-1. Launch System Settings on your device
-1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png))
-1. Select the "Nintendo DSi™" title
-1. Select "Copy", then select "OK"
+{% include_relative include/fredtool-restore-dsconn.txt %}
___
+
### Fortfahren mit [Setup fertigstellen](finalizing-setup)
{: .notice--primary}
diff --git a/_pages/de_DE/installing-boot9strap-(fredtool-legacy).txt b/_pages/de_DE/installing-boot9strap-(fredtool-legacy).txt
new file mode 100644
index 0000000000..a160b9a714
--- /dev/null
+++ b/_pages/de_DE/installing-boot9strap-(fredtool-legacy).txt
@@ -0,0 +1,77 @@
+---
+title: "Installing boot9strap (Fredtool, Legacy)"
+---
+
+{% include toc title="Inhalt" %}
+
+{% capture technical_info %}
+Technische Details (optional)
+
+Um ein DSiWare-Backup erstellen zu können, nutzen wir eine Schwachstelle im DSiWare-Datenverwaltungs-Fenster der Systemeinstellungen aus.
+
+Um das zu erreichen, werden wir die Verschlüsselung (movable.sed) nutzen, um ein DSiWare-Backup zu erstellen, das das System dazu bringen wird, die DSi Internet Einstellungs-Software zur SD-Karte zu kopieren.
+
+Once we have a DSiWare backup, we can inject it into the DS Internet Settings application.
+
+This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws).
+
+{% endcapture %}
+{{ technical_info | markdownify }}
+{: .notice--info}
+
+You should only be able to get to this page if you are running version 11.15.0 or 11.14.0. If you are on any firmware other than 11.15.0 or 11.14.0, STOP as these instructions WILL LEAD TO A BRICK on other firmwares!!
+{: .notice--warning}
+
+### Was du brauchst
+
+* Your `movable.sed` file from completing [Seedminer (Mii)](seedminer-(mii))
+* The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`)
+* **11.15.0 and 11.14.0 users only**: The v6.0.1 release of [b9sTool](https://github.com/zoogie/b9sTool/releases/tag/v6.0.1) (direct download)
+* Die neueste Version von [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (die Luma3DS `.zip` Datei)
+
+#### Abschnitt I - CFW Check
+
+{% include_relative include/cfw-check-fredtool.txt %}
+
+#### Section II - BannerBomb3
+
+In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next section.
+
+1. Stecke deine SD-Karte nun wieder in deinen 3DS
+1. Schalte deine Konsole an
+1. Launch System Settings on your device
+1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png))
+ + Your device should show the BB3 multihax menu
+ + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool)
+1. Use the D-Pad to navigate and press the (A) button to select "Dump DSiWare"
+ + Your device will automatically reboot
+1. Schalte deine Konsole aus
+
+#### Section III - Prep Work
+
+{% include_relative include/fredtool-prep.txt %}
+
+#### Section IV - Overwriting DS Connection Settings
+
+{% include_relative include/fredtool-write-flipnote.txt %}
+
+#### Abschnitt V - Flipnote Exploit
+
+{% include_relative include/install-boot9strap-b9stool.txt method="dsinternet" %}
+
+#### Section VI - Luma3DS Configuration
+
+1. Press and hold (Select), and while holding (Select), power on your device. This will launch Luma3DS configuration
+{% include_relative include/configure-luma3ds.txt %}
+
+{% include_relative include/luma3ds-installed-note.txt %}
+
+#### Section VII - Restoring DS Connection Settings
+
+{% include_relative include/fredtool-restore-dsconn.txt %}
+
+___
+
+
+### Fortfahren mit [Setup fertigstellen](finalizing-setup)
+{: .notice--primary}
diff --git a/_pages/de_DE/seedminer-(mii).txt b/_pages/de_DE/seedminer-(mii).txt
new file mode 100644
index 0000000000..bbc037f47e
--- /dev/null
+++ b/_pages/de_DE/seedminer-(mii).txt
@@ -0,0 +1,84 @@
+---
+title: "Seedminer (Mii)"
+---
+
+{% include toc title="Inhalt" %}
+
+{% capture gpu_warning %}
+This method requires a reasonably powerful GPU (any dedicated graphics card made in the last few years) and the ability to use a command line. If you don't know what those are or do not have the hardware necessary, you can ask someone to do this for you at [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp). You will need to have the following information ready:
++ Your Mii QR code, uploaded directly to Discord (do not take a screenshot or a photo of the image, just send the HNI_XXXX.JPG image itself)
++ Your console's ID0 (the name of the 32-character folder directly inside of Nintendo 3DS - see [this troubleshooting section](https://3ds.hacks.guide/troubleshooting#seedminer) if you have multiple)
++ Your console model (e.g. 3DS, 3DS XL, 2DS, New3DS, New3DS XL, New2DS XL)
++ Your console's approximate year of manufacturing (it may be present behind the frontplate or backplate; if you don't know, just guess - it's not super important)
+{% endcapture %}
+{{ gpu_warning | markdownify }}
+
+{% capture technical_info %}
+Technische Details (optional)
+
+To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device.
+
+Because we do not have access to the Friends List, we are deriving the first part of `movable.sed` using a Mii QR code instead of by performing a two-way friend exchange.
+
+For information on how Seedminer works, see [this presentation](https://zoogie.github.io/web/34⅕c3).
+
+{% endcapture %}
+{{ technical_info | markdownify }}
+{: .notice--info}
+
+## Instructions
+
+If you are on Linux or macOS, replace `py -3` with `python3` in all commands.
+{: .notice--info}
+
+### Was du benötigst
+
++ The latest release of [Seedminer](https://github.com/zoogie/seedminer/releases/latest) (the Seedminer .zip)
++ Any 3.x version of [Python](https://www.python.org/downloads/) installed
+ + If you are on Linux, you likely already have Python 3. Check by opening a terminal and entering `python3 -V`. If this returns a version number, it will work for this guide.
+
+### Section I - Prep Work
+
+In this section, you will set up Seedminer and obtain your console's files that are needed for mining.
+
+1. Extract the contents of the Seedminer `.zip` and move the folder with your operating systeem's name to anywhere on your PC
+ + Keep this location handy, as this Seedminer folder will be where multiple other files are placed
+1. In the Seedminer folder, hold SHIFT and right-click anywhere in the folder's empty space, then click the option that opens Terminal, PowerShell, or Command Prompt
+1. In the command line window, type `py -3 -mpip install pycryptodomex`, hit ENTER, and allow it to install
+ + If this command fails with the error `No module named pip`, you must manually install pip. The methods to do this can be found on [this page](https://pip.pypa.io/en/stable/installation/).
+1. Turn your console on while the SD card is inserted
+1. Open the Mii Maker app
+1. Tap the "QR Code/Image Options" button
+1. Tap "Save Mii as QR Code"
+1. Select any Mii Character (make a new one first if you don't have any), and press "OK"
+1. Turn the console off
+1. Put the console's SD card into your computer, navigate to the `Nintendo 3DS` folder on the SD, and copy the name of the 32-character-long folder directly inside
+ + This folder, known as the ID0, is system-specific. Only one should be present. If you see multiple, follow [these instructions](troubleshooting#seedminer)
+ + Once you have the ID0, paste it into a document so you can reference it later
+1. Navigate to the `DCIM` folder on the SD card
+1. Look for the QR Code, which will be a `.JPG` file starting with `HNI`
+ + You may have many other files in here already if you use the Nintendo 3DS Camera app
+1. Copy this file to the Seedminer folder on your PC
+
+### Section II - Processing Mii QR and Mining
+
+In this section, you will turn the Mii QR code into a usable file and mine `movable.sed` with it.
+
+1. Open the [editMii](https://zoogie.github.io/web/miiqr/) website on your computer
+1. Click on "Import from...", then select "QR Code" and upload the Mii QR code from earlier
+1. Click on "Export to...", then select "encrypted (.bin)"
+ + This will download a file named `input.bin`
+1. Copy this `input.bin` to the Seedminer folder
+1. Open the terminal/PowerShell/Command Prompt window from earlier
+1.Inside this window, enter the command `py -3 seedminer_launcher3.py id0 `
+ + Replace `` with the ID0 you copied into a document
+ + Do not include the angle brackets
+1. Once it completes, enter the command `py -3 seedminer_launcher3.py mii `
+ + Replace `` with the model of your console (`new` or `old`) - if you aren't sure, only models with the ZL/ZR buttons and C-Stick are new
+ + Replace `` with the year the 3DS was made (you often find this on the backplate) - leave this empty if you aren't sure, in which case it will start from the middle
+ + If this fails with an error of `input.bin is invalid size`, remake the `input.bin` using your QR Code. If it ''still'' fails, open a different browser and remake the `input.bin` there
+ + The mining process will usually take up to 90 minutes, depending on luck and your GPU's strength
+1. When it finishes, a file called `movable.sed` will appear in the Seedminer folder
+
+Continue to [BannerBomb3 (Legacy)](bannerbomb3-(legacy))
+{: .notice--primary}
diff --git a/_pages/de_DE/site-navigation.txt b/_pages/de_DE/site-navigation.txt
index ddf290fff3..5f5a3c6d6e 100644
--- a/_pages/de_DE/site-navigation.txt
+++ b/_pages/de_DE/site-navigation.txt
@@ -18,6 +18,7 @@ sitemap: false
+ [A9LH zu B9S](a9lh-to-b9s)
+ [BannerBomb3](bannerbomb3)
++ [Installing boot9strap (Fredtool, Legacy)](bannerbomb3-(legacy))
+ [BannerBomb3 + Fredtool (TWN)](bannerbomb3-fredtool-(twn))
+ [Danksagungen](credits)
+ [Checking for CFW](checking-for-cfw)
@@ -44,6 +45,7 @@ sitemap: false
+ [Startseite](/)
+ [Homebrew Launcher (super-skaterhax)](homebrew-launcher-(super-skaterhax))
+ [Installing boot9strap (Fredtool)](installing-boot9strap-(fredtool))
++ [Installing boot9strap (Fredtool, Legacy)](installing-boot9strap-(fredtool-legacy))
+ [Installing boot9strap (Frogtool)](installing-boot9strap-(frogtool))
+ [Installation von boot9strap (Hardmod)](installing-boot9strap-(hardmod))
+ [Installing boot9strap (HBL-USM)](installing-boot9strap-(hbl-usm))
@@ -59,6 +61,7 @@ sitemap: false
+ [Wechseln der Region](region-changing)
+ [Restoring / Updating CFW](restoring-updating-cfw)
+ [Seedminer](seedminer)
++ [Seedminer](seedminer-(mii))
+ [Seedminer (TWN)](seedminer-(twn))
+ [Problembehandlung](troubleshooting)
+ [CFW deinstallieren](uninstall-cfw)
diff --git a/_pages/de_DE/updating-firmware-(kor).txt b/_pages/de_DE/updating-firmware-(kor).txt
new file mode 100644
index 0000000000..9f9fbdeb19
--- /dev/null
+++ b/_pages/de_DE/updating-firmware-(kor).txt
@@ -0,0 +1,18 @@
+---
+title: "Updating Firmware (KOR)"
+---
+
+### Lesen erforderlich
+
+To use the Seedminer exploit, you must update your device to the latest system version.
+
+### Was du benötigst
+
+* An internet connection on your device
+
+#### Section I - Updating the System
+
+{% include_relative include/sysupdate.txt cfw="false" %}
+
+Continue to [Seedminer](seedminer)
+{: .notice--primary}
diff --git a/_pages/de_DE/updating-firmware-(kor-twn).md b/_pages/de_DE/updating-firmware-(kor-twn).md
deleted file mode 100644
index 74a2b48f90..0000000000
--- a/_pages/de_DE/updating-firmware-(kor-twn).md
+++ /dev/null
@@ -1,18 +0,0 @@
----
-title: "Updating Firmware (KOR/TWN)"
----
-
-### Required Reading
-
-To use the Seedminer exploit, you must update your device to the latest system version.
-
-### What you need
-
-* An internet connection on your device
-
-#### Section I - Updating the System
-
-{% include_relative include/sysupdate.txt cfw="false" %}
-
-Continue to [Seedminer](seedminer)
-{: .notice--primary}
diff --git a/_pages/de_DE/updating-firmware-(new-3ds).txt b/_pages/de_DE/updating-firmware-(new-3ds).txt
new file mode 100644
index 0000000000..28f8778001
--- /dev/null
+++ b/_pages/de_DE/updating-firmware-(new-3ds).txt
@@ -0,0 +1,18 @@
+---
+title: "Updating Firmware (New 3DS)"
+---
+
+### Lesen erforderlich
+
+To use the super-skaterhax exploit, you must update your device to the latest system version.
+
+### Was du benötigst
+
+* An internet connection on your device
+
+#### Section I - Updating the System
+
+{% include_relative include/sysupdate.txt cfw="false" %}
+
+Continue to [Homebrew Launcher (super-skaterhax)](homebrew-launcher-(super-skaterhax))
+{: .notice--primary}
diff --git a/_pages/de_DE/updating-firmware-(twn).txt b/_pages/de_DE/updating-firmware-(twn).txt
new file mode 100644
index 0000000000..2e6a0d9c66
--- /dev/null
+++ b/_pages/de_DE/updating-firmware-(twn).txt
@@ -0,0 +1,18 @@
+---
+title: "Updating Firmware (TWN)"
+---
+
+### Lesen erforderlich
+
+To use the Seedminer exploit, you must update your device to the latest system version.
+
+### Was du benötigst
+
+* An internet connection on your device
+
+#### Section I - Updating the System
+
+{% include_relative include/sysupdate.txt cfw="false" %}
+
+Continue to [Seedminer (TWN)](seedminer-(twn))
+{: .notice--primary}
diff --git a/_pages/el_GR/404.md b/_pages/el_GR/404.txt
similarity index 100%
rename from _pages/el_GR/404.md
rename to _pages/el_GR/404.txt
diff --git a/_pages/el_GR/bannerbomb3-(legacy).txt b/_pages/el_GR/bannerbomb3-(legacy).txt
new file mode 100644
index 0000000000..857a70632b
--- /dev/null
+++ b/_pages/el_GR/bannerbomb3-(legacy).txt
@@ -0,0 +1,50 @@
+---
+title: "BannerBomb3 (Legacy)"
+---
+
+{% include toc title="Πίνακας περιεχομένων" %}
+
+{% capture technical_info %}
+Technical Details (optional)
+
+To launch custom code, we exploit a flaw in the DSiWare Data Management window of the Settings application.
+
+To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system.
+
+For a more technical explanation, see [here](https://github.com/zoogie/Bannerbomb3).
+{% endcapture %}
+
+{{ technical_info | markdownify }}
+{: .notice--info}
+
+### Compatibility Notes
+
+These instructions work on USA, Europe, Japan, and Korea region consoles as indicated by the letters U, E, J, or K after the system version.
+
+### What You Need
+
+* Your `movable.sed` file from completing Seedminer or nimhax
+
+#### Section I - Prep Work
+
+{% include_relative include/bb3-prep.txt %}
+
+#### Section II - Hardware Button Check
+
+In this section, you will see whether you can access Safe Mode on your device. This will determine which method you will follow on the next page.
+
+Your SD card should remain in your computer while you perform this check.
+
+{% include_relative include/safemodecheck.txt %}
+
+___
+
+### Next steps: Choose an exploit
+
+If the camera appeared in the previous section, Safe Mode is likely to be working on your device.
+
+If the camera appeared, continue to [Installing boot9strap (USM)](installing-boot9strap-(usm))
+{: .notice--primary}
+
+If the camera did NOT appear, continue to [Installing boot9strap (Fredtool, Legacy)](installing-boot9strap-(fredtool-legacy))
+{: .notice--info}
diff --git a/_pages/el_GR/bannerbomb3.txt b/_pages/el_GR/bannerbomb3.txt
index 9acd887467..2a9cad9b39 100644
--- a/_pages/el_GR/bannerbomb3.txt
+++ b/_pages/el_GR/bannerbomb3.txt
@@ -30,36 +30,10 @@ If you have a Taiwanese console (indicated by a T after the system version), fol
#### Section I - Prep Work
-In this section, you will copy the files needed to trigger the BannerBomb3 exploit onto your device's SD card.
-
-1. Power off your device
-1. Εισάγετε την κάρτα SD στον υπολογιστή σας
-1. Open [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen) on your computer
-1. Upload your movable.sed using the “Choose File” option
-1. Click “Build and Download”
- + This will download an exploit DSiWare called `F00D43D5.bin` and a payload called `bb3.bin` inside of a zip archive (`DSIWARE_EXPLOIT.zip`)
-1. Copy `bb3.bin` from `DSIWARE_EXPLOIT.zip` to the root of your SD card
- + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it
- + This file does not need to be opened or extracted
- ![]({{ "/images/screenshots/bb3/bb3-root-layout.png" | absolute_url }}){: .notice--info}
-1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card
- + `` is the 32-letter folder name that you copied in [Seedminer](seedminer)
- + `` is a 32-letter folder inside of the ``
- + If you have multiple `` folders, follow the instructions [here](troubleshooting#bannerbomb3)
- ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info}
-1. Create a folder named `Nintendo DSiWare` inside of the ``
- + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card
-1. Copy the `F00D43D5.bin` file from `DSIWARE_EXPLOIT.zip` to the `Nintendo DSiWare` folder
-
-![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }})
-{: .notice--info}
+{% include_relative include/bb3-prep.txt %}
#### Section II - Hardware Button Check
-In this section, you will see whether you can access Safe Mode on your device. This will determine which method you will follow on the next page.
-
-Your SD card should remain in your computer while you perform this check.
-
{% include_relative include/safemodecheck.txt %}
___
diff --git a/_pages/en_PT/credits.md b/_pages/el_GR/credits.txt
similarity index 100%
rename from _pages/en_PT/credits.md
rename to _pages/el_GR/credits.txt
diff --git a/_pages/el_GR/donations.md b/_pages/el_GR/donations.txt
similarity index 100%
rename from _pages/el_GR/donations.md
rename to _pages/el_GR/donations.txt
diff --git a/_pages/el_GR/finalizing-setup.txt b/_pages/el_GR/finalizing-setup.txt
index cbefafdd6a..065c97fc6a 100644
--- a/_pages/el_GR/finalizing-setup.txt
+++ b/_pages/el_GR/finalizing-setup.txt
@@ -177,9 +177,6 @@ ___
You're done! Custom firmware is now fully configured on your device.
{: .notice--success}
-Hello! We're looking for feedback on the overall experience of following our guide. If you'd like to help out, check out the survey [here](https://forms.gle/vZNoc4QLCz5MEXCK7) (only available in English). Thanks!
-{: .notice--info}
-
### Information and Notes
{% capture notice-6 %}
diff --git a/_pages/el_GR/homebrew-launcher-(super-skaterhax).txt b/_pages/el_GR/homebrew-launcher-(super-skaterhax).txt
index 1c44abfc63..b548d2446e 100644
--- a/_pages/el_GR/homebrew-launcher-(super-skaterhax).txt
+++ b/_pages/el_GR/homebrew-launcher-(super-skaterhax).txt
@@ -64,7 +64,7 @@ If you haven't already, make sure you have a working Internet connection set up
1. Select the "GO GO!" button on the top screen
+ If any prompts appear, approve all of them
+ If your device freezes on a yellow screen, hold the POWER button until it turns off, then retry this section
- + If your device freezes on a red screen, hold the POWER button until it turns off, redo step Step 3 of Section II, then retry this section
+ + If your device freezes on a red screen, hold the POWER button until it turns off, redo step 3 of Section II, then retry this section
+ If you get another error, try again up to 5 times, and if it still doesn't work, [follow this troubleshooting guide](troubleshooting#homebrew-launcher-super-skaterhax)
1. If the exploit was successful, your device will have booted into the Homebrew Launcher
1. Power off your device
diff --git a/_pages/el_GR/include/bb3-prep.txt b/_pages/el_GR/include/bb3-prep.txt
new file mode 100644
index 0000000000..1ffc8f1e76
--- /dev/null
+++ b/_pages/el_GR/include/bb3-prep.txt
@@ -0,0 +1,23 @@
+In this section, you will copy the files needed to trigger the BannerBomb3 exploit onto your device's SD card.
+
+1. Power off your device
+1. Εισάγετε την κάρτα SD στον υπολογιστή σας
+1. Open [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen) on your computer
+1. Upload your movable.sed using the “Choose File” option
+1. Click “Build and Download”
+ + This will download an exploit DSiWare called `F00D43D5.bin` and a payload called `bb3.bin` inside of a zip archive (`DSIWARE_EXPLOIT.zip`)
+1. Copy `bb3.bin` from `DSIWARE_EXPLOIT.zip` to the root of your SD card
+ + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it
+ + This file does not need to be opened or extracted
+ ![]({{ "/images/screenshots/bb3/bb3-root-layout.png" | absolute_url }}){: .notice--info}
+1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card
+ + `` is the 32-letter folder name that you copied in [Seedminer](seedminer)
+ + `` is a 32-letter folder inside of the ``
+ + If you have multiple `` folders, follow the instructions [here](troubleshooting#bannerbomb3)
+ ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info}
+1. Create a folder named `Nintendo DSiWare` inside of the ``
+ + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card
+1. Copy the `F00D43D5.bin` file from `DSIWARE_EXPLOIT.zip` to the `Nintendo DSiWare` folder
+
+![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }})
+{: .notice--info}
diff --git a/_pages/el_GR/include/fredtool-prep.txt b/_pages/el_GR/include/fredtool-prep.txt
new file mode 100644
index 0000000000..caca23f27d
--- /dev/null
+++ b/_pages/el_GR/include/fredtool-prep.txt
@@ -0,0 +1,29 @@
+In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer.
+
+1. Εισάγετε την κάρτα SD στον υπολογιστή σας
+1. Open the [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) website on your computer
+1. Under the "Username" field, enter any alphanumeric name (no spaces or special characters)
+1. Under the "DSiBin" field, upload your DSiWare backup file (e.g. 42383841.bin) from the root of your SD card using the first "Browse..." option
+1. Under the "MovableSed" field, upload your `movable.sed` file using the second "Browse..." option
+1. Under the "InjectionTarget" field, set the injection target to `DSinternet` (NOT memorypit)
+1. Click "Build"
+ + Wait a few seconds for the build process to complete
+1. In the Build History section on the left, type the Username into the "Filter Builds" field
+1. Click on the first search result
+ + This result should have the latest timestamp
+1. Click the "output_(name).zip" link
+1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card
+ + `` is the 32-letter folder name that you copied in [Seedminer](seedminer)
+ + `` is a 32-letter folder inside of the ``
+1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder
+1. Copy the `42383841.bin` file from the `hax` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder
+ ![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info}
+1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card
+ + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it
+1. Copy `boot.nds` (B9STool) from the release `.zip` to the root of your SD card
+1. Copy the `private` folder from the Frogminer_save `.zip` to the root of your SD card
+1. Reinsert your SD card into your device
+1. Power on your device
+
+ ![]({{ "/images/screenshots/fredtool/fredtool-root-layout.png" | absolute_url }})
+ {: .notice--info}
\ No newline at end of file
diff --git a/_pages/el_GR/include/fredtool-restore-dsconn.txt b/_pages/el_GR/include/fredtool-restore-dsconn.txt
new file mode 100644
index 0000000000..3057b3ac9d
--- /dev/null
+++ b/_pages/el_GR/include/fredtool-restore-dsconn.txt
@@ -0,0 +1,10 @@
+In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in an earlier section.
+
+1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card
+1. Copy the `42383841.bin` file from the `clean` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder, replacing the existing one
+1. Reinsert your SD card into your device
+1. Power on your device
+1. Launch System Settings on your device
+1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png))
+1. Select the "Nintendo DSi™" title
+1. Select "Copy", then select "OK"
diff --git a/_pages/el_GR/include/fredtool-write-flipnote.txt b/_pages/el_GR/include/fredtool-write-flipnote.txt
new file mode 100644
index 0000000000..cb6f428624
--- /dev/null
+++ b/_pages/el_GR/include/fredtool-write-flipnote.txt
@@ -0,0 +1,11 @@
+In this section, you will copy the hacked DS Connection Settings DSiWare to internal memory, which will temporarily replace it with Flipnote Studio.
+
+1. Launch System Settings on your device
+1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png))
+1. Select the "Haxxxxxxxxx!" title
+ + If you are unable to select the "Haxxxxxxxxx" title, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool)
+1. Select "Copy", then select "OK"
+1. Return to main menu of the System Settings
+1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" ([image](/images/screenshots/fredtool/dsconnection.png))
+1. If the exploit was successful, your device will have loaded the JPN version of Flipnote Studio
+ + If your device does not load the JPN version of Flipnote Studio, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool)
\ No newline at end of file
diff --git a/_pages/el_GR/include/safemodecheck.txt b/_pages/el_GR/include/safemodecheck.txt
index 43ebec6575..7035baace8 100644
--- a/_pages/el_GR/include/safemodecheck.txt
+++ b/_pages/el_GR/include/safemodecheck.txt
@@ -1,3 +1,5 @@
+In this section, you will see whether your shoulder buttons are working on your device. This will determine which method you will follow on the next page.
+
1. Power on your device
1. Once you see the HOME Menu, press the (Left Shoulder) and (Right Shoulder) buttons at the same time
+ The camera applet should appear
diff --git a/_pages/el_GR/include/seedminer-base.txt b/_pages/el_GR/include/seedminer-base.txt
index a4730df700..fd8beb8060 100644
--- a/_pages/el_GR/include/seedminer-base.txt
+++ b/_pages/el_GR/include/seedminer-base.txt
@@ -15,10 +15,12 @@ This method uses a powerful graphics card to perform the calculations needed. A
In this section, you will get the necessary details from your 3DS that are required to figure out your device's encryption key.
+{% capture console_state_info %}
Before following this section:
+ Ensure that you have turned on your console with the SD card inserted at least once to generate the necessary data
+ Ensure that your console is connected to the Internet (you should see a blue "Internet" indicator on the top-left corner of the HOME screen)
-{: .notice--info}
+{% endcapture %}
+{{ console_state_info | markdownify }}
1. Power off your device
1. Εισάγετε την κάρτα SD στον υπολογιστή σας
diff --git a/_pages/el_GR/installing-boot9strap-(fredtool).txt b/_pages/el_GR/installing-boot9strap-(fredtool).txt
index d370acad4b..2d8f638dc8 100644
--- a/_pages/el_GR/installing-boot9strap-(fredtool).txt
+++ b/_pages/el_GR/installing-boot9strap-(fredtool).txt
@@ -15,11 +15,14 @@ This is a currently working implementation of the "FIRM partitions known-plainte
{{ technical_info | markdownify }}
{: .notice--info}
+You should only be able to get to this page if you are running version 11.16.0. If you are on any firmware other than 11.17.0 or 11.16.0, STOP as these instructions WILL LEAD TO A BRICK on other firmwares!!
+{: .notice--warning}
+
### What You Need
* Your `movable.sed` file from completing [Seedminer](seedminer)
* The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`)
-* The latest release of [b9sTool](https://github.com/zoogie/b9sTool/releases/download/v6.1.1/release_6.1.1.zip) (direct download)
+* **11.16.0 or 11.17.0 users**: The v6.1.1 release of [b9sTool](https://github.com/zoogie/b9sTool/releases/download/v6.1.1/release_6.1.1.zip) (direct download)
* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file)
#### Section I - CFW Check
@@ -42,49 +45,11 @@ In this section, you will trigger the BannerBomb3 exploit using the DSiWare Mana
#### Section III - Prep Work
-In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer.
-
-1. Εισάγετε την κάρτα SD στον υπολογιστή σας
-1. Open the [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) website on your computer
-1. Under the "Username" field, enter any alphanumeric name (no spaces or special characters)
-1. Under the "DSiBin" field, upload your `42383841.bin` file from the root of your SD card using the first "Browse..." option
-1. Under the "MovableSed" field, upload your `movable.sed` file using the second "Browse..." option
-1. Under the "InjectionTarget" field, set the injection target to `DSinternet` (NOT memorypit)
-1. Click "Build"
- + Wait a few seconds for the build process to complete
-1. In the Build History section on the left, type the Username into the "Filter Builds" field
-1. Click on the first search result
- + This result should have the latest timestamp
-1. Click the "output_(name).zip" link
-1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card
- + `` is the 32-letter folder name that you copied in [Seedminer](seedminer)
- + `` is a 32-letter folder inside of the ``
-1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder
-1. Copy the `42383841.bin` file from the `hax` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder
- ![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info}
-1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card
- + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it
-1. Copy `boot.nds` (B9STool) from the release `.zip` to the root of your SD card
-1. Copy the `private` folder from the Frogminer_save `.zip` to the root of your SD card
-1. Reinsert your SD card into your device
-1. Power on your device
-
- ![]({{ "/images/screenshots/fredtool/fredtool-root-layout.png" | absolute_url }})
- {: .notice--info}
+{% include_relative include/fredtool-prep.txt %}
#### Section IV - Overwriting DS Connection Settings
-In this section, you will copy the hacked DS Connection Settings DSiWare to internal memory, which will temporarily replace it with Flipnote Studio.
-
-1. Launch System Settings on your device
-1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png))
-1. Select the "Haxxxxxxxxx!" title
- + If you are unable to select the "Haxxxxxxxxx" title, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool)
-1. Select "Copy", then select "OK"
-1. Return to main menu of the System Settings
-1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" ([image](/images/screenshots/fredtool/dsconnection.png))
-1. If the exploit was successful, your device will have loaded the JPN version of Flipnote Studio
- + If your device does not load the JPN version of Flipnote Studio, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool)
+{% include_relative include/fredtool-write-flipnote.txt %}
#### Section V - Flipnote Exploit
@@ -99,18 +64,10 @@ In this section, you will copy the hacked DS Connection Settings DSiWare to inte
#### Section VII - Restoring DS Connection Settings
-In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in Section IV.
-
-1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card
-1. Copy the `42383841.bin` file from the `clean` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder, replacing the existing one
-1. Reinsert your SD card into your device
-1. Power on your device
-1. Launch System Settings on your device
-1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png))
-1. Select the "Nintendo DSi™" title
-1. Select "Copy", then select "OK"
+{% include_relative include/fredtool-restore-dsconn.txt %}
___
+
### Continue to [Finalizing Setup](finalizing-setup)
{: .notice--primary}
diff --git a/_pages/el_GR/installing-boot9strap-(fredtool-legacy).txt b/_pages/el_GR/installing-boot9strap-(fredtool-legacy).txt
new file mode 100644
index 0000000000..b4c1c16148
--- /dev/null
+++ b/_pages/el_GR/installing-boot9strap-(fredtool-legacy).txt
@@ -0,0 +1,77 @@
+---
+title: "Installing boot9strap (Fredtool, Legacy)"
+---
+
+{% include toc title="Πίνακας περιεχομένων" %}
+
+{% capture technical_info %}
+Technical Details (optional)
+
+To dump system DSiWare, we exploit a flaw in the DSiWare Data Management window of the Settings application.
+
+To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system to dump the DSi Internet Settings application to the SD root.
+
+Once we have a DSiWare backup, we can inject it into the DS Internet Settings application.
+
+This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws).
+
+{% endcapture %}
+{{ technical_info | markdownify }}
+{: .notice--info}
+
+You should only be able to get to this page if you are running version 11.15.0 or 11.14.0. If you are on any firmware other than 11.15.0 or 11.14.0, STOP as these instructions WILL LEAD TO A BRICK on other firmwares!!
+{: .notice--warning}
+
+### What You Need
+
+* Your `movable.sed` file from completing [Seedminer (Mii)](seedminer-(mii))
+* The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`)
+* **11.15.0 and 11.14.0 users only**: The v6.0.1 release of [b9sTool](https://github.com/zoogie/b9sTool/releases/tag/v6.0.1) (direct download)
+* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file)
+
+#### Section I - CFW Check
+
+{% include_relative include/cfw-check-fredtool.txt %}
+
+#### Section II - BannerBomb3
+
+In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next section.
+
+1. Reinsert your SD card into your device
+1. Power on your device
+1. Launch System Settings on your device
+1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png))
+ + Your device should show the BB3 multihax menu
+ + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool)
+1. Use the D-Pad to navigate and press the (A) button to select "Dump DSiWare"
+ + Your device will automatically reboot
+1. Power off your device
+
+#### Section III - Prep Work
+
+{% include_relative include/fredtool-prep.txt %}
+
+#### Section IV - Overwriting DS Connection Settings
+
+{% include_relative include/fredtool-write-flipnote.txt %}
+
+#### Section V - Flipnote Exploit
+
+{% include_relative include/install-boot9strap-b9stool.txt method="dsinternet" %}
+
+#### Section VI - Luma3DS Configuration
+
+1. Press and hold (Select), and while holding (Select), power on your device. This will launch Luma3DS configuration
+{% include_relative include/configure-luma3ds.txt %}
+
+{% include_relative include/luma3ds-installed-note.txt %}
+
+#### Section VII - Restoring DS Connection Settings
+
+{% include_relative include/fredtool-restore-dsconn.txt %}
+
+___
+
+
+### Continue to [Finalizing Setup](finalizing-setup)
+{: .notice--primary}
diff --git a/_pages/el_GR/seedminer-(mii).txt b/_pages/el_GR/seedminer-(mii).txt
new file mode 100644
index 0000000000..47e693ed45
--- /dev/null
+++ b/_pages/el_GR/seedminer-(mii).txt
@@ -0,0 +1,84 @@
+---
+title: "Seedminer (Mii)"
+---
+
+{% include toc title="Πίνακας περιεχομένων" %}
+
+{% capture gpu_warning %}
+This method requires a reasonably powerful GPU (any dedicated graphics card made in the last few years) and the ability to use a command line. If you don't know what those are or do not have the hardware necessary, you can ask someone to do this for you at [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp). You will need to have the following information ready:
++ Your Mii QR code, uploaded directly to Discord (do not take a screenshot or a photo of the image, just send the HNI_XXXX.JPG image itself)
++ Your console's ID0 (the name of the 32-character folder directly inside of Nintendo 3DS - see [this troubleshooting section](https://3ds.hacks.guide/troubleshooting#seedminer) if you have multiple)
++ Your console model (e.g. 3DS, 3DS XL, 2DS, New3DS, New3DS XL, New2DS XL)
++ Your console's approximate year of manufacturing (it may be present behind the frontplate or backplate; if you don't know, just guess - it's not super important)
+{% endcapture %}
+{{ gpu_warning | markdownify }}
+
+{% capture technical_info %}
+Technical Details (optional)
+
+To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device.
+
+Because we do not have access to the Friends List, we are deriving the first part of `movable.sed` using a Mii QR code instead of by performing a two-way friend exchange.
+
+For information on how Seedminer works, see [this presentation](https://zoogie.github.io/web/34⅕c3).
+
+{% endcapture %}
+{{ technical_info | markdownify }}
+{: .notice--info}
+
+## Instructions
+
+If you are on Linux or macOS, replace `py -3` with `python3` in all commands.
+{: .notice--info}
+
+### What you need
+
++ The latest release of [Seedminer](https://github.com/zoogie/seedminer/releases/latest) (the Seedminer .zip)
++ Any 3.x version of [Python](https://www.python.org/downloads/) installed
+ + If you are on Linux, you likely already have Python 3. Check by opening a terminal and entering `python3 -V`. If this returns a version number, it will work for this guide.
+
+### Section I - Prep Work
+
+In this section, you will set up Seedminer and obtain your console's files that are needed for mining.
+
+1. Extract the contents of the Seedminer `.zip` and move the folder with your operating systeem's name to anywhere on your PC
+ + Keep this location handy, as this Seedminer folder will be where multiple other files are placed
+1. In the Seedminer folder, hold SHIFT and right-click anywhere in the folder's empty space, then click the option that opens Terminal, PowerShell, or Command Prompt
+1. In the command line window, type `py -3 -mpip install pycryptodomex`, hit ENTER, and allow it to install
+ + If this command fails with the error `No module named pip`, you must manually install pip. The methods to do this can be found on [this page](https://pip.pypa.io/en/stable/installation/).
+1. Turn your console on while the SD card is inserted
+1. Open the Mii Maker app
+1. Tap the "QR Code/Image Options" button
+1. Tap "Save Mii as QR Code"
+1. Select any Mii Character (make a new one first if you don't have any), and press "OK"
+1. Turn the console off
+1. Put the console's SD card into your computer, navigate to the `Nintendo 3DS` folder on the SD, and copy the name of the 32-character-long folder directly inside
+ + This folder, known as the ID0, is system-specific. Only one should be present. If you see multiple, follow [these instructions](troubleshooting#seedminer)
+ + Once you have the ID0, paste it into a document so you can reference it later
+1. Navigate to the `DCIM` folder on the SD card
+1. Look for the QR Code, which will be a `.JPG` file starting with `HNI`
+ + You may have many other files in here already if you use the Nintendo 3DS Camera app
+1. Copy this file to the Seedminer folder on your PC
+
+### Section II - Processing Mii QR and Mining
+
+In this section, you will turn the Mii QR code into a usable file and mine `movable.sed` with it.
+
+1. Open the [editMii](https://zoogie.github.io/web/miiqr/) website on your computer
+1. Click on "Import from...", then select "QR Code" and upload the Mii QR code from earlier
+1. Click on "Export to...", then select "encrypted (.bin)"
+ + This will download a file named `input.bin`
+1. Copy this `input.bin` to the Seedminer folder
+1. Open the terminal/PowerShell/Command Prompt window from earlier
+1.Inside this window, enter the command `py -3 seedminer_launcher3.py id0 `
+ + Replace `` with the ID0 you copied into a document
+ + Do not include the angle brackets
+1. Once it completes, enter the command `py -3 seedminer_launcher3.py mii `
+ + Replace `` with the model of your console (`new` or `old`) - if you aren't sure, only models with the ZL/ZR buttons and C-Stick are new
+ + Replace `` with the year the 3DS was made (you often find this on the backplate) - leave this empty if you aren't sure, in which case it will start from the middle
+ + If this fails with an error of `input.bin is invalid size`, remake the `input.bin` using your QR Code. If it ''still'' fails, open a different browser and remake the `input.bin` there
+ + The mining process will usually take up to 90 minutes, depending on luck and your GPU's strength
+1. When it finishes, a file called `movable.sed` will appear in the Seedminer folder
+
+Continue to [BannerBomb3 (Legacy)](bannerbomb3-(legacy))
+{: .notice--primary}
diff --git a/_pages/el_GR/site-navigation.txt b/_pages/el_GR/site-navigation.txt
index 658e3c3a7a..7784055039 100644
--- a/_pages/el_GR/site-navigation.txt
+++ b/_pages/el_GR/site-navigation.txt
@@ -18,6 +18,7 @@ sitemap: false
+ [A9LH to B9S](a9lh-to-b9s)
+ [BannerBomb3](bannerbomb3)
++ [Installing boot9strap (Fredtool, Legacy)](bannerbomb3-(legacy))
+ [BannerBomb3 + Fredtool (TWN)](bannerbomb3-fredtool-(twn))
+ [Ευχαριστίες](credits)
+ [Checking for CFW](checking-for-cfw)
@@ -44,6 +45,7 @@ sitemap: false
+ [Home](/)
+ [Homebrew Launcher (super-skaterhax)](homebrew-launcher-(super-skaterhax))
+ [Installing boot9strap (Fredtool)](installing-boot9strap-(fredtool))
++ [Installing boot9strap (Fredtool, Legacy)](installing-boot9strap-(fredtool-legacy))
+ [Installing boot9strap (Frogtool)](installing-boot9strap-(frogtool))
+ [Installing boot9strap (Hardmod)](installing-boot9strap-(hardmod))
+ [Installing boot9strap (HBL-USM)](installing-boot9strap-(hbl-usm))
@@ -59,6 +61,7 @@ sitemap: false
+ [Αλλαγή Περιοχής](region-changing)
+ [Restoring / Updating CFW](restoring-updating-cfw)
+ [Seedminer](seedminer)
++ [Seedminer](seedminer-(mii))
+ [Seedminer (TWN)](seedminer-(twn))
+ [Αντιμετώπιση Προβλημάτων](troubleshooting)
+ [Uninstall CFW](uninstall-cfw)
diff --git a/_pages/el_GR/updating-firmware-(kor).txt b/_pages/el_GR/updating-firmware-(kor).txt
new file mode 100644
index 0000000000..4b08786c27
--- /dev/null
+++ b/_pages/el_GR/updating-firmware-(kor).txt
@@ -0,0 +1,18 @@
+---
+title: "Updating Firmware (KOR)"
+---
+
+### Required Reading
+
+To use the Seedminer exploit, you must update your device to the latest system version.
+
+### What you need
+
+* An internet connection on your device
+
+#### Section I - Updating the System
+
+{% include_relative include/sysupdate.txt cfw="false" %}
+
+Continue to [Seedminer](seedminer)
+{: .notice--primary}
diff --git a/_pages/el_GR/updating-firmware-(kor-twn).md b/_pages/el_GR/updating-firmware-(kor-twn).md
deleted file mode 100644
index 74a2b48f90..0000000000
--- a/_pages/el_GR/updating-firmware-(kor-twn).md
+++ /dev/null
@@ -1,18 +0,0 @@
----
-title: "Updating Firmware (KOR/TWN)"
----
-
-### Required Reading
-
-To use the Seedminer exploit, you must update your device to the latest system version.
-
-### What you need
-
-* An internet connection on your device
-
-#### Section I - Updating the System
-
-{% include_relative include/sysupdate.txt cfw="false" %}
-
-Continue to [Seedminer](seedminer)
-{: .notice--primary}
diff --git a/_pages/de_DE/updating-firmware-(new-3ds).md b/_pages/el_GR/updating-firmware-(new-3ds).txt
similarity index 100%
rename from _pages/de_DE/updating-firmware-(new-3ds).md
rename to _pages/el_GR/updating-firmware-(new-3ds).txt
diff --git a/_pages/el_GR/updating-firmware-(twn).txt b/_pages/el_GR/updating-firmware-(twn).txt
new file mode 100644
index 0000000000..83e6992b1b
--- /dev/null
+++ b/_pages/el_GR/updating-firmware-(twn).txt
@@ -0,0 +1,18 @@
+---
+title: "Updating Firmware (TWN)"
+---
+
+### Required Reading
+
+To use the Seedminer exploit, you must update your device to the latest system version.
+
+### What you need
+
+* An internet connection on your device
+
+#### Section I - Updating the System
+
+{% include_relative include/sysupdate.txt cfw="false" %}
+
+Continue to [Seedminer (TWN)](seedminer-(twn))
+{: .notice--primary}
diff --git a/_pages/en_PT/404.md b/_pages/en_PT/404.txt
similarity index 100%
rename from _pages/en_PT/404.md
rename to _pages/en_PT/404.txt
diff --git a/_pages/en_PT/bannerbomb3-(legacy).txt b/_pages/en_PT/bannerbomb3-(legacy).txt
new file mode 100644
index 0000000000..503794c42a
--- /dev/null
+++ b/_pages/en_PT/bannerbomb3-(legacy).txt
@@ -0,0 +1,50 @@
+---
+title: "BannerBomb3 (Legacy)"
+---
+
+{% include toc title="Table of Contents" %}
+
+{% capture technical_info %}
+Technical Details (optional)
+
+To launch custom code, we exploit a flaw in the DSiWare Data Management window of the Settings application.
+
+To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system.
+
+For a more technical explanation, see [here](https://github.com/zoogie/Bannerbomb3).
+{% endcapture %}
+
+{{ technical_info | markdownify }}
+{: .notice--info}
+
+### Compatibility Notes
+
+These instructions work on USA, Europe, Japan, and Korea region consoles as indicated by the letters U, E, J, or K after the system version.
+
+### What You Need
+
+* Your `movable.sed` file from completing Seedminer or nimhax
+
+#### Section I - Prep Work
+
+{% include_relative include/bb3-prep.txt %}
+
+#### Section II - Hardware Button Check
+
+In this section, you will see whether you can access Safe Mode on your device. This will determine which method you will follow on the next page.
+
+Your SD card should remain in your computer while you perform this check.
+
+{% include_relative include/safemodecheck.txt %}
+
+___
+
+### Next steps: Choose an exploit
+
+If the camera appeared in the previous section, Safe Mode is likely to be working on your device.
+
+If the camera appeared, continue to [Installing boot9strap (USM)](installing-boot9strap-(usm))
+{: .notice--primary}
+
+If the camera did NOT appear, continue to [Installing boot9strap (Fredtool, Legacy)](installing-boot9strap-(fredtool-legacy))
+{: .notice--info}
diff --git a/_pages/en_PT/bannerbomb3.txt b/_pages/en_PT/bannerbomb3.txt
index 1dab8a9825..a8383926fd 100644
--- a/_pages/en_PT/bannerbomb3.txt
+++ b/_pages/en_PT/bannerbomb3.txt
@@ -30,36 +30,10 @@ If you have a Taiwanese console (indicated by a T after the system version), fol
#### Section I - Prep Work
-In this section, you will copy the files needed to trigger the BannerBomb3 exploit onto your device's SD card.
-
-1. Power off ye device
-1. Insert ye SD card into ye computer
-1. Open [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen) on your computer
-1. Upload your movable.sed using the “Choose File” option
-1. Click “Build and Download”
- + This will download an exploit DSiWare called `F00D43D5.bin` and a payload called `bb3.bin` inside of a zip archive (`DSIWARE_EXPLOIT.zip`)
-1. Copy `bb3.bin` from `DSIWARE_EXPLOIT.zip` to the root of your SD card
- + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it
- + This file does not need to be opened or extracted
- ![]({{ "/images/screenshots/bb3/bb3-root-layout.png" | absolute_url }}){: .notice--info}
-1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card
- + `` is the 32-letter folder name that you copied in [Seedminer](seedminer)
- + `` is a 32-letter folder inside of the ``
- + If you have multiple `` folders, follow the instructions [here](troubleshooting#bannerbomb3)
- ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info}
-1. Create a folder named `Nintendo DSiWare` inside of the ``
- + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card
-1. Copy the `F00D43D5.bin` file from `DSIWARE_EXPLOIT.zip` to the `Nintendo DSiWare` folder
-
-![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }})
-{: .notice--info}
+{% include_relative include/bb3-prep.txt %}
#### Section II - Hardware Button Check
-In this section, you will see whether you can access Safe Mode on your device. This will determine which method you will follow on the next page.
-
-Your SD card should remain in your computer while you perform this check.
-
{% include_relative include/safemodecheck.txt %}
___
diff --git a/_pages/fi_FI/credits.md b/_pages/en_PT/credits.txt
similarity index 100%
rename from _pages/fi_FI/credits.md
rename to _pages/en_PT/credits.txt
diff --git a/_pages/en_PT/donations.md b/_pages/en_PT/donations.txt
similarity index 100%
rename from _pages/en_PT/donations.md
rename to _pages/en_PT/donations.txt
diff --git a/_pages/en_PT/finalizing-setup.txt b/_pages/en_PT/finalizing-setup.txt
index b365ff52b6..ffead17f02 100644
--- a/_pages/en_PT/finalizing-setup.txt
+++ b/_pages/en_PT/finalizing-setup.txt
@@ -177,9 +177,6 @@ ___
You're done! Custom firmware is now fully configured on your device.
{: .notice--success}
-Hello! We're looking for feedback on the overall experience of following our guide. If you'd like to help out, check out the survey [here](https://forms.gle/vZNoc4QLCz5MEXCK7) (only available in English). Thanks!
-{: .notice--info}
-
### Information and Notes
{% capture notice-6 %}
diff --git a/_pages/en_PT/homebrew-launcher-(super-skaterhax).txt b/_pages/en_PT/homebrew-launcher-(super-skaterhax).txt
index 77bf5c0f8f..c76c55cf7c 100644
--- a/_pages/en_PT/homebrew-launcher-(super-skaterhax).txt
+++ b/_pages/en_PT/homebrew-launcher-(super-skaterhax).txt
@@ -64,7 +64,7 @@ If you haven't already, make sure you have a working Internet connection set up
1. Select the "GO GO!" button on the top screen
+ If any prompts appear, approve all of them
+ If your device freezes on a yellow screen, hold the POWER button until it turns off, then retry this section
- + If your device freezes on a red screen, hold the POWER button until it turns off, redo step Step 3 of Section II, then retry this section
+ + If your device freezes on a red screen, hold the POWER button until it turns off, redo step 3 of Section II, then retry this section
+ If you get another error, try again up to 5 times, and if it still doesn't work, [follow this troubleshooting guide](troubleshooting#homebrew-launcher-super-skaterhax)
1. If the exploit was successful, your device will have booted into the Homebrew Launcher
1. Power off ye device
diff --git a/_pages/en_PT/include/bb3-prep.txt b/_pages/en_PT/include/bb3-prep.txt
new file mode 100644
index 0000000000..2957080e6e
--- /dev/null
+++ b/_pages/en_PT/include/bb3-prep.txt
@@ -0,0 +1,23 @@
+In this section, you will copy the files needed to trigger the BannerBomb3 exploit onto your device's SD card.
+
+1. Power off ye device
+1. Insert ye SD card into ye computer
+1. Open [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen) on your computer
+1. Upload your movable.sed using the “Choose File” option
+1. Click “Build and Download”
+ + This will download an exploit DSiWare called `F00D43D5.bin` and a payload called `bb3.bin` inside of a zip archive (`DSIWARE_EXPLOIT.zip`)
+1. Copy `bb3.bin` from `DSIWARE_EXPLOIT.zip` to the root of your SD card
+ + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it
+ + This file does not need to be opened or extracted
+ ![]({{ "/images/screenshots/bb3/bb3-root-layout.png" | absolute_url }}){: .notice--info}
+1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card
+ + `` is the 32-letter folder name that you copied in [Seedminer](seedminer)
+ + `` is a 32-letter folder inside of the ``
+ + If you have multiple `` folders, follow the instructions [here](troubleshooting#bannerbomb3)
+ ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info}
+1. Create a folder named `Nintendo DSiWare` inside of the ``
+ + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card
+1. Copy the `F00D43D5.bin` file from `DSIWARE_EXPLOIT.zip` to the `Nintendo DSiWare` folder
+
+![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }})
+{: .notice--info}
diff --git a/_pages/en_PT/include/fredtool-prep.txt b/_pages/en_PT/include/fredtool-prep.txt
new file mode 100644
index 0000000000..245ac40a9a
--- /dev/null
+++ b/_pages/en_PT/include/fredtool-prep.txt
@@ -0,0 +1,29 @@
+In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer.
+
+1. Insert ye SD card into ye computer
+1. Open the [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) website on your computer
+1. Under the "Username" field, enter any alphanumeric name (no spaces or special characters)
+1. Under the "DSiBin" field, upload your DSiWare backup file (e.g. 42383841.bin) from the root of your SD card using the first "Browse..." option
+1. Under the "MovableSed" field, upload your `movable.sed` file using the second "Browse..." option
+1. Under the "InjectionTarget" field, set the injection target to `DSinternet` (NOT memorypit)
+1. Click "Build"
+ + Wait a few seconds for the build process to complete
+1. In the Build History section on the left, type the Username into the "Filter Builds" field
+1. Click on the first search result
+ + This result should have the latest timestamp
+1. Click the "output_(name).zip" link
+1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card
+ + `` is the 32-letter folder name that you copied in [Seedminer](seedminer)
+ + `` is a 32-letter folder inside of the ``
+1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder
+1. Copy the `42383841.bin` file from the `hax` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder
+ ![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info}
+1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card
+ + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it
+1. Copy `boot.nds` (B9STool) from the release `.zip` to the root of your SD card
+1. Copy the `private` folder from the Frogminer_save `.zip` to the root of your SD card
+1. Reinsert ye SD card into ye device
+1. Power on your device
+
+ ![]({{ "/images/screenshots/fredtool/fredtool-root-layout.png" | absolute_url }})
+ {: .notice--info}
\ No newline at end of file
diff --git a/_pages/en_PT/include/fredtool-restore-dsconn.txt b/_pages/en_PT/include/fredtool-restore-dsconn.txt
new file mode 100644
index 0000000000..33392efb4d
--- /dev/null
+++ b/_pages/en_PT/include/fredtool-restore-dsconn.txt
@@ -0,0 +1,10 @@
+In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in an earlier section.
+
+1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card
+1. Copy the `42383841.bin` file from the `clean` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder, replacing the existing one
+1. Reinsert ye SD card into ye device
+1. Power on your device
+1. Launch System Settings on your device
+1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png))
+1. Select the "Nintendo DSi™" title
+1. Select "Copy", then select "OK"
diff --git a/_pages/en_PT/include/fredtool-write-flipnote.txt b/_pages/en_PT/include/fredtool-write-flipnote.txt
new file mode 100644
index 0000000000..cb6f428624
--- /dev/null
+++ b/_pages/en_PT/include/fredtool-write-flipnote.txt
@@ -0,0 +1,11 @@
+In this section, you will copy the hacked DS Connection Settings DSiWare to internal memory, which will temporarily replace it with Flipnote Studio.
+
+1. Launch System Settings on your device
+1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png))
+1. Select the "Haxxxxxxxxx!" title
+ + If you are unable to select the "Haxxxxxxxxx" title, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool)
+1. Select "Copy", then select "OK"
+1. Return to main menu of the System Settings
+1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" ([image](/images/screenshots/fredtool/dsconnection.png))
+1. If the exploit was successful, your device will have loaded the JPN version of Flipnote Studio
+ + If your device does not load the JPN version of Flipnote Studio, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool)
\ No newline at end of file
diff --git a/_pages/en_PT/include/safemodecheck.txt b/_pages/en_PT/include/safemodecheck.txt
index cc5e12d9ac..286dbf27b0 100644
--- a/_pages/en_PT/include/safemodecheck.txt
+++ b/_pages/en_PT/include/safemodecheck.txt
@@ -1,3 +1,5 @@
+In this section, you will see whether your shoulder buttons are working on your device. This will determine which method you will follow on the next page.
+
1. Power on your device
1. Once you see the HOME Menu, press the (Left Shoulder) and (Right Shoulder) buttons at the same time
+ The camera applet should appear
diff --git a/_pages/en_PT/include/seedminer-base.txt b/_pages/en_PT/include/seedminer-base.txt
index 5225e89c8b..6886f5c9f4 100644
--- a/_pages/en_PT/include/seedminer-base.txt
+++ b/_pages/en_PT/include/seedminer-base.txt
@@ -15,10 +15,12 @@ This method uses a powerful graphics card to perform the calculations needed. A
In this section, you will get the necessary details from your 3DS that are required to figure out your device's encryption key.
+{% capture console_state_info %}
Before following this section:
+ Ensure that you have turned on your console with the SD card inserted at least once to generate the necessary data
+ Ensure that your console is connected to the Internet (you should see a blue "Internet" indicator on the top-left corner of the HOME screen)
-{: .notice--info}
+{% endcapture %}
+{{ console_state_info | markdownify }}
1. Power off ye device
1. Insert ye SD card into ye computer
diff --git a/_pages/en_PT/installing-boot9strap-(fredtool).txt b/_pages/en_PT/installing-boot9strap-(fredtool).txt
index a292553a8c..15c210e5f8 100644
--- a/_pages/en_PT/installing-boot9strap-(fredtool).txt
+++ b/_pages/en_PT/installing-boot9strap-(fredtool).txt
@@ -15,11 +15,14 @@ This is a currently working implementation of the "FIRM partitions known-plainte
{{ technical_info | markdownify }}
{: .notice--info}
+You should only be able to get to this page if you are running version 11.16.0. If you are on any firmware other than 11.17.0 or 11.16.0, STOP as these instructions WILL LEAD TO A BRICK on other firmwares!!
+{: .notice--warning}
+
### What You Need
* Your `movable.sed` file from completing [Seedminer](seedminer)
* The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`)
-* The latest release of [b9sTool](https://github.com/zoogie/b9sTool/releases/download/v6.1.1/release_6.1.1.zip) (direct download)
+* **11.16.0 or 11.17.0 users**: The v6.1.1 release of [b9sTool](https://github.com/zoogie/b9sTool/releases/download/v6.1.1/release_6.1.1.zip) (direct download)
* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file)
#### Section I - CFW Check
@@ -42,49 +45,11 @@ In this section, you will trigger the BannerBomb3 exploit using the DSiWare Mana
#### Section III - Prep Work
-In this section, you will copy the files necessary to temporarily replace DS Connection Settings with Flipnote Studio, which is used to launch the boot9strap (custom firmware) installer.
-
-1. Insert ye SD card into ye computer
-1. Open the [DSIHaxInjector_new](https://jenkins.nelthorya.net/job/DSIHaxInjector_new/build?delay=0sec) website on your computer
-1. Under the "Username" field, enter any alphanumeric name (no spaces or special characters)
-1. Under the "DSiBin" field, upload your `42383841.bin` file from the root of your SD card using the first "Browse..." option
-1. Under the "MovableSed" field, upload your `movable.sed` file using the second "Browse..." option
-1. Under the "InjectionTarget" field, set the injection target to `DSinternet` (NOT memorypit)
-1. Click "Build"
- + Wait a few seconds for the build process to complete
-1. In the Build History section on the left, type the Username into the "Filter Builds" field
-1. Click on the first search result
- + This result should have the latest timestamp
-1. Click the "output_(name).zip" link
-1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card
- + `` is the 32-letter folder name that you copied in [Seedminer](seedminer)
- + `` is a 32-letter folder inside of the ``
-1. Delete `F00D43D5.bin` from your Nintendo DSiWare folder
-1. Copy the `42383841.bin` file from the `hax` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder
- ![]({{ "/images/screenshots/bb3/dsiware-location-4.png" | absolute_url }}){: .notice--info}
-1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card
- + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it
-1. Copy `boot.nds` (B9STool) from the release `.zip` to the root of your SD card
-1. Copy the `private` folder from the Frogminer_save `.zip` to the root of your SD card
-1. Reinsert ye SD card into ye device
-1. Power on your device
-
- ![]({{ "/images/screenshots/fredtool/fredtool-root-layout.png" | absolute_url }})
- {: .notice--info}
+{% include_relative include/fredtool-prep.txt %}
#### Section IV - Overwriting DS Connection Settings
-In this section, you will copy the hacked DS Connection Settings DSiWare to internal memory, which will temporarily replace it with Flipnote Studio.
-
-1. Launch System Settings on your device
-1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png))
-1. Select the "Haxxxxxxxxx!" title
- + If you are unable to select the "Haxxxxxxxxx" title, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool)
-1. Select "Copy", then select "OK"
-1. Return to main menu of the System Settings
-1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" ([image](/images/screenshots/fredtool/dsconnection.png))
-1. If the exploit was successful, your device will have loaded the JPN version of Flipnote Studio
- + If your device does not load the JPN version of Flipnote Studio, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool)
+{% include_relative include/fredtool-write-flipnote.txt %}
#### Section V - Flipnote Exploit
@@ -99,18 +64,10 @@ In this section, you will copy the hacked DS Connection Settings DSiWare to inte
#### Section VII - Restoring DS Connection Settings
-In this section, you will restore DS Connection Settings to the way it was before it was temporarily replaced with Flipnote Studio in Section IV.
-
-1. Navigate to `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` on your SD card
-1. Copy the `42383841.bin` file from the `clean` folder of the downloaded DSiWare archive (output_(name).zip) to the `Nintendo DSiWare` folder, replacing the existing one
-1. Reinsert ye SD card into ye device
-1. Power on your device
-1. Launch System Settings on your device
-1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png))
-1. Select the "Nintendo DSi™" title
-1. Select "Copy", then select "OK"
+{% include_relative include/fredtool-restore-dsconn.txt %}
___
+
### Continue to [Finalizing Setup](finalizing-setup)
{: .notice--primary}
diff --git a/_pages/en_PT/installing-boot9strap-(fredtool-legacy).txt b/_pages/en_PT/installing-boot9strap-(fredtool-legacy).txt
new file mode 100644
index 0000000000..a9cc332cba
--- /dev/null
+++ b/_pages/en_PT/installing-boot9strap-(fredtool-legacy).txt
@@ -0,0 +1,77 @@
+---
+title: "Installing boot9strap (Fredtool, Legacy)"
+---
+
+{% include toc title="Table of Contents" %}
+
+{% capture technical_info %}
+Technical Details (optional)
+
+To dump system DSiWare, we exploit a flaw in the DSiWare Data Management window of the Settings application.
+
+To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system to dump the DSi Internet Settings application to the SD root.
+
+Once we have a DSiWare backup, we can inject it into the DS Internet Settings application.
+
+This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws).
+
+{% endcapture %}
+{{ technical_info | markdownify }}
+{: .notice--info}
+
+You should only be able to get to this page if you are running version 11.15.0 or 11.14.0. If you are on any firmware other than 11.15.0 or 11.14.0, STOP as these instructions WILL LEAD TO A BRICK on other firmwares!!
+{: .notice--warning}
+
+### What You Need
+
+* Your `movable.sed` file from completing [Seedminer (Mii)](seedminer-(mii))
+* The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) (`Frogminer_save.zip`)
+* **11.15.0 and 11.14.0 users only**: The v6.0.1 release of [b9sTool](https://github.com/zoogie/b9sTool/releases/tag/v6.0.1) (direct download)
+* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file)
+
+#### Section I - CFW Check
+
+{% include_relative include/cfw-check-fredtool.txt %}
+
+#### Section II - BannerBomb3
+
+In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next section.
+
+1. Reinsert ye SD card into ye device
+1. Power on your device
+1. Launch System Settings on your device
+1. Navigate to `Data Management` -> `DSiWare`-> `SD Card` ([image](/images/screenshots/bb3/dsiware-management.png))
+ + Your device should show the BB3 multihax menu
+ + If this step causes your device to crash, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-fredtool)
+1. Use the D-Pad to navigate and press the (A) button to select "Dump DSiWare"
+ + Your device will automatically reboot
+1. Power off ye device
+
+#### Section III - Prep Work
+
+{% include_relative include/fredtool-prep.txt %}
+
+#### Section IV - Overwriting DS Connection Settings
+
+{% include_relative include/fredtool-write-flipnote.txt %}
+
+#### Section V - Flipnote Exploit
+
+{% include_relative include/install-boot9strap-b9stool.txt method="dsinternet" %}
+
+#### Section VI - Luma3DS Configuration
+
+1. Press and hold (Select), and while holding (Select), power on your device. This will launch Luma3DS configuration
+{% include_relative include/configure-luma3ds.txt %}
+
+{% include_relative include/luma3ds-installed-note.txt %}
+
+#### Section VII - Restoring DS Connection Settings
+
+{% include_relative include/fredtool-restore-dsconn.txt %}
+
+___
+
+
+### Continue to [Finalizing Setup](finalizing-setup)
+{: .notice--primary}
diff --git a/_pages/en_PT/seedminer-(mii).txt b/_pages/en_PT/seedminer-(mii).txt
new file mode 100644
index 0000000000..5faf224c22
--- /dev/null
+++ b/_pages/en_PT/seedminer-(mii).txt
@@ -0,0 +1,84 @@
+---
+title: "Seedminer (Mii)"
+---
+
+{% include toc title="Table of Contents" %}
+
+{% capture gpu_warning %}
+This method requires a reasonably powerful GPU (any dedicated graphics card made in the last few years) and the ability to use a command line. If you don't know what those are or do not have the hardware necessary, you can ask someone to do this for you at [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp). You will need to have the following information ready:
++ Your Mii QR code, uploaded directly to Discord (do not take a screenshot or a photo of the image, just send the HNI_XXXX.JPG image itself)
++ Your console's ID0 (the name of the 32-character folder directly inside of Nintendo 3DS - see [this troubleshooting section](https://3ds.hacks.guide/troubleshooting#seedminer) if you have multiple)
++ Your console model (e.g. 3DS, 3DS XL, 2DS, New3DS, New3DS XL, New2DS XL)
++ Your console's approximate year of manufacturing (it may be present behind the frontplate or backplate; if you don't know, just guess - it's not super important)
+{% endcapture %}
+{{ gpu_warning | markdownify }}
+
+{% capture technical_info %}
+Technical Details (optional)
+
+To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device.
+
+Because we do not have access to the Friends List, we are deriving the first part of `movable.sed` using a Mii QR code instead of by performing a two-way friend exchange.
+
+For information on how Seedminer works, see [this presentation](https://zoogie.github.io/web/34⅕c3).
+
+{% endcapture %}
+{{ technical_info | markdownify }}
+{: .notice--info}
+
+## Instructions
+
+If you are on Linux or macOS, replace `py -3` with `python3` in all commands.
+{: .notice--info}
+
+### What you need
+
++ The latest release of [Seedminer](https://github.com/zoogie/seedminer/releases/latest) (the Seedminer .zip)
++ Any 3.x version of [Python](https://www.python.org/downloads/) installed
+ + If you are on Linux, you likely already have Python 3. Check by opening a terminal and entering `python3 -V`. If this returns a version number, it will work for this guide.
+
+### Section I - Prep Work
+
+In this section, you will set up Seedminer and obtain your console's files that are needed for mining.
+
+1. Extract the contents of the Seedminer `.zip` and move the folder with your operating systeem's name to anywhere on your PC
+ + Keep this location handy, as this Seedminer folder will be where multiple other files are placed
+1. In the Seedminer folder, hold SHIFT and right-click anywhere in the folder's empty space, then click the option that opens Terminal, PowerShell, or Command Prompt
+1. In the command line window, type `py -3 -mpip install pycryptodomex`, hit ENTER, and allow it to install
+ + If this command fails with the error `No module named pip`, you must manually install pip. The methods to do this can be found on [this page](https://pip.pypa.io/en/stable/installation/).
+1. Turn your console on while the SD card is inserted
+1. Open the Mii Maker app
+1. Tap the "QR Code/Image Options" button
+1. Tap "Save Mii as QR Code"
+1. Select any Mii Character (make a new one first if you don't have any), and press "OK"
+1. Turn the console off
+1. Put the console's SD card into your computer, navigate to the `Nintendo 3DS` folder on the SD, and copy the name of the 32-character-long folder directly inside
+ + This folder, known as the ID0, is system-specific. Only one should be present. If you see multiple, follow [these instructions](troubleshooting#seedminer)
+ + Once you have the ID0, paste it into a document so you can reference it later
+1. Navigate to the `DCIM` folder on the SD card
+1. Look for the QR Code, which will be a `.JPG` file starting with `HNI`
+ + You may have many other files in here already if you use the Nintendo 3DS Camera app
+1. Copy this file to the Seedminer folder on your PC
+
+### Section II - Processing Mii QR and Mining
+
+In this section, you will turn the Mii QR code into a usable file and mine `movable.sed` with it.
+
+1. Open the [editMii](https://zoogie.github.io/web/miiqr/) website on your computer
+1. Click on "Import from...", then select "QR Code" and upload the Mii QR code from earlier
+1. Click on "Export to...", then select "encrypted (.bin)"
+ + This will download a file named `input.bin`
+1. Copy this `input.bin` to the Seedminer folder
+1. Open the terminal/PowerShell/Command Prompt window from earlier
+1.Inside this window, enter the command `py -3 seedminer_launcher3.py id0 `
+ + Replace `` with the ID0 you copied into a document
+ + Do not include the angle brackets
+1. Once it completes, enter the command `py -3 seedminer_launcher3.py mii `
+ + Replace `` with the model of your console (`new` or `old`) - if you aren't sure, only models with the ZL/ZR buttons and C-Stick are new
+ + Replace `` with the year the 3DS was made (you often find this on the backplate) - leave this empty if you aren't sure, in which case it will start from the middle
+ + If this fails with an error of `input.bin is invalid size`, remake the `input.bin` using your QR Code. If it ''still'' fails, open a different browser and remake the `input.bin` there
+ + The mining process will usually take up to 90 minutes, depending on luck and your GPU's strength
+1. When it finishes, a file called `movable.sed` will appear in the Seedminer folder
+
+Continue to [BannerBomb3 (Legacy)](bannerbomb3-(legacy))
+{: .notice--primary}
diff --git a/_pages/en_PT/site-navigation.txt b/_pages/en_PT/site-navigation.txt
index f4455a209f..e0d200e7e4 100644
--- a/_pages/en_PT/site-navigation.txt
+++ b/_pages/en_PT/site-navigation.txt
@@ -18,6 +18,7 @@ sitemap: false
+ [A9LH to B9S](a9lh-to-b9s)
+ [BannerBomb3](bannerbomb3)
++ [Installing boot9strap (Fredtool, Legacy)](bannerbomb3-(legacy))
+ [BannerBomb3 + Fredtool (TWN)](bannerbomb3-fredtool-(twn))
+ [Credits](credits)
+ [Checking for CFW](checking-for-cfw)
@@ -44,6 +45,7 @@ sitemap: false
+ [Home](/en_PT/)
+ [Homebrew Launcher (super-skaterhax)](homebrew-launcher-(super-skaterhax))
+ [Installing boot9strap (Fredtool)](installing-boot9strap-(fredtool))
++ [Installing boot9strap (Fredtool, Legacy)](installing-boot9strap-(fredtool-legacy))
+ [Installing boot9strap (Frogtool)](installing-boot9strap-(frogtool))
+ [Installin' boot9strap (Hardmod)](installing-boot9strap-(hardmod))
+ [Installing boot9strap (HBL-USM)](installing-boot9strap-(hbl-usm))
@@ -59,6 +61,7 @@ sitemap: false
+ [Region Changin'](region-changing)
+ [Restoring / Updating CFW](restoring-updating-cfw)
+ [Seedminer](seedminer)
++ [Seedminer](seedminer-(mii))
+ [Seedminer (TWN)](seedminer-(twn))
+ [Troubleshootin'](troubleshooting)
+ [Uninstall CFW](uninstall-cfw)
diff --git a/_pages/en_PT/updating-firmware-(kor).txt b/_pages/en_PT/updating-firmware-(kor).txt
new file mode 100644
index 0000000000..4b08786c27
--- /dev/null
+++ b/_pages/en_PT/updating-firmware-(kor).txt
@@ -0,0 +1,18 @@
+---
+title: "Updating Firmware (KOR)"
+---
+
+### Required Reading
+
+To use the Seedminer exploit, you must update your device to the latest system version.
+
+### What you need
+
+* An internet connection on your device
+
+#### Section I - Updating the System
+
+{% include_relative include/sysupdate.txt cfw="false" %}
+
+Continue to [Seedminer](seedminer)
+{: .notice--primary}
diff --git a/_pages/en_PT/updating-firmware-(kor-twn).md b/_pages/en_PT/updating-firmware-(kor-twn).md
deleted file mode 100644
index 74a2b48f90..0000000000
--- a/_pages/en_PT/updating-firmware-(kor-twn).md
+++ /dev/null
@@ -1,18 +0,0 @@
----
-title: "Updating Firmware (KOR/TWN)"
----
-
-### Required Reading
-
-To use the Seedminer exploit, you must update your device to the latest system version.
-
-### What you need
-
-* An internet connection on your device
-
-#### Section I - Updating the System
-
-{% include_relative include/sysupdate.txt cfw="false" %}
-
-Continue to [Seedminer](seedminer)
-{: .notice--primary}
diff --git a/_pages/el_GR/updating-firmware-(new-3ds).md b/_pages/en_PT/updating-firmware-(new-3ds).txt
similarity index 100%
rename from _pages/el_GR/updating-firmware-(new-3ds).md
rename to _pages/en_PT/updating-firmware-(new-3ds).txt
diff --git a/_pages/en_PT/updating-firmware-(twn).txt b/_pages/en_PT/updating-firmware-(twn).txt
new file mode 100644
index 0000000000..83e6992b1b
--- /dev/null
+++ b/_pages/en_PT/updating-firmware-(twn).txt
@@ -0,0 +1,18 @@
+---
+title: "Updating Firmware (TWN)"
+---
+
+### Required Reading
+
+To use the Seedminer exploit, you must update your device to the latest system version.
+
+### What you need
+
+* An internet connection on your device
+
+#### Section I - Updating the System
+
+{% include_relative include/sysupdate.txt cfw="false" %}
+
+Continue to [Seedminer (TWN)](seedminer-(twn))
+{: .notice--primary}
diff --git a/_pages/es_ES/404.md b/_pages/es_ES/404.txt
similarity index 100%
rename from _pages/es_ES/404.md
rename to _pages/es_ES/404.txt
diff --git a/_pages/es_ES/bannerbomb3-(legacy).txt b/_pages/es_ES/bannerbomb3-(legacy).txt
new file mode 100644
index 0000000000..ef6369c87e
--- /dev/null
+++ b/_pages/es_ES/bannerbomb3-(legacy).txt
@@ -0,0 +1,50 @@
+---
+title: "BannerBomb3 (Legacy)"
+---
+
+{% include toc title="Tabla de contenidos" %}
+
+{% capture technical_info %}
+Technical Details (optional)
+
+To launch custom code, we exploit a flaw in the DSiWare Data Management window of the Settings application.
+
+To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system.
+
+For a more technical explanation, see [here](https://github.com/zoogie/Bannerbomb3).
+{% endcapture %}
+
+{{ technical_info | markdownify }}
+{: .notice--info}
+
+### Compatibility Notes
+
+Estas instrucciones funcionan en consolas de las regiones USA, Europa, Japón y Corea, indicado por las letras U, E, J o K después de la versión del sistema.
+
+### Qué necesitas
+
+* Your `movable.sed` file from completing Seedminer or nimhax
+
+#### Sección I - Preparativos
+
+{% include_relative include/bb3-prep.txt %}
+
+#### Section II - Hardware Button Check
+
+In this section, you will see whether you can access Safe Mode on your device. This will determine which method you will follow on the next page.
+
+Your SD card should remain in your computer while you perform this check.
+
+{% include_relative include/safemodecheck.txt %}
+
+___
+
+### Next steps: Choose an exploit
+
+If the camera appeared in the previous section, Safe Mode is likely to be working on your device.
+
+If the camera appeared, continue to [Installing boot9strap (USM)](installing-boot9strap-(usm))
+{: .notice--primary}
+
+If the camera did NOT appear, continue to [Installing boot9strap (Fredtool, Legacy)](installing-boot9strap-(fredtool-legacy))
+{: .notice--info}
diff --git a/_pages/es_ES/bannerbomb3.txt b/_pages/es_ES/bannerbomb3.txt
index 6c8f364199..d96abdf2e6 100644
--- a/_pages/es_ES/bannerbomb3.txt
+++ b/_pages/es_ES/bannerbomb3.txt
@@ -30,36 +30,10 @@ If you have a Taiwanese console (indicated by a T after the system version), fol
#### Sección I - Preparativos
-In this section, you will copy the files needed to trigger the BannerBomb3 exploit onto your device's SD card.
-
-1. Apaga tu consola
-1. Inserta tu tarjeta SD en tu computadora
-1. Open [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen) on your computer
-1. Upload your movable.sed using the “Choose File” option
-1. Click “Build and Download”
- + This will download an exploit DSiWare called `F00D43D5.bin` and a payload called `bb3.bin` inside of a zip archive (`DSIWARE_EXPLOIT.zip`)
-1. Copy `bb3.bin` from `DSIWARE_EXPLOIT.zip` to the root of your SD card
- + La raíz de tu tarjeta SD se refiere al primer directorio de la tarjeta, donde puedes ver la carpeta Nintendo 3DS pero no estás dentro de ella
- + This file does not need to be opened or extracted
- ![]({{ "/images/screenshots/bb3/bb3-root-layout.png" | absolute_url }}){: .notice--info}
-1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card
- + `` is the 32-letter folder name that you copied in [Seedminer](seedminer)
- + `` is a 32-letter folder inside of the ``
- + If you have multiple `` folders, follow the instructions [here](troubleshooting#bannerbomb3)
- ![]({{ "/images/screenshots/bb3/dsiware-location-1.png" | absolute_url }}){: .notice--info}
-1. Create a folder named `Nintendo DSiWare` inside of the ``
- + If you already had the folder *and* there are any existing DSiWare backup files (`<8-character-id>.bin`) inside, copy them to your PC and remove them from your SD card
-1. Copy the `F00D43D5.bin` file from `DSIWARE_EXPLOIT.zip` to the `Nintendo DSiWare` folder
-
-![]({{ "/images/screenshots/bb3/dsiware-location-2.png" | absolute_url }})
-{: .notice--info}
+{% include_relative include/bb3-prep.txt %}
#### Section II - Hardware Button Check
-In this section, you will see whether you can access Safe Mode on your device. This will determine which method you will follow on the next page.
-
-Your SD card should remain in your computer while you perform this check.
-
{% include_relative include/safemodecheck.txt %}
___
diff --git a/_pages/he_IL/credits.md b/_pages/es_ES/credits.txt
similarity index 100%
rename from _pages/he_IL/credits.md
rename to _pages/es_ES/credits.txt
diff --git a/_pages/es_ES/donations.md b/_pages/es_ES/donations.txt
similarity index 100%
rename from _pages/es_ES/donations.md
rename to _pages/es_ES/donations.txt
diff --git a/_pages/es_ES/finalizing-setup.txt b/_pages/es_ES/finalizing-setup.txt
index 0889d41ad9..25abbacd50 100644
--- a/_pages/es_ES/finalizing-setup.txt
+++ b/_pages/es_ES/finalizing-setup.txt
@@ -177,9 +177,6 @@ ___
You're done! Custom firmware is now fully configured on your device.
{: .notice--success}
-Hello! We're looking for feedback on the overall experience of following our guide. If you'd like to help out, check out the survey [here](https://forms.gle/vZNoc4QLCz5MEXCK7) (only available in English). Thanks!
-{: .notice--info}
-
### Information and Notes
{% capture notice-6 %}
diff --git a/_pages/es_ES/homebrew-launcher-(super-skaterhax).txt b/_pages/es_ES/homebrew-launcher-(super-skaterhax).txt
index 736a8878c6..12665ec29c 100644
--- a/_pages/es_ES/homebrew-launcher-(super-skaterhax).txt
+++ b/_pages/es_ES/homebrew-launcher-(super-skaterhax).txt
@@ -64,7 +64,7 @@ If you haven't already, make sure you have a working Internet connection set up
1. Select the "GO GO!" button on the top screen
+ If any prompts appear, approve all of them
+ If your device freezes on a yellow screen, hold the POWER button until it turns off, then retry this section
- + If your device freezes on a red screen, hold the POWER button until it turns off, redo step Step 3 of Section II, then retry this section
+ + If your device freezes on a red screen, hold the POWER button until it turns off, redo step 3 of Section II, then retry this section
+ If you get another error, try again up to 5 times, and if it still doesn't work, [follow this troubleshooting guide](troubleshooting#homebrew-launcher-super-skaterhax)
1. If the exploit was successful, your device will have booted into the Homebrew Launcher
1. Apaga tu consola
diff --git a/_pages/es_ES/include/bb3-prep.txt b/_pages/es_ES/include/bb3-prep.txt
new file mode 100644
index 0000000000..0366318d47
--- /dev/null
+++ b/_pages/es_ES/include/bb3-prep.txt
@@ -0,0 +1,23 @@
+In this section, you will copy the files needed to trigger the BannerBomb3 exploit onto your device's SD card.
+
+1. Apaga tu consola
+1. Inserta tu tarjeta SD en tu computadora
+1. Open [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen) on your computer
+1. Upload your movable.sed using the “Choose File” option
+1. Click “Build and Download”
+ + This will download an exploit DSiWare called `F00D43D5.bin` and a payload called `bb3.bin` inside of a zip archive (`DSIWARE_EXPLOIT.zip`)
+1. Copy `bb3.bin` from `DSIWARE_EXPLOIT.zip` to the root of your SD card
+ + La raíz de tu tarjeta SD se refiere al primer directorio de la tarjeta, donde puedes ver la carpeta Nintendo 3DS pero no estás dentro de ella
+ + This file does not need to be opened or extracted
+ ![]({{ "/images/screenshots/bb3/bb3-root-layout.png" | absolute_url }}){: .notice--info}
+1. Navigate to `Nintendo 3DS` -> `` -> `` on your SD card
+ + `` is the 32-letter folder name that you copied in [Seedminer](seedminer)
+ + `` is a 32-letter folder inside of the ``
+ + If you have multiple `