New Crowdin translations (#1658)

This commit is contained in:
Devon Maloney 2019-03-19 12:42:54 -04:00 committed by Plailect
parent 1052ae2152
commit e78242cf23
No known key found for this signature in database
GPG key ID: F8A415C5EA602A41
227 changed files with 2094 additions and 1401 deletions

View file

@ -56,7 +56,7 @@ sidebar_pages:
title: Comencemos
url: get-started
-
title: Cart Update
title: Actualizar con cartucho
url: cart-update
-
title: ntrboot
@ -65,62 +65,62 @@ sidebar_pages:
title: Seedminer
url: seedminer
-
title: Multiple Options
title: Múltiples opciones
url: multiple-options
-
title: Flashing ntrboot (3DS Single System)
title: Flashear ntrboot (Una consola 3DS)
url: flashing-ntrboot-(3ds-single-system)
-
title: Flashing ntrboot (3DS Multi System)
title: Flashear ntrboot (Dos consolas 3DS)
url: flashing-ntrboot-(3ds-multi-system)
-
title: Flashing ntrboot (DSi)
title: Flashear ntrboot (DSi)
url: flashing-ntrboot-(dsi)
-
title: Flashing ntrboot (NDS)
title: Flashear ntrboot (NDS)
url: flashing-ntrboot-(nds)
-
title: Flashing ntrboot (Powersaves)
title: Flashear ntrboot (Powersaves)
url: flashing-ntrboot-(powersaves)
-
title: Homebrew Launcher (Soundhax)
url: homebrew-launcher-(soundhax)
-
title: Homebrew Launcher (Alternatives)
title: Homebrew Launcher (Alternativas)
url: homebrew-launcher-(alternatives)
-
title: Homebrew Launcher (Steelhax)
url: homebrew-launcher-(steelhax)
-
title: NTR and Cubic Ninja
title: NTR y Cubic Ninja
url: ntr-and-cubic-ninja
-
title: Installing boot9strap (2xrsa)
title: Instalar boot9strap (2xrsa)
url: installing-boot9strap-(2xrsa)
-
title: Installing boot9strap (Browser)
title: Instalar boot9strap (navegador)
url: installing-boot9strap-(browser)
-
title: Installing boot9strap (Hardmod)
title: Instalar boot9strap (Hardmod)
url: installing-boot9strap-(hardmod)
-
title: Installing boot9strap (SafeB9SInstaller)
title: Instalar boot9strap (SafeB9SInstaller)
url: installing-boot9strap-(safeb9sinstaller)
-
title: Installing boot9strap (MSET)
title: Instalar boot9strap (MSET)
url: installing-boot9strap-(mset)
-
title: Installing boot9strap (ntrboot)
title: Instalar boot9strap (ntrboot)
url: installing-boot9strap-(ntrboot)
-
title: Installing boot9strap (Soundhax)
title: Instalar boot9strap (Soundhax)
url: installing-boot9strap-(soundhax)
-
title: Installing boot9strap (Frogtool)
url: installing-boot9strap-(frogtool)
-
title: Installing boot9strap (Fredtool)
title: Instalar boot9strap (Fredtool)
url: installing-boot9strap-(fredtool)
-
title: Finalizing Setup
title: Finalizar instalación
url: finalizing-setup

View file

@ -56,7 +56,7 @@ sidebar_pages:
title: Pour commencer
url: get-started
-
title: Cart Update
title: Mise à jour par cartouche
url: cart-update
-
title: ntrboot
@ -65,22 +65,22 @@ sidebar_pages:
title: Seedminer
url: seedminer
-
title: Multiple Options
title: Options multiples
url: multiple-options
-
title: Flashing ntrboot (3DS Single System)
title: Flash de ntrboot (une seule 3DS)
url: flashing-ntrboot-(3ds-single-system)
-
title: Flashing ntrboot (3DS Multi System)
title: Flash de ntrboot (plusieurs 3DS)
url: flashing-ntrboot-(3ds-multi-system)
-
title: Flashing ntrboot (DSi)
title: Flash de ntrboot (DSi)
url: flashing-ntrboot-(dsi)
-
title: Flashing ntrboot (NDS)
title: Flash de ntrboot (NDS)
url: flashing-ntrboot-(nds)
-
title: Flashing ntrboot (Powersaves)
title: Flash de ntrboot (Powersaves)
url: flashing-ntrboot-(powersaves)
-
title: Homebrew Launcher (Soundhax)
@ -89,38 +89,38 @@ sidebar_pages:
title: Homebrew Launcher (Alternatives)
url: homebrew-launcher-(alternatives)
-
title: Homebrew Launcher (Steelhax)
title: Installing boot9strap (Steelhax)
url: homebrew-launcher-(steelhax)
-
title: NTR and Cubic Ninja
title: NTR et Cubic Ninja
url: ntr-and-cubic-ninja
-
title: Installing boot9strap (2xrsa)
title: Installation de boot9strap (2xrsa)
url: installing-boot9strap-(2xrsa)
-
title: Installing boot9strap (Browser)
title: Installation de boot9strap (Navigateur internet)
url: installing-boot9strap-(browser)
-
title: Installing boot9strap (Hardmod)
title: Installation de boot9strap (Hardmod)
url: installing-boot9strap-(hardmod)
-
title: Installing boot9strap (SafeB9SInstaller)
title: Installer boot9strap (SafeB9SInstaller)
url: installing-boot9strap-(safeb9sinstaller)
-
title: Installing boot9strap (MSET)
title: Installation de boot9strap (MSET)
url: installing-boot9strap-(mset)
-
title: Installing boot9strap (ntrboot)
title: Installation de boot9strap (ntrboot)
url: installing-boot9strap-(ntrboot)
-
title: Installing boot9strap (Soundhax)
title: Installation de boot9strap (Soundhax)
url: installing-boot9strap-(soundhax)
-
title: Installing boot9strap (Frogtool)
title: Installation de boot9strap (Frogtool)
url: installing-boot9strap-(frogtool)
-
title: Installing boot9strap (Fredtool)
title: Installation de boot9strap (Fredtool)
url: installing-boot9strap-(fredtool)
-
title: Finalizing Setup
title: Finalisation de la configuration
url: finalizing-setup

View file

@ -18,6 +18,8 @@ During this process, we also setup programs such as the following:
+ **Luma3DS Updater** *(updates your CFW installation easily)*
+ **GodMode9** *(multipurpose tool which can do NAND and cartridge functions)*
+ **Homebrew Launcher Loader** *(launches the Homebrew Launcher)*
+ **DSP1** *(allows homebrew applications to have sound)*
+ **ctr-no-timeoffset** *(removes the rtc offset so that the home menu and rtc timestamps match)*
### What You Need
@ -143,7 +145,7 @@ If, before following this guide, you already had an EmuNAND setup and would like
1. Press (B) to return to the main menu
1. Hold (R) and press (B) at the same time to eject your SD card
1. Insert your SD card into your computer
1. Copy `<date>_<serialnumber>_sysnand_###.bin`, `essential.exefs`, and `boot9.bin` from the `/gm9/out/` folder on your SD card to a safe location on your computer
1. Copy `<date>_<serialnumber>_sysnand_###.bin`, `<date>_<serialnumber>_sysnand_###.bin.sha`, `essential.exefs`, and `boot9.bin` from the `/gm9/out/` folder on your SD card to a safe location on your computer
+ Make backups in multiple locations (such as online file storage)
+ These backups will save you from a brick and/or help you recover files from the NAND image if anything goes wrong in the future
1. Delete `<date>_<serialnumber>_sysnand_###.bin` and `<date>_<serialnumber>_sysnand_###.bin.sha` from the `/gm9/out/` folder on your SD card after copying it

View file

@ -8,7 +8,7 @@ title: "Homebrew Launcher (Steelhax)"
This method of using Seedminer for further exploitation uses your `movable.sed` file to gain access to the Homebrew Launcher using the Steelhax exploit for the purposes of injecting an exploitable DSiWare title into the DS Download Play application. This method requires you to already own (or download) the free "Steel Divers: Sub Wars" game from the eShop.
If your device already has access to the Homebrew Launcher (whether through Steelhax or another exploit), you can skip to [Installing Boot9strap (Frogminer)](installing-boot9strap-(frogminer)).
If your device already has access to the Homebrew Launcher (whether through Steelhax or another exploit), you can skip to [Installing Boot9strap (Frogtool)](installing-boot9strap-(frogtool)).
{: .notice--success}
If you already have Steel Diver: Sub Wars, this process will overwrite your game's save file!
@ -17,6 +17,7 @@ If you already have Steel Diver: Sub Wars, this process will overwrite your game
### What You Need
* The free eShop game "Steel Diver: Sub Wars"
* Your `movable.sed` file from completing [Seedminer](seedminer)
* The latest release of [the Homebrew Launcher](https://github.com/fincs/new-hbmenu/releases/latest)
* The latest release of [Steelhax](https://github.com/VegaRoXas/vegaroxas.github.io/raw/master/files/steelhax-installer.rar)
* The [otherapp payload](https://smealum.github.io/3ds/#otherapp) *(for your region and version)*
@ -39,7 +40,7 @@ If you already have Steel Diver: Sub Wars, this process will overwrite your game
1. Exit "Steel Diver: Sub Wars"
1. Power off your device
1. Insert your SD card into your computer
1. Open [the Steelminer Injector website](http://steelminer.jisagi.net/injector) on your computer
1. Open [the Steelminer Injector website](https://bruteforcemovable.com/steelhax/) on your computer
1. Select your `movable.sed` file
1. Select "Start!"
1. Wait for the process to complete

View file

@ -10,8 +10,6 @@ This method of using Seedminer for further exploitation uses your `movable.sed`
This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws).
To use the [magnet](https://wikipedia.org/wiki/Magnet_URI_scheme) links on this page, you will need a torrent client like [Deluge](http://dev.deluge-torrent.org/wiki/Download).
To extract the `.7z` and `.rar` files linked on this page, you will need a file archiver like [7-Zip](http://www.7-zip.org/) or [The Unarchiver](https://theunarchiver.com/).
### What You Need

View file

@ -17,14 +17,14 @@ Note that carts with a "Time Bomb" will no longer be able to launch `.nds` files
| Flashcart Name | Current Price | "Time Bomb"? | 3DS Versions? | DSi Versions? | Other Notes |
|-|-:|:-:|:-:|:-:|-|
| [**R4i-SDHC B9S**](http://www.nds-card.net/ProShow.asp?ProID=574) | $15.99 | September 3, 2019 | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot**; can be flashed back to an NDS flashcart. |
| [**R4i Gold 3DS Plus**](http://www.nds-card.net/ProShow.asp?ProID=575) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot** ([internal switch to switch between ntrboot and NDS modes]({{ "/images/screenshots/r4i-gold-3ds-plus.png" | absolute_url }})); do not manually flash with ntrboot. |
| [**Acekard 2i**](http://www.nds-card.net/ProShow.asp?ProID=160) | $20.99 | No | <= 4.3.0 | <= 1.4.4 | |
| [**DSTT**](http://www.nds-card.net/ProShow.asp?ProID=157) | $9.99 | No | None | None | Only models with [certain flash chips](https://gist.github.com/yuukieve/6b48f1bb8dd15136403c15c39fafdb42) are compatible with ntrboot. |
| [**R4i Gold 3DS**](http://www.nds-card.net/ProShow.asp?ProID=149) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | All RTS revisions are compatible. |
| [**R4i-SDHC 3DS RTS**](http://www.nds-card.net/ProShow.asp?ProID=146) | $13.99 | 1.87: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | |
| [**R4iSDHC GOLD Pro 20XX**](http://www.nds-card.net/ProShow.asp?ProID=490) | $9.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. 2013 models are incompatible. |
| [**R4iSDHC RTS LITE 20XX**](http://www.nds-card.net/ProShow.asp?ProID=450) | $13.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. 2013 models are incompatible. |
| [**R4i-SDHC B9S**](http://www.nds-card.com/ProShow.asp?ProID=574) | $15.99 | September 3, 2019 | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot**; can be flashed back to an NDS flashcart. |
| [**R4i Gold 3DS Plus**](http://www.nds-card.com/ProShow.asp?ProID=575) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot** ([internal switch to switch between ntrboot and NDS modes]({{ "/images/screenshots/r4i-gold-3ds-plus.png" | absolute_url }})); do not manually flash with ntrboot. |
| [**Acekard 2i**](http://www.nds-card.com/ProShow.asp?ProID=160) | $20.99 | No | <= 4.3.0 | <= 1.4.4 | |
| [**DSTT**](http://www.nds-card.com/ProShow.asp?ProID=157) | $9.99 | No | None | None | Only models with [certain flash chips](https://gist.github.com/yuukieve/6b48f1bb8dd15136403c15c39fafdb42) are compatible with ntrboot. |
| [**R4i Gold 3DS**](http://www.nds-card.com/ProShow.asp?ProID=149) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | All RTS revisions are compatible. |
| [**R4i-SDHC 3DS RTS**](http://www.nds-card.com/ProShow.asp?ProID=146) | $13.99 | 1.87: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | |
| [**R4iSDHC GOLD Pro 20XX**](http://www.nds-card.com/ProShow.asp?ProID=490) | $9.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. 2013 models are incompatible. |
| [**R4iSDHC RTS LITE 20XX**](http://www.nds-card.com/ProShow.asp?ProID=450) | $13.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. 2013 models are incompatible. |
| **Ace3DS X** | | No | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot** (external switch to switch between ntrboot ("3DS") and NDS modes); do not manually flash with ntrboot. |
| **Ace3DS Plus** | | No | <= 11.9.0 | <= 1.4.5 | |
| **Gateway Blue** | | No | 4.1.0 - 4.5.0 | <= 1.4.5 | |
@ -49,7 +49,7 @@ To test if a magnet will work, hold it on or around the (A)(B)(X)(Y) buttons whi
Note that the flashcart will not be able to be used for its standard functions while the ntrboot exploit is installed on it (except for in the case of the Acekard 2i, which remains functional *on NDS and custom firmware 3DS systems only*). This means that, for most flashcarts, it will not even display on the home menu. There are optional steps at the end of the ntrboot flashing instructions to remove it from your flashcart when you are done.
Note that in some rare circumstances, it may be possible for the flashing process to **brick** a counterfeit flashcart and render it permanently unusable. This is unlikely, but nevertheless only original listed flashcarts are supported. To reduce the chance of receiving a counterfeit card, it is recommended that you use a reputable site to buy your flashcart (such as [NDS Card](http://www.nds-card.net/))
Note that in some rare circumstances, it may be possible for the flashing process to **brick** a counterfeit flashcart and render it permanently unusable. This is unlikely, but nevertheless only original listed flashcarts are supported. To reduce the chance of receiving a counterfeit card, it is recommended that you use a reputable site to buy your flashcart (such as [NDS Card](http://www.nds-card.com/))
{: .notice--danger}
___

View file

@ -63,9 +63,7 @@ There are two different methods for building on the Seedminer exploit (described
1. Open [Bruteforce Movable](https://bruteforcemovable.com/) on your computer
+ This site can automate the retrieval of `movable_part1.sed` (using a bot 3DS console) and the breaking of your device's DSiWare encryption (using a volunteer's computer to run Seedminer)
+ If you already have access to a 3DS capable of launching the Homebrew Launcher, you can manually retrieve your `movable_part1.sed` using that device by following [these](https://jisagi.github.io/SeedminerGuide/seedminerSelf/#section1) instructions
+ If you already have access to a PC with a powerful graphics card, you can manually calculate your `movable.sed` using it by following [these](https://jisagi.github.io/SeedminerGuide/seedminerSelf/#section2) instructions
+ If the automated service is nonfunctional and you cannot do one or both of those manually, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you
+ If the automated service is nonfunctional, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you
1. Enter your device's Friend Code (with no spaces or dashes) into the "Your friend code" field
1. Paste your device's 32 character long folder name into the "Your ID0" field
1. Complete the "I'm not a robot" captcha
@ -74,11 +72,11 @@ There are two different methods for building on the Seedminer exploit (described
1. When prompted, use the "Register Friend" button on your device to add the friend code of the bot 3DS console
1. Wait for the site to update
+ If it does not, wait a few minutes before refreshing the page once
1. Select "Continue"
1. Wait for the process to complete
+ This can take a while (up to an hour in some cases)
+ During this process, the bot may not show up on your 3ds. As long as the website updates, this is not an issue.
+ If you are still waiting after an hour, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you
1. Once the site processes your information, you will be given the option to "Continue" or "Do another device". Click the green "Continue" button
1. Wait for the remainder of the process to complete
+ This is usually fast (1-5 minutes) but in some cases, can take up to half an hour.
+ During this process, the bot you added may not show up on your 3ds. As long as the website updates, this is not an issue.
+ If you are still waiting after half an hour, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you
1. When the process has completed, download your `movable.sed` file from the site
+ Keep this file as you will need it in the upcoming pages
@ -102,7 +100,7 @@ ___
#### Seedminer + Steelhax + Frogtool
This method of using Seedminer for further exploitation uses your `movable.sed` file to gain access to the Homebrew Launcher using the Steelhax exploit for the purposes of injecting an exploitable DSiWare title into the DS Download Play application. This method requires you to already own (or download) the free "Steel Divers: Sub Wars" game from the eShop.
This method of using Seedminer for further exploitation uses your `movable.sed` file to gain access to the Homebrew Launcher using the Steelhax exploit for the purposes of injecting an exploitable DSiWare title into the DS Download Play application. This method requires you to already own (or download) the free "Steel Diver: Sub Wars" game from the eShop.
This method is only compatible with the EUR, JPN, and USA regions, and is somewhat more complicated than the above method. It is only recommended to use this method if you have a EUR region device and do not wish to pay for a DSiWare game, or if the above method does not work for you for some reason.

View file

@ -11,7 +11,7 @@ This will completely remove CFW from your device, including Boot9Strap and Luma3
This is almost never the solution to fix any issues you encounter with your CFW installation. A better idea would be to read the [troubleshooting](troubleshooting) page or ask (in English) for help at [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp).
{: .notice--danger}
Any unsigned (illegitimate) games will be rendered unusable and can be manually removed using the Data Management section of the System Settings. Use a [save manager](https://github.com/FlagBrew/Checkpoint/releases/latest) to backup any saves for these unsigned (illegitimate) games you care about.
Any unsigned (illegitimate) games will be rendered unusable and should be manually removed before starting this process by using the Data Management section of the System Settings. Use a [save manager](https://github.com/FlagBrew/Checkpoint/releases/latest) to backup any saves for these unsigned (illegitimate) games you care about.
This will not affect your NNID, any legitimately purchased games, or any saves for those legitimately purchased games.
@ -26,21 +26,43 @@ Note that if you have any payload files other than `GodMode9.firm` in the `/luma
### Instructions
#### Section I - Prep Work
#### Section I - Safety Test
1. Power off your device
1. Insert your SD card into your computer
1. Copy `GodMode9.firm` from the GodMode9 `.zip` to the `/luma/payloads/` folder on your SD card
1. Copy the `gm9` folder from the GodMode9 `.zip` to the root of your SD card
1. Reinsert your SD card into your device
1. Power on your device
#### Section II - Running Uninstall Script
1. Launch GodMode9 by holding (Start) during boot
1. If you are prompted to create an essential files backup, press (A) to do so, then press (A) to continue once it has completed
1. If you are prompted to fix the RTC date&time, press (A) to do so, then set the date and time, then press (A) to continue
+ Note that, if you had to fix the RTC date and time, you will have to fix the time in the System Settings as well after this guide
1. Navigate to `[1:] SYSNAND CTRNAND > title > 00040138 > (X)0000002 > content`
+ On a "New" edition console, the (X) will instead be 2
+ On an "Old" edition console, the (X) will instead be 0
1. Select the `.app` file
1. Select `NCCH Image Options`
1. Select `Mount image to drive`
1. In the window that appears, open the `exefs` folder
1. In this folder, select the `.firm` file
1. Select "Firm Options"
1. Select "Boot Firm"
1. When prompted, choose to decrypt and make a copy
1. You should boot into the regular 3DS Home Menu. If you do, power your device off and continue to the next section
+ If you do NOT boot into the regular 3DS Home Menu, continuing with these instructions **WILL** brick your device. You should join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you
#### Section II - Prep Work
1. Power on your device
1. Navigate to System Settings > Data Management > Nintendo 3DS > Software
1. In this list of software, delete any non-Nintendo content you installed while using CFW
+ This includes common system software such as FBI, Anemone3DS, Luma Updater, Homebrew Launcher, Checkpoint, and others, along with any non-eShop games
+ Failure to remove CFW software before uninstalling CFW may break access to the Data Management menu after uninstalling CFW
1. Power off your device
#### Section III - Running Uninstall Script
1. Launch GodMode9 by holding (Start) during boot
1. Press (Home) to bring up the action menu
1. Select "Scripts..."
1. Select "GM9Megascript"

View file

@ -18,6 +18,8 @@ During this process, we also setup programs such as the following:
+ **Luma3DS Updater** *(updates your CFW installation easily)*
+ **GodMode9** *(multipurpose tool which can do NAND and cartridge functions)*
+ **Homebrew Launcher Loader** *(launches the Homebrew Launcher)*
+ **DSP1** *(allows homebrew applications to have sound)*
+ **ctr-no-timeoffset** *(removes the rtc offset so that the home menu and rtc timestamps match)*
### What You Need
@ -143,7 +145,7 @@ If, before following this guide, you already had an EmuNAND setup and would like
1. Press (B) to return to the main menu
1. Hold (R) and press (B) at the same time to eject your SD card
1. Insert your SD card into your computer
1. Copy `<date>_<serialnumber>_sysnand_###.bin`, `essential.exefs`, and `boot9.bin` from the `/gm9/out/` folder on your SD card to a safe location on your computer
1. Copy `<date>_<serialnumber>_sysnand_###.bin`, `<date>_<serialnumber>_sysnand_###.bin.sha`, `essential.exefs`, and `boot9.bin` from the `/gm9/out/` folder on your SD card to a safe location on your computer
+ Make backups in multiple locations (such as online file storage)
+ These backups will save you from a brick and/or help you recover files from the NAND image if anything goes wrong in the future
1. Delete `<date>_<serialnumber>_sysnand_###.bin` and `<date>_<serialnumber>_sysnand_###.bin.sha` from the `/gm9/out/` folder on your SD card after copying it

View file

@ -8,7 +8,7 @@ title: "Homebrew Launcher (Steelhax)"
This method of using Seedminer for further exploitation uses your `movable.sed` file to gain access to the Homebrew Launcher using the Steelhax exploit for the purposes of injecting an exploitable DSiWare title into the DS Download Play application. This method requires you to already own (or download) the free "Steel Divers: Sub Wars" game from the eShop.
If your device already has access to the Homebrew Launcher (whether through Steelhax or another exploit), you can skip to [Installing Boot9strap (Frogminer)](installing-boot9strap-(frogminer)).
If your device already has access to the Homebrew Launcher (whether through Steelhax or another exploit), you can skip to [Installing Boot9strap (Frogtool)](installing-boot9strap-(frogtool)).
{: .notice--success}
If you already have Steel Diver: Sub Wars, this process will overwrite your game's save file!
@ -17,6 +17,7 @@ If you already have Steel Diver: Sub Wars, this process will overwrite your game
### What You Need
* The free eShop game "Steel Diver: Sub Wars"
* Your `movable.sed` file from completing [Seedminer](seedminer)
* The latest release of [the Homebrew Launcher](https://github.com/fincs/new-hbmenu/releases/latest)
* The latest release of [Steelhax](https://github.com/VegaRoXas/vegaroxas.github.io/raw/master/files/steelhax-installer.rar)
* The [otherapp payload](https://smealum.github.io/3ds/#otherapp) *(for your region and version)*
@ -39,7 +40,7 @@ If you already have Steel Diver: Sub Wars, this process will overwrite your game
1. Exit "Steel Diver: Sub Wars"
1. Power off your device
1. Insert your SD card into your computer
1. Open [the Steelminer Injector website](http://steelminer.jisagi.net/injector) on your computer
1. Open [the Steelminer Injector website](https://bruteforcemovable.com/steelhax/) on your computer
1. Select your `movable.sed` file
1. Select "Start!"
1. Wait for the process to complete

View file

@ -10,8 +10,6 @@ This method of using Seedminer for further exploitation uses your `movable.sed`
This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws).
To use the [magnet](https://wikipedia.org/wiki/Magnet_URI_scheme) links on this page, you will need a torrent client like [Deluge](http://dev.deluge-torrent.org/wiki/Download).
To extract the `.7z` and `.rar` files linked on this page, you will need a file archiver like [7-Zip](http://www.7-zip.org/) or [The Unarchiver](https://theunarchiver.com/).
### What You Need

View file

@ -17,14 +17,14 @@ Note that carts with a "Time Bomb" will no longer be able to launch `.nds` files
| Flashcart Name | Current Price | "Time Bomb"? | 3DS Versions? | DSi Versions? | Other Notes |
|-|-:|:-:|:-:|:-:|-|
| [**R4i-SDHC B9S**](http://www.nds-card.net/ProShow.asp?ProID=574) | $15.99 | September 3, 2019 | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot**; can be flashed back to an NDS flashcart. |
| [**R4i Gold 3DS Plus**](http://www.nds-card.net/ProShow.asp?ProID=575) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot** ([internal switch to switch between ntrboot and NDS modes]({{ "/images/screenshots/r4i-gold-3ds-plus.png" | absolute_url }})); do not manually flash with ntrboot. |
| [**Acekard 2i**](http://www.nds-card.net/ProShow.asp?ProID=160) | $20.99 | No | <= 4.3.0 | <= 1.4.4 | |
| [**DSTT**](http://www.nds-card.net/ProShow.asp?ProID=157) | $9.99 | No | None | None | Only models with [certain flash chips](https://gist.github.com/yuukieve/6b48f1bb8dd15136403c15c39fafdb42) are compatible with ntrboot. |
| [**R4i Gold 3DS**](http://www.nds-card.net/ProShow.asp?ProID=149) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | All RTS revisions are compatible. |
| [**R4i-SDHC 3DS RTS**](http://www.nds-card.net/ProShow.asp?ProID=146) | $13.99 | 1.87: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | |
| [**R4iSDHC GOLD Pro 20XX**](http://www.nds-card.net/ProShow.asp?ProID=490) | $9.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. 2013 models are incompatible. |
| [**R4iSDHC RTS LITE 20XX**](http://www.nds-card.net/ProShow.asp?ProID=450) | $13.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. 2013 models are incompatible. |
| [**R4i-SDHC B9S**](http://www.nds-card.com/ProShow.asp?ProID=574) | $15.99 | September 3, 2019 | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot**; can be flashed back to an NDS flashcart. |
| [**R4i Gold 3DS Plus**](http://www.nds-card.com/ProShow.asp?ProID=575) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot** ([internal switch to switch between ntrboot and NDS modes]({{ "/images/screenshots/r4i-gold-3ds-plus.png" | absolute_url }})); do not manually flash with ntrboot. |
| [**Acekard 2i**](http://www.nds-card.com/ProShow.asp?ProID=160) | $20.99 | No | <= 4.3.0 | <= 1.4.4 | |
| [**DSTT**](http://www.nds-card.com/ProShow.asp?ProID=157) | $9.99 | No | None | None | Only models with [certain flash chips](https://gist.github.com/yuukieve/6b48f1bb8dd15136403c15c39fafdb42) are compatible with ntrboot. |
| [**R4i Gold 3DS**](http://www.nds-card.com/ProShow.asp?ProID=149) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | All RTS revisions are compatible. |
| [**R4i-SDHC 3DS RTS**](http://www.nds-card.com/ProShow.asp?ProID=146) | $13.99 | 1.87: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | |
| [**R4iSDHC GOLD Pro 20XX**](http://www.nds-card.com/ProShow.asp?ProID=490) | $9.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. 2013 models are incompatible. |
| [**R4iSDHC RTS LITE 20XX**](http://www.nds-card.com/ProShow.asp?ProID=450) | $13.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. 2013 models are incompatible. |
| **Ace3DS X** | | No | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot** (external switch to switch between ntrboot ("3DS") and NDS modes); do not manually flash with ntrboot. |
| **Ace3DS Plus** | | No | <= 11.9.0 | <= 1.4.5 | |
| **Gateway Blue** | | No | 4.1.0 - 4.5.0 | <= 1.4.5 | |
@ -49,7 +49,7 @@ To test if a magnet will work, hold it on or around the (A)(B)(X)(Y) buttons whi
Note that the flashcart will not be able to be used for its standard functions while the ntrboot exploit is installed on it (except for in the case of the Acekard 2i, which remains functional *on NDS and custom firmware 3DS systems only*). This means that, for most flashcarts, it will not even display on the home menu. There are optional steps at the end of the ntrboot flashing instructions to remove it from your flashcart when you are done.
Note that in some rare circumstances, it may be possible for the flashing process to **brick** a counterfeit flashcart and render it permanently unusable. This is unlikely, but nevertheless only original listed flashcarts are supported. To reduce the chance of receiving a counterfeit card, it is recommended that you use a reputable site to buy your flashcart (such as [NDS Card](http://www.nds-card.net/))
Note that in some rare circumstances, it may be possible for the flashing process to **brick** a counterfeit flashcart and render it permanently unusable. This is unlikely, but nevertheless only original listed flashcarts are supported. To reduce the chance of receiving a counterfeit card, it is recommended that you use a reputable site to buy your flashcart (such as [NDS Card](http://www.nds-card.com/))
{: .notice--danger}
___

View file

@ -63,9 +63,7 @@ There are two different methods for building on the Seedminer exploit (described
1. Open [Bruteforce Movable](https://bruteforcemovable.com/) on your computer
+ This site can automate the retrieval of `movable_part1.sed` (using a bot 3DS console) and the breaking of your device's DSiWare encryption (using a volunteer's computer to run Seedminer)
+ If you already have access to a 3DS capable of launching the Homebrew Launcher, you can manually retrieve your `movable_part1.sed` using that device by following [these](https://jisagi.github.io/SeedminerGuide/seedminerSelf/#section1) instructions
+ If you already have access to a PC with a powerful graphics card, you can manually calculate your `movable.sed` using it by following [these](https://jisagi.github.io/SeedminerGuide/seedminerSelf/#section2) instructions
+ If the automated service is nonfunctional and you cannot do one or both of those manually, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you
+ If the automated service is nonfunctional, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you
1. Enter your device's Friend Code (with no spaces or dashes) into the "Your friend code" field
1. Paste your device's 32 character long folder name into the "Your ID0" field
1. Complete the "I'm not a robot" captcha
@ -74,11 +72,11 @@ There are two different methods for building on the Seedminer exploit (described
1. When prompted, use the "Register Friend" button on your device to add the friend code of the bot 3DS console
1. Wait for the site to update
+ If it does not, wait a few minutes before refreshing the page once
1. Select "Continue"
1. Wait for the process to complete
+ This can take a while (up to an hour in some cases)
+ During this process, the bot may not show up on your 3ds. As long as the website updates, this is not an issue.
+ If you are still waiting after an hour, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you
1. Once the site processes your information, you will be given the option to "Continue" or "Do another device". Click the green "Continue" button
1. Wait for the remainder of the process to complete
+ This is usually fast (1-5 minutes) but in some cases, can take up to half an hour.
+ During this process, the bot you added may not show up on your 3ds. As long as the website updates, this is not an issue.
+ If you are still waiting after half an hour, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you
1. When the process has completed, download your `movable.sed` file from the site
+ Keep this file as you will need it in the upcoming pages
@ -102,7 +100,7 @@ ___
#### Seedminer + Steelhax + Frogtool
This method of using Seedminer for further exploitation uses your `movable.sed` file to gain access to the Homebrew Launcher using the Steelhax exploit for the purposes of injecting an exploitable DSiWare title into the DS Download Play application. This method requires you to already own (or download) the free "Steel Divers: Sub Wars" game from the eShop.
This method of using Seedminer for further exploitation uses your `movable.sed` file to gain access to the Homebrew Launcher using the Steelhax exploit for the purposes of injecting an exploitable DSiWare title into the DS Download Play application. This method requires you to already own (or download) the free "Steel Diver: Sub Wars" game from the eShop.
This method is only compatible with the EUR, JPN, and USA regions, and is somewhat more complicated than the above method. It is only recommended to use this method if you have a EUR region device and do not wish to pay for a DSiWare game, or if the above method does not work for you for some reason.

View file

@ -11,7 +11,7 @@ This will completely remove CFW from your device, including Boot9Strap and Luma3
This is almost never the solution to fix any issues you encounter with your CFW installation. A better idea would be to read the [troubleshooting](troubleshooting) page or ask (in English) for help at [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp).
{: .notice--danger}
Any unsigned (illegitimate) games will be rendered unusable and can be manually removed using the Data Management section of the System Settings. Use a [save manager](https://github.com/FlagBrew/Checkpoint/releases/latest) to backup any saves for these unsigned (illegitimate) games you care about.
Any unsigned (illegitimate) games will be rendered unusable and should be manually removed before starting this process by using the Data Management section of the System Settings. Use a [save manager](https://github.com/FlagBrew/Checkpoint/releases/latest) to backup any saves for these unsigned (illegitimate) games you care about.
This will not affect your NNID, any legitimately purchased games, or any saves for those legitimately purchased games.
@ -26,21 +26,43 @@ Note that if you have any payload files other than `GodMode9.firm` in the `/luma
### Instructions
#### Section I - Prep Work
#### Section I - Safety Test
1. Power off your device
1. Insert your SD card into your computer
1. Copy `GodMode9.firm` from the GodMode9 `.zip` to the `/luma/payloads/` folder on your SD card
1. Copy the `gm9` folder from the GodMode9 `.zip` to the root of your SD card
1. Reinsert your SD card into your device
1. Power on your device
#### Section II - Running Uninstall Script
1. Launch GodMode9 by holding (Start) during boot
1. If you are prompted to create an essential files backup, press (A) to do so, then press (A) to continue once it has completed
1. If you are prompted to fix the RTC date&time, press (A) to do so, then set the date and time, then press (A) to continue
+ Note that, if you had to fix the RTC date and time, you will have to fix the time in the System Settings as well after this guide
1. Navigate to `[1:] SYSNAND CTRNAND > title > 00040138 > (X)0000002 > content`
+ On a "New" edition console, the (X) will instead be 2
+ On an "Old" edition console, the (X) will instead be 0
1. Select the `.app` file
1. Select `NCCH Image Options`
1. Select `Mount image to drive`
1. In the window that appears, open the `exefs` folder
1. In this folder, select the `.firm` file
1. Select "Firm Options"
1. Select "Boot Firm"
1. When prompted, choose to decrypt and make a copy
1. You should boot into the regular 3DS Home Menu. If you do, power your device off and continue to the next section
+ If you do NOT boot into the regular 3DS Home Menu, continuing with these instructions **WILL** brick your device. You should join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you
#### Section II - Prep Work
1. Power on your device
1. Navigate to System Settings > Data Management > Nintendo 3DS > Software
1. In this list of software, delete any non-Nintendo content you installed while using CFW
+ This includes common system software such as FBI, Anemone3DS, Luma Updater, Homebrew Launcher, Checkpoint, and others, along with any non-eShop games
+ Failure to remove CFW software before uninstalling CFW may break access to the Data Management menu after uninstalling CFW
1. Power off your device
#### Section III - Running Uninstall Script
1. Launch GodMode9 by holding (Start) during boot
1. Press (Home) to bring up the action menu
1. Select "Scripts..."
1. Select "GM9Megascript"

View file

@ -18,6 +18,8 @@ During this process, we also setup programs such as the following:
+ **Luma3DS Updater** *(updates your CFW installation easily)*
+ **GodMode9** *(multipurpose tool which can do NAND and cartridge functions)*
+ **Homebrew Launcher Loader** *(launches the Homebrew Launcher)*
+ **DSP1** *(allows homebrew applications to have sound)*
+ **ctr-no-timeoffset** *(removes the rtc offset so that the home menu and rtc timestamps match)*
### What You Need
@ -143,7 +145,7 @@ If, before following this guide, you already had an EmuNAND setup and would like
1. Press (B) to return to the main menu
1. Hold (R) and press (B) at the same time to eject your SD card
1. Insert your SD card into your computer
1. Copy `<date>_<serialnumber>_sysnand_###.bin`, `essential.exefs`, and `boot9.bin` from the `/gm9/out/` folder on your SD card to a safe location on your computer
1. Copy `<date>_<serialnumber>_sysnand_###.bin`, `<date>_<serialnumber>_sysnand_###.bin.sha`, `essential.exefs`, and `boot9.bin` from the `/gm9/out/` folder on your SD card to a safe location on your computer
+ Make backups in multiple locations (such as online file storage)
+ These backups will save you from a brick and/or help you recover files from the NAND image if anything goes wrong in the future
1. Delete `<date>_<serialnumber>_sysnand_###.bin` and `<date>_<serialnumber>_sysnand_###.bin.sha` from the `/gm9/out/` folder on your SD card after copying it

View file

@ -8,7 +8,7 @@ title: "Homebrew Launcher (Steelhax)"
This method of using Seedminer for further exploitation uses your `movable.sed` file to gain access to the Homebrew Launcher using the Steelhax exploit for the purposes of injecting an exploitable DSiWare title into the DS Download Play application. This method requires you to already own (or download) the free "Steel Divers: Sub Wars" game from the eShop.
If your device already has access to the Homebrew Launcher (whether through Steelhax or another exploit), you can skip to [Installing Boot9strap (Frogminer)](installing-boot9strap-(frogminer)).
If your device already has access to the Homebrew Launcher (whether through Steelhax or another exploit), you can skip to [Installing Boot9strap (Frogtool)](installing-boot9strap-(frogtool)).
{: .notice--success}
If you already have Steel Diver: Sub Wars, this process will overwrite your game's save file!
@ -17,6 +17,7 @@ If you already have Steel Diver: Sub Wars, this process will overwrite your game
### What You Need
* The free eShop game "Steel Diver: Sub Wars"
* Your `movable.sed` file from completing [Seedminer](seedminer)
* The latest release of [the Homebrew Launcher](https://github.com/fincs/new-hbmenu/releases/latest)
* The latest release of [Steelhax](https://github.com/VegaRoXas/vegaroxas.github.io/raw/master/files/steelhax-installer.rar)
* The [otherapp payload](https://smealum.github.io/3ds/#otherapp) *(for your region and version)*
@ -39,7 +40,7 @@ If you already have Steel Diver: Sub Wars, this process will overwrite your game
1. Exit "Steel Diver: Sub Wars"
1. Power off your device
1. Insert your SD card into your computer
1. Open [the Steelminer Injector website](http://steelminer.jisagi.net/injector) on your computer
1. Open [the Steelminer Injector website](https://bruteforcemovable.com/steelhax/) on your computer
1. Select your `movable.sed` file
1. Select "Start!"
1. Wait for the process to complete

View file

@ -10,8 +10,6 @@ This method of using Seedminer for further exploitation uses your `movable.sed`
This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws).
To use the [magnet](https://wikipedia.org/wiki/Magnet_URI_scheme) links on this page, you will need a torrent client like [Deluge](http://dev.deluge-torrent.org/wiki/Download).
To extract the `.7z` and `.rar` files linked on this page, you will need a file archiver like [7-Zip](http://www.7-zip.org/) or [The Unarchiver](https://theunarchiver.com/).
### What You Need

View file

@ -17,14 +17,14 @@ Note that carts with a "Time Bomb" will no longer be able to launch `.nds` files
| Flashcart Name | Current Price | "Time Bomb"? | 3DS Versions? | DSi Versions? | Other Notes |
|-|-:|:-:|:-:|:-:|-|
| [**R4i-SDHC B9S**](http://www.nds-card.net/ProShow.asp?ProID=574) | $15.99 | September 3, 2019 | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot**; can be flashed back to an NDS flashcart. |
| [**R4i Gold 3DS Plus**](http://www.nds-card.net/ProShow.asp?ProID=575) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot** ([internal switch to switch between ntrboot and NDS modes]({{ "/images/screenshots/r4i-gold-3ds-plus.png" | absolute_url }})); do not manually flash with ntrboot. |
| [**Acekard 2i**](http://www.nds-card.net/ProShow.asp?ProID=160) | $20.99 | No | <= 4.3.0 | <= 1.4.4 | |
| [**DSTT**](http://www.nds-card.net/ProShow.asp?ProID=157) | $9.99 | No | None | None | Only models with [certain flash chips](https://gist.github.com/yuukieve/6b48f1bb8dd15136403c15c39fafdb42) are compatible with ntrboot. |
| [**R4i Gold 3DS**](http://www.nds-card.net/ProShow.asp?ProID=149) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | All RTS revisions are compatible. |
| [**R4i-SDHC 3DS RTS**](http://www.nds-card.net/ProShow.asp?ProID=146) | $13.99 | 1.87: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | |
| [**R4iSDHC GOLD Pro 20XX**](http://www.nds-card.net/ProShow.asp?ProID=490) | $9.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. 2013 models are incompatible. |
| [**R4iSDHC RTS LITE 20XX**](http://www.nds-card.net/ProShow.asp?ProID=450) | $13.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. 2013 models are incompatible. |
| [**R4i-SDHC B9S**](http://www.nds-card.com/ProShow.asp?ProID=574) | $15.99 | September 3, 2019 | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot**; can be flashed back to an NDS flashcart. |
| [**R4i Gold 3DS Plus**](http://www.nds-card.com/ProShow.asp?ProID=575) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot** ([internal switch to switch between ntrboot and NDS modes]({{ "/images/screenshots/r4i-gold-3ds-plus.png" | absolute_url }})); do not manually flash with ntrboot. |
| [**Acekard 2i**](http://www.nds-card.com/ProShow.asp?ProID=160) | $20.99 | No | <= 4.3.0 | <= 1.4.4 | |
| [**DSTT**](http://www.nds-card.com/ProShow.asp?ProID=157) | $9.99 | No | None | None | Only models with [certain flash chips](https://gist.github.com/yuukieve/6b48f1bb8dd15136403c15c39fafdb42) are compatible with ntrboot. |
| [**R4i Gold 3DS**](http://www.nds-card.com/ProShow.asp?ProID=149) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | All RTS revisions are compatible. |
| [**R4i-SDHC 3DS RTS**](http://www.nds-card.com/ProShow.asp?ProID=146) | $13.99 | 1.87: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | |
| [**R4iSDHC GOLD Pro 20XX**](http://www.nds-card.com/ProShow.asp?ProID=490) | $9.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. 2013 models are incompatible. |
| [**R4iSDHC RTS LITE 20XX**](http://www.nds-card.com/ProShow.asp?ProID=450) | $13.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. 2013 models are incompatible. |
| **Ace3DS X** | | No | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot** (external switch to switch between ntrboot ("3DS") and NDS modes); do not manually flash with ntrboot. |
| **Ace3DS Plus** | | No | <= 11.9.0 | <= 1.4.5 | |
| **Gateway Blue** | | No | 4.1.0 - 4.5.0 | <= 1.4.5 | |
@ -49,7 +49,7 @@ To test if a magnet will work, hold it on or around the (A)(B)(X)(Y) buttons whi
Note that the flashcart will not be able to be used for its standard functions while the ntrboot exploit is installed on it (except for in the case of the Acekard 2i, which remains functional *on NDS and custom firmware 3DS systems only*). This means that, for most flashcarts, it will not even display on the home menu. There are optional steps at the end of the ntrboot flashing instructions to remove it from your flashcart when you are done.
Note that in some rare circumstances, it may be possible for the flashing process to **brick** a counterfeit flashcart and render it permanently unusable. This is unlikely, but nevertheless only original listed flashcarts are supported. To reduce the chance of receiving a counterfeit card, it is recommended that you use a reputable site to buy your flashcart (such as [NDS Card](http://www.nds-card.net/))
Note that in some rare circumstances, it may be possible for the flashing process to **brick** a counterfeit flashcart and render it permanently unusable. This is unlikely, but nevertheless only original listed flashcarts are supported. To reduce the chance of receiving a counterfeit card, it is recommended that you use a reputable site to buy your flashcart (such as [NDS Card](http://www.nds-card.com/))
{: .notice--danger}
___

View file

@ -63,9 +63,7 @@ There are two different methods for building on the Seedminer exploit (described
1. Open [Bruteforce Movable](https://bruteforcemovable.com/) on your computer
+ This site can automate the retrieval of `movable_part1.sed` (using a bot 3DS console) and the breaking of your device's DSiWare encryption (using a volunteer's computer to run Seedminer)
+ If you already have access to a 3DS capable of launching the Homebrew Launcher, you can manually retrieve your `movable_part1.sed` using that device by following [these](https://jisagi.github.io/SeedminerGuide/seedminerSelf/#section1) instructions
+ If you already have access to a PC with a powerful graphics card, you can manually calculate your `movable.sed` using it by following [these](https://jisagi.github.io/SeedminerGuide/seedminerSelf/#section2) instructions
+ If the automated service is nonfunctional and you cannot do one or both of those manually, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you
+ If the automated service is nonfunctional, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you
1. Enter your device's Friend Code (with no spaces or dashes) into the "Your friend code" field
1. Paste your device's 32 character long folder name into the "Your ID0" field
1. Complete the "I'm not a robot" captcha
@ -74,11 +72,11 @@ There are two different methods for building on the Seedminer exploit (described
1. When prompted, use the "Register Friend" button on your device to add the friend code of the bot 3DS console
1. Wait for the site to update
+ If it does not, wait a few minutes before refreshing the page once
1. Select "Continue"
1. Wait for the process to complete
+ This can take a while (up to an hour in some cases)
+ During this process, the bot may not show up on your 3ds. As long as the website updates, this is not an issue.
+ If you are still waiting after an hour, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you
1. Once the site processes your information, you will be given the option to "Continue" or "Do another device". Click the green "Continue" button
1. Wait for the remainder of the process to complete
+ This is usually fast (1-5 minutes) but in some cases, can take up to half an hour.
+ During this process, the bot you added may not show up on your 3ds. As long as the website updates, this is not an issue.
+ If you are still waiting after half an hour, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you
1. When the process has completed, download your `movable.sed` file from the site
+ Keep this file as you will need it in the upcoming pages
@ -102,7 +100,7 @@ ___
#### Seedminer + Steelhax + Frogtool
This method of using Seedminer for further exploitation uses your `movable.sed` file to gain access to the Homebrew Launcher using the Steelhax exploit for the purposes of injecting an exploitable DSiWare title into the DS Download Play application. This method requires you to already own (or download) the free "Steel Divers: Sub Wars" game from the eShop.
This method of using Seedminer for further exploitation uses your `movable.sed` file to gain access to the Homebrew Launcher using the Steelhax exploit for the purposes of injecting an exploitable DSiWare title into the DS Download Play application. This method requires you to already own (or download) the free "Steel Diver: Sub Wars" game from the eShop.
This method is only compatible with the EUR, JPN, and USA regions, and is somewhat more complicated than the above method. It is only recommended to use this method if you have a EUR region device and do not wish to pay for a DSiWare game, or if the above method does not work for you for some reason.

View file

@ -11,7 +11,7 @@ This will completely remove CFW from your device, including Boot9Strap and Luma3
This is almost never the solution to fix any issues you encounter with your CFW installation. A better idea would be to read the [troubleshooting](troubleshooting) page or ask (in English) for help at [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp).
{: .notice--danger}
Any unsigned (illegitimate) games will be rendered unusable and can be manually removed using the Data Management section of the System Settings. Use a [save manager](https://github.com/FlagBrew/Checkpoint/releases/latest) to backup any saves for these unsigned (illegitimate) games you care about.
Any unsigned (illegitimate) games will be rendered unusable and should be manually removed before starting this process by using the Data Management section of the System Settings. Use a [save manager](https://github.com/FlagBrew/Checkpoint/releases/latest) to backup any saves for these unsigned (illegitimate) games you care about.
This will not affect your NNID, any legitimately purchased games, or any saves for those legitimately purchased games.
@ -26,21 +26,43 @@ Note that if you have any payload files other than `GodMode9.firm` in the `/luma
### Instructions
#### Section I - Prep Work
#### Section I - Safety Test
1. Power off your device
1. Insert your SD card into your computer
1. Copy `GodMode9.firm` from the GodMode9 `.zip` to the `/luma/payloads/` folder on your SD card
1. Copy the `gm9` folder from the GodMode9 `.zip` to the root of your SD card
1. Reinsert your SD card into your device
1. Power on your device
#### Section II - Running Uninstall Script
1. Launch GodMode9 by holding (Start) during boot
1. If you are prompted to create an essential files backup, press (A) to do so, then press (A) to continue once it has completed
1. If you are prompted to fix the RTC date&time, press (A) to do so, then set the date and time, then press (A) to continue
+ Note that, if you had to fix the RTC date and time, you will have to fix the time in the System Settings as well after this guide
1. Navigate to `[1:] SYSNAND CTRNAND > title > 00040138 > (X)0000002 > content`
+ On a "New" edition console, the (X) will instead be 2
+ On an "Old" edition console, the (X) will instead be 0
1. Select the `.app` file
1. Select `NCCH Image Options`
1. Select `Mount image to drive`
1. In the window that appears, open the `exefs` folder
1. In this folder, select the `.firm` file
1. Select "Firm Options"
1. Select "Boot Firm"
1. When prompted, choose to decrypt and make a copy
1. You should boot into the regular 3DS Home Menu. If you do, power your device off and continue to the next section
+ If you do NOT boot into the regular 3DS Home Menu, continuing with these instructions **WILL** brick your device. You should join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you
#### Section II - Prep Work
1. Power on your device
1. Navigate to System Settings > Data Management > Nintendo 3DS > Software
1. In this list of software, delete any non-Nintendo content you installed while using CFW
+ This includes common system software such as FBI, Anemone3DS, Luma Updater, Homebrew Launcher, Checkpoint, and others, along with any non-eShop games
+ Failure to remove CFW software before uninstalling CFW may break access to the Data Management menu after uninstalling CFW
1. Power off your device
#### Section III - Running Uninstall Script
1. Launch GodMode9 by holding (Start) during boot
1. Press (Home) to bring up the action menu
1. Select "Scripts..."
1. Select "GM9Megascript"

View file

@ -18,6 +18,8 @@ During this process, we also setup programs such as the following:
+ **Luma3DS Updater** *(updates your CFW installation easily)*
+ **GodMode9** *(multipurpose tool which can do NAND and cartridge functions)*
+ **Homebrew Launcher Loader** *(launches the Homebrew Launcher)*
+ **DSP1** *(allows homebrew applications to have sound)*
+ **ctr-no-timeoffset** *(removes the rtc offset so that the home menu and rtc timestamps match)*
### What You Need
@ -143,7 +145,7 @@ If, before following this guide, you already had an EmuNAND setup and would like
1. Press (B) to return to the main menu
1. Hold (R) and press (B) at the same time to eject your SD card
1. Insert your SD card into your computer
1. Copy `<date>_<serialnumber>_sysnand_###.bin`, `essential.exefs`, and `boot9.bin` from the `/gm9/out/` folder on your SD card to a safe location on your computer
1. Copy `<date>_<serialnumber>_sysnand_###.bin`, `<date>_<serialnumber>_sysnand_###.bin.sha`, `essential.exefs`, and `boot9.bin` from the `/gm9/out/` folder on your SD card to a safe location on your computer
+ Make backups in multiple locations (such as online file storage)
+ These backups will save you from a brick and/or help you recover files from the NAND image if anything goes wrong in the future
1. Delete `<date>_<serialnumber>_sysnand_###.bin` and `<date>_<serialnumber>_sysnand_###.bin.sha` from the `/gm9/out/` folder on your SD card after copying it

View file

@ -8,7 +8,7 @@ title: "Homebrew Launcher (Steelhax)"
This method of using Seedminer for further exploitation uses your `movable.sed` file to gain access to the Homebrew Launcher using the Steelhax exploit for the purposes of injecting an exploitable DSiWare title into the DS Download Play application. This method requires you to already own (or download) the free "Steel Divers: Sub Wars" game from the eShop.
If your device already has access to the Homebrew Launcher (whether through Steelhax or another exploit), you can skip to [Installing Boot9strap (Frogminer)](installing-boot9strap-(frogminer)).
If your device already has access to the Homebrew Launcher (whether through Steelhax or another exploit), you can skip to [Installing Boot9strap (Frogtool)](installing-boot9strap-(frogtool)).
{: .notice--success}
If you already have Steel Diver: Sub Wars, this process will overwrite your game's save file!
@ -17,6 +17,7 @@ If you already have Steel Diver: Sub Wars, this process will overwrite your game
### What You Need
* The free eShop game "Steel Diver: Sub Wars"
* Your `movable.sed` file from completing [Seedminer](seedminer)
* The latest release of [the Homebrew Launcher](https://github.com/fincs/new-hbmenu/releases/latest)
* The latest release of [Steelhax](https://github.com/VegaRoXas/vegaroxas.github.io/raw/master/files/steelhax-installer.rar)
* The [otherapp payload](https://smealum.github.io/3ds/#otherapp) *(for your region and version)*
@ -39,7 +40,7 @@ If you already have Steel Diver: Sub Wars, this process will overwrite your game
1. Exit "Steel Diver: Sub Wars"
1. Power off your device
1. Insert your SD card into your computer
1. Open [the Steelminer Injector website](http://steelminer.jisagi.net/injector) on your computer
1. Open [the Steelminer Injector website](https://bruteforcemovable.com/steelhax/) on your computer
1. Select your `movable.sed` file
1. Select "Start!"
1. Wait for the process to complete

View file

@ -10,8 +10,6 @@ This method of using Seedminer for further exploitation uses your `movable.sed`
This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws).
To use the [magnet](https://wikipedia.org/wiki/Magnet_URI_scheme) links on this page, you will need a torrent client like [Deluge](http://dev.deluge-torrent.org/wiki/Download).
To extract the `.7z` and `.rar` files linked on this page, you will need a file archiver like [7-Zip](http://www.7-zip.org/) or [The Unarchiver](https://theunarchiver.com/).
### What You Need

View file

@ -17,14 +17,14 @@ Note that carts with a "Time Bomb" will no longer be able to launch `.nds` files
| Flashcart Name | Current Price | "Time Bomb"? | 3DS Versions? | DSi Versions? | Other Notes |
|-|-:|:-:|:-:|:-:|-|
| [**R4i-SDHC B9S**](http://www.nds-card.net/ProShow.asp?ProID=574) | $15.99 | September 3, 2019 | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot**; can be flashed back to an NDS flashcart. |
| [**R4i Gold 3DS Plus**](http://www.nds-card.net/ProShow.asp?ProID=575) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot** ([internal switch to switch between ntrboot and NDS modes]({{ "/images/screenshots/r4i-gold-3ds-plus.png" | absolute_url }})); do not manually flash with ntrboot. |
| [**Acekard 2i**](http://www.nds-card.net/ProShow.asp?ProID=160) | $20.99 | No | <= 4.3.0 | <= 1.4.4 | |
| [**DSTT**](http://www.nds-card.net/ProShow.asp?ProID=157) | $9.99 | No | None | None | Only models with [certain flash chips](https://gist.github.com/yuukieve/6b48f1bb8dd15136403c15c39fafdb42) are compatible with ntrboot. |
| [**R4i Gold 3DS**](http://www.nds-card.net/ProShow.asp?ProID=149) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | All RTS revisions are compatible. |
| [**R4i-SDHC 3DS RTS**](http://www.nds-card.net/ProShow.asp?ProID=146) | $13.99 | 1.87: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | |
| [**R4iSDHC GOLD Pro 20XX**](http://www.nds-card.net/ProShow.asp?ProID=490) | $9.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. 2013 models are incompatible. |
| [**R4iSDHC RTS LITE 20XX**](http://www.nds-card.net/ProShow.asp?ProID=450) | $13.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. 2013 models are incompatible. |
| [**R4i-SDHC B9S**](http://www.nds-card.com/ProShow.asp?ProID=574) | $15.99 | September 3, 2019 | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot**; can be flashed back to an NDS flashcart. |
| [**R4i Gold 3DS Plus**](http://www.nds-card.com/ProShow.asp?ProID=575) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot** ([internal switch to switch between ntrboot and NDS modes]({{ "/images/screenshots/r4i-gold-3ds-plus.png" | absolute_url }})); do not manually flash with ntrboot. |
| [**Acekard 2i**](http://www.nds-card.com/ProShow.asp?ProID=160) | $20.99 | No | <= 4.3.0 | <= 1.4.4 | |
| [**DSTT**](http://www.nds-card.com/ProShow.asp?ProID=157) | $9.99 | No | None | None | Only models with [certain flash chips](https://gist.github.com/yuukieve/6b48f1bb8dd15136403c15c39fafdb42) are compatible with ntrboot. |
| [**R4i Gold 3DS**](http://www.nds-card.com/ProShow.asp?ProID=149) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | All RTS revisions are compatible. |
| [**R4i-SDHC 3DS RTS**](http://www.nds-card.com/ProShow.asp?ProID=146) | $13.99 | 1.87: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | |
| [**R4iSDHC GOLD Pro 20XX**](http://www.nds-card.com/ProShow.asp?ProID=490) | $9.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. 2013 models are incompatible. |
| [**R4iSDHC RTS LITE 20XX**](http://www.nds-card.com/ProShow.asp?ProID=450) | $13.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. 2013 models are incompatible. |
| **Ace3DS X** | | No | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot** (external switch to switch between ntrboot ("3DS") and NDS modes); do not manually flash with ntrboot. |
| **Ace3DS Plus** | | No | <= 11.9.0 | <= 1.4.5 | |
| **Gateway Blue** | | No | 4.1.0 - 4.5.0 | <= 1.4.5 | |
@ -49,7 +49,7 @@ To test if a magnet will work, hold it on or around the (A)(B)(X)(Y) buttons whi
Note that the flashcart will not be able to be used for its standard functions while the ntrboot exploit is installed on it (except for in the case of the Acekard 2i, which remains functional *on NDS and custom firmware 3DS systems only*). This means that, for most flashcarts, it will not even display on the home menu. There are optional steps at the end of the ntrboot flashing instructions to remove it from your flashcart when you are done.
Note that in some rare circumstances, it may be possible for the flashing process to **brick** a counterfeit flashcart and render it permanently unusable. This is unlikely, but nevertheless only original listed flashcarts are supported. To reduce the chance of receiving a counterfeit card, it is recommended that you use a reputable site to buy your flashcart (such as [NDS Card](http://www.nds-card.net/))
Note that in some rare circumstances, it may be possible for the flashing process to **brick** a counterfeit flashcart and render it permanently unusable. This is unlikely, but nevertheless only original listed flashcarts are supported. To reduce the chance of receiving a counterfeit card, it is recommended that you use a reputable site to buy your flashcart (such as [NDS Card](http://www.nds-card.com/))
{: .notice--danger}
___

View file

@ -63,9 +63,7 @@ There are two different methods for building on the Seedminer exploit (described
1. Open [Bruteforce Movable](https://bruteforcemovable.com/) on your computer
+ This site can automate the retrieval of `movable_part1.sed` (using a bot 3DS console) and the breaking of your device's DSiWare encryption (using a volunteer's computer to run Seedminer)
+ If you already have access to a 3DS capable of launching the Homebrew Launcher, you can manually retrieve your `movable_part1.sed` using that device by following [these](https://jisagi.github.io/SeedminerGuide/seedminerSelf/#section1) instructions
+ If you already have access to a PC with a powerful graphics card, you can manually calculate your `movable.sed` using it by following [these](https://jisagi.github.io/SeedminerGuide/seedminerSelf/#section2) instructions
+ If the automated service is nonfunctional and you cannot do one or both of those manually, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you
+ If the automated service is nonfunctional, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you
1. Enter your device's Friend Code (with no spaces or dashes) into the "Your friend code" field
1. Paste your device's 32 character long folder name into the "Your ID0" field
1. Complete the "I'm not a robot" captcha
@ -74,11 +72,11 @@ There are two different methods for building on the Seedminer exploit (described
1. When prompted, use the "Register Friend" button on your device to add the friend code of the bot 3DS console
1. Wait for the site to update
+ If it does not, wait a few minutes before refreshing the page once
1. Select "Continue"
1. Wait for the process to complete
+ This can take a while (up to an hour in some cases)
+ During this process, the bot may not show up on your 3ds. As long as the website updates, this is not an issue.
+ If you are still waiting after an hour, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you
1. Once the site processes your information, you will be given the option to "Continue" or "Do another device". Click the green "Continue" button
1. Wait for the remainder of the process to complete
+ This is usually fast (1-5 minutes) but in some cases, can take up to half an hour.
+ During this process, the bot you added may not show up on your 3ds. As long as the website updates, this is not an issue.
+ If you are still waiting after half an hour, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you
1. When the process has completed, download your `movable.sed` file from the site
+ Keep this file as you will need it in the upcoming pages
@ -102,7 +100,7 @@ ___
#### Seedminer + Steelhax + Frogtool
This method of using Seedminer for further exploitation uses your `movable.sed` file to gain access to the Homebrew Launcher using the Steelhax exploit for the purposes of injecting an exploitable DSiWare title into the DS Download Play application. This method requires you to already own (or download) the free "Steel Divers: Sub Wars" game from the eShop.
This method of using Seedminer for further exploitation uses your `movable.sed` file to gain access to the Homebrew Launcher using the Steelhax exploit for the purposes of injecting an exploitable DSiWare title into the DS Download Play application. This method requires you to already own (or download) the free "Steel Diver: Sub Wars" game from the eShop.
This method is only compatible with the EUR, JPN, and USA regions, and is somewhat more complicated than the above method. It is only recommended to use this method if you have a EUR region device and do not wish to pay for a DSiWare game, or if the above method does not work for you for some reason.

View file

@ -11,7 +11,7 @@ This will completely remove CFW from your device, including Boot9Strap and Luma3
This is almost never the solution to fix any issues you encounter with your CFW installation. A better idea would be to read the [troubleshooting](troubleshooting) page or ask (in English) for help at [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp).
{: .notice--danger}
Any unsigned (illegitimate) games will be rendered unusable and can be manually removed using the Data Management section of the System Settings. Use a [save manager](https://github.com/FlagBrew/Checkpoint/releases/latest) to backup any saves for these unsigned (illegitimate) games you care about.
Any unsigned (illegitimate) games will be rendered unusable and should be manually removed before starting this process by using the Data Management section of the System Settings. Use a [save manager](https://github.com/FlagBrew/Checkpoint/releases/latest) to backup any saves for these unsigned (illegitimate) games you care about.
This will not affect your NNID, any legitimately purchased games, or any saves for those legitimately purchased games.
@ -26,21 +26,43 @@ Note that if you have any payload files other than `GodMode9.firm` in the `/luma
### Instructions
#### Section I - Prep Work
#### Section I - Safety Test
1. Power off your device
1. Insert your SD card into your computer
1. Copy `GodMode9.firm` from the GodMode9 `.zip` to the `/luma/payloads/` folder on your SD card
1. Copy the `gm9` folder from the GodMode9 `.zip` to the root of your SD card
1. Reinsert your SD card into your device
1. Power on your device
#### Section II - Running Uninstall Script
1. Launch GodMode9 by holding (Start) during boot
1. If you are prompted to create an essential files backup, press (A) to do so, then press (A) to continue once it has completed
1. If you are prompted to fix the RTC date&time, press (A) to do so, then set the date and time, then press (A) to continue
+ Note that, if you had to fix the RTC date and time, you will have to fix the time in the System Settings as well after this guide
1. Navigate to `[1:] SYSNAND CTRNAND > title > 00040138 > (X)0000002 > content`
+ On a "New" edition console, the (X) will instead be 2
+ On an "Old" edition console, the (X) will instead be 0
1. Select the `.app` file
1. Select `NCCH Image Options`
1. Select `Mount image to drive`
1. In the window that appears, open the `exefs` folder
1. In this folder, select the `.firm` file
1. Select "Firm Options"
1. Select "Boot Firm"
1. When prompted, choose to decrypt and make a copy
1. You should boot into the regular 3DS Home Menu. If you do, power your device off and continue to the next section
+ If you do NOT boot into the regular 3DS Home Menu, continuing with these instructions **WILL** brick your device. You should join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you
#### Section II - Prep Work
1. Power on your device
1. Navigate to System Settings > Data Management > Nintendo 3DS > Software
1. In this list of software, delete any non-Nintendo content you installed while using CFW
+ This includes common system software such as FBI, Anemone3DS, Luma Updater, Homebrew Launcher, Checkpoint, and others, along with any non-eShop games
+ Failure to remove CFW software before uninstalling CFW may break access to the Data Management menu after uninstalling CFW
1. Power off your device
#### Section III - Running Uninstall Script
1. Launch GodMode9 by holding (Start) during boot
1. Press (Home) to bring up the action menu
1. Select "Scripts..."
1. Select "GM9Megascript"

View file

@ -18,6 +18,8 @@ During this process, we also setup programs such as the following:
+ **Luma3DS Updater** *(updates your CFW installation easily)*
+ **GodMode9** *(multipurpose tool which can do NAND and cartridge functions)*
+ **Homebrew Launcher Loader** *(launches the Homebrew Launcher)*
+ **DSP1** *(allows homebrew applications to have sound)*
+ **ctr-no-timeoffset** *(removes the rtc offset so that the home menu and rtc timestamps match)*
### What You Need
@ -143,7 +145,7 @@ If, before following this guide, you already had an EmuNAND setup and would like
1. Press (B) to return to the main menu
1. Hold (R) and press (B) at the same time to eject your SD card
1. Insert your SD card into your computer
1. Copy `<date>_<serialnumber>_sysnand_###.bin`, `essential.exefs`, and `boot9.bin` from the `/gm9/out/` folder on your SD card to a safe location on your computer
1. Copy `<date>_<serialnumber>_sysnand_###.bin`, `<date>_<serialnumber>_sysnand_###.bin.sha`, `essential.exefs`, and `boot9.bin` from the `/gm9/out/` folder on your SD card to a safe location on your computer
+ Make backups in multiple locations (such as online file storage)
+ These backups will save you from a brick and/or help you recover files from the NAND image if anything goes wrong in the future
1. Delete `<date>_<serialnumber>_sysnand_###.bin` and `<date>_<serialnumber>_sysnand_###.bin.sha` from the `/gm9/out/` folder on your SD card after copying it

View file

@ -8,7 +8,7 @@ title: "Homebrew Launcher (Steelhax)"
This method of using Seedminer for further exploitation uses your `movable.sed` file to gain access to the Homebrew Launcher using the Steelhax exploit for the purposes of injecting an exploitable DSiWare title into the DS Download Play application. This method requires you to already own (or download) the free "Steel Divers: Sub Wars" game from the eShop.
If your device already has access to the Homebrew Launcher (whether through Steelhax or another exploit), you can skip to [Installing Boot9strap (Frogminer)](installing-boot9strap-(frogminer)).
If your device already has access to the Homebrew Launcher (whether through Steelhax or another exploit), you can skip to [Installing Boot9strap (Frogtool)](installing-boot9strap-(frogtool)).
{: .notice--success}
If you already have Steel Diver: Sub Wars, this process will overwrite your game's save file!
@ -17,6 +17,7 @@ If you already have Steel Diver: Sub Wars, this process will overwrite your game
### What You Need
* The free eShop game "Steel Diver: Sub Wars"
* Your `movable.sed` file from completing [Seedminer](seedminer)
* The latest release of [the Homebrew Launcher](https://github.com/fincs/new-hbmenu/releases/latest)
* The latest release of [Steelhax](https://github.com/VegaRoXas/vegaroxas.github.io/raw/master/files/steelhax-installer.rar)
* The [otherapp payload](https://smealum.github.io/3ds/#otherapp) *(for your region and version)*
@ -39,7 +40,7 @@ If you already have Steel Diver: Sub Wars, this process will overwrite your game
1. Exit "Steel Diver: Sub Wars"
1. Power off your device
1. Insert your SD card into your computer
1. Open [the Steelminer Injector website](http://steelminer.jisagi.net/injector) on your computer
1. Open [the Steelminer Injector website](https://bruteforcemovable.com/steelhax/) on your computer
1. Select your `movable.sed` file
1. Select "Start!"
1. Wait for the process to complete

View file

@ -10,8 +10,6 @@ This method of using Seedminer for further exploitation uses your `movable.sed`
This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws).
To use the [magnet](https://wikipedia.org/wiki/Magnet_URI_scheme) links on this page, you will need a torrent client like [Deluge](http://dev.deluge-torrent.org/wiki/Download).
To extract the `.7z` and `.rar` files linked on this page, you will need a file archiver like [7-Zip](http://www.7-zip.org/) or [The Unarchiver](https://theunarchiver.com/).
### What You Need

View file

@ -17,14 +17,14 @@ Note that carts with a "Time Bomb" will no longer be able to launch `.nds` files
| Flashcart Name | Current Price | "Time Bomb"? | 3DS Versions? | DSi Versions? | Other Notes |
|-|-:|:-:|:-:|:-:|-|
| [**R4i-SDHC B9S**](http://www.nds-card.net/ProShow.asp?ProID=574) | $15.99 | September 3, 2019 | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot**; can be flashed back to an NDS flashcart. |
| [**R4i Gold 3DS Plus**](http://www.nds-card.net/ProShow.asp?ProID=575) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot** ([internal switch to switch between ntrboot and NDS modes]({{ "/images/screenshots/r4i-gold-3ds-plus.png" | absolute_url }})); do not manually flash with ntrboot. |
| [**Acekard 2i**](http://www.nds-card.net/ProShow.asp?ProID=160) | $20.99 | No | <= 4.3.0 | <= 1.4.4 | |
| [**DSTT**](http://www.nds-card.net/ProShow.asp?ProID=157) | $9.99 | No | None | None | Only models with [certain flash chips](https://gist.github.com/yuukieve/6b48f1bb8dd15136403c15c39fafdb42) are compatible with ntrboot. |
| [**R4i Gold 3DS**](http://www.nds-card.net/ProShow.asp?ProID=149) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | All RTS revisions are compatible. |
| [**R4i-SDHC 3DS RTS**](http://www.nds-card.net/ProShow.asp?ProID=146) | $13.99 | 1.87: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | |
| [**R4iSDHC GOLD Pro 20XX**](http://www.nds-card.net/ProShow.asp?ProID=490) | $9.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. 2013 models are incompatible. |
| [**R4iSDHC RTS LITE 20XX**](http://www.nds-card.net/ProShow.asp?ProID=450) | $13.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. 2013 models are incompatible. |
| [**R4i-SDHC B9S**](http://www.nds-card.com/ProShow.asp?ProID=574) | $15.99 | September 3, 2019 | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot**; can be flashed back to an NDS flashcart. |
| [**R4i Gold 3DS Plus**](http://www.nds-card.com/ProShow.asp?ProID=575) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot** ([internal switch to switch between ntrboot and NDS modes]({{ "/images/screenshots/r4i-gold-3ds-plus.png" | absolute_url }})); do not manually flash with ntrboot. |
| [**Acekard 2i**](http://www.nds-card.com/ProShow.asp?ProID=160) | $20.99 | No | <= 4.3.0 | <= 1.4.4 | |
| [**DSTT**](http://www.nds-card.com/ProShow.asp?ProID=157) | $9.99 | No | None | None | Only models with [certain flash chips](https://gist.github.com/yuukieve/6b48f1bb8dd15136403c15c39fafdb42) are compatible with ntrboot. |
| [**R4i Gold 3DS**](http://www.nds-card.com/ProShow.asp?ProID=149) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | All RTS revisions are compatible. |
| [**R4i-SDHC 3DS RTS**](http://www.nds-card.com/ProShow.asp?ProID=146) | $13.99 | 1.87: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | |
| [**R4iSDHC GOLD Pro 20XX**](http://www.nds-card.com/ProShow.asp?ProID=490) | $9.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. 2013 models are incompatible. |
| [**R4iSDHC RTS LITE 20XX**](http://www.nds-card.com/ProShow.asp?ProID=450) | $13.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. 2013 models are incompatible. |
| **Ace3DS X** | | No | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot** (external switch to switch between ntrboot ("3DS") and NDS modes); do not manually flash with ntrboot. |
| **Ace3DS Plus** | | No | <= 11.9.0 | <= 1.4.5 | |
| **Gateway Blue** | | No | 4.1.0 - 4.5.0 | <= 1.4.5 | |
@ -49,7 +49,7 @@ To test if a magnet will work, hold it on or around the (A)(B)(X)(Y) buttons whi
Note that the flashcart will not be able to be used for its standard functions while the ntrboot exploit is installed on it (except for in the case of the Acekard 2i, which remains functional *on NDS and custom firmware 3DS systems only*). This means that, for most flashcarts, it will not even display on the home menu. There are optional steps at the end of the ntrboot flashing instructions to remove it from your flashcart when you are done.
Note that in some rare circumstances, it may be possible for the flashing process to **brick** a counterfeit flashcart and render it permanently unusable. This is unlikely, but nevertheless only original listed flashcarts are supported. To reduce the chance of receiving a counterfeit card, it is recommended that you use a reputable site to buy your flashcart (such as [NDS Card](http://www.nds-card.net/))
Note that in some rare circumstances, it may be possible for the flashing process to **brick** a counterfeit flashcart and render it permanently unusable. This is unlikely, but nevertheless only original listed flashcarts are supported. To reduce the chance of receiving a counterfeit card, it is recommended that you use a reputable site to buy your flashcart (such as [NDS Card](http://www.nds-card.com/))
{: .notice--danger}
___

View file

@ -63,9 +63,7 @@ There are two different methods for building on the Seedminer exploit (described
1. Open [Bruteforce Movable](https://bruteforcemovable.com/) on your computer
+ This site can automate the retrieval of `movable_part1.sed` (using a bot 3DS console) and the breaking of your device's DSiWare encryption (using a volunteer's computer to run Seedminer)
+ If you already have access to a 3DS capable of launching the Homebrew Launcher, you can manually retrieve your `movable_part1.sed` using that device by following [these](https://jisagi.github.io/SeedminerGuide/seedminerSelf/#section1) instructions
+ If you already have access to a PC with a powerful graphics card, you can manually calculate your `movable.sed` using it by following [these](https://jisagi.github.io/SeedminerGuide/seedminerSelf/#section2) instructions
+ If the automated service is nonfunctional and you cannot do one or both of those manually, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you
+ If the automated service is nonfunctional, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you
1. Enter your device's Friend Code (with no spaces or dashes) into the "Your friend code" field
1. Paste your device's 32 character long folder name into the "Your ID0" field
1. Complete the "I'm not a robot" captcha
@ -74,11 +72,11 @@ There are two different methods for building on the Seedminer exploit (described
1. When prompted, use the "Register Friend" button on your device to add the friend code of the bot 3DS console
1. Wait for the site to update
+ If it does not, wait a few minutes before refreshing the page once
1. Select "Continue"
1. Wait for the process to complete
+ This can take a while (up to an hour in some cases)
+ During this process, the bot may not show up on your 3ds. As long as the website updates, this is not an issue.
+ If you are still waiting after an hour, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you
1. Once the site processes your information, you will be given the option to "Continue" or "Do another device". Click the green "Continue" button
1. Wait for the remainder of the process to complete
+ This is usually fast (1-5 minutes) but in some cases, can take up to half an hour.
+ During this process, the bot you added may not show up on your 3ds. As long as the website updates, this is not an issue.
+ If you are still waiting after half an hour, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you
1. When the process has completed, download your `movable.sed` file from the site
+ Keep this file as you will need it in the upcoming pages
@ -102,7 +100,7 @@ ___
#### Seedminer + Steelhax + Frogtool
This method of using Seedminer for further exploitation uses your `movable.sed` file to gain access to the Homebrew Launcher using the Steelhax exploit for the purposes of injecting an exploitable DSiWare title into the DS Download Play application. This method requires you to already own (or download) the free "Steel Divers: Sub Wars" game from the eShop.
This method of using Seedminer for further exploitation uses your `movable.sed` file to gain access to the Homebrew Launcher using the Steelhax exploit for the purposes of injecting an exploitable DSiWare title into the DS Download Play application. This method requires you to already own (or download) the free "Steel Diver: Sub Wars" game from the eShop.
This method is only compatible with the EUR, JPN, and USA regions, and is somewhat more complicated than the above method. It is only recommended to use this method if you have a EUR region device and do not wish to pay for a DSiWare game, or if the above method does not work for you for some reason.

View file

@ -11,7 +11,7 @@ This will completely remove CFW from your device, including Boot9Strap and Luma3
This is almost never the solution to fix any issues you encounter with your CFW installation. A better idea would be to read the [troubleshooting](troubleshooting) page or ask (in English) for help at [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp).
{: .notice--danger}
Any unsigned (illegitimate) games will be rendered unusable and can be manually removed using the Data Management section of the System Settings. Use a [save manager](https://github.com/FlagBrew/Checkpoint/releases/latest) to backup any saves for these unsigned (illegitimate) games you care about.
Any unsigned (illegitimate) games will be rendered unusable and should be manually removed before starting this process by using the Data Management section of the System Settings. Use a [save manager](https://github.com/FlagBrew/Checkpoint/releases/latest) to backup any saves for these unsigned (illegitimate) games you care about.
This will not affect your NNID, any legitimately purchased games, or any saves for those legitimately purchased games.
@ -26,21 +26,43 @@ Note that if you have any payload files other than `GodMode9.firm` in the `/luma
### Instructions
#### Section I - Prep Work
#### Section I - Safety Test
1. Power off your device
1. Insert your SD card into your computer
1. Copy `GodMode9.firm` from the GodMode9 `.zip` to the `/luma/payloads/` folder on your SD card
1. Copy the `gm9` folder from the GodMode9 `.zip` to the root of your SD card
1. Reinsert your SD card into your device
1. Power on your device
#### Section II - Running Uninstall Script
1. Launch GodMode9 by holding (Start) during boot
1. If you are prompted to create an essential files backup, press (A) to do so, then press (A) to continue once it has completed
1. If you are prompted to fix the RTC date&time, press (A) to do so, then set the date and time, then press (A) to continue
+ Note that, if you had to fix the RTC date and time, you will have to fix the time in the System Settings as well after this guide
1. Navigate to `[1:] SYSNAND CTRNAND > title > 00040138 > (X)0000002 > content`
+ On a "New" edition console, the (X) will instead be 2
+ On an "Old" edition console, the (X) will instead be 0
1. Select the `.app` file
1. Select `NCCH Image Options`
1. Select `Mount image to drive`
1. In the window that appears, open the `exefs` folder
1. In this folder, select the `.firm` file
1. Select "Firm Options"
1. Select "Boot Firm"
1. When prompted, choose to decrypt and make a copy
1. You should boot into the regular 3DS Home Menu. If you do, power your device off and continue to the next section
+ If you do NOT boot into the regular 3DS Home Menu, continuing with these instructions **WILL** brick your device. You should join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you
#### Section II - Prep Work
1. Power on your device
1. Navigate to System Settings > Data Management > Nintendo 3DS > Software
1. In this list of software, delete any non-Nintendo content you installed while using CFW
+ This includes common system software such as FBI, Anemone3DS, Luma Updater, Homebrew Launcher, Checkpoint, and others, along with any non-eShop games
+ Failure to remove CFW software before uninstalling CFW may break access to the Data Management menu after uninstalling CFW
1. Power off your device
#### Section III - Running Uninstall Script
1. Launch GodMode9 by holding (Start) during boot
1. Press (Home) to bring up the action menu
1. Select "Scripts..."
1. Select "GM9Megascript"

View file

@ -18,6 +18,8 @@ Während dieses Prozesses richtest du auch folgende Programme ein:
+ **Luma3DS Updater** *(aktualisiert deine CFW Installation)*
+ **GodMode9** *(Multifunktionstool, welches NAND- und Cartridge-Funktionen ausführen kann)*
+ **Homebrew Launcher Loader** *(startet den Homebrew Launcher)*
+ **DSP1** *(allows homebrew applications to have sound)*
+ **ctr-no-timeoffset** *(removes the rtc offset so that the home menu and rtc timestamps match)*
### Was du brauchst
@ -143,7 +145,7 @@ Wenn du vor dieser Anleitung bereits einen EmuNAND hattest und dessen Inhalte in
1. Drücke (B), um zum Hauptmenü zurückzukehren
1. Drücke (R) und (B) gleichzeitig um die SD-Karte auszuwerfen
1. Stecke deine SD-Karte in deinen Computer
1. Copy `<date>_<serialnumber>_sysnand_###.bin`, `essential.exefs`, and `boot9.bin` from the `/gm9/out/` folder on your SD card to a safe location on your computer
1. Copy `<date>_<serialnumber>_sysnand_###.bin`, `<date>_<serialnumber>_sysnand_###.bin.sha`, `essential.exefs`, and `boot9.bin` from the `/gm9/out/` folder on your SD card to a safe location on your computer
+ Erstelle Backup Dateien an mehreren Orten (USB-Stick, PC, Externe Festplatte, Online-Speicher, etc.)
+ Diese Backups werden im Falle eines Bricks benötigt, um Daten aus dem NAND-Image wieder herzustellen, wenn etwas schief gehen sollte
1. Lösche `<date>_<serialnumber>_sysnand_###.bin` und `<date>_<serialnumber>_sysnand_###.bin.sha`aus dem `/gm9/out/` Ordner der SD-Karte nachdem du diese kopiert hast

View file

@ -8,7 +8,7 @@ title: "Homebrew Launcher (Steelhax)"
This method of using Seedminer for further exploitation uses your `movable.sed` file to gain access to the Homebrew Launcher using the Steelhax exploit for the purposes of injecting an exploitable DSiWare title into the DS Download Play application. This method requires you to already own (or download) the free "Steel Divers: Sub Wars" game from the eShop.
If your device already has access to the Homebrew Launcher (whether through Steelhax or another exploit), you can skip to [Installing Boot9strap (Frogminer)](installing-boot9strap-(frogminer)).
If your device already has access to the Homebrew Launcher (whether through Steelhax or another exploit), you can skip to [Installing Boot9strap (Frogtool)](installing-boot9strap-(frogtool)).
{: .notice--success}
If you already have Steel Diver: Sub Wars, this process will overwrite your game's save file!
@ -17,6 +17,7 @@ If you already have Steel Diver: Sub Wars, this process will overwrite your game
### Was du brauchst
* The free eShop game "Steel Diver: Sub Wars"
* Your `movable.sed` file from completing [Seedminer](seedminer)
* The latest release of [the Homebrew Launcher](https://github.com/fincs/new-hbmenu/releases/latest)
* The latest release of [Steelhax](https://github.com/VegaRoXas/vegaroxas.github.io/raw/master/files/steelhax-installer.rar)
* The [otherapp payload](https://smealum.github.io/3ds/#otherapp) *(for your region and version)*
@ -39,7 +40,7 @@ If you already have Steel Diver: Sub Wars, this process will overwrite your game
1. Exit "Steel Diver: Sub Wars"
1. Schalte deinen 3DS aus
1. Stecke deine SD-Karte in deinen Computer
1. Open [the Steelminer Injector website](http://steelminer.jisagi.net/injector) on your computer
1. Open [the Steelminer Injector website](https://bruteforcemovable.com/steelhax/) on your computer
1. Select your `movable.sed` file
1. Select "Start!"
1. Wait for the process to complete

View file

@ -10,8 +10,6 @@ This method of using Seedminer for further exploitation uses your `movable.sed`
Dies ist eine zurzeit funktionierende Implementation des "FIRM Partitions Known-Plaintext"-Exploits. Details findest du [hier](https://www.3dbrew.org/wiki/3DS_System_Flaws).
To use the [magnet](https://wikipedia.org/wiki/Magnet_URI_scheme) links on this page, you will need a torrent client like [Deluge](http://dev.deluge-torrent.org/wiki/Download).
To extract the `.7z` and `.rar` files linked on this page, you will need a file archiver like [7-Zip](http://www.7-zip.org/) or [The Unarchiver](https://theunarchiver.com/).
### Was du brauchst
@ -83,7 +81,7 @@ If you would prefer a visual guide to this section, one is available [here](http
1. Scroll left until reel "1/3" is selected
1. Tap the fourth box with the letter "A" in it
1. If the exploit was successful, your device will have loaded b9sTool
1. Wähle "Install boot9strap" und bestätige es
1. Select "Install boot9strap" and confirm
1. Schließe b9stool, schalte dann dein Gerät aus
+ Unter Umständen musst du das Ausschalten der Konsole erzwingen indem du den Power-Knopf gedrückt hälst
+ If you see the Luma Configuration screen, continue with the guide without powering off

View file

@ -17,14 +17,14 @@ Karten mit 'Time Bomb' sind nicht länger in der Lage '.nds' Dateien zu starten,
| Flashcart Name | Derzeitiger Preis | "Time Bomb"? | 3DS Versionen? | DSi Versionen? | Anmerkungen |
|-|-:|:-:|:-:|:-:|-|
| [**R4i-SDHC B9S**](http://www.nds-card.net/ProShow.asp?ProID=574) | $15.99 | September 3, 2019 | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot**; can be flashed back to an NDS flashcart. |
| [**R4i Gold 3DS Plus**](http://www.nds-card.net/ProShow.asp?ProID=575) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot** ([internal switch to switch between ntrboot and NDS modes]({{ "/images/screenshots/r4i-gold-3ds-plus.png" | absolute_url }})); do not manually flash with ntrboot. |
| [**Acekard 2i**](http://www.nds-card.net/ProShow.asp?ProID=160) | $20.99 | No | <= 4.3.0 | <= 1.4.4 | |
| [**DSTT**](http://www.nds-card.net/ProShow.asp?ProID=157) | $9.99 | No | None | None | Only models with [certain flash chips](https://gist.github.com/yuukieve/6b48f1bb8dd15136403c15c39fafdb42) are compatible with ntrboot. |
| [**R4i Gold 3DS**](http://www.nds-card.net/ProShow.asp?ProID=149) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | All RTS revisions are compatible. |
| [**R4i-SDHC 3DS RTS**](http://www.nds-card.net/ProShow.asp?ProID=146) | $13.99 | 1.87: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | |
| [**R4iSDHC GOLD Pro 20XX**](http://www.nds-card.net/ProShow.asp?ProID=490) | $9.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. 2013er Modelle sind nicht kompatibel. |
| [**R4iSDHC RTS LITE 20XX**](http://www.nds-card.net/ProShow.asp?ProID=450) | $13.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. 2013er Modelle sind nicht kompatibel. |
| [**R4i-SDHC B9S**](http://www.nds-card.com/ProShow.asp?ProID=574) | $15.99 | September 3, 2019 | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot**; can be flashed back to an NDS flashcart. |
| [**R4i Gold 3DS Plus**](http://www.nds-card.com/ProShow.asp?ProID=575) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot** ([internal switch to switch between ntrboot and NDS modes]({{ "/images/screenshots/r4i-gold-3ds-plus.png" | absolute_url }})); do not manually flash with ntrboot. |
| [**Acekard 2i**](http://www.nds-card.com/ProShow.asp?ProID=160) | $20.99 | No | <= 4.3.0 | <= 1.4.4 | |
| [**DSTT**](http://www.nds-card.com/ProShow.asp?ProID=157) | $9.99 | No | None | None | Only models with [certain flash chips](https://gist.github.com/yuukieve/6b48f1bb8dd15136403c15c39fafdb42) are compatible with ntrboot. |
| [**R4i Gold 3DS**](http://www.nds-card.com/ProShow.asp?ProID=149) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | All RTS revisions are compatible. |
| [**R4i-SDHC 3DS RTS**](http://www.nds-card.com/ProShow.asp?ProID=146) | $13.99 | 1.87: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | |
| [**R4iSDHC GOLD Pro 20XX**](http://www.nds-card.com/ProShow.asp?ProID=490) | $9.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. 2013er Modelle sind nicht kompatibel. |
| [**R4iSDHC RTS LITE 20XX**](http://www.nds-card.com/ProShow.asp?ProID=450) | $13.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. 2013er Modelle sind nicht kompatibel. |
| **Ace3DS X** | | No | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot** (external switch to switch between ntrboot ("3DS") and NDS modes); do not manually flash with ntrboot. |
| **Ace3DS Plus** | | No | <= 11.9.0 | <= 1.4.5 | |
| **Gateway Blue** | | Nein | 4.1.0 - 4.5.0 | <= 1.4.5 | |
@ -49,7 +49,7 @@ Um zu testen ob ein Magnet funktionieren wird, halte es auf oder in die Nähe de
Beachte dass die Flashkarte nicht in der Lage ist, ihre Standardfunktionen auszuführen, solange der ntrboot exploit installiert ist (Ausnahme ist die Acekard 2i, welche weiterhin funktioniert *auf NDS und 3DS Custom Firmware Systemen*). Dass heißt, dass die meisten Flashcarts nicht einmal im Homemenü angezeigt werden. Am Ende der ntrboot flashen Anleitung findest du optional weitere Schritte, welche dir erklären, wie du ntrboot wieder von deiner Flashkarte entfernen und diese wieder wie gewohnt nutzen kannst.
In manchen seltenen Fällen ist es möglich, dass während des Flashens einer gefälschten Flashkarte diese **gebrickt** wird und somit permanent unbenutzbar wird. Dies ist unwahrscheinlich, aber dennoch nur originale und aufgeführte Flashkarten werden unterstützt. To reduce the chance of receiving a counterfeit card, it is recommended that you use a reputable site to buy your flashcart (such as [NDS Card](http://www.nds-card.net/))
In manchen seltenen Fällen ist es möglich, dass während des Flashens einer gefälschten Flashkarte diese **gebrickt** wird und somit permanent unbenutzbar wird. Dies ist unwahrscheinlich, aber dennoch nur originale und aufgeführte Flashkarten werden unterstützt. To reduce the chance of receiving a counterfeit card, it is recommended that you use a reputable site to buy your flashcart (such as [NDS Card](http://www.nds-card.com/))
{: .notice--danger}
___

View file

@ -63,9 +63,7 @@ There are two different methods for building on the Seedminer exploit (described
1. Open [Bruteforce Movable](https://bruteforcemovable.com/) on your computer
+ This site can automate the retrieval of `movable_part1.sed` (using a bot 3DS console) and the breaking of your device's DSiWare encryption (using a volunteer's computer to run Seedminer)
+ If you already have access to a 3DS capable of launching the Homebrew Launcher, you can manually retrieve your `movable_part1.sed` using that device by following [these](https://jisagi.github.io/SeedminerGuide/seedminerSelf/#section1) instructions
+ If you already have access to a PC with a powerful graphics card, you can manually calculate your `movable.sed` using it by following [these](https://jisagi.github.io/SeedminerGuide/seedminerSelf/#section2) instructions
+ If the automated service is nonfunctional and you cannot do one or both of those manually, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you
+ If the automated service is nonfunctional, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you
1. Enter your device's Friend Code (with no spaces or dashes) into the "Your friend code" field
1. Paste your device's 32 character long folder name into the "Your ID0" field
1. Complete the "I'm not a robot" captcha
@ -74,11 +72,11 @@ There are two different methods for building on the Seedminer exploit (described
1. When prompted, use the "Register Friend" button on your device to add the friend code of the bot 3DS console
1. Wait for the site to update
+ If it does not, wait a few minutes before refreshing the page once
1. Select "Continue"
1. Wait for the process to complete
+ This can take a while (up to an hour in some cases)
+ During this process, the bot may not show up on your 3ds. As long as the website updates, this is not an issue.
+ If you are still waiting after an hour, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you
1. Once the site processes your information, you will be given the option to "Continue" or "Do another device". Click the green "Continue" button
1. Wait for the remainder of the process to complete
+ This is usually fast (1-5 minutes) but in some cases, can take up to half an hour.
+ During this process, the bot you added may not show up on your 3ds. As long as the website updates, this is not an issue.
+ If you are still waiting after half an hour, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you
1. When the process has completed, download your `movable.sed` file from the site
+ Keep this file as you will need it in the upcoming pages
@ -102,7 +100,7 @@ ___
#### Seedminer + Steelhax + Frogtool
This method of using Seedminer for further exploitation uses your `movable.sed` file to gain access to the Homebrew Launcher using the Steelhax exploit for the purposes of injecting an exploitable DSiWare title into the DS Download Play application. This method requires you to already own (or download) the free "Steel Divers: Sub Wars" game from the eShop.
This method of using Seedminer for further exploitation uses your `movable.sed` file to gain access to the Homebrew Launcher using the Steelhax exploit for the purposes of injecting an exploitable DSiWare title into the DS Download Play application. This method requires you to already own (or download) the free "Steel Diver: Sub Wars" game from the eShop.
This method is only compatible with the EUR, JPN, and USA regions, and is somewhat more complicated than the above method. It is only recommended to use this method if you have a EUR region device and do not wish to pay for a DSiWare game, or if the above method does not work for you for some reason.

View file

@ -11,7 +11,7 @@ Dies wird die CFW, einschließlich Boot9Strap und Luma3DS, vollständig von dein
Die CFW zu deinstallieren ist fast nie die Lösung der Probleme, welche bei der CFW-Installation auftreten. A better idea would be to read the [troubleshooting](troubleshooting) page or ask (in English) for help at [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp).
{: .notice--danger}
Alle unsignierten (nicht-legitimen) Spiele werden unbrauchbar und können manuell mit der Datenverwaltung in den Systemeinstellungen entfernt werden. Use a [save manager](https://github.com/FlagBrew/Checkpoint/releases/latest) to backup any saves for these unsigned (illegitimate) games you care about.
Any unsigned (illegitimate) games will be rendered unusable and should be manually removed before starting this process by using the Data Management section of the System Settings. Use a [save manager](https://github.com/FlagBrew/Checkpoint/releases/latest) to backup any saves for these unsigned (illegitimate) games you care about.
Dies wird deine NNID, alle legitim gekauften Spielen und deren Speicherstände nicht beeinträchtigen.
@ -26,21 +26,43 @@ Beachte: Sollten noch weitere Dateien als nur die`GodMode9.firm` Datei im `/luma
### Anleitung
#### Schritt I - Vorbereitungen
#### Section I - Safety Test
1. Schalte deinen 3DS aus
1. Stecke deine SD-Karte in deinen Computer
1. Kopiere `Godmode9.firm`von der `Godmode9.zip`-Datei nach `/luma/payloads/` auf deiner SD Karte
1. Kopiere den Ordner `gm9` aus der GodMode9 `.zip` in das Stammverzeichnis deiner SD-Karte
1. Stecke deine SD-Karte nun wieder in deinen 3DS
1. Schalte deine Konsole an
#### Schritt II - Ausführen des Deinstallations-Scripts
1. Starte GodMode9, indem du während dem Starten deiner Konsole die Taste (Start) gedrückt hältst
1. Wenn du aufgefordert wirst, ein "essential files backup" durchzuführen, drücke (A). Drücke erneut (A) nachdem es abgeschlossen ist
1. Wenn du aufgefordert wirst Datum und Uhrzeit der "RTC" (Real Time Clock, Echtzeituhr) zu korrigieren, drücke (A), stelle Datum und Uhrzeit ein und drücke (A) um fortzufahren
+ Bitte beachte, falls du die RTC korrigieren musstest, dass du nach beenden der Anleitung auch Datum und Uhrzeit in den Systemeinstellungen korrigieren musst
1. Navigate to `[1:] SYSNAND CTRNAND > title > 00040138 > (X)0000002 > content`
+ On a "New" edition console, the (X) will instead be 2
+ On an "Old" edition console, the (X) will instead be 0
1. Select the `.app` file
1. Select `NCCH Image Options`
1. Select `Mount image to drive`
1. In the window that appears, open the `exefs` folder
1. In this folder, select the `.firm` file
1. Select "Firm Options"
1. Select "Boot Firm"
1. When prompted, choose to decrypt and make a copy
1. You should boot into the regular 3DS Home Menu. If you do, power your device off and continue to the next section
+ If you do NOT boot into the regular 3DS Home Menu, continuing with these instructions **WILL** brick your device. You should join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you
#### Section II - Prep Work
1. Schalte deine Konsole an
1. Navigate to System Settings > Data Management > Nintendo 3DS > Software
1. In this list of software, delete any non-Nintendo content you installed while using CFW
+ This includes common system software such as FBI, Anemone3DS, Luma Updater, Homebrew Launcher, Checkpoint, and others, along with any non-eShop games
+ Failure to remove CFW software before uninstalling CFW may break access to the Data Management menu after uninstalling CFW
1. Schalte deinen 3DS aus
#### Section III - Running Uninstall Script
1. Starte GodMode9, indem du während dem Starten deiner Konsole die Taste (Start) gedrückt hältst
1. Drücke (HOME) um das Aktionsmenü aufzurufen
1. Wähle "Scripts"
1. Select "GM9Megascript"

View file

@ -18,6 +18,8 @@ The file `boot.firm` is what is launched by boot9strap itself after it finishes
+ **Luma3DS Updater** *(ενημερώνει εύκολα την εγκατάσταση του CFW)*
+ **GodMode9** *(multipurpose tool which can do NAND and cartridge functions)*
+ **Homebrew Launcher Loader** *(launches the Homebrew Launcher)*
+ **DSP1** *(allows homebrew applications to have sound)*
+ **ctr-no-timeoffset** *(removes the rtc offset so that the home menu and rtc timestamps match)*
### What You Need
@ -143,7 +145,7 @@ If, before following this guide, you already had an EmuNAND setup and would like
1. Press (B) to return to the main menu
1. Κρατήστε πατημένο το (R) και πατήστε ταυτόχρονα το (B) για να αφαιρέσετε την κάρτα SD
1. Εισάγετε την κάρτα SD στον υπολογιστή σας
1. Copy `<date>_<serialnumber>_sysnand_###.bin`, `essential.exefs`, and `boot9.bin` from the `/gm9/out/` folder on your SD card to a safe location on your computer
1. Copy `<date>_<serialnumber>_sysnand_###.bin`, `<date>_<serialnumber>_sysnand_###.bin.sha`, `essential.exefs`, and `boot9.bin` from the `/gm9/out/` folder on your SD card to a safe location on your computer
+ Make backups in multiple locations (such as online file storage)
+ These backups will save you from a brick and/or help you recover files from the NAND image if anything goes wrong in the future
1. Delete `<date>_<serialnumber>_sysnand_###.bin` and `<date>_<serialnumber>_sysnand_###.bin.sha` from the `/gm9/out/` folder on your SD card after copying it

View file

@ -8,7 +8,7 @@ title: "Homebrew Launcher (Steelhax)"
This method of using Seedminer for further exploitation uses your `movable.sed` file to gain access to the Homebrew Launcher using the Steelhax exploit for the purposes of injecting an exploitable DSiWare title into the DS Download Play application. This method requires you to already own (or download) the free "Steel Divers: Sub Wars" game from the eShop.
If your device already has access to the Homebrew Launcher (whether through Steelhax or another exploit), you can skip to [Installing Boot9strap (Frogminer)](installing-boot9strap-(frogminer)).
If your device already has access to the Homebrew Launcher (whether through Steelhax or another exploit), you can skip to [Installing Boot9strap (Frogtool)](installing-boot9strap-(frogtool)).
{: .notice--success}
If you already have Steel Diver: Sub Wars, this process will overwrite your game's save file!
@ -17,6 +17,7 @@ If you already have Steel Diver: Sub Wars, this process will overwrite your game
### What You Need
* The free eShop game "Steel Diver: Sub Wars"
* Your `movable.sed` file from completing [Seedminer](seedminer)
* The latest release of [the Homebrew Launcher](https://github.com/fincs/new-hbmenu/releases/latest)
* The latest release of [Steelhax](https://github.com/VegaRoXas/vegaroxas.github.io/raw/master/files/steelhax-installer.rar)
* The [otherapp payload](https://smealum.github.io/3ds/#otherapp) *(for your region and version)*
@ -39,7 +40,7 @@ If you already have Steel Diver: Sub Wars, this process will overwrite your game
1. Exit "Steel Diver: Sub Wars"
1. Power off your device
1. Εισάγετε την κάρτα SD στον υπολογιστή σας
1. Open [the Steelminer Injector website](http://steelminer.jisagi.net/injector) on your computer
1. Open [the Steelminer Injector website](https://bruteforcemovable.com/steelhax/) on your computer
1. Select your `movable.sed` file
1. Select "Start!"
1. Wait for the process to complete

View file

@ -10,8 +10,6 @@ This method of using Seedminer for further exploitation uses your `movable.sed`
This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws).
To use the [magnet](https://wikipedia.org/wiki/Magnet_URI_scheme) links on this page, you will need a torrent client like [Deluge](http://dev.deluge-torrent.org/wiki/Download).
To extract the `.7z` and `.rar` files linked on this page, you will need a file archiver like [7-Zip](http://www.7-zip.org/) or [The Unarchiver](https://theunarchiver.com/).
### What You Need

View file

@ -17,14 +17,14 @@ Note that carts with a "Time Bomb" will no longer be able to launch `.nds` files
| Flashcart Name | Current Price | "Time Bomb"? | 3DS Versions? | DSi Versions? | Other Notes |
|-|-:|:-:|:-:|:-:|-|
| [**R4i-SDHC B9S**](http://www.nds-card.net/ProShow.asp?ProID=574) | $15.99 | September 3, 2019 | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot**; can be flashed back to an NDS flashcart. |
| [**R4i Gold 3DS Plus**](http://www.nds-card.net/ProShow.asp?ProID=575) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot** ([internal switch to switch between ntrboot and NDS modes]({{ "/images/screenshots/r4i-gold-3ds-plus.png" | absolute_url }})); do not manually flash with ntrboot. |
| [**Acekard 2i**](http://www.nds-card.net/ProShow.asp?ProID=160) | $20.99 | No | <= 4.3.0 | <= 1.4.4 | |
| [**DSTT**](http://www.nds-card.net/ProShow.asp?ProID=157) | $9.99 | No | None | None | Only models with [certain flash chips](https://gist.github.com/yuukieve/6b48f1bb8dd15136403c15c39fafdb42) are compatible with ntrboot. |
| [**R4i Gold 3DS**](http://www.nds-card.net/ProShow.asp?ProID=149) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | All RTS revisions are compatible. |
| [**R4i-SDHC 3DS RTS**](http://www.nds-card.net/ProShow.asp?ProID=146) | $13.99 | 1.87: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | |
| [**R4iSDHC GOLD Pro 20XX**](http://www.nds-card.net/ProShow.asp?ProID=490) | $9.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. 2013 models are incompatible. |
| [**R4iSDHC RTS LITE 20XX**](http://www.nds-card.net/ProShow.asp?ProID=450) | $13.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. 2013 models are incompatible. |
| [**R4i-SDHC B9S**](http://www.nds-card.com/ProShow.asp?ProID=574) | $15.99 | September 3, 2019 | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot**; can be flashed back to an NDS flashcart. |
| [**R4i Gold 3DS Plus**](http://www.nds-card.com/ProShow.asp?ProID=575) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot** ([internal switch to switch between ntrboot and NDS modes]({{ "/images/screenshots/r4i-gold-3ds-plus.png" | absolute_url }})); do not manually flash with ntrboot. |
| [**Acekard 2i**](http://www.nds-card.com/ProShow.asp?ProID=160) | $20.99 | No | <= 4.3.0 | <= 1.4.4 | |
| [**DSTT**](http://www.nds-card.com/ProShow.asp?ProID=157) | $9.99 | No | None | None | Only models with [certain flash chips](https://gist.github.com/yuukieve/6b48f1bb8dd15136403c15c39fafdb42) are compatible with ntrboot. |
| [**R4i Gold 3DS**](http://www.nds-card.com/ProShow.asp?ProID=149) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | All RTS revisions are compatible. |
| [**R4i-SDHC 3DS RTS**](http://www.nds-card.com/ProShow.asp?ProID=146) | $13.99 | 1.87: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | |
| [**R4iSDHC GOLD Pro 20XX**](http://www.nds-card.com/ProShow.asp?ProID=490) | $9.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. 2013 models are incompatible. |
| [**R4iSDHC RTS LITE 20XX**](http://www.nds-card.com/ProShow.asp?ProID=450) | $13.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. 2013 models are incompatible. |
| **Ace3DS X** | | No | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot** (external switch to switch between ntrboot ("3DS") and NDS modes); do not manually flash with ntrboot. |
| **Ace3DS Plus** | | No | <= 11.9.0 | <= 1.4.5 | |
| **Gateway Blue** | | No | 4.1.0 - 4.5.0 | <= 1.4.5 | |
@ -49,7 +49,7 @@ To test if a magnet will work, hold it on or around the (A)(B)(X)(Y) buttons whi
Note that the flashcart will not be able to be used for its standard functions while the ntrboot exploit is installed on it (except for in the case of the Acekard 2i, which remains functional *on NDS and custom firmware 3DS systems only*). This means that, for most flashcarts, it will not even display on the home menu. There are optional steps at the end of the ntrboot flashing instructions to remove it from your flashcart when you are done.
Note that in some rare circumstances, it may be possible for the flashing process to **brick** a counterfeit flashcart and render it permanently unusable. This is unlikely, but nevertheless only original listed flashcarts are supported. To reduce the chance of receiving a counterfeit card, it is recommended that you use a reputable site to buy your flashcart (such as [NDS Card](http://www.nds-card.net/))
Note that in some rare circumstances, it may be possible for the flashing process to **brick** a counterfeit flashcart and render it permanently unusable. This is unlikely, but nevertheless only original listed flashcarts are supported. To reduce the chance of receiving a counterfeit card, it is recommended that you use a reputable site to buy your flashcart (such as [NDS Card](http://www.nds-card.com/))
{: .notice--danger}
___

View file

@ -63,9 +63,7 @@ There are two different methods for building on the Seedminer exploit (described
1. Open [Bruteforce Movable](https://bruteforcemovable.com/) on your computer
+ This site can automate the retrieval of `movable_part1.sed` (using a bot 3DS console) and the breaking of your device's DSiWare encryption (using a volunteer's computer to run Seedminer)
+ If you already have access to a 3DS capable of launching the Homebrew Launcher, you can manually retrieve your `movable_part1.sed` using that device by following [these](https://jisagi.github.io/SeedminerGuide/seedminerSelf/#section1) instructions
+ If you already have access to a PC with a powerful graphics card, you can manually calculate your `movable.sed` using it by following [these](https://jisagi.github.io/SeedminerGuide/seedminerSelf/#section2) instructions
+ If the automated service is nonfunctional and you cannot do one or both of those manually, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you
+ If the automated service is nonfunctional, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you
1. Enter your device's Friend Code (with no spaces or dashes) into the "Your friend code" field
1. Paste your device's 32 character long folder name into the "Your ID0" field
1. Complete the "I'm not a robot" captcha
@ -74,11 +72,11 @@ There are two different methods for building on the Seedminer exploit (described
1. When prompted, use the "Register Friend" button on your device to add the friend code of the bot 3DS console
1. Wait for the site to update
+ If it does not, wait a few minutes before refreshing the page once
1. Select "Continue"
1. Wait for the process to complete
+ This can take a while (up to an hour in some cases)
+ During this process, the bot may not show up on your 3ds. As long as the website updates, this is not an issue.
+ If you are still waiting after an hour, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you
1. Once the site processes your information, you will be given the option to "Continue" or "Do another device". Click the green "Continue" button
1. Wait for the remainder of the process to complete
+ This is usually fast (1-5 minutes) but in some cases, can take up to half an hour.
+ During this process, the bot you added may not show up on your 3ds. As long as the website updates, this is not an issue.
+ If you are still waiting after half an hour, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you
1. When the process has completed, download your `movable.sed` file from the site
+ Keep this file as you will need it in the upcoming pages
@ -102,7 +100,7 @@ ___
#### Seedminer + Steelhax + Frogtool
This method of using Seedminer for further exploitation uses your `movable.sed` file to gain access to the Homebrew Launcher using the Steelhax exploit for the purposes of injecting an exploitable DSiWare title into the DS Download Play application. This method requires you to already own (or download) the free "Steel Divers: Sub Wars" game from the eShop.
This method of using Seedminer for further exploitation uses your `movable.sed` file to gain access to the Homebrew Launcher using the Steelhax exploit for the purposes of injecting an exploitable DSiWare title into the DS Download Play application. This method requires you to already own (or download) the free "Steel Diver: Sub Wars" game from the eShop.
This method is only compatible with the EUR, JPN, and USA regions, and is somewhat more complicated than the above method. It is only recommended to use this method if you have a EUR region device and do not wish to pay for a DSiWare game, or if the above method does not work for you for some reason.

View file

@ -11,7 +11,7 @@ This will completely remove CFW from your device, including Boot9Strap and Luma3
This is almost never the solution to fix any issues you encounter with your CFW installation. A better idea would be to read the [troubleshooting](troubleshooting) page or ask (in English) for help at [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp).
{: .notice--danger}
Any unsigned (illegitimate) games will be rendered unusable and can be manually removed using the Data Management section of the System Settings. Use a [save manager](https://github.com/FlagBrew/Checkpoint/releases/latest) to backup any saves for these unsigned (illegitimate) games you care about.
Any unsigned (illegitimate) games will be rendered unusable and should be manually removed before starting this process by using the Data Management section of the System Settings. Use a [save manager](https://github.com/FlagBrew/Checkpoint/releases/latest) to backup any saves for these unsigned (illegitimate) games you care about.
This will not affect your NNID, any legitimately purchased games, or any saves for those legitimately purchased games.
@ -26,21 +26,43 @@ Note that if you have any payload files other than `GodMode9.firm` in the `/luma
### Instructions
#### Section I - Prep Work
#### Section I - Safety Test
1. Power off your device
1. Εισάγετε την κάρτα SD στον υπολογιστή σας
1. Copy `GodMode9.firm` from the GodMode9 `.zip` to the `/luma/payloads/` folder on your SD card
1. Copy the `gm9` folder from the GodMode9 `.zip` to the root of your SD card
1. Reinsert your SD card into your device
1. Power on your device
#### Section II - Running Uninstall Script
1. Launch GodMode9 by holding (Start) during boot
1. If you are prompted to create an essential files backup, press (A) to do so, then press (A) to continue once it has completed
1. If you are prompted to fix the RTC date&time, press (A) to do so, then set the date and time, then press (A) to continue
+ Note that, if you had to fix the RTC date and time, you will have to fix the time in the System Settings as well after this guide
1. Navigate to `[1:] SYSNAND CTRNAND > title > 00040138 > (X)0000002 > content`
+ On a "New" edition console, the (X) will instead be 2
+ On an "Old" edition console, the (X) will instead be 0
1. Select the `.app` file
1. Select `NCCH Image Options`
1. Select `Mount image to drive`
1. In the window that appears, open the `exefs` folder
1. In this folder, select the `.firm` file
1. Select "Firm Options"
1. Select "Boot Firm"
1. When prompted, choose to decrypt and make a copy
1. You should boot into the regular 3DS Home Menu. If you do, power your device off and continue to the next section
+ If you do NOT boot into the regular 3DS Home Menu, continuing with these instructions **WILL** brick your device. You should join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you
#### Section II - Prep Work
1. Power on your device
1. Navigate to System Settings > Data Management > Nintendo 3DS > Software
1. In this list of software, delete any non-Nintendo content you installed while using CFW
+ This includes common system software such as FBI, Anemone3DS, Luma Updater, Homebrew Launcher, Checkpoint, and others, along with any non-eShop games
+ Failure to remove CFW software before uninstalling CFW may break access to the Data Management menu after uninstalling CFW
1. Power off your device
#### Section III - Running Uninstall Script
1. Launch GodMode9 by holding (Start) during boot
1. Press (Home) to bring up the action menu
1. Select "Scripts..."
1. Select "GM9Megascript"

View file

@ -18,6 +18,8 @@ Durin' 'tis process, we also setup programs such as th' followin':
+ **Luma3DS Updater** *(updates ye CFW installation easily)*
+ **GodMode9** *(multipurpose tool which can do NAND and cartridge functions)*
+ **Homebrew Launcher Loader** *(launches the Homebrew Launcher)*
+ **DSP1** *(allows homebrew applications to have sound)*
+ **ctr-no-timeoffset** *(removes the rtc offset so that the home menu and rtc timestamps match)*
### What You Need
@ -143,7 +145,7 @@ If, before following this guide, you already had an EmuNAND setup and would like
1. Press (B) to return to the main menu
1. Hold (R) and press (B) at the same time to eject your SD card
1. Insert ye SD card into ye computer
1. Copy `<date>_<serialnumber>_sysnand_###.bin`, `essential.exefs`, and `boot9.bin` from the `/gm9/out/` folder on your SD card to a safe location on your computer
1. Copy `<date>_<serialnumber>_sysnand_###.bin`, `<date>_<serialnumber>_sysnand_###.bin.sha`, `essential.exefs`, and `boot9.bin` from the `/gm9/out/` folder on your SD card to a safe location on your computer
+ Make backups in multiple locations (such as online file storage)
+ These backups gunna be savin' ye from any brick, 'n they may help ye recover files, especially th' NAND image, if anythin' be off or wrong in th' future
1. Delete `<date>_<serialnumber>_sysnand_###.bin` and `<date>_<serialnumber>_sysnand_###.bin.sha` from the `/gm9/out/` folder on your SD card after copying it

View file

@ -8,7 +8,7 @@ title: "Homebrew Launcher (Steelhax)"
This method of using Seedminer for further exploitation uses your `movable.sed` file to gain access to the Homebrew Launcher using the Steelhax exploit for the purposes of injecting an exploitable DSiWare title into the DS Download Play application. This method requires you to already own (or download) the free "Steel Divers: Sub Wars" game from the eShop.
If your device already has access to the Homebrew Launcher (whether through Steelhax or another exploit), you can skip to [Installing Boot9strap (Frogminer)](installing-boot9strap-(frogminer)).
If your device already has access to the Homebrew Launcher (whether through Steelhax or another exploit), you can skip to [Installing Boot9strap (Frogtool)](installing-boot9strap-(frogtool)).
{: .notice--success}
If you already have Steel Diver: Sub Wars, this process will overwrite your game's save file!
@ -17,6 +17,7 @@ If you already have Steel Diver: Sub Wars, this process will overwrite your game
### What You Need
* The free eShop game "Steel Diver: Sub Wars"
* Your `movable.sed` file from completing [Seedminer](seedminer)
* The latest release of [the Homebrew Launcher](https://github.com/fincs/new-hbmenu/releases/latest)
* The latest release of [Steelhax](https://github.com/VegaRoXas/vegaroxas.github.io/raw/master/files/steelhax-installer.rar)
* The [otherapp payload](https://smealum.github.io/3ds/#otherapp) *(for your region and version)*
@ -39,7 +40,7 @@ If you already have Steel Diver: Sub Wars, this process will overwrite your game
1. Exit "Steel Diver: Sub Wars"
1. Power off ye device
1. Insert ye SD card into ye computer
1. Open [the Steelminer Injector website](http://steelminer.jisagi.net/injector) on your computer
1. Open [the Steelminer Injector website](https://bruteforcemovable.com/steelhax/) on your computer
1. Select your `movable.sed` file
1. Select "Start!"
1. Wait for the process to complete

View file

@ -10,8 +10,6 @@ This method of using Seedminer for further exploitation uses your `movable.sed`
This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws).
To use the [magnet](https://wikipedia.org/wiki/Magnet_URI_scheme) links on this page, you will need a torrent client like [Deluge](http://dev.deluge-torrent.org/wiki/Download).
To extract the `.7z` and `.rar` files linked on this page, you will need a file archiver like [7-Zip](http://www.7-zip.org/) or [The Unarchiver](https://theunarchiver.com/).
### What You Need

View file

@ -17,14 +17,14 @@ Note that carts with a "Time Bomb" will no longer be able to launch `.nds` files
| Flashcart Name | Current Price | "Time Bomb"? | 3DS Versions? | DSi Versions? | Other Notes |
|-|-:|:-:|:-:|:-:|-|
| [**R4i-SDHC B9S**](http://www.nds-card.net/ProShow.asp?ProID=574) | $15.99 | September 3, 2019 | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot**; can be flashed back to an NDS flashcart. |
| [**R4i Gold 3DS Plus**](http://www.nds-card.net/ProShow.asp?ProID=575) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot** ([internal switch to switch between ntrboot and NDS modes]({{ "/images/screenshots/r4i-gold-3ds-plus.png" | absolute_url }})); do not manually flash with ntrboot. |
| [**Acekard 2i**](http://www.nds-card.net/ProShow.asp?ProID=160) | $20.99 | No | <= 4.3.0 | <= 1.4.4 | |
| [**DSTT**](http://www.nds-card.net/ProShow.asp?ProID=157) | $9.99 | No | None | None | Only models with [certain flash chips](https://gist.github.com/yuukieve/6b48f1bb8dd15136403c15c39fafdb42) are compatible with ntrboot. |
| [**R4i Gold 3DS**](http://www.nds-card.net/ProShow.asp?ProID=149) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | All RTS revisions are compatible. |
| [**R4i-SDHC 3DS RTS**](http://www.nds-card.net/ProShow.asp?ProID=146) | $13.99 | 1.87: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | |
| [**R4iSDHC GOLD Pro 20XX**](http://www.nds-card.net/ProShow.asp?ProID=490) | $9.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. 2013 models are incompatible. |
| [**R4iSDHC RTS LITE 20XX**](http://www.nds-card.net/ProShow.asp?ProID=450) | $13.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. 2013 models are incompatible. |
| [**R4i-SDHC B9S**](http://www.nds-card.com/ProShow.asp?ProID=574) | $15.99 | September 3, 2019 | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot**; can be flashed back to an NDS flashcart. |
| [**R4i Gold 3DS Plus**](http://www.nds-card.com/ProShow.asp?ProID=575) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot** ([internal switch to switch between ntrboot and NDS modes]({{ "/images/screenshots/r4i-gold-3ds-plus.png" | absolute_url }})); do not manually flash with ntrboot. |
| [**Acekard 2i**](http://www.nds-card.com/ProShow.asp?ProID=160) | $20.99 | No | <= 4.3.0 | <= 1.4.4 | |
| [**DSTT**](http://www.nds-card.com/ProShow.asp?ProID=157) | $9.99 | No | None | None | Only models with [certain flash chips](https://gist.github.com/yuukieve/6b48f1bb8dd15136403c15c39fafdb42) are compatible with ntrboot. |
| [**R4i Gold 3DS**](http://www.nds-card.com/ProShow.asp?ProID=149) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | All RTS revisions are compatible. |
| [**R4i-SDHC 3DS RTS**](http://www.nds-card.com/ProShow.asp?ProID=146) | $13.99 | 1.87: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | |
| [**R4iSDHC GOLD Pro 20XX**](http://www.nds-card.com/ProShow.asp?ProID=490) | $9.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. 2013 models are incompatible. |
| [**R4iSDHC RTS LITE 20XX**](http://www.nds-card.com/ProShow.asp?ProID=450) | $13.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. 2013 models are incompatible. |
| **Ace3DS X** | | No | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot** (external switch to switch between ntrboot ("3DS") and NDS modes); do not manually flash with ntrboot. |
| **Ace3DS Plus** | | No | <= 11.9.0 | <= 1.4.5 | |
| **Gateway Blue** | | No | 4.1.0 - 4.5.0 | <= 1.4.5 | |
@ -49,7 +49,7 @@ To test if a magnet gunna work, hold it on or around th' (A)(B)(X)(Y) buttons wh
Note that the flashcart will not be able to be used for its standard functions while the ntrboot exploit is installed on it (except for in the case of the Acekard 2i, which remains functional *on NDS and custom firmware 3DS systems only*). This means that, for most flashcarts, it will not even display on the home menu. There be optional steps at th' end 'o th' ntrboot flashin' instructions to remove it from ye flashcart when ye be done.
Note that in some rare cases, it may be possible fer th' flashin' process to **brick** a counterfeit flashcart n' render it permanently unusable. 'Tis be unlikely, but nevertheless only original listed flashcarts be supported. To reduce the chance of receiving a counterfeit card, it is recommended that you use a reputable site to buy your flashcart (such as [NDS Card](http://www.nds-card.net/))
Note that in some rare cases, it may be possible fer th' flashin' process to **brick** a counterfeit flashcart n' render it permanently unusable. 'Tis be unlikely, but nevertheless only original listed flashcarts be supported. To reduce the chance of receiving a counterfeit card, it is recommended that you use a reputable site to buy your flashcart (such as [NDS Card](http://www.nds-card.com/))
{: .notice--danger}
___

View file

@ -63,9 +63,7 @@ There are two different methods for building on the Seedminer exploit (described
1. Open [Bruteforce Movable](https://bruteforcemovable.com/) on your computer
+ This site can automate the retrieval of `movable_part1.sed` (using a bot 3DS console) and the breaking of your device's DSiWare encryption (using a volunteer's computer to run Seedminer)
+ If you already have access to a 3DS capable of launching the Homebrew Launcher, you can manually retrieve your `movable_part1.sed` using that device by following [these](https://jisagi.github.io/SeedminerGuide/seedminerSelf/#section1) instructions
+ If you already have access to a PC with a powerful graphics card, you can manually calculate your `movable.sed` using it by following [these](https://jisagi.github.io/SeedminerGuide/seedminerSelf/#section2) instructions
+ If the automated service is nonfunctional and you cannot do one or both of those manually, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you
+ If the automated service is nonfunctional, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you
1. Enter your device's Friend Code (with no spaces or dashes) into the "Your friend code" field
1. Paste your device's 32 character long folder name into the "Your ID0" field
1. Complete the "I'm not a robot" captcha
@ -74,11 +72,11 @@ There are two different methods for building on the Seedminer exploit (described
1. When prompted, use the "Register Friend" button on your device to add the friend code of the bot 3DS console
1. Wait for the site to update
+ If it does not, wait a few minutes before refreshing the page once
1. Select "Continue"
1. Wait for the process to complete
+ This can take a while (up to an hour in some cases)
+ During this process, the bot may not show up on your 3ds. As long as the website updates, this is not an issue.
+ If you are still waiting after an hour, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you
1. Once the site processes your information, you will be given the option to "Continue" or "Do another device". Click the green "Continue" button
1. Wait for the remainder of the process to complete
+ This is usually fast (1-5 minutes) but in some cases, can take up to half an hour.
+ During this process, the bot you added may not show up on your 3ds. As long as the website updates, this is not an issue.
+ If you are still waiting after half an hour, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you
1. When the process has completed, download your `movable.sed` file from the site
+ Keep this file as you will need it in the upcoming pages
@ -102,7 +100,7 @@ ___
#### Seedminer + Steelhax + Frogtool
This method of using Seedminer for further exploitation uses your `movable.sed` file to gain access to the Homebrew Launcher using the Steelhax exploit for the purposes of injecting an exploitable DSiWare title into the DS Download Play application. This method requires you to already own (or download) the free "Steel Divers: Sub Wars" game from the eShop.
This method of using Seedminer for further exploitation uses your `movable.sed` file to gain access to the Homebrew Launcher using the Steelhax exploit for the purposes of injecting an exploitable DSiWare title into the DS Download Play application. This method requires you to already own (or download) the free "Steel Diver: Sub Wars" game from the eShop.
This method is only compatible with the EUR, JPN, and USA regions, and is somewhat more complicated than the above method. It is only recommended to use this method if you have a EUR region device and do not wish to pay for a DSiWare game, or if the above method does not work for you for some reason.

View file

@ -11,7 +11,7 @@ This will completely remove CFW from your device, including Boot9Strap and Luma3
This is almost never the solution to fix any issues you encounter with your CFW installation. A better idea would be to read the [troubleshooting](troubleshooting) page or ask (in English) for help at [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp).
{: .notice--danger}
Any unsigned (illegitimate) games will be rendered unusable and can be manually removed using the Data Management section of the System Settings. Use a [save manager](https://github.com/FlagBrew/Checkpoint/releases/latest) to backup any saves for these unsigned (illegitimate) games you care about.
Any unsigned (illegitimate) games will be rendered unusable and should be manually removed before starting this process by using the Data Management section of the System Settings. Use a [save manager](https://github.com/FlagBrew/Checkpoint/releases/latest) to backup any saves for these unsigned (illegitimate) games you care about.
This will not affect your NNID, any legitimately purchased games, or any saves for those legitimately purchased games.
@ -26,21 +26,43 @@ Note that if ye have any payload files other than `GodMode9.firm` in th' `/luma/
### Instructions
#### Section I - Prep Work
#### Section I - Safety Test
1. Power off ye device
1. Insert ye SD card into ye computer
1. Copy `GodMode9.firm` from th' GodMode9 `.zip` to th' `/luma/payloads/` folder on ye SD card
1. Copy th' `gm9` folder from th' GodMode9 `.zip` to th' root 'o ye SD card
1. Reinsert ye SD card into ye device
1. Power on your device
#### Section II - Running Uninstall Script
1. Launch GodMode9 by holdin' (Start) durin' boot
1. If ye be prompted to create an essential files backup, press (A) to do so, then press (A) to continue once it has completed
1. If ye be prompted to fix th' RTC date&time, press (A) to do so, then set th' date 'n time, then press (A) to continue
+ Note that, if you had to fix the RTC date and time, you will have to fix the time in the System Settings as well after this guide
1. Navigate to `[1:] SYSNAND CTRNAND > title > 00040138 > (X)0000002 > content`
+ On a "New" edition console, the (X) will instead be 2
+ On an "Old" edition console, the (X) will instead be 0
1. Select the `.app` file
1. Select `NCCH Image Options`
1. Select `Mount image to drive`
1. In the window that appears, open the `exefs` folder
1. In this folder, select the `.firm` file
1. Select "Firm Options"
1. Select "Boot Firm"
1. When prompted, choose to decrypt and make a copy
1. You should boot into the regular 3DS Home Menu. If you do, power your device off and continue to the next section
+ If you do NOT boot into the regular 3DS Home Menu, continuing with these instructions **WILL** brick your device. You should join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you
#### Section II - Prep Work
1. Power on your device
1. Navigate to System Settings > Data Management > Nintendo 3DS > Software
1. In this list of software, delete any non-Nintendo content you installed while using CFW
+ This includes common system software such as FBI, Anemone3DS, Luma Updater, Homebrew Launcher, Checkpoint, and others, along with any non-eShop games
+ Failure to remove CFW software before uninstalling CFW may break access to the Data Management menu after uninstalling CFW
1. Power off ye device
#### Section III - Running Uninstall Script
1. Launch GodMode9 by holdin' (Start) durin' boot
1. Press (Home) to bring up th' action menu
1. Select "Scripts..."
1. Select "GM9Megascript"

View file

@ -18,6 +18,8 @@ Durante este proceso, también instalaremos programas como los siguientes:
+ **Luma3DS Updater** *(actualiza tu instalación de CFW fácilmente)*
+ **GodMode9** *(herramienta multipropósito que puede realizar funciones sobre la NAND y cartridges)*
+ **Homebrew Launcher Loader** *(inicia el Homebrew Launcher)*
**DSP1** *(permite que las aplicaciones homebrew tengan sonido)*
+ **ctr-no-timeoffset** *(elimina la diferencia de rtc para que la hora en el Menú HOME y el rtc coincidan)*
### Qué necesitas
@ -88,7 +90,7 @@ Si, antes de seguir esta guía, ya tenías una configuración EmuNAND y deseas m
1. Presiona (A) para definir el offset en 0
+ Esto ajustará el reloj del sistema para que coincida con la fecha y hora RTC (la cual se definiremos pronto)
1. Presiona (Start) para volver al Homebrew Launcher
+ If you previously followed [Installing boot9strap (Frogtool)](installing-boot9strap-(frogtool)), you should now use the "RESTORE clean DS Download Play" option in Frogtool to restore the DS Download Play application to its original state
+ Si anteriormente seguiste [Instalar boot9strap (Frogtool)](installing-boot9strap-(frogtool)), ahora deberías usar la opción "RESTORE clean DS Download Play" en Frogtool para restaurar la aplicación Modo Descarga de DS a su estado original
1. Inicia FBI desde la lista de homebrew
#### Sección IV - Instalar CIAs
@ -143,7 +145,7 @@ Si, antes de seguir esta guía, ya tenías una configuración EmuNAND y deseas m
1. Presiona (B) para volver al menú principal
1. Mantén (R) y presiona (B) al mismo tiempo para extraer la SD
1. Inserta tu tarjeta SD en tu computadora
1. Copia `<fecha>_<númerodeserie>_sysnand###.bin`, `essential.exefs` y `boot9.bin` desde la carpeta `/gm9/out/` en tu tarjeta SD a una ubicación segura en tu computadora
1. Copia `<date>_<serialnumber>_sysnand_###.bin`, `<date>_<serialnumber>_sysnand_###.bin.sha`, `essential.exefs` y `boot9.bin` desde la carpeta `/gm9/out/` en tu tarjeta SD a un lugar seguro en tu computadora
+ Haz copias de seguridad en múltiples sitios (como por ejemplo, en un pendrive o almacenamiento online)
+ Estos respaldos podrán prevenir que se inutilice la consola y/o ayudarte a recuperar archivos de la memoria de tu consola si algo sale mal en el futuro
1. Elimina `<date>_<serialnumber>_sysnand_###.bin` y `<date>_<serialnumber>_sysnand_###.bin.sha` de la carpeta `/gm9/out/` de tu tarjeta SD después de copiarla

View file

@ -80,5 +80,5 @@ Para extraer los archivos `.7z` enlazados esta página, necesitarás un gestor d
![]({{ "/images/screenshots/homebrew-launcher.png" | absolute_url }})
{: .notice--info}
### Continue to [Installing boot9strap (SafeB9SInstaller)](installing-boot9strap-(safeb9sinstaller))
### Continúa a [Instalar boot9strap (SafeB9SInstaller)](installing-boot9strap-(safeb9sinstaller))
{: .notice--primary}

View file

@ -77,5 +77,5 @@ Ten en cuenta que las actualizaciones con cartucho sólo actualizarán los eleme
___
### Continue to [Installing boot9strap (SafeB9SInstaller)](installing-boot9strap-(safeb9sinstaller))
### Continúa en [Instalar boot9strap (SafeB9SInstaller)](installing-boot9strap-(safeb9sinstaller))
{: .notice--primary}

View file

@ -6,17 +6,18 @@ title: "Homebrew Launcher (Steelhax)"
### Lectura requerida
This method of using Seedminer for further exploitation uses your `movable.sed` file to gain access to the Homebrew Launcher using the Steelhax exploit for the purposes of injecting an exploitable DSiWare title into the DS Download Play application. This method requires you to already own (or download) the free "Steel Divers: Sub Wars" game from the eShop.
Este método de uso de Seedminer, para hacer un mejor exploit, utiliza tu archivo `movable.sed` para obtener acceso al Homebrew Launcher por medio del exploit Steelhax, tras lo cual inyectar un juego vulnerable de DSiWare en la aplicación de Modo Descarga de DS. Este método requiere que poseas (o descargues si no lo tienes) el juego gratuito "Steel Divers: Sub Wars" desde la eShop.
If your device already has access to the Homebrew Launcher (whether through Steelhax or another exploit), you can skip to [Installing Boot9strap (Frogminer)](installing-boot9strap-(frogminer)).
Si tu dispositivo ya posee acceso al Homebrew Launcher (ya sea a través de Steelhax o de otro exploit), puedes saltar a [Instalar Boot9strap (Frogtool)](installing-boot9strap-(frogtool)).
{: .notice--success}
If you already have Steel Diver: Sub Wars, this process will overwrite your game's save file!
Si ya tenías Steel Diver: Sub Wars, ¡este proceso sobreescribirá tu archivo de guardado!
{: .notice--warning}
### Qué necesitas
* The free eShop game "Steel Diver: Sub Wars"
* El juego gratuito "Steel Diver: Sub Wars" de la eShop
* Tu archivo `movable.sed` proveniente de haber completado [Seedminer](seedminer)
* La última versión [del Homebrew Launcher](https://github.com/fincs/new-hbmenu/releases/latest)
* La última versión de [Steelhax](https://github.com/VegaRoXas/vegaroxas.github.io/raw/master/files/steelhax-installer.rar)
* El [otherapp payload](https://smealum.github.io/3ds/#otherapp) *(correspondiente a tu versión del sistema y región)*
@ -30,16 +31,16 @@ If you already have Steel Diver: Sub Wars, this process will overwrite your game
1. Copia la carpeta `steelhax` contenida en el `.rar` de Steelhax a la raíz de tu tarjeta SD
1. Copia el otherapp payload a la carpeta `steelhax` en tu tarjeta SD y cambia su nombre a `payload.bin`
#### Section II - Steelminer
#### Sección II - Steelminer
1. Insert your SD card into your device
1. Inserta tu tarjeta SD en tu consola
1. Inicia "Steel Diver: Sub Wars" y selecciona un Mii para crear un archivo de guardado
+ Rechaza la actualización del juego cuando lo pregunte
+ Si ya has actualizado el juego, usa el menú de Gestión de datos en la Configuración de la consola para eliminar la actualización
1. Sal de "Steel Diver: Sub Wars"
1. Apaga tu consola
1. Inserta tu tarjeta SD en tu computadora
1. Abre [el sitio web de inyección de Steelminer](http://steelminer.jisagi.net/injector) en tu computadora
1. Abre [el sitio web de inyección de Steelminer](https://bruteforcemovable.com/steelhax/) en tu computadora
1. Selecciona tu archivo `movable.sed`
1. Selecciona "Start!"
1. Espera a que el procesos se complete
@ -53,10 +54,10 @@ If you already have Steel Diver: Sub Wars, this process will overwrite your game
1. Enciende tu consola
1. Inicia "Steel Diver: Sub Wars"
1. Si el exploit fue exitoso, tu consola habrá cargado el Hombrew Launcher
+ You may see an error stating there are no applications found.
1. Power off your device.
+ Es posible que aparezca un error diciendo que no se han encontrado aplicaciones.
1. Apaga tu consola.
___
### Continue to [Installing Boot9strap (Frogtool)](installing-boot9strap-(frogtool))
### Continúa a [Instalar Boot9strap (Frogtool)](installing-boot9strap-(frogtool))
{: .notice--primary}

View file

@ -1,26 +1,24 @@
---
title: "Installing Boot9strap (Fredtool)"
title: "Instalar Boot9strap (Fredtool)"
---
{% include toc title="Tabla de contenidos" %}
### Lectura requerida
This method of using Seedminer for further exploitation uses your `movable.sed` file to decrypt any DSiWare eShop title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. This requires you to already own (or download / buy) a DSiWare game from the eShop.
Este método de uso de Seedminer, para hacer un mejor exploit, utiliza tu archivo `movable.sed` para desencriptar cualquier título de DSiWare de la eShop que haya disponible con el objetivo de inyectar un título de DSiWare vulnerable en la aplicación de Configuración de Internet de DS. Esto requiere que ya poseas (o descargues/compres) un juego de DSiWare de la eShop.
Todo esto son implementaciones funcionales del exploit "Particiones FIRM de texto plano conocido" detallado [aquí](https://www.3dbrew.org/wiki/3DS_System_Flaws) (*en inglés*).
Para utilizar los enlaces [magnet](https://wikipedia.org/wiki/Magnet_URI_scheme) de esta página, vas a necesitar un cliente torrent como [Deluge](http://dev.deluge-torrent.org/wiki/Download).
Para extraer los archivos `.7z` y `.rar` enlazados esta página, necesitarás un gestor de archivos como [7-Zip](http://www.7-zip.org/) o [The Unarchiver](https://theunarchiver.com/).
### Qué necesitas
* Any eShop DSiWare game
+ JPN region users can download the free title "ほぼ日の健康手帳™" ([![]({{ "/images/qrcodes/50010000005133.png" | absolute_url }}){: height="24px" width="24px"})]({{ "/images/qrcodes/50010000005133.png" | absolute_url }})
+ USA region users can download the free title "Nintendo Fan Network" ([![]({{ "/images/qrcodes/50010000013696.png" | absolute_url }}){: height="24px" width="24px"})]({{ "/images/qrcodes/50010000013696.png" | absolute_url }})
* Your `movable.sed` file from completing [Seedminer](seedminer)
* The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest)
* Cualquier juego de DSiWare de la eShop
+ Los usuarios de región JPN pueden descargar gratis el título "ほぼ日の健康手帳™" ([![]({{ "/images/qrcodes/50010000005133.png" | absolute_url }}){: height="24px" width="24px"})]({{ "/images/qrcodes/50010000005133.png" | absolute_url }})
+ Los usuarios de región USA pueden descargar gratis el título "Nintendo Fan Network" ([![]({{ "/images/qrcodes/50010000013696.png" | absolute_url }}){: height="24px" width="24px"})]({{ "/images/qrcodes/50010000013696.png" | absolute_url }})
* Tu archivo `movable.sed` proveniente de haber completado [Seedminer](seedminer)
* La última versión de [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest)
* La ultima versión de [b9sTool](https://github.com/zoogie/b9sTool/releases/latest)
* La última versión de [Luma3DS](https://github.com/AuroraWright/Luma3DS/releases/latest) *(el archivo`.7z`)*
* La última versión [del Homebrew Launcher](https://github.com/fincs/new-hbmenu/releases/latest)
@ -29,55 +27,55 @@ Para extraer los archivos `.7z` y `.rar` enlazados esta página, necesitarás un
1. Entra a Configuración de la consola
1. Ve a `Data Management` -> `DSiWare`
1. Under the "System Memory" section, select your DSiWare game
1. Ve a la sección "Memoria de la Consola" y selecciona tu juego de DSiWare
1. Selecciona "Copiar", luego "OK"
+ Si se te pide, sobreescribe la copia en caso de existir
1. Apaga tu consola
1. Inserta tu tarjeta SD en tu computadora
1. Copy your `movable.sed` file to the root of your SD card
1. Copia tu archivo `movable.sed` a la raíz de tu tarjeta SD
1. Copia el archivo `boot.firm` desde el `.7z` de Luma3DS a la raíz de tu tarjeta SD
1. Copia `boot.nds` (B9STool) a la raíz de tu tarjeta SD
1. Copia `boot.3dsx` a la raíz de tu tarjeta SD
1. Copy the `private` folder from the Frogminer_save `.zip` to the root of your SD card
1. Navigate to `Nintendo 3DS` -> `<ID0>` -> `<32-character-id>` -> `Nintendo DSiWare` on your SD card
+ This `<ID0>` will be the same one that you used in [Seedminer](seedminer)
1. Copia la carpeta `private` contenida en el `.zip` de Frogminer_save a la raíz de tu tarjeta SD
1. Ve a `Nintendo 3DS` -> `<ID0>` -> `<ID-de-32-caracteres>` -> `Nintendo DSiWare` en tu tarjeta SD
+ La `<ID0>` en cuestión es la misma que usaste en [Seedminer](seedminer)
1. Copia `<ID-de-8-caracteres>.bin` a una carpeta en tu computadora
+ If there are multiple `<8-character-id>.bin` files, just pick one. It doesn't matter which you use.
+ Si hay varios archivos llamados `<ID-de-8-caracteres>.bin`, elige uno cualquiera. No importa cuál uses.
#### Section II - Fredtool
#### Sección II - Fredtool
1. Open [Fredtool](https://fredtool.bruteforcemovable.com/) on your computer
1. Select your `movable.sed` file for the "Your movable.sed" field
1. Select your `<8-character-id>.bin` file for the "Your dsiware.bin" field
1. Abre [Fredtool](https://fredtool.bruteforcemovable.com/) en tu computadora
1. Selecciona tu archivo `movable.sed` para completar el campo "Your movable.sed"
1. Selecciona tu archivo `<ID-de-8-caracteres>.bin` para completar el campo "Your dsiware.bin"
1. Completa el captcha que dice "I'm not a robot"
1. Select "Start"
1. Selecciona "Start"
1. Espera a que el procesos se complete
1. When the process has completed, download your modified DSiWare archive from the site
1. Copy the `42383841.bin` file from the `output/hax/` folder of the downloaded DSiWare archive to the `Nintendo 3DS/<ID0>/<32-character-id>/Nintendo DSiWare/` folder on your SD card
+ This should be different than your initial `<8-character-id>.bin` file
+ Do not remove any existing `<8-character-id>.bin` files
1. Cuando el proceso haya finalizado, descarga tu archivo modificado de DSiWare desde el sitio
1. Copia el archivo `42383841.bin` presente en la carpeta `output/hax/` del archivo DSiWare que descargaste, a la carpeta `Nintendo 3DS/<ID0>/<32-character-id>/Nintendo DSiWare/` en tu tarjeta SD
+ El mismo debería ser distinto al archivo `<ID-de-8-caracteres>.bin` inicial
+ No remuevas ninguno de los archivos `<ID-de-8-caracteres>.bin`
1. Vuelve a insertar tu tarjeta SD en tu consola
1. Enciende tu consola
1. Entra a Configuración de la consola
1. Ve a `Data Management` -> `DSiWare`
1. Under the "SD Card" section, select the "Haxxxxxxxxx!" title
1. En la sección "Tarjeta SD", elige el título "Haxxxxxxxxx!"
1. Selecciona "Copiar", luego "OK"
1. Return to main menu of the System Settings
1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK"
1. Regresa al menú principal de Configuración de la Consola
1. Ve a `Configuraciones de Internet` -> `Conexiones de Nintendo DS`, luego elige "OK"
1. Si el exploit fue exitoso, tu consola habrá cargado la versión japonesa de Flipnote Studio
#### Section III - Flipnote Exploit
#### Sección III - Exploit de Flipnote
If you would prefer a visual guide to this section, one is available [here](https://zoogie.github.io/web/flipnote_directions/).
Si prefieres una guía visual para esta parte, hay una disponible [aquí](https://zoogie.github.io/web/flipnote_directions/).
{: .notice--info}
1. Completa la configuración del juego hasta que llegues al menú principal
+ Selecciona la opción de la izquierda cuando te lo pida durante la configuración inicial
1. Utilizando la pantalla táctil, selecciona el cuadrado grande de la izquierda, luego selecciona el cuadrado con el ícono de una tarjeta SD
1. Una vez que cargue el menú, selecciona el ícono con una cara, luego el ícono abajo a la derecha de la pantalla para continuar
1. Select the frog icon at the bottom left
+ Alternatively, press (X) or (UP) on the D-Pad depending on which is shown on the top screen
1. Select the second button along the top with a film-reel icon
1. Elige el ícono de la rana abajo del todo a la izquierda
+ Alternativamente, puedes presionar (X) o (Arriba) en el D-Pad dependiendo de cuál que se muestre en la pantalla superior
1. Elige el segundo botón de los que están en la parte de arriba, con un ícono de rollo de película
1. Ve hacia la derecha hasta seleccionar el carrete "3/3"
1. Toca el tercer cuadrado con una letra "A" en él
1. Ve hacia la izquierda hasta el carrete "1/3"
@ -86,7 +84,7 @@ If you would prefer a visual guide to this section, one is available [here](http
1. Selecciona "Install boot9strap" y confirma
1. Sal de b9sTool, luego apaga tu consola
+ Puede que tengas que forzar el apagado manteniendo pulsado el botón de encendido
+ If you see the Luma Configuration screen, continue with the guide without powering off
+ Si ves la pantalla de configuración de Luma, continúa con la guía sin apagar la consola
#### Sección IV - Configurar Luma3DS
@ -97,17 +95,17 @@ If you would prefer a visual guide to this section, one is available [here](http
1. Presiona (Start) para guardar y reiniciar
+ Si la pantalla se queda en negro, [sigue la guía de problemas](troubleshooting#black-screen-on-sysnand-boot-after-installing-boot9strap)
#### Section V - Restoring DS Connection Settings
#### Sección V - Restaurar el menú de Configuración de Internet de DS
1. Apaga tu consola
1. Inserta tu tarjeta SD en tu computadora
1. Copy the `42383841.bin` file from the `output/clean/` folder of the downloaded DSiWare archive to the `Nintendo 3DS/<ID0>/<32-character-id>/Nintendo DSiWare/` folder on your SD card
+ Replace the existing `42383841.bin` file
1. Copia el archivo `42383841.bin` presente en la carpeta `output/clean/` del archivo de DSiWare que descargaste a la carpeta `Nintendo 3DS/<ID0>/<32-character-id>/Nintendo DSiWare/` en tu tarjeta SD
+ Reemplaza el archivo `42383841.bin` ya existente
1. Vuelve a insertar tu tarjeta SD en tu consola
1. Enciende tu consola
1. Entra a Configuración de la consola
1. Ve a `Data Management` -> `DSiWare`
1. Under the "SD Card" section, select the "Nintendo DSi™" title
1. En la sección "Tarjeta SD", elige el título "Nintendo DSi™"
1. Selecciona "Copiar", luego "OK"
___

View file

@ -1,12 +1,12 @@
---
title: "Installing Boot9strap (Frogtool)"
title: "Instalar boot9strap (Frogtool)"
---
{% include toc title="Tabla de contenidos" %}
### Lectura requerida
We will now use our Homebrew Launcher access to run the Frogtool utility in order to inject the exploitable Japanese version of the "Flipnote Studio" title, which we then use to run b9sTool and install boot9strap.
Ahora aprovecharemos el acceso al Homebrew Launcher para ejecutar la aplicación Frogtool e inyectar la versión japonesa del título "Flipnote Studio", la cual usaremos posteriormente para ejecutar b9sTool e instalar boot9strap.
Todo esto son implementaciones funcionales del exploit "Particiones FIRM de texto plano conocido" detallado [aquí](https://www.3dbrew.org/wiki/3DS_System_Flaws) (*en inglés*).
@ -16,7 +16,7 @@ Para extraer los archivos `.7z` y `.rar` enlazados esta página, necesitarás un
### Qué necesitas
* Your `movable.sed` file from completing [Seedminer](seedminer)
* Tu archivo `movable.sed` proveniente de haber completado [Seedminer](seedminer)
* <i class="fa fa-magnet" aria-hidden="true" title="Este es un enlace magnético. Usa un cliente torrent para descargar el archivo."></i> - [frogcert.bin](magnet:?xt=urn:btih:d12278ea50bb3574f1fbd327f3d0e2292c70941f&dn=frogcert.bin&tr=https%3a%2f%2ftracker.fastdownload.xyz%3a443%2fannounce&tr=https%3a%2f%2fopentracker.xyz%3a443%2fannounce&tr=http%3a%2f%2fopen.trackerlist.xyz%3a80%2fannounce&tr=http%3a%2f%2ft.nyaatracker.com%3a80%2fannounce&tr=udp%3a%2f%2ftracker.tiny-vps.com%3a6969%2fannounce&tr=udp%3a%2f%2fopen.demonii.si%3a1337%2fannounce&tr=udp%3a%2f%2ftracker.port443.xyz%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.vanitycore.co%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.torrent.eu.org%3a451%2fannounce&tr=udp%3a%2f%2fretracker.lanta-net.ru%3a2710%2fannounce&tr=udp%3a%2f%2fthetracker.org%3a80%2fannounce&tr=http%3a%2f%2ftorrent.nwps.ws%3a80%2fannounce&tr=udp%3a%2f%2ftracker.coppersurfer.tk%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.iamhansen.xyz%3a2000%2fannounce&tr=udp%3a%2f%2fbt.xxx-tracker.com%3a2710%2fannounce&tr=http%3a%2f%2f0d.kebhana.mx%3a443%2fannounce&tr=udp%3a%2f%2fexodus.desync.com%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.opentrackr.org%3a1337%2fannounce&tr=udp%3a%2f%2ftracker4.itzmx.com%3a2710%2fannounce&tr=udp%3a%2f%2ftracker.justseed.it%3a1337%2fannounce&tr=http%3a%2f%2ftherightsize.net%3a1337%2fannounce&tr=udp%3a%2f%2fretracker.hotplug.ru%3a2710%2fannounce&tr=udp%3a%2f%2ftracker.internetwarriors.net%3a1337%2fannounce&tr=udp%3a%2f%2f9.rarbg.com%3a2800%2fannounce&tr=https%3a%2f%2f2.track.ga%3a443%2fannounce&tr=udp%3a%2f%2fbigfoot1942.sektori.org%3a6969%2fannounce)
* La última versión de [Frogtool](https://github.com/zoogie/Frogtool/releases/latest)
* La ultima versión de [b9sTool](https://github.com/zoogie/b9sTool/releases/latest)
@ -25,7 +25,7 @@ Para extraer los archivos `.7z` y `.rar` enlazados esta página, necesitarás un
#### Sección I - Preparativos
1. Inserta tu tarjeta SD en tu computadora
1. Copy your `movable.sed` file to the root of your SD card
1. Copia tu archivo `movable.sed` a la raíz de tu tarjeta SD
1. Copia el archivo `boot.firm` desde el `.7z` de Luma3DS a la raíz de tu tarjeta SD
1. Copia `boot.nds` (B9STool) a la raíz de tu tarjeta SD
1. Copia `Frogtool.3dsx` a la carpeta `/3ds/` en tu tarjeta SD
@ -33,27 +33,27 @@ Para extraer los archivos `.7z` y `.rar` enlazados esta página, necesitarás un
1. Vuelve a insertar tu tarjeta SD en tu consola
1. Enciende tu consola
#### Section II - Patching DS Download Play
#### Sección II - Parchear el Modo Descarga de DS
1. Open the Homebrew Launcher using any method
1. Abre el Homebrew Launcher usando cualquier método
1. Inicia Frogtool desde la lista de homebrew
1. Selecciona la opción "INJECT patched DS Download Play"
1. Frogtool automáticamente ejecutará e inyectará la versión JPN de Flipnote Studio en tu Modo Descarga de DS
1. Una vez terminada la operación, presiona la pantalla táctil selecciona "BOOT patched DS Download Play"
1. Si el exploit fue exitoso, tu consola habrá cargado la versión japonesa de Flipnote Studio
#### Section III - Flipnote Exploit
#### Sección III - Exploit de Flipnote
If you would prefer a visual guide to this section, one is available [here](https://zoogie.github.io/web/flipnote_directions/).
Si prefieres una guía visual para esta parte, hay una disponible [aquí](https://zoogie.github.io/web/flipnote_directions/).
{: .notice--info}
1. Completa la configuración del juego hasta que llegues al menú principal
+ Selecciona la opción de la izquierda cuando te lo pida durante la configuración inicial
1. Utilizando la pantalla táctil, selecciona el cuadrado grande de la izquierda, luego selecciona el cuadrado con el ícono de una tarjeta SD
1. Una vez que cargue el menú, selecciona el ícono con una cara, luego el ícono abajo a la derecha de la pantalla para continuar
1. Select the frog icon at the bottom left
+ Alternatively, press (X) or (UP) on the D-Pad depending on which is shown on the top screen
1. Select the second button along the top with a film-reel icon
1. Elige el ícono de la rana abajo del todo a la izquierda
+ Alternativamente, puedes presionar (X) o (Arriba) en el D-Pad dependiendo de cuál que se muestre en la pantalla superior
1. Elige el segundo botón de los que están en la parte de arriba, con un ícono de rollo de película
1. Ve hacia la derecha hasta seleccionar el carrete "3/3"
1. Toca el tercer cuadrado con una letra "A" en él
1. Ve hacia la izquierda hasta el carrete "1/3"
@ -62,7 +62,7 @@ If you would prefer a visual guide to this section, one is available [here](http
1. Selecciona "Install boot9strap" y confirma
1. Sal de b9sTool, luego apaga tu consola
+ Puede que tengas que forzar el apagado manteniendo pulsado el botón de encendido
+ If you see the Luma configuration menu, continue without powering off
+ Si ves el menú de configuración de Luma, continúa sin apagar la consola
#### Sección IV - Configurar Luma3DS

View file

@ -1,5 +1,5 @@
---
title: "Installing boot9strap (SafeB9SInstaller)"
title: "Instalar boot9strap (SafeB9SInstaller)"
---
{% include toc title="Tabla de contenidos" %}

View file

@ -17,14 +17,14 @@ Ten en cuenta que cartuchos que tengan una "Bomba de tiempo" incorporados no pod
| Nombre de la flashcart | Precio actual |¿Tiene "bomba de tiempo"? | ¿Versiones de 3DS? | ¿Versiones de DSi? | Notas Adicionales |
|-|-:|:-:|:-:|:-:|-|
| [**R4i-SDHC B9S**](http://www.nds-card.net/ProShow.asp?ProID=574) | $15.99 | 3 de Septiembre de 2019 | <= 11.9.0 | <= 1.4.5 | **Viene pre-flasheado con ntrboot**; puede ser flasheado de nuevo a un flashcart NDS. |
| [**R4i Gold 3DS Plus**](http://www.nds-card.net/ProShow.asp?ProID=575) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | **Viene pre-flasheado con ntrboot** ([interruptor interno para cambiar entre los modos ntrboot y NDS]({{ "/images/screenshots/r4i-gold-3ds-plus.png" | absolute_url }})); no flashear manualmente con ntrboot. |
| [**Acekard 2i**](http://www.nds-card.net/ProShow.asp?ProID=160) | $20.99 | No | <= 4.3.0 | <= 1.4.4 | |
| [**DSTT**](http://www.nds-card.net/ProShow.asp?ProID=157) | $9.99 | No | Ninguna | Ninguna | Solo modelos con [ciertos chips flash](https://gist.github.com/yuukieve/6b48f1bb8dd15136403c15c39fafdb42) son compatibles con ntrboot. |
| [**R4i Gold 3DS**](http://www.nds-card.net/ProShow.asp?ProID=149) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | Todas las revisiones RTS son compatibles. |
| [**R4i-SDHC 3DS RTS**](http://www.nds-card.net/ProShow.asp?ProID=146) | $13.99 | 1.87: 3 de septiembre de 2019 | <= 11.9.0 | <= 1.4.5 | |
| [**R4iSDHC GOLD Pro 20XX**](http://www.nds-card.net/ProShow.asp?ProID=490) | $9.99 | 3.9b: 3 de septiembre de 2019 | <= 11.9.0 | <= 1.4.5 | Todos los flashcarts R4iSDHC 20XX son idénticos. Los modelos de 2013 son incompatibles. |
| [**R4iSDHC RTS LITE 20XX**](http://www.nds-card.net/ProShow.asp?ProID=450) | $13.99 | 3.9b: 3 de septiembre de 2019 | <= 11.9.0 | <= 1.4.5 | Todos los flashcarts R4iSDHC 20XX son idénticos. Los modelos de 2013 son incompatibles. |
| [**R4i-SDHC B9S**](http://www.nds-card.com/ProShow.asp?ProID=574) | $15.99 | 3 de Septiembre de 2019 | <= 11.9.0 | <= 1.4.5 | **Viene pre-flasheado con ntrboot**; puede ser flasheado de nuevo a un flashcart NDS. |
| [**R4i Gold 3DS Plus**](http://www.nds-card.com/ProShow.asp?ProID=575) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | **Viene pre-flasheado con ntrboot** ([interruptor interno para cambiar entre los modos ntrboot y NDS]({{ "/images/screenshots/r4i-gold-3ds-plus.png" | absolute_url }})); no flashear manualmente con ntrboot. |
| [**Acekard 2i**](http://www.nds-card.com/ProShow.asp?ProID=160) | $20.99 | No | <= 4.3.0 | <= 1.4.4 | |
| [**DSTT**](http://www.nds-card.com/ProShow.asp?ProID=157) | $9.99 | No | Ninguna | Ninguna | Sólo los modelos con [ciertos chips flash](https://gist.github.com/yuukieve/6b48f1bb8dd15136403c15c39fafdb42) son compatibles con ntrboot. |
| [**R4i Gold 3DS**](http://www.nds-card.com/ProShow.asp?ProID=149) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | Todas las revisiones RTS son compatibles. |
| [**R4i-SDHC 3DS RTS**](http://www.nds-card.com/ProShow.asp?ProID=146) | $13.99 | 1.87: 3 de septiembre de 2019 | <= 11.9.0 | <= 1.4.5 | |
| [**R4iSDHC GOLD Pro 20XX**](http://www.nds-card.com/ProShow.asp?ProID=490) | $9.99 | 3.9b: 3 de septiembre de 2019 | <= 11.9.0 | <= 1.4.5 | Todos los flashcarts R4iSDHC 20XX son idénticos. Los modelos de 2013 son incompatibles. |
| [**R4iSDHC RTS LITE 20XX**](http://www.nds-card.com/ProShow.asp?ProID=450) | $13.99 | 3.9b: 3 de septiembre de 2019 | <= 11.9.0 | <= 1.4.5 | Todos los flashcarts R4iSDHC 20XX son idénticos. Los modelos de 2013 son incompatibles. |
| **Ace3DS X** | | No | <= 11.9.0 | <= 1.4.5 | **Viene con ntrboot pre-flasheado** (posee interruptor externo para alternar entre modo ntrboot ("3DS") y modo NDS); no flashear manualmente con ntrboot. |
| **Ace3DS Plus** | | No | <= 11.9.0 | <= 1.4.5 | |
| **Gateway Blue** | | No | 4.1.0 - 4.5.0 | <= 1.4.5 | |
@ -49,7 +49,7 @@ Para probar si un imán sirve, mantenlo en o alrededor de los botones (A)(B)(X)(
Ten en cuenta que no podrás usar las funciones estándar del flashcart mientras tenga instalado el exploit de ntrboot (excepto en el caso de la Acekard 2i, que sigue funcional *en NDS y sistemas 3DS con custom firmware*). Esto significa que, para la mayoría de las flashcarts, ni siquiera se mostrarán en el Menú HOME. Hay pasos opcionales al final de las instrucciones de flasheo de ntrboot para eliminarlo de la flashcart cuando termines.
Ten en cuenta que en raras ocasiones, es posible que realizar el proceso de flasheo en un clon de flashcart podría dejarla **permanentemente inutilizable**. Esto es poco probable, pero sin embargo, sólo las flashcarts originales mencionadas tienen soporte. Para reducir la posibilidad de recibir una tarjeta clon, se recomienda que utilices un sitio con buena reputación para comprar tu flashcart (como [NDS Card](http://www.nds-card.net/))
Ten en cuenta que en raras ocasiones, es posible que realizar el proceso de flasheo en un clon de flashcart podría dejarla **permanentemente inutilizable**. Esto es poco probable, pero sin embargo, sólo las flashcarts originales mencionadas tienen soporte. Para reducir la posibilidad de recibir un clon, se recomienda que utilizar un sitio de confianza para comprar una flashcart (como [NDS Card](http://www.nds-card.com/))
{: .notice--danger}
___

View file

@ -6,81 +6,79 @@ title: "Seedminer"
### Lectura requerida
To install boot9strap on your device, we exploit an oversight in the security restrictions applied to "DSiWare" applications.
Para instalar boot9strap en tu consola nos aprovecharemos de un descuido existente en las restricciones de seguridad aplicadas a las aplicaciones "DSiWare".
To accomplish this, we use a tool called Seedminer to calculate the DSiWare encryption key (`movable.sed`) for your device. We then use this DSiWare encryption key to decrypt a compatible DSiWare application and inject an exploit into it to run our own code (the exact exploit used will depend on your device's region).
Para lograrlo, utilizaremos una herramienta llamada Seedminer para calcular la clave de encriptación (`movable.sed`) de tu consola. Luego usaremos esta llave de encriptación de DSiWare para desencriptar una aplicación de DSiWare compatible, e inyectar un exploit en ella para así poder ejecutar nuestro propio código (el exploit específico a utilizar dependerá de la región de tu consola).
If this key were completely random, the encryption key would be impossible to break on current computing hardware. Fortunately, the first half of the key (`movable_part1.sed`) is actually mathematically related to your device's Friend Code, allowing us to break the encryption. For information on how Seedminer works, please see [this presentation](https://zoogie.github.io/web/34⅕c3).
Si esta llave fuese completamente aleatoria, sería imposible calcularla con el hardware de computación que existe actualmente. Afortunadamente, la primera mitad de la clave (`movable_part1.sed`) está relacionada matemáticamente con el código de amigo de tu consola, permitiéndonos romper la encriptación. Para más información sobre cómo funciona Seedminer, por favor echa un vistazo a [esta presentación](https://zoogie.github.io/web/34⅕c3).
Note that this tool requires a PC with a powerful graphics card to break your device's DSiWare encryption. If you do not have access to one of these, there also exists several online helper services where a volunteer running automated software will do this for you.
Ten en cuenta que esta herramienta requiere de un PC con una tarjeta gráfica muy poderosa para que pueda romper la encriptación DSiWare de tu consola. Si no tienes acceso a uno, también existen varios servicios de ayuda en línea donde un voluntario ejecutando software automatizado hará esto por ti.
### Instrucciones
#### Section I - Compatibility Tests
#### Sección I - Pruebas de compatibilidad
While these tests are not strictly necessary to perform the Seedminer exploit, the follow-up exploits to this do require this test to be performed and it would be a waste of time and effort to perform Seedminer without the ability to use the other exploits.
Si bien estas pruebas no son estrictamente necesarias para poder ejecutar el exploit Seedminer, los exploits posteriores a éste requieren que las pruebas se realicen y sería una pérdida de tiempo y esfuerzo ejecutar Seedminer sin ser capaz de ejecutar el resto de exploits.
There are two different methods for building on the Seedminer exploit (described in more detail at the bottom of this page), so even if one of these test fails you can still use another method as long as the other does not fail.
Existen dos métodos diferentes que se basan en el exploit Seedminer (descriptos en más detalle al pie de la página), de modo que si una de las pruebas falla todavía puedes utilizar el otro método siempre y cuando la otra prueba no falle.
#### DS Internet Settings Test (used for Fredtool)
#### Prueba de la Configuración de Internet de DS (utilizada para Fredtool)
1. Go to System Settings, then "Internet Settings", then "Nintendo DS Connections"
1. Press "OK"
1. If your device loads into a "Nintendo Wi-Fi Connection Setup" menu, the test was successful
+ If the screen stays black or appears to freeze, the test has failed and you will not be able to use the Fredtool method which requires a functioning DS Internet Settings
1. Exit this menu
1. Ve a Configuración de la Consola, luego a "Ajustes de Internet", luego a "Conexiones de Nintendo DS"
1. Presiona "OK"
1. Si tu consola carga un menú que dice "Nintendo Wi-Fi Connection Setup", la prueba fue exitosa
+ Si la pantalla se queda en negro o parece estar congelada, la prueba ha fallado; no podrás utilizar el método de Fredtool ya que es necesario que la Configuración de Internet de DS funcione correctamente
1. Sal de este menú
#### DS Download Play Test (used for Frogtool)
#### Prueba del Modo Descarga de DS (utilizado para Frogtool)
1. Ejecuta la aplicación Modo Descarga (![]({{ "/images/download-play-icon.png" | absolute_url }}){: height="24px" width="24px"})
1. Select "Nintendo DS"
1. If your device loads into a "Download software via DS Download Play" menu, the test was successful
+ If the screen stays black or appears to freeze, the test has failed and you will not be able to use the Frogtool method which requires a functioning DS Download Play
1. Exit this menu
1. Selecciona "Nintendo DS"
1. Si tu consola carga un menú que dice "Download software via DS Download Play", la prueba fue exitosa
+ Si la pantalla se queda en negro o parece estar congelada, la prueba ha fallado; no podrás utilizar el método de Frogtool ya que es necesario que el Modo Descarga de DS funcione correctamente
1. Sal de este menú
#### Section II - Prep Work
#### Sección II - Preparativos
1. Inserta tu tarjeta SD en tu computadora
1. Navigate to the `Nintendo 3DS` folder on your SD card
1. Copy the 32 character long name of the folder you see
+ If you see multiple folders like this, perform the following:
+ Rename the `Nintendo 3DS` folder to `BACKUP_Nintendo 3DS`
+ Reinsert your SD card into your device and power on your device
+ Wait for the device to generate the SD card data
+ Power off your device and reinsert your SD card into your computer
+ Navigate to the `Nintendo 3DS` folder on your SD card
+ Copy the 32 character long name of the folder you see
+ Delete the `Nintendo 3DS` folder
+ Rename the `BACKUP_Nintendo 3DS` folder to `Nintendo 3DS`
1. Paste your 32 character long folder name into a document you can reference later
+ This folder name is also known as your "ID0"
1. Ve a la carpeta `Nintendo 3DS` en tu tarjeta SD
1. Copia el nombre de 32 caracteres que posee la carpeta que hay dentro
+ Si hay más de una carpeta, haz lo siguiente:
+ Renombra la carpeta `Nintendo 3DS` como `BACKUP_Nintendo 3DS`
+ Reinserta la tarjeta SD en tu consola y enciéndela
+ Espera a que la consola genere los datos necesarios en la tarjeta SD
+ Apaga la consola y vuelve a insertar la tarjeta SD en tu computadora
+ Ve a la carpeta `Nintendo 3DS` que se generó de nuevo en tu tarjeta SD
+ Copia el nombre de 32 caracteres que posee la carpeta que hay dentro
+ Borra la carpeta `Nintendo 3DS` que se generó
+ Renombra la carpeta `BACKUP_Nintendo 3DS` de vuelta a `Nintendo 3DS`
1. Pega el nombre de 32 caracteres en un documento que puedas tener a mano más tarde
+ Este nombre se conoce también como el "ID0" de tu consola
1. Enciende tu consola
1. Ve a tu Lista de Amigos (el [Icono Naranja con una cara]({{ "/images/friend-list-icon.png" | absolute_url }}) en la fila superior de tu Menú HOME)
+ If you receive an error and are kicked out of the menu, you either must create a new Mii or your console cannot connect to Nintendo's servers (due to a ban or connection issues)
1. Find your Mii profile, then find the "Friend Code" field on the top screen
+ Si recibes un error y eres expulsado del menú, es posible que debas crear un nuevo Mii o tu consola no pueda conectarse a los servidores de Nintendo (debido a un ban o problemas de conexión)
1. Encuentra el perfil de tu Mii, luego busca donde dice "Código de amigo" en la pantalla superior
#### Section III - Seedminer
#### Sección III - Seedminer
1. Open [Bruteforce Movable](https://bruteforcemovable.com/) on your computer
+ This site can automate the retrieval of `movable_part1.sed` (using a bot 3DS console) and the breaking of your device's DSiWare encryption (using a volunteer's computer to run Seedminer)
+ If you already have access to a 3DS capable of launching the Homebrew Launcher, you can manually retrieve your `movable_part1.sed` using that device by following [these](https://jisagi.github.io/SeedminerGuide/seedminerSelf/#section1) instructions
+ If you already have access to a PC with a powerful graphics card, you can manually calculate your `movable.sed` using it by following [these](https://jisagi.github.io/SeedminerGuide/seedminerSelf/#section2) instructions
+ If the automated service is nonfunctional and you cannot do one or both of those manually, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you
1. Enter your device's Friend Code (with no spaces or dashes) into the "Your friend code" field
1. Paste your device's 32 character long folder name into the "Your ID0" field
1. Entra a [Bruteforce Movable](https://bruteforcemovable.com/) en tu computadora
+ Este sitio puede automatizar la obtención del `movable_part1.sed` (utilizando un bot que simula una consola 3DS) y la ruptura de la encriptación DSiWare de tu consola (utilizando la computadora de un voluntario para ejecutar Seedminer)
+ Si el sistema automático no está operativo, únete al [Discord de Nintendo Homebrew](https://discord.gg/MWxPgEp) (en inglés) y pide ayuda a alguien de allí
1. Ingresa el código de amigo de tu consola (sin espacios ni guiones) en donde dice "Your friend code"
1. Copia y pega el nombre de 32 caracteres donde dice "Your ID0"
1. Completa el captcha que dice "I'm not a robot"
1. Select "Go"
+ If the site immediately goes to step 4, download your `movable.sed` file and continue with the next section.
1. When prompted, use the "Register Friend" button on your device to add the friend code of the bot 3DS console
1. Wait for the site to update
+ If it does not, wait a few minutes before refreshing the page once
1. Select "Continue"
1. Espera a que el procesos se complete
+ This can take a while (up to an hour in some cases)
+ During this process, the bot may not show up on your 3ds. As long as the website updates, this is not an issue.
+ If you are still waiting after an hour, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you
1. When the process has completed, download your `movable.sed` file from the site
+ Keep this file as you will need it in the upcoming pages
1. Selecciona "Go"
+ Si el sitio se mueve inmediatamente al paso 4, descarga tu archivo `movable.sed` y continúa con la siguiente sección.
1. Cuando te lo pida, utiliza el botón de "Añadir amigo" en tu consola para añadir el código de amigo del bot que simula una consola 3DS
1. Espera a que el sitio se actualice
+ Si no lo hace, espera unos minutos antes de recargar la página una vez
1. Una vez que el sitio procesa tu información, te dará la opción para "Continue" (Continuar) o "Do another device" (Hacer otro dispositivo). Haz click en el botón verde que dice "Continue"
1. Espera a que el resto del proceso termine
+ Esto es generalmente rápido (1-5 minutos) pero en algunos casos, puede tomar hasta media hora.
+ Durante este proceso, el bot que agregaste podría no ser mostrado en tu 3DS. Mientras no se actualice el sitio web, esto no es un problema.
+ Si todavía estás esperando luego de media hora, únete al [Discord de Nintendo Homebrew](https://discord.gg/MWxPgEp) (en inglés) y pide ayuda a alguien de allí
1. Cuando el proceso haya finalizado, descarga tu archivo `movable.sed` desde el sitio
+ Conserva este archivo ya que lo necesitarás en las próximas páginas
___
### Métodos
@ -89,25 +87,25 @@ ___
#### Seedminer + Fredtool
This method of using Seedminer for further exploitation uses your `movable.sed` file to decrypt any DSiWare eShop title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. This requires you to already own (or download / buy) a DSiWare game from the eShop.
Este método de uso de Seedminer, para hacer un mejor exploit, utiliza tu archivo `movable.sed` para desencriptar cualquier título de DSiWare de la eShop que haya disponible con el objetivo de inyectar un título de DSiWare vulnerable en la aplicación de Configuración de Internet de DS. Esto requiere que ya poseas (o descargues/compres) un juego de DSiWare de la eShop.
This method is compatible with all regions, though only the JPN and USA regions have free DSiWare titles in the eShop.
Este método es compatible con todas las regiones, aunque solamente las regiones JPN y USA poseen títulos de DSiWare gratuitos en la eShop.
This method requires that the DS Internet Settings be functioning properly (see the test at the top of this page).
Este método requiere que la Configuración de Internet de DS funcione correctamente (ver la prueba realizada al comienzo de la página).
Continue to [Installing boot9strap (Fredtool)](installing-boot9strap-(fredtool))
Continúa en [Instalar boot9strap (Fredtool)](installing-boot9strap-(fredtool))
{: .notice--primary}
___
#### Seedminer + Steelhax + Frogtool
This method of using Seedminer for further exploitation uses your `movable.sed` file to gain access to the Homebrew Launcher using the Steelhax exploit for the purposes of injecting an exploitable DSiWare title into the DS Download Play application. This method requires you to already own (or download) the free "Steel Divers: Sub Wars" game from the eShop.
Este método de uso de Seedminer, para hacer un mejor exploit, utiliza tu archivo `movable.sed` para obtener acceso al Homebrew Launcher por medio del exploit Steelhax, tras lo cual inyectar un juego vulnerable de DSiWare en la aplicación de Modo Descarga de DS. Este método requiere que poseas de antemano (o que descargues) el juego gratuito "Steel Divers: Sub Wars" desde la eShop.
This method is only compatible with the EUR, JPN, and USA regions, and is somewhat more complicated than the above method. It is only recommended to use this method if you have a EUR region device and do not wish to pay for a DSiWare game, or if the above method does not work for you for some reason.
Este método sólo es compatible con las regiones EUR, JPN y USA, y es un poco más complicado que el método anterior. Se recomienda utilizar este método solamente si posees una consola de región EUR y no deseas pagar por un juego de DSiWare, o si el método anterior no te sirve por algún motivo.
This method requires that the DS Download Play be functioning properly (see the test at the top of this page).
Este método requiere que el Modo Descarga de DS funcione correctamente (ver la prueba realizada el inicio de la página).
Continue to [Homebrew Launcher (Steelhax)](homebrew-launcher-(steelhax))
Continúa en [Homebrew Launcher (Steelhax)](homebrew-launcher-(steelhax))
{: .notice--primary}

View file

@ -9,7 +9,7 @@ sitemap: false
+ [Finalizar Instalación](finalizing-setup)
+ [Homebrew Launcher (Soundhax)](homebrew-launcher-(soundhax))
+ [Installing boot9strap (SafeB9SInstaller)](installing-boot9strap-(SafeB9SInstaller))
+ [Instalar boot9strap (SafeB9SInstaller)](installing-boot9strap-(SafeB9SInstaller))
{% endcapture %}
<div class="notice--info">{{ notice-1 | markdownify }}</div>
@ -39,12 +39,12 @@ sitemap: false
+ [Homebrew Launcher (Steelhax)](homebrew-launcher-(steelhax))
+ [Instalar boot9strap (2xrsa)](installing-boot9strap-(2xrsa))
+ [Instalar boot9strap (Navegador)](installing-boot9strap-(browser))
+ [Installing boot9strap (Fredtool)](installing-boot9strap-(fredtool))
+ [Installing boot9strap (Frogtool)](installing-boot9strap-(frogtool))
+ [Instalar boot9strap (Fredtool)](installing-boot9strap-(fredtool))
+ [Instalar boot9strap (Frogtool)](installing-boot9strap-(frogtool))
+ [Instalar boot9strap (Hardmod)](installing-boot9strap-(hardmod))
+ [Instalar boot9strap (MSET)](installing-boot9strap-(mset))
+ [Instalar boot9strap (ntrboot)](installing-boot9strap-(ntrboot))
+ [Installing boot9strap (SafeB9SInstaller)](installing-boot9strap-(SafeB9SInstaller))
+ [Instalar boot9strap (SafeB9SInstaller)](installing-boot9strap-(SafeB9SInstaller))
+ [Instalar boot9strap (Soundhax)](installing-boot9strap-(soundhax))
+ [Mover EmuNAND](move-emunand)
+ [ntrboot](ntrboot)

View file

@ -11,7 +11,7 @@ Esto removerá completamente el CFW de tu consola, incluyendo Boot9Strap y Luma3
Esto casi nunca es la solución para arreglar cualquier problema que encuentres en tu instalación del CFW. Una mejor idea sería leer la página de [solución de problemas](troubleshooting) o pedir ayuda en [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) (*en inglés*).
{: .notice--danger}
Cualquier juego sin firmar (ilegítimo) se volverá inutilizable y puede ser manualmente removido usando la sección de "Gestión de Datos" en la Configuración de la consola. Utiliza un [gestor de datos de guardado](https://github.com/FlagBrew/Checkpoint/releases/latest) para respaldar los datos de guardado de cualquier juego sin firmar (ilegítimo) que te sea de importancia conservar.
Cualquier juego sin firmar (ilegítimo) se volverá inutilizable y debe ser eliminado manualmente antes de comenzar este proceso yendo a la sección Gestión de datos en la Configuración de la consola. Utiliza un [gestor de datos de guardado](https://github.com/FlagBrew/Checkpoint/releases/latest) para respaldar los datos de guardado de cualquier juego sin firmar (ilegítimo) que te sea de importancia conservar.
Esto no afectará a tu NNID, ningún juego comprado legalmente o a los datos de guardado pertenecientes a dichos juegos.
@ -26,21 +26,43 @@ Ten en cuenta que si tienes archivos de payloads distintos de `GodMode9.firm` en
### Instrucciones
#### Sección I - Preparativos
#### Sección I - Prueba de seguridad
1. Apaga tu consola
1. Inserta tu tarjeta SD en tu computadora
1. Copia el archivo `GodMode9.firm` desde el `.zip` de GodMode9 a la carpeta `/luma/payloads/` en tu tarjeta SD
1. Copia la carpeta `gm9`contenida en el `.zip`de GodMode9 al directorio raíz de tu tarjeta SD
1. Vuelve a insertar tu tarjeta SD en tu consola
1. Enciende tu consola
#### Sección II - Ejecutar script de desinstalación
1. Inicia GodMode9 manteniendo presionado (Start) mientras enciendes la consola
1. Si se te pide crear copias de seguridad de archivos esenciales, presiona (A) para hacerlo y luego presiona (A) para continuar una vez que haya terminado
1. Si se te pide fijar la fecha y hora RTC, presiona (A) para hacerlo, luego define la fecha y la hora, y después presiona (A) para continuar
+ Ten en cuenta que, si tuviste que cambiar la fecha y hora RTC, también deberás cambiar la hora en la Configuración de la consola después de hacer esta guía
1. Ve a `[1:] SYSNAND CTRNAND > title > 00040138 > (X)0000002 > content`
+ En una consola "New", la (X) será un 2
+ En una consola "Old", la (X) será un 0
1. Selecciona el archivo `.app`
1. Selecciona `NCCH Image Options`
1. Selecciona `Mount image to drive`
1. En la ventana que aparece, abre la carpeta `exefs`
1. En esta carpeta, selecciona el archivo `.firm`
1. Selecciona "Firm Options"
1. Selecciona "Boot Firm"
1. Cuando se solicite, elige "decrypt and make a copy"
1. Deberías iniciar en el Menú HOME normal de 3DS. Si lo haces, apaga tu consola y continúa en la siguiente sección
+ Si NO inicias en el Menú HOME normal de 3DS, continuar con estas instrucciones **INHABILITARÁ** tu consola. Deberías unirte al [Discord de Nintendo Homebrew](https://discord.gg/MWxPgEp) y pide (en inglés) ayuda a alguien de allí
#### Sección II - Preparativos
1. Enciende tu consola
1. Ve a Configuración de la consola > Gestión de datos > Nintendo 3DS > Software
1. En esta lista de software, elimina cualquier contenido que no sea de Nintendo que hayas instalado durante el uso de CFW
+ Esto incluye software de sistema de uso común como FBI, Anemone3DS, Luma Updater, Homebrew Launcher, Checkpoint, y otros, junto a los juegos que no sean de eShop
+ No quitar software de CFW antes de desinstalarlo podría inhabilitar el acceso al menú Gestión de datos luego de desinstalar el CFW
1. Apaga tu consola
#### Sección III - Ejecutar script de desinstalación
1. Inicia GodMode9 manteniendo presionado (Start) mientras enciendes la consola
1. Presiona el botón (Home) para abrir el menú de acción
1. Selecciona "Scripts..."
1. Selecciona "GM9Megascript"

View file

@ -18,6 +18,8 @@ Tämän prosessin aikana myös asennetaan muun muassa seuraavat ohjelmat:
+ **Luma3DS Updater** *(päivittää CFW-asennuksesi helposti)*
+ **GodMode9** *(monikäyttöinen työkalu, jolla voi tehdä NANDiin ja pelikorttiin liittyviä toimintoja)*
+ **Homebrew Launcher Loader** *(avaa Homebrew Launcherin)*
+ **DSP1** *(allows homebrew applications to have sound)*
+ **ctr-no-timeoffset** *(removes the rtc offset so that the home menu and rtc timestamps match)*
### Tarpeet
@ -143,7 +145,7 @@ Jos sinulla oli ennen tämän oppaan aloittamista EmuNAND-kokoonpano, ja haluais
1. Paina (B):tä palataksesi päävalikkoon
1. Pidä (R):ää pohjassa ja paina samalla (B):tä irrottaaksesi SD-korttisi
1. Aseta SD-korttisi tietokoneeseesi
1. Copy `<date>_<serialnumber>_sysnand_###.bin`, `essential.exefs`, and `boot9.bin` from the `/gm9/out/` folder on your SD card to a safe location on your computer
1. Copy `<date>_<serialnumber>_sysnand_###.bin`, `<date>_<serialnumber>_sysnand_###.bin.sha`, `essential.exefs`, and `boot9.bin` from the `/gm9/out/` folder on your SD card to a safe location on your computer
+ Varmuuskopioi useaan eri paikkaan (kuten pilvipalveluihin)
+ Nämä varmuuskopiot pelastavat sinut konsolin vioittumiselta ja/tai auttavat palauttamaan tiedostoja NAND-näköistiedostosta, jos jokin menee pieleen tulevaisuudessa
1. Kun olet varmuuskopioinut NANDin, poista `<päivämäärä>_<sarjanumero>_sysnand_###.bin` ja `<päivämäärä>_<sarjanumero>_sysnand_###.bin.sha` SD-korttisi `/gm9/out/`-kansiosta

View file

@ -8,7 +8,7 @@ title: "Homebrew Launcher (Steelhax)"
This method of using Seedminer for further exploitation uses your `movable.sed` file to gain access to the Homebrew Launcher using the Steelhax exploit for the purposes of injecting an exploitable DSiWare title into the DS Download Play application. This method requires you to already own (or download) the free "Steel Divers: Sub Wars" game from the eShop.
If your device already has access to the Homebrew Launcher (whether through Steelhax or another exploit), you can skip to [Installing Boot9strap (Frogminer)](installing-boot9strap-(frogminer)).
If your device already has access to the Homebrew Launcher (whether through Steelhax or another exploit), you can skip to [Installing Boot9strap (Frogtool)](installing-boot9strap-(frogtool)).
{: .notice--success}
If you already have Steel Diver: Sub Wars, this process will overwrite your game's save file!
@ -17,6 +17,7 @@ If you already have Steel Diver: Sub Wars, this process will overwrite your game
### Tarpeet
* The free eShop game "Steel Diver: Sub Wars"
* Your `movable.sed` file from completing [Seedminer](seedminer)
* The latest release of [the Homebrew Launcher](https://github.com/fincs/new-hbmenu/releases/latest)
* The latest release of [Steelhax](https://github.com/VegaRoXas/vegaroxas.github.io/raw/master/files/steelhax-installer.rar)
* The [otherapp payload](https://smealum.github.io/3ds/#otherapp) *(for your region and version)*
@ -39,7 +40,7 @@ If you already have Steel Diver: Sub Wars, this process will overwrite your game
1. Exit "Steel Diver: Sub Wars"
1. Sammuta konsolisi
1. Aseta SD-korttisi tietokoneeseesi
1. Open [the Steelminer Injector website](http://steelminer.jisagi.net/injector) on your computer
1. Open [the Steelminer Injector website](https://bruteforcemovable.com/steelhax/) on your computer
1. Select your `movable.sed` file
1. Select "Start!"
1. Wait for the process to complete

View file

@ -10,8 +10,6 @@ This method of using Seedminer for further exploitation uses your `movable.sed`
Tämä menetelmä käyttää FIRM-osioiden salaamatonta muotoa (known-plaintext, selitetty [täällä](https://www.3dbrew.org/wiki/3DS_System_Flaws)) hyödyntävää haavoittuvuutta.
To use the [magnet](https://wikipedia.org/wiki/Magnet_URI_scheme) links on this page, you will need a torrent client like [Deluge](http://dev.deluge-torrent.org/wiki/Download).
To extract the `.7z` and `.rar` files linked on this page, you will need a file archiver like [7-Zip](http://www.7-zip.org/) or [The Unarchiver](https://theunarchiver.com/).
### Tarpeet

View file

@ -17,14 +17,14 @@ Huomaa, että "aikapommin" sisältävät kortit eivät voi enää avata `.nds`-t
| Flash-kortin nimi | Nykyinen hinta | "Aika­pommi"? | 3DS-versiot? | DSi-versiot? | Muita huomioita |
|-|-:|:-:|:-:|:-:|-|
| [**R4i-SDHC B9S**](http://www.nds-card.net/ProShow.asp?ProID=574) | $15.99 | September 3, 2019 | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot**; can be flashed back to an NDS flashcart. |
| [**R4i Gold 3DS Plus**](http://www.nds-card.net/ProShow.asp?ProID=575) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot** ([internal switch to switch between ntrboot and NDS modes]({{ "/images/screenshots/r4i-gold-3ds-plus.png" | absolute_url }})); do not manually flash with ntrboot. |
| [**Acekard 2i**](http://www.nds-card.net/ProShow.asp?ProID=160) | $20.99 | No | <= 4.3.0 | <= 1.4.4 | |
| [**DSTT**](http://www.nds-card.net/ProShow.asp?ProID=157) | $9.99 | No | None | None | Only models with [certain flash chips](https://gist.github.com/yuukieve/6b48f1bb8dd15136403c15c39fafdb42) are compatible with ntrboot. |
| [**R4i Gold 3DS**](http://www.nds-card.net/ProShow.asp?ProID=149) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | All RTS revisions are compatible. |
| [**R4i-SDHC 3DS RTS**](http://www.nds-card.net/ProShow.asp?ProID=146) | $13.99 | 1.87: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | |
| [**R4iSDHC GOLD Pro 20XX**](http://www.nds-card.net/ProShow.asp?ProID=490) | $9.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. 2013-mallit eivät ole yhteensopivia. |
| [**R4iSDHC RTS LITE 20XX**](http://www.nds-card.net/ProShow.asp?ProID=450) | $13.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. 2013-mallit eivät ole yhteensopivia. |
| [**R4i-SDHC B9S**](http://www.nds-card.com/ProShow.asp?ProID=574) | $15.99 | September 3, 2019 | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot**; can be flashed back to an NDS flashcart. |
| [**R4i Gold 3DS Plus**](http://www.nds-card.com/ProShow.asp?ProID=575) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot** ([internal switch to switch between ntrboot and NDS modes]({{ "/images/screenshots/r4i-gold-3ds-plus.png" | absolute_url }})); do not manually flash with ntrboot. |
| [**Acekard 2i**](http://www.nds-card.com/ProShow.asp?ProID=160) | $20.99 | No | <= 4.3.0 | <= 1.4.4 | |
| [**DSTT**](http://www.nds-card.com/ProShow.asp?ProID=157) | $9.99 | No | None | None | Only models with [certain flash chips](https://gist.github.com/yuukieve/6b48f1bb8dd15136403c15c39fafdb42) are compatible with ntrboot. |
| [**R4i Gold 3DS**](http://www.nds-card.com/ProShow.asp?ProID=149) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | All RTS revisions are compatible. |
| [**R4i-SDHC 3DS RTS**](http://www.nds-card.com/ProShow.asp?ProID=146) | $13.99 | 1.87: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | |
| [**R4iSDHC GOLD Pro 20XX**](http://www.nds-card.com/ProShow.asp?ProID=490) | $9.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. 2013-mallit eivät ole yhteensopivia. |
| [**R4iSDHC RTS LITE 20XX**](http://www.nds-card.com/ProShow.asp?ProID=450) | $13.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. 2013-mallit eivät ole yhteensopivia. |
| **Ace3DS X** | | No | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot** (external switch to switch between ntrboot ("3DS") and NDS modes); do not manually flash with ntrboot. |
| **Ace3DS Plus** | | No | <= 11.9.0 | <= 1.4.5 | |
| **Gateway Blue** | | No | 4.1.0 - 4.5.0 | <= 1.4.5 | |
@ -49,7 +49,7 @@ Kokeillaksesi magneetin toimivuutta pidä sitä (A)-, (B)-, (X)- ja (Y)-painikke
Huomaa, että flash-korttia ei voi käyttää sen normaaleihin käyttötarkoituksiin silloin, kun ntrboot on asennettuna sille (lukuun ottamatta Acekard 2i -korttia, joka toimii edelleen normaalisti *NDS:llä sekä 3DS:llä, jossa on mukautettu laiteohjelmisto*). Suurin osa flash-korteista ei edes näy HOME-valikossa. Asennusohjeiden lopussa on valinnaiset ohjeet, joiden avulla voit poistaa ntrbootin flash-kortiltasi asennettuasi boot9strapin.
Huomaa, että joissain harvinaisissa yhteensattumissa asennusprosessi saattaa **vioittaa** jäljitelmä-flash-korttia ja tehdä siitä pysyvästi käyttökelvottoman. Vaikka tämä onkin epätodennäköistä, on suositeltavaa käyttää vain alkuperäisiä kortteja. To reduce the chance of receiving a counterfeit card, it is recommended that you use a reputable site to buy your flashcart (such as [NDS Card](http://www.nds-card.net/))
Huomaa, että joissain harvinaisissa yhteensattumissa asennusprosessi saattaa **vioittaa** jäljitelmä-flash-korttia ja tehdä siitä pysyvästi käyttökelvottoman. Vaikka tämä onkin epätodennäköistä, on suositeltavaa käyttää vain alkuperäisiä kortteja. To reduce the chance of receiving a counterfeit card, it is recommended that you use a reputable site to buy your flashcart (such as [NDS Card](http://www.nds-card.com/))
{: .notice--danger}
___

View file

@ -63,9 +63,7 @@ There are two different methods for building on the Seedminer exploit (described
1. Open [Bruteforce Movable](https://bruteforcemovable.com/) on your computer
+ This site can automate the retrieval of `movable_part1.sed` (using a bot 3DS console) and the breaking of your device's DSiWare encryption (using a volunteer's computer to run Seedminer)
+ If you already have access to a 3DS capable of launching the Homebrew Launcher, you can manually retrieve your `movable_part1.sed` using that device by following [these](https://jisagi.github.io/SeedminerGuide/seedminerSelf/#section1) instructions
+ If you already have access to a PC with a powerful graphics card, you can manually calculate your `movable.sed` using it by following [these](https://jisagi.github.io/SeedminerGuide/seedminerSelf/#section2) instructions
+ If the automated service is nonfunctional and you cannot do one or both of those manually, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you
+ If the automated service is nonfunctional, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you
1. Enter your device's Friend Code (with no spaces or dashes) into the "Your friend code" field
1. Paste your device's 32 character long folder name into the "Your ID0" field
1. Complete the "I'm not a robot" captcha
@ -74,11 +72,11 @@ There are two different methods for building on the Seedminer exploit (described
1. When prompted, use the "Register Friend" button on your device to add the friend code of the bot 3DS console
1. Wait for the site to update
+ If it does not, wait a few minutes before refreshing the page once
1. Select "Continue"
1. Wait for the process to complete
+ This can take a while (up to an hour in some cases)
+ During this process, the bot may not show up on your 3ds. As long as the website updates, this is not an issue.
+ If you are still waiting after an hour, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you
1. Once the site processes your information, you will be given the option to "Continue" or "Do another device". Click the green "Continue" button
1. Wait for the remainder of the process to complete
+ This is usually fast (1-5 minutes) but in some cases, can take up to half an hour.
+ During this process, the bot you added may not show up on your 3ds. As long as the website updates, this is not an issue.
+ If you are still waiting after half an hour, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you
1. When the process has completed, download your `movable.sed` file from the site
+ Keep this file as you will need it in the upcoming pages
@ -102,7 +100,7 @@ ___
#### Seedminer + Steelhax + Frogtool
This method of using Seedminer for further exploitation uses your `movable.sed` file to gain access to the Homebrew Launcher using the Steelhax exploit for the purposes of injecting an exploitable DSiWare title into the DS Download Play application. This method requires you to already own (or download) the free "Steel Divers: Sub Wars" game from the eShop.
This method of using Seedminer for further exploitation uses your `movable.sed` file to gain access to the Homebrew Launcher using the Steelhax exploit for the purposes of injecting an exploitable DSiWare title into the DS Download Play application. This method requires you to already own (or download) the free "Steel Diver: Sub Wars" game from the eShop.
This method is only compatible with the EUR, JPN, and USA regions, and is somewhat more complicated than the above method. It is only recommended to use this method if you have a EUR region device and do not wish to pay for a DSiWare game, or if the above method does not work for you for some reason.

View file

@ -11,7 +11,7 @@ Tämä poistaa kokonaan mukautetun laiteohjelmiston konsolistasi, mukaan lukien
Tämä ei lähes koskaan ole ratkaisu CFW-asennuksessasi ilmenevien ongelmien korjaamiseen. A better idea would be to read the [troubleshooting](troubleshooting) page or ask (in English) for help at [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp).
{: .notice--danger}
Kaikista digitaalisesti allekirjoittamattomista (laittomista) peleistä tulee käyttökelvottomia, ja ne voi poistaa käsin järjestelmäasetusten (System Settings) tiedonhallinnasta (Data Management). Use a [save manager](https://github.com/FlagBrew/Checkpoint/releases/latest) to backup any saves for these unsigned (illegitimate) games you care about.
Any unsigned (illegitimate) games will be rendered unusable and should be manually removed before starting this process by using the Data Management section of the System Settings. Use a [save manager](https://github.com/FlagBrew/Checkpoint/releases/latest) to backup any saves for these unsigned (illegitimate) games you care about.
Tämä ei vaikuta sinun NNID-käyttäjääsi, laillisesti ostettuihin peleihisi eikä niiden tallennuksiin.
@ -26,21 +26,43 @@ Huomaa, että jos sinulla on muita käynnistystiedostoja kuin `GodMode9.firm` SD
### Ohjeet
#### Vaihe I Valmistelut
#### Section I - Safety Test
1. Sammuta konsolisi
1. Aseta SD-korttisi tietokoneeseesi
1. Kopioi GodMode9-`.zip`-pakkauksesta `GodMode9.firm` SD-korttisi `/luma/payloads/`-kansioon
1. Kopioi GodMode9-`.zip`-pakkauksesta `gm9`-kansio SD-korttisi juureen
1. Aseta SD-korttisi takaisin konsoliisi
1. Käynnistä konsolisi
#### Vaihe II Poisto-ohjelman ajaminen
1. Avaa GodMode9 pitämällä (START)-painiketta pohjassa konsolin käynnistyessä
1. Jos ohjelma kehottaa luomaan varmuuskopion tärkeistä tiedostoista (essential files), paina (A):ta tehdäksesi sen, ja kun varmuuskopio on valmis, paina (A):ta uudelleen jatkaaksesi
1. Jos sinua kehotetaan korjaamaan RTC-aika ja -päivämäärä, paina (A):ta ja aseta ne oikein, paina sitten (A):ta jatkaaksesi
+ Huomaa, että jos jouduit korjaamaan RTC-ajan ja -päivämäärän, sinun täytyy korjata ne myös järjestelmäasetuksista (System Settings) näiden ohjeiden jälkeen
1. Navigate to `[1:] SYSNAND CTRNAND > title > 00040138 > (X)0000002 > content`
+ On a "New" edition console, the (X) will instead be 2
+ On an "Old" edition console, the (X) will instead be 0
1. Select the `.app` file
1. Select `NCCH Image Options`
1. Select `Mount image to drive`
1. In the window that appears, open the `exefs` folder
1. In this folder, select the `.firm` file
1. Select "Firm Options"
1. Select "Boot Firm"
1. When prompted, choose to decrypt and make a copy
1. You should boot into the regular 3DS Home Menu. If you do, power your device off and continue to the next section
+ If you do NOT boot into the regular 3DS Home Menu, continuing with these instructions **WILL** brick your device. You should join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you
#### Section II - Prep Work
1. Käynnistä konsolisi
1. Navigate to System Settings > Data Management > Nintendo 3DS > Software
1. In this list of software, delete any non-Nintendo content you installed while using CFW
+ This includes common system software such as FBI, Anemone3DS, Luma Updater, Homebrew Launcher, Checkpoint, and others, along with any non-eShop games
+ Failure to remove CFW software before uninstalling CFW may break access to the Data Management menu after uninstalling CFW
1. Sammuta konsolisi
#### Section III - Running Uninstall Script
1. Avaa GodMode9 pitämällä (START)-painiketta pohjassa konsolin käynnistyessä
1. Paina (HOME)-painiketta näyttääksesi toimintovalikon
1. Select "Scripts..."
1. Select "GM9Megascript"

View file

@ -10,7 +10,7 @@ Cette page est faite pour que les utilisateurs actuels de arm9loaderhax puissent
Toutes les futures versions de Luma3DS ne seront faites qu'exclusivement dans le format ".firm", lequel ne sera compatible qu'boot9strap et sighax. Cela veut dire que pour pouvoir recevoir les dernières mises à jour de Luma3DS, vous devez utiliser cette page pour mettre à jour votre installation.
To use the [magnet](https://wikipedia.org/wiki/Magnet_URI_scheme) links on this page, you will need a torrent client like [Deluge](http://dev.deluge-torrent.org/wiki/Download).
Pour utiliser les liens suivants [magnet](https://fr.wikipedia.org/wiki/Magnet_(standard)), vous avez besoin d'un client Torrent comme [Deluge](http://dev.deluge-torrent.org/wiki/Download).
Pour extraire les fichiers `.7z` sur cette page, vous aurez besoin d'un programme d'archives comme [7-Zip](http://www.7-zip.org/) ou [The Unarchiver](https://theunarchiver.com).
@ -41,13 +41,13 @@ Notez que le fichier requis nommé `secret_sector.bin` est le même que celui se
Notez que, seulement sur New 3DS, `secret_sector.bin` est nécessaire pour revenir sur l'exploit arm9loaderhax, c'est pourquoi il n'est pas nécessaire pour l'installation de boot9strap sur une console non-modifiée. Si vous n'avez pas de New 3DS, vous n'avez pas besoin de `secret_sector.bin`.
{: .notice--info}
* <i class="fa fa-magnet" aria-hidden="true" title="Ceci est un lien magnet. Use a torrent client to download the file."></i> - **New 3DS Users Only:** [secret_sector.bin](magnet:?xt=urn:btih:15a3c97acf17d67af98ae8657cc66820cc58f655&dn=secret_sector.bin&tr=udp%3A%2F%2F9.rarbg.to%3A2710%2Fannounce&tr=udp%3A%2F%2Fbt.xxx-tracker.com%3A2710%2Fannounce&tr=udp%3A%2F%2Fexodus.desync.com%3A6969%2Fannounce&tr=udp%3A%2F%2Fmgtracker.org%3A6969%2Fannounce&tr=udp%3A%2F%2Fopen.demonii.si%3A1337%2Fannounce&tr=udp%3A%2F%2Fpublic.popcorn-tracker.org%3A6969%2Fannounce&tr=udp%3A%2F%2Fthetracker.org%3A80%2Fannounce&tr=udp%3A%2F%2Ftracker.coppersurfer.tk%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker.cypherpunks.ru%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker.ds.is%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker.internetwarriors.net%3A1337%2Fannounce&tr=udp%3A%2F%2Ftracker.mg64.net%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker.open-internet.nl%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker.opentrackr.org%3A1337%2Fannounce&tr=udp%3A%2F%2Ftracker.port443.xyz%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker.qt.is%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker.tiny-vps.com%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker.torrent.eu.org%3A451%2Fannounce&tr=udp%3A%2F%2Ftracker.vanitycore.co%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker-2.msm8916.com%3A6969%2Fannounce)
* The latest release of [Luma3DS](https://github.com/AuroraWright/Luma3DS/releases/latest) *(the `.7z` file)*
* <i class="fa fa-magnet" aria-hidden="true" title="Ceci est un lien magnet. Utilisez un logiciel de torrent pour télécharger le fichier."></i> - **Seulement pour les utilisateurs d'une New 3DS:** [secret_sector.bin](magnet:?xt=urn:btih:15a3c97acf17d67af98ae8657cc66820cc58f655&dn=secret_sector.bin&tr=udp%3A%2F%2F9.rarbg.to%3A2710%2Fannounce&tr=udp%3A%2F%2Fbt.xxx-tracker.com%3A2710%2Fannounce&tr=udp%3A%2F%2Fexodus.desync.com%3A6969%2Fannounce&tr=udp%3A%2F%2Fmgtracker.org%3A6969%2Fannounce&tr=udp%3A%2F%2Fopen.demonii.si%3A1337%2Fannounce&tr=udp%3A%2F%2Fpublic.popcorn-tracker.org%3A6969%2Fannounce&tr=udp%3A%2F%2Fthetracker.org%3A80%2Fannounce&tr=udp%3A%2F%2Ftracker.coppersurfer.tk%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker.cypherpunks.ru%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker.ds.is%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker.internetwarriors.net%3A1337%2Fannounce&tr=udp%3A%2F%2Ftracker.mg64.net%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker.open-internet.nl%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker.opentrackr.org%3A1337%2Fannounce&tr=udp%3A%2F%2Ftracker.port443.xyz%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker.qt.is%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker.tiny-vps.com%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker.torrent.eu.org%3A451%2Fannounce&tr=udp%3A%2F%2Ftracker.vanitycore.co%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker-2.msm8916.com%3A6969%2Fannounce)
* La dernière version de [Luma3DS](https://github.com/AuroraWright/Luma3DS/releases/latest) *(le fichier`.7z`)*
* La version 7.0.5 de [Luma3DS](https://github.com/AuroraWright/Luma3DS/releases/tag/v7.0.5) *(le fichier `.7z`)*
* La dernière version de [SafeB9SInstaller](https://github.com/d0k3/SafeB9SInstaller/releases/latest)
* La dernière version de [boot9strap](https://github.com/SciresM/boot9strap/releases/latest) *(boot9strap standard, ni le fichier `devkit`, ni le fichier `ntr`)*
* La dernière version de [Anemone3DS](https://github.com/astronautlevel2/Anemone3DS/releases/latest) *(le fichier`.cia`)*
* The latest release of [Checkpoint](https://github.com/FlagBrew/Checkpoint/releases/latest) *(the `.cia` file)*
* La dernière version de [Checkpoint] (https://github.com/FlagBrew/Checkpoint/releases/latest) *(the `.cia` file) *
* La dernière version de [Homebrew Launcher Wrapper](https://github.com/mariohackandglitch/homebrew_launcher_dummy/releases/latest)
* La dernière version de [GodMode9](https://github.com/d0k3/GodMode9/releases/latest)
* La dernière version de [DSP1](https://github.com/zoogie/DSP1/releases/latest)
@ -97,7 +97,7 @@ Pour toutes les étapes de cette section, remplacez tous les fichiers existants
+ Si vous voyez l'écran de configuration de Luma à la place de celui de SafeBS9Installer, appuyez tout simplement sur (Start), puis éteignez votre 3DS et réessayez
+ Si vous obtenez une erreur, essayez soit en utilisant une nouvelle carte SD, soit en formatant votre carte SD actuelle (sauvegardez d'abord les fichiers existants)
1. Attendez que tous les tests de sécurité soient finis
+ Si vous obtenez une erreur "OTP Crypto Fail", télécharger <i class="fa fa-magnet" aria-hidden="true" title="Ceci est un lien magnet. Use a torrent client to download the file."></i> - [aeskeydb.bin](magnet:?xt=urn:btih:d25dab06a7e127922d70ddaa4fe896709dc99a1e&dn=aeskeydb.bin&tr=udp%3A%2F%2F9.rarbg.to%3A2710%2Fannounce&tr=udp%3A%2F%2Fbt.xxx-tracker.com%3A2710%2Fannounce&tr=udp%3A%2F%2Fexodus.desync.com%3A6969%2Fannounce&tr=udp%3A%2F%2Fmgtracker.org%3A6969%2Fannounce&tr=udp%3A%2F%2Fopen.demonii.si%3A1337%2Fannounce&tr=udp%3A%2F%2Fpublic.popcorn-tracker.org%3A6969%2Fannounce&tr=udp%3A%2F%2Fthetracker.org%3A80%2Fannounce&tr=udp%3A%2F%2Ftracker.coppersurfer.tk%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker.cypherpunks.ru%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker.ds.is%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker.internetwarriors.net%3A1337%2Fannounce&tr=udp%3A%2F%2Ftracker.mg64.net%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker.open-internet.nl%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker.opentrackr.org%3A1337%2Fannounce&tr=udp%3A%2F%2Ftracker.port443.xyz%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker.qt.is%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker.tiny-vps.com%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker.torrent.eu.org%3A451%2Fannounce&tr=udp%3A%2F%2Ftracker.vanitycore.co%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker-2.msm8916.com%3A6969%2Fannounce), then put it in the `/boot9strap/` folder on your SD card and try again
+ Si vous obtenez une erreur "OTP Crypto Fail", télécharger <i class="fa fa-magnet" aria-hidden="true" title="Ceci est un lien magnet. Utilisez un logiciel de torrent pour télécharger le fichier."></i> - [aeskeydb.bin](magnet:?xt=urn:btih:d25dab06a7e127922d70ddaa4fe896709dc99a1e&dn=aeskeydb.bin&tr=udp%3A%2F%2F9.rarbg.to%3A2710%2Fannounce&tr=udp%3A%2F%2Fbt.xxx-tracker.com%3A2710%2Fannounce&tr=udp%3A%2F%2Fexodus.desync.com%3A6969%2Fannounce&tr=udp%3A%2F%2Fmgtracker.org%3A6969%2Fannounce&tr=udp%3A%2F%2Fopen.demonii.si%3A1337%2Fannounce&tr=udp%3A%2F%2Fpublic.popcorn-tracker.org%3A6969%2Fannounce&tr=udp%3A%2F%2Fthetracker.org%3A80%2Fannounce&tr=udp%3A%2F%2Ftracker.coppersurfer.tk%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker.cypherpunks.ru%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker.ds.is%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker.internetwarriors.net%3A1337%2Fannounce&tr=udp%3A%2F%2Ftracker.mg64.net%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker.open-internet.nl%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker.opentrackr.org%3A1337%2Fannounce&tr=udp%3A%2F%2Ftracker.port443.xyz%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker.qt.is%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker.tiny-vps.com%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker.torrent.eu.org%3A451%2Fannounce&tr=udp%3A%2F%2Ftracker.vanitycore.co%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker-2.msm8916.com%3A6969%2Fannounce), puis placez le dans le dossier `/boot9strap/` sur votre carte SD et réessayez
1. Quand cela est demandé, appuyez sur la combinaison de boutons donnée pour installer boot9strap
1. Une fois que c'est fini, appuez sur (A) pour redémarrer l'appareil.
+ Si votre appareil séteint au démarrage, assurez-vous que vous avez copié `boot.firm` du dossier Luma3DS`.7z` à la racine de votre carte SD
@ -120,7 +120,7 @@ Si, avant d'avoir suivi ce guide, vous aviez une installation EmuNAND et que vou
#### Section V - Homebrew Launcher
1. Launch the Download Play application (this [icon]({{ "/images/download-play-icon.png" | absolute_url }})
1. Lancez l'application Mode téléchargement (cette [icône]({{ "/images/download-play-icon.png" | absolute_url }})
1. Appuyez simultanément sur (L) + (Bas) + (Select) pour ouvrir le menu Rosalina
1. Sélectionnez "Miscellaneous options"
1. Sélectionnez "Switch the hb. title to the current app."
@ -136,7 +136,7 @@ Si, avant d'avoir suivi ce guide, vous aviez une installation EmuNAND et que vou
1. Appuyez sur (Start) pour retourner à l'Homebrew Launcher
1. Lancez FBI que vous trouverez dans la liste des homebrews
#### Section VI - Installing CIAs
#### Section VI - Installation des CIAs
1. Naviguez vers `SD` -> `cias`
1. Sélectionnez "\<current directory>"
@ -163,14 +163,14 @@ Si, avant d'avoir suivi ce guide, vous aviez une installation EmuNAND et que vou
1. Appuyez sur (A) pour autoriser l'écriture (lv2) sur votre SysNAND, puis entrez la combinaison de touches demandée
1. Appuyez sur (A) pour continuer
#### Section IX - Cleanup SD Card
#### Section IX - Nettoyer la Carte SD
1. Sélectionnez "Cleanup SD Card"
1. Lorsque vous êtes invité, appuyez sur (A)
1. Appuyez sur (A) pour continuer
1. Appuyez sur (B) pour revenir au menu principal
#### Section X - Backup Essential Files
#### Section X - Sauvegarde des fichiers essentiels
1. Sélectionnez "Backup Options"
1. Sélectionnez "SysNAND Backup"
@ -181,14 +181,14 @@ Si, avant d'avoir suivi ce guide, vous aviez une installation EmuNAND et que vou
1. Appuyez sur (B) pour revenir au menu principal
1. Sélectionnez "Exit"
1. Appuyez (A) pour reverrouiller autorisations en écriture si vous êtes invité
1. Navigate to `[M:] MEMORY VIRTUAL`
1. Press (A) on `boot9.bin` to select it
1. Select "Copy to 0:/gm9/out"
1. Naviguez vers `[M:] MEMORY VIRTUAL`
1. Appuyez sur (A) sur `boot9.bin` pour le sélectionner
1. Sélectionnez "Copy to 0:/gm9/out"
1. Appuyez sur (A) pour continuer
1. Appuyez sur (B) pour revenir au menu principal
1. Maintenez (R) et appuyez sur (B) en même temps pour éjecter votre carte SD
1. Insérez votre carte SD dans votre ordinateur
1. Copy `<date>_<serialnumber>_sysnand_###.bin`, `essential.exefs`, and `boot9.bin` from the `/gm9/out/` folder on your SD card to a safe location on your computer
1. Copiez `<date>_<serialnumber>_sysnand_###.bin`, `essential.exefs` et `boot9.bin` du dossier `/gm9/out/` de votre carte SD vers un emplacement sûr de votre ordinateur
+ Faites des sauvegardes dans plusieurs endroits (tels que des stockages de fichiers en ligne par exemple)
Ces sauvegardes vous sauveront d'un brick et/ou vous aideront à récupérer des fichiers de l'image de la NAND si quelque chose se passe mal plus tard
1. Supprimez `<date>_<serialnumber>_sysnand_###.bin` et `<date>_<serialnumber>_sysnand_###.bin.sha` du dossier `/gm9/out/` de votre carte SD après l'avoir copiée

View file

@ -8,7 +8,7 @@ title : "CTRTransfer"
Ceci est une section complémentaire pour ceux qui voudraient installer une image CTRTransfer 11.5.0 sur leur machine.
To use the [magnet](https://wikipedia.org/wiki/Magnet_URI_scheme) links on this page, you will need a torrent client like [Deluge](http://dev.deluge-torrent.org/wiki/Download).
Pour utiliser les liens suivants [magnet](https://fr.wikipedia.org/wiki/Magnet_(standard)), vous avez besoin d'un client Torrent comme [Deluge](http://dev.deluge-torrent.org/wiki/Download).
Notez que si vous avez nimporte quel autre payload que `GodMode9.firm` dans le dossier `/luma/payloads/` sur votre carte SD, appuyer sur (Start) au démarrage affiche un "chainloader menu" où vous devrez utiliser le D-Pad et le bouton (A) pour sélectionner "GodMode9" .
@ -78,7 +78,7 @@ Vous DEVEZ avoir déjà installé Luma3DS et boot9strap pour utiliser ceci.
#### Section III - Lancez FBI
1. Launch the Download Play application (this [icon]({{ "/images/download-play-icon.png" | absolute_url }})
1. Lancez l'application Mode téléchargement (cette [icône]({{ "/images/download-play-icon.png" | absolute_url }})
1. Appuyez simultanément sur (L) + (Bas) + (Select) pour ouvrir le menu Rosalina
1. Sélectionnez "Miscellaneous options"
1. Sélectionnez "Switch the hb. title to the current app."

View file

@ -27,7 +27,7 @@ title: "FAQ"
**R :** Oui. Cest sûr, arrêtez de demander.
<a name="faq_support" /> **Q :** *Où dois-je aller pour avoir de l'aide ?*
**A:** For support (in English), ask for help at [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp).
**R :** Pour obtenir de l'aide (en anglais), demandez sur le [Discord Nintendo Homebrew](https://discord.gg/MWxPgEp).
<a name="faq_le4gbsd" /> **Q :** *Puis-je faire cela avec une carte SD 4 Go (ou moins)  ?*
**R :** Oui !

View file

@ -18,11 +18,13 @@ Durant cette étape, nous allons également configurer les programmes suivants :
+ **Luma3DS Updater** *(Permet de mettre facilement à jour votre CFW)*
+ **GodMode9** *(Programme multifonction qui peut effectuer des opérations relatives à la NAND et aux cartouches)*
+ **Homebrew Launcher Loader** *(lance le Homebrew Launcher) *
+ **DSP1** *(allows homebrew applications to have sound)*
+ **ctr-no-timeoffset** *(removes the rtc offset so that the home menu and rtc timestamps match)*
## Ce dont vous avez besoin
* La dernière version de [Anemone3DS](https://github.com/astronautlevel2/Anemone3DS/releases/latest) *(le fichier`.cia`)*
* The latest release of [Checkpoint](https://github.com/FlagBrew/Checkpoint/releases/latest) *(the `.cia` file)*
* La dernière version de [Checkpoint] (https://github.com/FlagBrew/Checkpoint/releases/latest) *(the `.cia` file) *
* La dernière version de [Homebrew Launcher Wrapper](https://github.com/mariohackandglitch/homebrew_launcher_dummy/releases/latest)
* La dernière version de [GodMode9](https://github.com/d0k3/GodMode9/releases/latest)
* La dernière version de [DSP1](https://github.com/zoogie/DSP1/releases/latest)
@ -61,7 +63,7 @@ Durant cette étape, nous allons également configurer les programmes suivants :
#### Section II - Mise à jour du système
If, while following a previous version of this guide, you CTRTransfered your *New 3DS* to 2.1.0, you should now [restore your NAND backup](godmode9-usage#restoring-a-nand-backup) before doing this section.
Si, en suivant une version précédente de ce guide, vous avez CTRTransféré votre *New 3DS* en 2.1.0, vous devrez maintenant [restaurer votre sauvegarde de la NAND](godmode9-usage#restoring-a-nand-backup) avant de faire cette section.
{: .notice--danger}
Si, avant d'avoir suivi ce guide, vous aviez une installation EmuNAND et que vous souhaitez transférer le contenu de votre précédent EmuNAND sur votre nouvelle SysNAND CFW, il est temps de [Transférer votre EmuNAND](move-emunand) avant de suivre cette section.
@ -74,7 +76,7 @@ Si, avant d'avoir suivi ce guide, vous aviez une installation EmuNAND et que vou
#### Section III - Homebrew Launcher
1. Launch the Download Play application (![]({{ "/images/download-play-icon.png" | absolute_url }}){: height="24px" width="24px"})
1. Lancez l'application Mode Téléchargement (![]({{ "/images/download-play-icon.png" | absolute_url }}){: height="24px" width="24px"})
1. Appuyez simultanément sur (L) + (Bas) + (Select) pour ouvrir le menu Rosalina
1. Sélectionnez "Miscellaneous options"
1. Sélectionnez "Switch the hb. title to the current app."
@ -88,7 +90,7 @@ Si, avant d'avoir suivi ce guide, vous aviez une installation EmuNAND et que vou
1. Appuyez sur (A) pour mettre loffset à 0
+ Ainsi, l'horloge système correspondra à la date et heure du RTC (que nous allons régler bientôt)
1. Appuyez sur (Start) pour retourner à l'Homebrew Launcher
+ If you previously followed [Installing boot9strap (Frogtool)](installing-boot9strap-(frogtool)), you should now use the "RESTORE clean DS Download Play" option in Frogtool to restore the DS Download Play application to its original state
+ Si vous avez suivi précédemment la section [Installation de boot9strap (Frogtool)](installing-boot9strap-(frogtool)), vous devriez maintenant utiliser l'option "RESTORE clean DS Download Play" de Frogtool afin de restaurer l'application Mode téléchargement à son état original
1. Lancez FBI que vous trouverez dans la liste des homebrews
#### Section IV - Installation des CIAs
@ -136,14 +138,14 @@ Si, avant d'avoir suivi ce guide, vous aviez une installation EmuNAND et que vou
1. Appuyez sur (B) pour revenir au menu principal
1. Sélectionnez "Exit"
1. Appuyez (A) pour reverrouiller autorisations en écriture si vous êtes invité
1. Navigate to `[M:] MEMORY VIRTUAL`
1. Press (A) on `boot9.bin` to select it
1. Select "Copy to 0:/gm9/out"
1. Naviguez vers `[M:] MEMORY VIRTUAL`
1. Appuyez sur (A) sur `boot9.bin` pour le sélectionner
1. Sélectionnez "Copy to 0:/gm9/out"
1. Appuyez sur (A) pour continuer
1. Appuyez sur (B) pour revenir au menu principal
1. Maintenez (R) et appuyez sur (B) en même temps pour éjecter votre carte SD
1. Insérez votre carte SD dans votre ordinateur
1. Copy `<date>_<serialnumber>_sysnand_###.bin`, `essential.exefs`, and `boot9.bin` from the `/gm9/out/` folder on your SD card to a safe location on your computer
1. Copy `<date>_<serialnumber>_sysnand_###.bin`, `<date>_<serialnumber>_sysnand_###.bin.sha`, `essential.exefs`, and `boot9.bin` from the `/gm9/out/` folder on your SD card to a safe location on your computer
+ Faites des sauvegardes dans plusieurs endroits (tels que des stockages de fichiers en ligne par exemple)
Ces sauvegardes vous sauveront d'un brick et/ou vous aideront à récupérer des fichiers de l'image de la NAND si quelque chose se passe mal plus tard
1. Supprimez `<date>_<serialnumber>_sysnand_###.bin` et `<date>_<serialnumber>_sysnand_###.bin.sha` du dossier `/gm9/out/` de votre carte SD après l'avoir copiée

View file

@ -21,7 +21,7 @@ Pour extraire les fichiers `.7z` sur cette page, vous aurez besoin d'un programm
* La dernière version de [boot9strap](https://github.com/SciresM/boot9strap/releases/latest) *(boot9strap standard, ni le fichier `devkit`, ni le fichier `ntr`)*
- La dernière version de [safehax](https://github.com/TiniVi/safehax/releases/latest)
* La dernière version de [udsploit](https://github.com/smealum/udsploit/releases/latest)
* The latest release of [Luma3DS](https://github.com/AuroraWright/Luma3DS/releases/latest) *(the `.7z` file)*
* La dernière version de [Luma3DS](https://github.com/AuroraWright/Luma3DS/releases/latest) *(le fichier`.7z`)*
### Instructions

View file

@ -6,19 +6,20 @@ title: "Homebrew Launcher (Steelhax)"
### Lecture requise
This method of using Seedminer for further exploitation uses your `movable.sed` file to gain access to the Homebrew Launcher using the Steelhax exploit for the purposes of injecting an exploitable DSiWare title into the DS Download Play application. This method requires you to already own (or download) the free "Steel Divers: Sub Wars" game from the eShop.
Cette méthode d'utilisation de Seedminer pour une exploitation ultérieure utilise votre fichier `movable.sed` pour accéder à l'Homebrew Launcher en utilisant l'exploit Steelhax pour injecter un titre DSiWare exploitable dans l'application Mode téléchargement. Cette méthode vous oblige à posséder (ou télécharger) le jeu gratuit "Steel Diver: Sub Wars" de l'eShop.
If your device already has access to the Homebrew Launcher (whether through Steelhax or another exploit), you can skip to [Installing Boot9strap (Frogminer)](installing-boot9strap-(frogminer)).
Si votre console a déjà accès à l'Homebrew Launcher (que ce soit via Steelhax ou un autre exploit), vous pouvez passer à [Installer Boot9strap (Frogtool)](installing-boot9strap-(frogtool)).
{: .notice--success}
If you already have Steel Diver: Sub Wars, this process will overwrite your game's save file!
Si vous avez déjà Steel Diver: Sub Wars, ce processus écrasera votre fichier de sauvegarde du jeu !
{: .notice--warning}
## Ce dont vous avez besoin
* The free eShop game "Steel Diver: Sub Wars"
* La dernière version de [Homebrew Launcher](https://github.com/fincs/new-hbmenu/releases/latest)
* The latest release of [Steelhax](https://github.com/VegaRoXas/vegaroxas.github.io/raw/master/files/steelhax-installer.rar)
* Le jeu eShop gratuit "Steel Diver: Sub Wars" depuis l'eShop
* Votre fichier `movable.sed` obtenu grâce à [Seedminer](seedminer)
* The latest release of [the Homebrew Launcher](https://github.com/fincs/new-hbmenu/releases/latest)
* La dernière version de [Steelhax](https://github.com/VegaRoXas/vegaroxas.github.io/raw/master/files/steelhax-installer.rar)
* Le [payload otherapp](https://smealum.github.io/3ds/#otherapp) *(en fonction de votre région et de votre version)*
### Instructions
@ -27,36 +28,36 @@ If you already have Steel Diver: Sub Wars, this process will overwrite your game
1. Créez un dossier nommé `3ds` à la racine de votre carte SD si celui ci n'existe pas
1. Copiez `boot.3dsx` à la racine de votre carte SD
1. Copy the `steelhax` folder from the Steelhax `.rar` to the root of your SD card
1. Copy the otherapp payload to the `steelhax` folder on your SD card and rename it to `payload.bin`
1. Copiez le dossier `steelhax` du fichier `.rar` de Steelhax à la racine de votre carte SD
1. Copiez le payload otherapp vers le dossier `steelhax` sur votre carte SD et renommez-le `payload.bin`
#### Section II - Steelminer
1. Insert your SD card into your device
1. Launch "Steel Diver: Sub Wars" once and select a Mii to initialize your save file
+ Decline the game update when prompted
+ If you have already updated the game, use the Data Management menu of the System Settings to delete the update
1. Exit "Steel Diver: Sub Wars"
1. Insérez votre carte SD dans votre 3DS
1. Lancez "Steel Diver: Sub Wars" une fois et sélectionnez un Mii afin d'initialiser votre fichier de sauvegarde
+ Refusez la mise à jour du jeu lorsque cela vous sera demandé
+ Si vous avez déjà mis à jour le jeu, utilisez le menu Gestion des données des Paramètres de la console afin de supprimer la mise à jour
1. Quittez "Steel Diver: Sub Wars"
1. Éteignez votre 3DS
1. Insérez votre carte SD dans votre ordinateur
1. Open [the Steelminer Injector website](http://steelminer.jisagi.net/injector) on your computer
1. Select your `movable.sed` file
1. Select "Start!"
1. Wait for the process to complete
1. Navigate to `Nintendo 3DS` -> `<ID0>` -> `<32-character-id>` -> `title` -> `00040000` -> `<8-character-region>` -> `data` on your SD card
+ **EUR Region**: `000d7e00`
+ **JPN Region**: `000d7c00`
+ **USA Region**: `000d7d00`
1. Copy the new downloaded save file to the `data` folder on your SD card
+ Overwrite the old save file when prompted
1. Ouvez le [site web de Steelminer Injector](https://bruteforcemovable.com/steelhax/) sur votre ordinateur
1. Sélectionnez votre fichier `movable.sed`
1. Sélectionnez "Start!"
1. Attendez la fin de l'opération
1. Naviguez vers `Nintendo 3DS` -> `<ID0>` -> `<32-character-id>` -> `title` -> `00040000` -> `<8-character-region>` -> `data` sur votre carte SD
+ **Région EUR** : `000d7e00`
+ **Région JPN** : `000d7c00`
+ **Région USA** : `000d7d00`
1. Copiez le nouveau fichier de sauvegarde téléchargé vers le dossier `data` sur votre carte SD
+ Remplacez l'ancien fichier de sauvegarde lorsque cela vous sera demandé
1. Réinsérez votre carte SD dans votre 3DS
1. Allumez à présent votre 3DS
1. Launch "Steel Diver: Sub Wars"
1. Lancez "Steel Diver: Sub Wars"
1. Si l'exploit a réussi, votre console devrait avoir démarré l'Homebrew Launcher
+ You may see an error stating there are no applications found.
1. Power off your device.
+ Vous pouvez voir une erreur indiquant qu'il n'y a pas d'applications trouvées.
1. Éteignez votre console.
___
### Continue to [Installing Boot9strap (Frogtool)](installing-boot9strap-(frogtool))
### Continuez vers [Installation de Boot9strap (Frogtool)](installing-boot9strap-(frogtool))
{: .notice--primary}

View file

@ -14,8 +14,8 @@ Pour extraire les fichiers `.7z` sur cette page, vous aurez besoin d'un programm
* La dernière version de [SafeB9SInstaller](https://github.com/d0k3/SafeB9SInstaller/releases/latest)
* La dernière version de [boot9strap](https://github.com/SciresM/boot9strap/releases/latest) *(boot9strap standard, ni le fichier `devkit`, ni le fichier `ntr`)*
* The latest release of [Luma3DS](https://github.com/AuroraWright/Luma3DS/releases/latest) *(the `.7z` file)*
* La dernière version de [Homebrew Launcher](https://github.com/fincs/new-hbmenu/releases/latest)
* La dernière version de [Luma3DS](https://github.com/AuroraWright/Luma3DS/releases/latest) *(le fichier`.7z`)*
* The latest release of [the Homebrew Launcher](https://github.com/fincs/new-hbmenu/releases/latest)
### Instructions

View file

@ -14,7 +14,7 @@ Pour extraire les fichiers `.7z` sur cette page, vous aurez besoin d'un programm
* La dernière version de [SafeB9SInstaller](https://github.com/d0k3/SafeB9SInstaller/releases/latest)
* La dernière version de [boot9strap](https://github.com/SciresM/boot9strap/releases/latest) *(boot9strap standard, ni le fichier `devkit`, ni le fichier `ntr`)*
* The latest release of [Luma3DS](https://github.com/AuroraWright/Luma3DS/releases/latest) *(the `.7z` file)*
* La dernière version de [Luma3DS](https://github.com/AuroraWright/Luma3DS/releases/latest) *(le fichier`.7z`)*
* La dernière version de [Homebrew Launcher](https://github.com/fincs/new-hbmenu/releases/latest)
### Instructions

View file

@ -10,20 +10,18 @@ This method of using Seedminer for further exploitation uses your `movable.sed`
Ceci est une implémentation de l'exploit "FIRM partitions known-plaintext" qui est décrit [ici](https://www.3dbrew.org/wiki/3DS_System_Flaws).
To use the [magnet](https://wikipedia.org/wiki/Magnet_URI_scheme) links on this page, you will need a torrent client like [Deluge](http://dev.deluge-torrent.org/wiki/Download).
To extract the `.7z` and `.rar` files linked on this page, you will need a file archiver like [7-Zip](http://www.7-zip.org/) or [The Unarchiver](https://theunarchiver.com/).
Pour extraire les fichiers `.7z` et `.rar` sur cette page, vous aurez besoin d'un programme d'archives comme [7-Zip](http://www.7-zip.org/) ou [The Unarchiver](https://theunarchiver.com).
## Ce dont vous avez besoin
* Any eShop DSiWare game
+ JPN region users can download the free title "ほぼ日の健康手帳™" ([![]({{ "/images/qrcodes/50010000005133.png" | absolute_url }}){: height="24px" width="24px"})]({{ "/images/qrcodes/50010000005133.png" | absolute_url }})
+ USA region users can download the free title "Nintendo Fan Network" ([![]({{ "/images/qrcodes/50010000013696.png" | absolute_url }}){: height="24px" width="24px"})]({{ "/images/qrcodes/50010000013696.png" | absolute_url }})
* Your `movable.sed` file from completing [Seedminer](seedminer)
* Votre fichier `movable.sed` obtenu grâce à [Seedminer](seedminer)
* The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest)
* The latest release of [b9sTool](https://github.com/zoogie/b9sTool/releases/latest)
* The latest release of [Luma3DS](https://github.com/AuroraWright/Luma3DS/releases/latest) *(the `.7z` file)*
* La dernière version de [Homebrew Launcher](https://github.com/fincs/new-hbmenu/releases/latest)
* La dernière version de [Luma3DS](https://github.com/AuroraWright/Luma3DS/releases/latest) *(le fichier`.7z`)*
* The latest release of [the Homebrew Launcher](https://github.com/fincs/new-hbmenu/releases/latest)
#### Section I - Préparatifs
@ -34,9 +32,9 @@ To extract the `.7z` and `.rar` files linked on this page, you will need a file
+ If prompted, overwrite any existing copy
1. Éteignez votre 3DS
1. Insérez votre carte SD dans votre ordinateur
1. Copy your `movable.sed` file to the root of your SD card
1. Copiez votre fichier `movable.sed` à la racine de votre carte SD
1. Copiez `boot.firm` de Luma3DS `.7z` dans la racine de votre carte SD
1. Copy `boot.nds` (B9STool) to the root of your SD card
1. Copiez le fichier `boot.nds`(B9STool) vers la racine de votre carte SD
1. Copiez `boot.3dsx` à la racine de votre carte SD
1. Copy the `private` folder from the Frogminer_save `.zip` to the root of your SD card
1. Navigate to `Nintendo 3DS` -> `<ID0>` -> `<32-character-id>` -> `Nintendo DSiWare` on your SD card
@ -51,7 +49,7 @@ To extract the `.7z` and `.rar` files linked on this page, you will need a file
1. Select your `<8-character-id>.bin` file for the "Your dsiware.bin" field
1. Complete the "I'm not a robot" captcha
1. Select "Start"
1. Wait for the process to complete
1. Attendez la fin de l'opération
1. When the process has completed, download your modified DSiWare archive from the site
1. Copy the `42383841.bin` file from the `output/hax/` folder of the downloaded DSiWare archive to the `Nintendo 3DS/<ID0>/<32-character-id>/Nintendo DSiWare/` folder on your SD card
+ This should be different than your initial `<8-character-id>.bin` file

View file

@ -10,26 +10,26 @@ We will now use our Homebrew Launcher access to run the Frogtool utility in orde
Ceci est une implémentation de l'exploit "FIRM partitions known-plaintext" qui est décrit [ici](https://www.3dbrew.org/wiki/3DS_System_Flaws).
To use the [magnet](https://wikipedia.org/wiki/Magnet_URI_scheme) links on this page, you will need a torrent client like [Deluge](http://dev.deluge-torrent.org/wiki/Download).
Pour utiliser les liens suivants [magnet](https://fr.wikipedia.org/wiki/Magnet_(standard)), vous avez besoin d'un client Torrent comme [Deluge](http://dev.deluge-torrent.org/wiki/Download).
To extract the `.7z` and `.rar` files linked on this page, you will need a file archiver like [7-Zip](http://www.7-zip.org/) or [The Unarchiver](https://theunarchiver.com/).
Pour extraire les fichiers `.7z` et `.rar` sur cette page, vous aurez besoin d'un programme d'archives comme [7-Zip](http://www.7-zip.org/) ou [The Unarchiver](https://theunarchiver.com).
## Ce dont vous avez besoin
* Your `movable.sed` file from completing [Seedminer](seedminer)
* Votre fichier `movable.sed` obtenu grâce à [Seedminer](seedminer)
* <i class="fa fa-magnet" aria-hidden="true" title="Ceci est un lien magnet. Use a torrent client to download the file."></i> - [frogcert.bin](magnet:?xt=urn:btih:d12278ea50bb3574f1fbd327f3d0e2292c70941f&dn=frogcert.bin&tr=https%3a%2f%2ftracker.fastdownload.xyz%3a443%2fannounce&tr=https%3a%2f%2fopentracker.xyz%3a443%2fannounce&tr=http%3a%2f%2fopen.trackerlist.xyz%3a80%2fannounce&tr=http%3a%2f%2ft.nyaatracker.com%3a80%2fannounce&tr=udp%3a%2f%2ftracker.tiny-vps.com%3a6969%2fannounce&tr=udp%3a%2f%2fopen.demonii.si%3a1337%2fannounce&tr=udp%3a%2f%2ftracker.port443.xyz%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.vanitycore.co%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.torrent.eu.org%3a451%2fannounce&tr=udp%3a%2f%2fretracker.lanta-net.ru%3a2710%2fannounce&tr=udp%3a%2f%2fthetracker.org%3a80%2fannounce&tr=http%3a%2f%2ftorrent.nwps.ws%3a80%2fannounce&tr=udp%3a%2f%2ftracker.coppersurfer.tk%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.iamhansen.xyz%3a2000%2fannounce&tr=udp%3a%2f%2fbt.xxx-tracker.com%3a2710%2fannounce&tr=http%3a%2f%2f0d.kebhana.mx%3a443%2fannounce&tr=udp%3a%2f%2fexodus.desync.com%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.opentrackr.org%3a1337%2fannounce&tr=udp%3a%2f%2ftracker4.itzmx.com%3a2710%2fannounce&tr=udp%3a%2f%2ftracker.justseed.it%3a1337%2fannounce&tr=http%3a%2f%2ftherightsize.net%3a1337%2fannounce&tr=udp%3a%2f%2fretracker.hotplug.ru%3a2710%2fannounce&tr=udp%3a%2f%2ftracker.internetwarriors.net%3a1337%2fannounce&tr=udp%3a%2f%2f9.rarbg.com%3a2800%2fannounce&tr=https%3a%2f%2f2.track.ga%3a443%2fannounce&tr=udp%3a%2f%2fbigfoot1942.sektori.org%3a6969%2fannounce)
* The latest release of [Frogtool](https://github.com/zoogie/Frogtool/releases/latest)
* La dernière version de [Frogtool](https://github.com/zoogie/Frogtool/releases/latest)
* The latest release of [b9sTool](https://github.com/zoogie/b9sTool/releases/latest)
* The latest release of [Luma3DS](https://github.com/AuroraWright/Luma3DS/releases/latest) *(the `.7z` file)*
* La dernière version de [Luma3DS](https://github.com/AuroraWright/Luma3DS/releases/latest) *(le fichier`.7z`)*
#### Section I - Préparatifs
1. Insérez votre carte SD dans votre ordinateur
1. Copy your `movable.sed` file to the root of your SD card
1. Copiez votre fichier `movable.sed` à la racine de votre carte SD
1. Copiez `boot.firm` de Luma3DS `.7z` dans la racine de votre carte SD
1. Copy `boot.nds` (B9STool) to the root of your SD card
1. Copy `Frogtool.3dsx` to the `/3ds/` folder on your SD card
1. Copy `frogcert.bin` to the root of your SD card
1. Copiez le fichier `boot.nds`(B9STool) vers la racine de votre carte SD
1. Copiez `Frogtool.3dsx` dans le dossier `/3ds/` de votre carte SD
1. Copiez `frogcert.bin` à la racine de votre carte SD
1. Réinsérez votre carte SD dans votre 3DS
1. Allumez à présent votre 3DS

View file

@ -10,7 +10,7 @@ Un excellent guide pour obtenir un hardmod se trouve [ici](https://gbatemp.net/t
Ceci est une implémentation de l'exploit "FIRM partitions known-plaintext" qui est décrit [ici](https://www.3dbrew.org/wiki/3DS_System_Flaws).
To use the [magnet](https://wikipedia.org/wiki/Magnet_URI_scheme) links on this page, you will need a torrent client like [Deluge](http://dev.deluge-torrent.org/wiki/Download).
Pour utiliser les liens suivants [magnet](https://fr.wikipedia.org/wiki/Magnet_(standard)), vous avez besoin d'un client Torrent comme [Deluge](http://dev.deluge-torrent.org/wiki/Download).
Pour extraire les fichiers `.7z` sur cette page, vous aurez besoin d'un programme d'archives comme [7-Zip](http://www.7-zip.org/) ou [The Unarchiver](https://theunarchiver.com).
@ -22,7 +22,7 @@ Cela fonctionne sur la New3DS, Old3DS, New 2DS et Old 3DS sur *toutes* les versi
* La dernière version de [boot9strap](https://github.com/SciresM/boot9strap/releases/latest) *(boot9strap standard, ni le fichier `devkit`, ni le fichier `ntr`)*
* La dernière version de [hardmod-b9s-installer](https://github.com/ihaveamac/hardmod-b9s-installer/releases/latest)
+ Les utilisateurs de Windows peuvent utiliser le `.exe` compilé, tandis que les utilisateurs Mac et Linux devront avoir [Python 3](https://www.python.org/downloads/) installé pour exécuter le `.py`
* The latest release of [Luma3DS](https://github.com/AuroraWright/Luma3DS/releases/latest) *(the `.7z` file)*
* La dernière version de [Luma3DS](https://github.com/AuroraWright/Luma3DS/releases/latest) *(le fichier`.7z`)*
* La dernière version de [Homebrew Launcher](https://github.com/fincs/new-hbmenu/releases/latest)
* Le `.firm` correspondant à votre console et version:

View file

@ -15,7 +15,7 @@ Pour extraire les fichiers `.7z` sur cette page, vous aurez besoin d'un programm
* N'importe quelle cartouche DS qui fonctionne sur la version de votre console
* La dernière version de [SafeB9SInstaller](https://github.com/d0k3/SafeB9SInstaller/releases/latest)
* La dernière version de [boot9strap](https://github.com/SciresM/boot9strap/releases/latest) *(boot9strap standard, ni le fichier `devkit`, ni le fichier `ntr`)*
* The latest release of [Luma3DS](https://github.com/AuroraWright/Luma3DS/releases/latest) *(the `.7z` file)*
* La dernière version de [Luma3DS](https://github.com/AuroraWright/Luma3DS/releases/latest) *(le fichier`.7z`)*
* La dernière version de [Homebrew Launcher](https://github.com/fincs/new-hbmenu/releases/latest)
### Instructions

View file

@ -8,7 +8,7 @@ title: "Installer boot9strap (ntrboot)"
Ceci est une implémentation de l'exploit "FIRM partitions known-plaintext" qui est décrit [ici](https://www.3dbrew.org/wiki/3DS_System_Flaws).
To use the [magnet](https://wikipedia.org/wiki/Magnet_URI_scheme) links on this page, you will need a torrent client like [Deluge](http://dev.deluge-torrent.org/wiki/Download).
Pour utiliser les liens suivants [magnet](https://fr.wikipedia.org/wiki/Magnet_(standard)), vous avez besoin d'un client Torrent comme [Deluge](http://dev.deluge-torrent.org/wiki/Download).
Pour extraire les fichiers `.7z` sur cette page, vous aurez besoin d'un programme d'archives comme [7-Zip](http://www.7-zip.org/) ou [The Unarchiver](https://theunarchiver.com).
@ -18,8 +18,8 @@ Pour extraire les fichiers `.7z` sur cette page, vous aurez besoin d'un programm
* Votre linker DS
* La dernière version de [SafeB9SInstaller](https://github.com/d0k3/SafeB9SInstaller/releases/latest)
* La dernière version de [boot9strap](https://github.com/SciresM/boot9strap/releases/latest) *(boot9strap standard, ni le fichier `devkit`, ni le fichier `ntr`)*
* The latest release of [Luma3DS](https://github.com/AuroraWright/Luma3DS/releases/latest) *(the `.7z` file)*
* La dernière version de [Homebrew Launcher](https://github.com/fincs/new-hbmenu/releases/latest)
* La dernière version de [Luma3DS](https://github.com/AuroraWright/Luma3DS/releases/latest) *(le fichier`.7z`)*
* The latest release of [the Homebrew Launcher](https://github.com/fincs/new-hbmenu/releases/latest)
### Instructions

View file

@ -26,8 +26,8 @@ Cela signifie que lutilisation dune mise à jour via cartouche depuis une
* The latest release of [Soundhax](http://soundhax.com) *(for your region, device, and version)*
* La dernière version de [SafeB9SInstaller](https://github.com/d0k3/SafeB9SInstaller/releases/latest)
* La dernière version de [boot9strap](https://github.com/SciresM/boot9strap/releases/latest) *(boot9strap standard, ni le fichier `devkit`, ni le fichier `ntr`)*
* The latest release of [Luma3DS](https://github.com/AuroraWright/Luma3DS/releases/latest) *(the `.7z` file)*
* La dernière version de [Homebrew Launcher](https://github.com/fincs/new-hbmenu/releases/latest)
* La dernière version de [Luma3DS](https://github.com/AuroraWright/Luma3DS/releases/latest) *(le fichier`.7z`)*
* The latest release of [the Homebrew Launcher](https://github.com/fincs/new-hbmenu/releases/latest)
* The latest release of [pre9otherapp](https://github.com/Pirater12/otherapp/releases/latest) *(the `.bin` file corresponding to your firmware version)*
### Instructions

View file

@ -17,14 +17,14 @@ Note : les linkers avec une "bombe à retardement" ne seront plus capables de la
| Linker | Prix actuel | "Bombe à retardement" ? | Compatible 3DS ? | Compatible DSi ? | Autres notes |
|-|-:|:-:|:-:|:-:|-|
| [**R4i-SDHC B9S**](http://www.nds-card.net/ProShow.asp?ProID=574) | $15.99 | September 3, 2019 | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot**; can be flashed back to an NDS flashcart. |
| [**R4i Gold 3DS Plus**](http://www.nds-card.net/ProShow.asp?ProID=575) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot** ([internal switch to switch between ntrboot and NDS modes]({{ "/images/screenshots/r4i-gold-3ds-plus.png" | absolute_url }})); do not manually flash with ntrboot. |
| [**Acekard 2i**](http://www.nds-card.net/ProShow.asp?ProID=160) | $20.99 | No | <= 4.3.0 | <= 1.4.4 | |
| [**DSTT**](http://www.nds-card.net/ProShow.asp?ProID=157) | $9.99 | No | None | None | Only models with [certain flash chips](https://gist.github.com/yuukieve/6b48f1bb8dd15136403c15c39fafdb42) are compatible with ntrboot. |
| [**R4i Gold 3DS**](http://www.nds-card.net/ProShow.asp?ProID=149) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | All RTS revisions are compatible. |
| [**R4i-SDHC 3DS RTS**](http://www.nds-card.net/ProShow.asp?ProID=146) | $13.99 | 1.87: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | |
| [**R4iSDHC GOLD Pro 20XX**](http://www.nds-card.net/ProShow.asp?ProID=490) | $9.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. Les modèles 2013 sont incompatibles. |
| [**R4iSDHC RTS LITE 20XX**](http://www.nds-card.net/ProShow.asp?ProID=450) | $13.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. Les modèles 2013 sont incompatibles. |
| [**R4i-SDHC B9S**](http://www.nds-card.com/ProShow.asp?ProID=574) | $15.99 | September 3, 2019 | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot**; can be flashed back to an NDS flashcart. |
| [**R4i Gold 3DS Plus**](http://www.nds-card.com/ProShow.asp?ProID=575) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot** ([internal switch to switch between ntrboot and NDS modes]({{ "/images/screenshots/r4i-gold-3ds-plus.png" | absolute_url }})); do not manually flash with ntrboot. |
| [**Acekard 2i**](http://www.nds-card.com/ProShow.asp?ProID=160) | $20.99 | No | <= 4.3.0 | <= 1.4.4 | |
| [**DSTT**](http://www.nds-card.com/ProShow.asp?ProID=157) | $9.99 | No | None | None | Only models with [certain flash chips](https://gist.github.com/yuukieve/6b48f1bb8dd15136403c15c39fafdb42) are compatible with ntrboot. |
| [**R4i Gold 3DS**](http://www.nds-card.com/ProShow.asp?ProID=149) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | All RTS revisions are compatible. |
| [**R4i-SDHC 3DS RTS**](http://www.nds-card.com/ProShow.asp?ProID=146) | $13.99 | 1.87: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | |
| [**R4iSDHC GOLD Pro 20XX**](http://www.nds-card.com/ProShow.asp?ProID=490) | $9.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. Les modèles 2013 sont incompatibles. |
| [**R4iSDHC RTS LITE 20XX**](http://www.nds-card.com/ProShow.asp?ProID=450) | $13.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. Les modèles 2013 sont incompatibles. |
| **Ace3DS X** | | No | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot** (external switch to switch between ntrboot ("3DS") and NDS modes); do not manually flash with ntrboot. |
| **Ace3DS Plus** | | No | <= 11.9.0 | <= 1.4.5 | |
| **Gateway Blue** | | Non | 4.1.0 - 4.5.0 | <= 1.4.5 | |
@ -50,7 +50,7 @@ puis de voir si l'appareil se met en mode veille . Si cela fonctionne , l'écran
Notez que le Linker ne pourra pas être utilisé pour ses fonctions standards tant que lexploit de ntrboot est installé dessus (sauf dans le cas de lAcekard 2i, qui reste fonctionnel *sur NDS et 3DS avec custom firmware installé seulement*). Cela signifie que, pour la plupart des linkers, il ne sera même pas affiché sur le menu HOME. Des étapes facultatives se trouvent à la fin des instructions de flash Ntrboot , concernant la suppresion de l'exploit de votre Linker .
Notez qu'il est possible que pendant le flash sur un clone celui-ci devienne **inutilisable**. C'est peu probable, mais notez que seuls les originaux sont supportés. To reduce the chance of receiving a counterfeit card, it is recommended that you use a reputable site to buy your flashcart (such as [NDS Card](http://www.nds-card.net/))
Notez qu'il est possible que pendant le flash sur un clone celui-ci devienne **inutilisable**. C'est peu probable, mais notez que seuls les originaux sont supportés. To reduce the chance of receiving a counterfeit card, it is recommended that you use a reputable site to buy your flashcart (such as [NDS Card](http://www.nds-card.com/))
{: .notice--danger}
___

View file

@ -10,7 +10,7 @@ Ceci est une section complémentaire pour ceux qui voudraient changer la région
Note that region changing is almost completely unnecessary since Luma3DS supports out-of-region games and individual title [Locale Emulation](https://github.com/AuroraWright/Luma3DS/wiki/Optional-features). Additionally, running NDS games with alternative out-of-region languages is supported [DSiMenu++](https://github.com/Robz8/TWiLightMenu/releases).
To use the [magnet](https://wikipedia.org/wiki/Magnet_URI_scheme) links on this page, you will need a torrent client like [Deluge](http://dev.deluge-torrent.org/wiki/Download).
Pour utiliser les liens suivants [magnet](https://fr.wikipedia.org/wiki/Magnet_(standard)), vous avez besoin d'un client Torrent comme [Deluge](http://dev.deluge-torrent.org/wiki/Download).
Notez que si vous avez nimporte quel autre payload que `GodMode9.firm` dans le dossier `/luma/payloads/` sur votre carte SD, appuyez (Start) au démarrage affiche un "chainloader menu" où vous devrez utiliser le D-Pad et le bouton (A) pour sélectionner "GodMode9" .
@ -89,7 +89,7 @@ Vous DEVEZ avoir déjà installé Luma3DS et boot9strap pour utiliser ceci.
#### Section III - Lancez FBI
1. Launch the Download Play application (this [icon]({{ "/images/download-play-icon.png" | absolute_url }})
1. Lancez l'application Mode téléchargement (cette [icône]({{ "/images/download-play-icon.png" | absolute_url }})
1. Appuyez simultanément sur (L) + (Bas) + (Select) pour ouvrir le menu Rosalina
1. Sélectionnez "Miscellaneous options"
1. Sélectionnez "Switch the hb. title to the current app."

View file

@ -63,9 +63,7 @@ There are two different methods for building on the Seedminer exploit (described
1. Open [Bruteforce Movable](https://bruteforcemovable.com/) on your computer
+ This site can automate the retrieval of `movable_part1.sed` (using a bot 3DS console) and the breaking of your device's DSiWare encryption (using a volunteer's computer to run Seedminer)
+ If you already have access to a 3DS capable of launching the Homebrew Launcher, you can manually retrieve your `movable_part1.sed` using that device by following [these](https://jisagi.github.io/SeedminerGuide/seedminerSelf/#section1) instructions
+ If you already have access to a PC with a powerful graphics card, you can manually calculate your `movable.sed` using it by following [these](https://jisagi.github.io/SeedminerGuide/seedminerSelf/#section2) instructions
+ If the automated service is nonfunctional and you cannot do one or both of those manually, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you
+ If the automated service is nonfunctional, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you
1. Enter your device's Friend Code (with no spaces or dashes) into the "Your friend code" field
1. Paste your device's 32 character long folder name into the "Your ID0" field
1. Complete the "I'm not a robot" captcha
@ -74,11 +72,11 @@ There are two different methods for building on the Seedminer exploit (described
1. When prompted, use the "Register Friend" button on your device to add the friend code of the bot 3DS console
1. Wait for the site to update
+ If it does not, wait a few minutes before refreshing the page once
1. Select "Continue"
1. Wait for the process to complete
+ This can take a while (up to an hour in some cases)
+ During this process, the bot may not show up on your 3ds. As long as the website updates, this is not an issue.
+ If you are still waiting after an hour, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you
1. Once the site processes your information, you will be given the option to "Continue" or "Do another device". Click the green "Continue" button
1. Wait for the remainder of the process to complete
+ This is usually fast (1-5 minutes) but in some cases, can take up to half an hour.
+ During this process, the bot you added may not show up on your 3ds. As long as the website updates, this is not an issue.
+ If you are still waiting after half an hour, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you
1. When the process has completed, download your `movable.sed` file from the site
+ Keep this file as you will need it in the upcoming pages
@ -102,7 +100,7 @@ ___
#### Seedminer + Steelhax + Frogtool
This method of using Seedminer for further exploitation uses your `movable.sed` file to gain access to the Homebrew Launcher using the Steelhax exploit for the purposes of injecting an exploitable DSiWare title into the DS Download Play application. This method requires you to already own (or download) the free "Steel Divers: Sub Wars" game from the eShop.
Cette méthode d'utilisation de Seedminer pour une exploitation ultérieure utilise votre fichier `movable.sed` pour accéder à l'Homebrew Launcher en utilisant l'exploit Steelhax pour injecter un titre DSiWare exploitable dans l'application Mode téléchargement. This method requires you to already own (or download) the free "Steel Diver: Sub Wars" game from the eShop.
This method is only compatible with the EUR, JPN, and USA regions, and is somewhat more complicated than the above method. It is only recommended to use this method if you have a EUR region device and do not wish to pay for a DSiWare game, or if the above method does not work for you for some reason.

View file

@ -12,7 +12,7 @@ Si vous ne parvenez pas à démarrer votre 3DS, recherchez la section qui vous c
Notez que si vous avez nimporte quel autre payload que `GodMode9.firm` dans le dossier `/luma/payloads/` sur votre carte SD, appuyer sur (Start) au démarrage affiche un "chainloader menu" où vous devrez utiliser le D-Pad et le bouton (A) pour sélectionner "GodMode9" .
To use the [magnet](https://wikipedia.org/wiki/Magnet_URI_scheme) links on this page, you will need a torrent client like [Deluge](http://dev.deluge-torrent.org/wiki/Download).
Pour utiliser les liens suivants [magnet](https://fr.wikipedia.org/wiki/Magnet_(standard)), vous avez besoin d'un client Torrent comme [Deluge](http://dev.deluge-torrent.org/wiki/Download).
## La fonctionnalité DSi / DS ne fonctionne plus après avoir fini le guide

View file

@ -11,7 +11,7 @@ Ceci supprimera complètement le CFW de votre console, y compris Boot9Strap et L
Ce n'est presque jamais la solution pour résoudre les problèmes que vous pouvez rencontrez lors de l'installation d'un CFW. A better idea would be to read the [troubleshooting](troubleshooting) page or ask (in English) for help at [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp).
{: .notice--danger}
Tous les jeux (illégitimes) non signés seront rendues inutilisables et peuvent être supprimés manuellement à laide de la section de gestion des données des paramètres système. Use a [save manager](https://github.com/FlagBrew/Checkpoint/releases/latest) to backup any saves for these unsigned (illegitimate) games you care about.
Any unsigned (illegitimate) games will be rendered unusable and should be manually removed before starting this process by using the Data Management section of the System Settings. Use a [save manager](https://github.com/FlagBrew/Checkpoint/releases/latest) to backup any saves for these unsigned (illegitimate) games you care about.
Cela naffectera pas votre NNID, nimporte quel jeux légitimement achetés ou des sauvegardes pour ces jeux légitimement achetés.
@ -26,21 +26,43 @@ Notez que si vous avez nimporte quel autre payload que `GodMode9.firm` dans l
### Instructions
#### Section I - Préparatifs
#### Section I - Safety Test
1. Éteignez votre 3DS
1. Insérez votre carte SD dans votre ordinateur
1. Copiez le fichier `GodMode9.firm` de l'archive GodMode9 `.zip` dans le dossier `/luma/payloads/` sur votre carte SD
1. Copiez le dossier `gm9` de GodMode9 `.zip` à la racine de votre carte SD
1. Réinsérez votre carte SD dans votre 3DS
1. Allumez à présent votre 3DS
#### Section II - Exécution du script pour désinstaller CFW
1. Ouvrez Godmode9 en maintenant (Start) au démarrage
1. Si vous êtes invité à créer une sauvegarde de fichiers essentiels, appuyez sur (A) pour le faire, puis appuyez sur (A) pour continuer une fois quelle a complété
1. Si vous êtes invité à régler la date et l'heure du RTC, appuyez sur (A) pour le faire, puis réglez la date et l'heure, puis appuyez sur (A) pour continuer
Notez que, si vous avez dû régler la date et l'heure du RTC, vous devrez également régler l'heure dans les Paramètres du système après ce guide
1. Navigate to `[1:] SYSNAND CTRNAND > title > 00040138 > (X)0000002 > content`
+ On a "New" edition console, the (X) will instead be 2
+ On an "Old" edition console, the (X) will instead be 0
1. Select the `.app` file
1. Select `NCCH Image Options`
1. Select `Mount image to drive`
1. In the window that appears, open the `exefs` folder
1. In this folder, select the `.firm` file
1. Select "Firm Options"
1. Select "Boot Firm"
1. When prompted, choose to decrypt and make a copy
1. You should boot into the regular 3DS Home Menu. If you do, power your device off and continue to the next section
+ If you do NOT boot into the regular 3DS Home Menu, continuing with these instructions **WILL** brick your device. You should join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you
#### Section II - Prep Work
1. Allumez à présent votre 3DS
1. Navigate to System Settings > Data Management > Nintendo 3DS > Software
1. In this list of software, delete any non-Nintendo content you installed while using CFW
+ This includes common system software such as FBI, Anemone3DS, Luma Updater, Homebrew Launcher, Checkpoint, and others, along with any non-eShop games
+ Failure to remove CFW software before uninstalling CFW may break access to the Data Management menu after uninstalling CFW
1. Éteignez votre 3DS
#### Section III - Running Uninstall Script
1. Ouvrez Godmode9 en maintenant (Start) au démarrage
1. Appuyez sur (Home) pour faire apparaître le menu dactions (action menu)
1. Sélectionnez "Scripts"
1. Sélectionnez "GM9Megascript"

View file

@ -31,7 +31,7 @@ Il y a eu des informations concernant une vague de bannissements contre les util
* La dernière version de [SafeB9SInstaller](https://github.com/d0k3/SafeB9SInstaller/releases/latest)
* La dernière version de [boot9strap](https://github.com/SciresM/boot9strap/releases/latest) *(boot9strap standard, ni le fichier `devkit`, ni le fichier `ntr`)*
* La dernière version de [GodMode9](https://github.com/d0k3/GodMode9/releases/latest)
* The latest release of [Luma3DS](https://github.com/AuroraWright/Luma3DS/releases/latest) *(the `.7z` file)*
* La dernière version de [Luma3DS](https://github.com/AuroraWright/Luma3DS/releases/latest) *(le fichier`.7z`)*
### Instructions

View file

@ -18,6 +18,8 @@ title: "סיום התהליך"
+ **Luma3DS Updater** *(עדכון לCFW בקלות)*
+ **GodMode9** *(כלי רב שימושי אשר מסוגל לבצע פונקציות הקשורות ל-NAND ולקלטות משחק)*
+ **Homebrew Launcher Loader** *(מפעיל את הHomebrew Launcher)*
+ **DSP1** *(allows homebrew applications to have sound)*
+ **ctr-no-timeoffset** *(removes the rtc offset so that the home menu and rtc timestamps match)*
### What You Need
@ -143,7 +145,7 @@ If, while following a previous version of this guide, you CTRTransfered your *Ne
1. תלחצו (B) כדי לחזור לתפריט הראשי
1. תחזיקו (R) ולחצו (B) באותו הזמן כדי להוציא את הSD
1. תכניסו את ה-SD שלכם למחשב
1. Copy `<date>_<serialnumber>_sysnand_###.bin`, `essential.exefs`, and `boot9.bin` from the `/gm9/out/` folder on your SD card to a safe location on your computer
1. Copy `<date>_<serialnumber>_sysnand_###.bin`, `<date>_<serialnumber>_sysnand_###.bin.sha`, `essential.exefs`, and `boot9.bin` from the `/gm9/out/` folder on your SD card to a safe location on your computer
+ תיצרו גיבויים במקומות שונים (כמו אחסון בענן)
+ These backups will save you from a brick and/or help you recover files from the NAND image if anything goes wrong in the future
1. Delete `<date>_<serialnumber>_sysnand_###.bin` and `<date>_<serialnumber>_sysnand_###.bin.sha` from the `/gm9/out/` folder on your SD card after copying it

View file

@ -8,7 +8,7 @@ title: "Homebrew Launcher (Steelhax)"
This method of using Seedminer for further exploitation uses your `movable.sed` file to gain access to the Homebrew Launcher using the Steelhax exploit for the purposes of injecting an exploitable DSiWare title into the DS Download Play application. This method requires you to already own (or download) the free "Steel Divers: Sub Wars" game from the eShop.
If your device already has access to the Homebrew Launcher (whether through Steelhax or another exploit), you can skip to [Installing Boot9strap (Frogminer)](installing-boot9strap-(frogminer)).
If your device already has access to the Homebrew Launcher (whether through Steelhax or another exploit), you can skip to [Installing Boot9strap (Frogtool)](installing-boot9strap-(frogtool)).
{: .notice--success}
If you already have Steel Diver: Sub Wars, this process will overwrite your game's save file!
@ -17,6 +17,7 @@ If you already have Steel Diver: Sub Wars, this process will overwrite your game
### What You Need
* The free eShop game "Steel Diver: Sub Wars"
* Your `movable.sed` file from completing [Seedminer](seedminer)
* The latest release of [the Homebrew Launcher](https://github.com/fincs/new-hbmenu/releases/latest)
* The latest release of [Steelhax](https://github.com/VegaRoXas/vegaroxas.github.io/raw/master/files/steelhax-installer.rar)
* The [otherapp payload](https://smealum.github.io/3ds/#otherapp) *(for your region and version)*
@ -39,7 +40,7 @@ If you already have Steel Diver: Sub Wars, this process will overwrite your game
1. Exit "Steel Diver: Sub Wars"
1. תכבו את המכשיר
1. תכניסו את ה-SD שלכם למחשב
1. Open [the Steelminer Injector website](http://steelminer.jisagi.net/injector) on your computer
1. Open [the Steelminer Injector website](https://bruteforcemovable.com/steelhax/) on your computer
1. Select your `movable.sed` file
1. Select "Start!"
1. Wait for the process to complete

View file

@ -10,8 +10,6 @@ This method of using Seedminer for further exploitation uses your `movable.sed`
זה כרגע יישום עובד של הפירצה "PLAINTEXT ידוע למחיצת הFIRM" עם הסבר [כאן](https://www.3dbrew.org/wiki/3DS_System_Flaws).
To use the [magnet](https://wikipedia.org/wiki/Magnet_URI_scheme) links on this page, you will need a torrent client like [Deluge](http://dev.deluge-torrent.org/wiki/Download).
To extract the `.7z` and `.rar` files linked on this page, you will need a file archiver like [7-Zip](http://www.7-zip.org/) or [The Unarchiver](https://theunarchiver.com/).
### What You Need

View file

@ -17,14 +17,14 @@ If your flashcart comes pre-flashed with ntrboot (or you have already flashed nt
| שם הכרטיס | מחיר נוכחי | "פצצת זמן"? | גרסאות 3DS? | גירסאות DSi? | הערות אחרות |
|-|-:|:-:|:-:|:-:|-|
| [**R4i-SDHC B9S**](http://www.nds-card.net/ProShow.asp?ProID=574) | $15.99 | September 3, 2019 | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot**; can be flashed back to an NDS flashcart. |
| [**R4i Gold 3DS Plus**](http://www.nds-card.net/ProShow.asp?ProID=575) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot** ([internal switch to switch between ntrboot and NDS modes]({{ "/images/screenshots/r4i-gold-3ds-plus.png" | absolute_url }})); do not manually flash with ntrboot. |
| [**Acekard 2i**](http://www.nds-card.net/ProShow.asp?ProID=160) | $20.99 | No | <= 4.3.0 | <= 1.4.4 | |
| [**DSTT**](http://www.nds-card.net/ProShow.asp?ProID=157) | $9.99 | No | None | None | Only models with [certain flash chips](https://gist.github.com/yuukieve/6b48f1bb8dd15136403c15c39fafdb42) are compatible with ntrboot. |
| [**R4i Gold 3DS**](http://www.nds-card.net/ProShow.asp?ProID=149) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | All RTS revisions are compatible. |
| [**R4i-SDHC 3DS RTS**](http://www.nds-card.net/ProShow.asp?ProID=146) | $13.99 | 1.87: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | |
| [**R4iSDHC GOLD Pro 20XX**](http://www.nds-card.net/ProShow.asp?ProID=490) | $9.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. 2013 models are incompatible. |
| [**R4iSDHC RTS LITE 20XX**](http://www.nds-card.net/ProShow.asp?ProID=450) | $13.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. 2013 models are incompatible. |
| [**R4i-SDHC B9S**](http://www.nds-card.com/ProShow.asp?ProID=574) | $15.99 | September 3, 2019 | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot**; can be flashed back to an NDS flashcart. |
| [**R4i Gold 3DS Plus**](http://www.nds-card.com/ProShow.asp?ProID=575) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot** ([internal switch to switch between ntrboot and NDS modes]({{ "/images/screenshots/r4i-gold-3ds-plus.png" | absolute_url }})); do not manually flash with ntrboot. |
| [**Acekard 2i**](http://www.nds-card.com/ProShow.asp?ProID=160) | $20.99 | No | <= 4.3.0 | <= 1.4.4 | |
| [**DSTT**](http://www.nds-card.com/ProShow.asp?ProID=157) | $9.99 | No | None | None | Only models with [certain flash chips](https://gist.github.com/yuukieve/6b48f1bb8dd15136403c15c39fafdb42) are compatible with ntrboot. |
| [**R4i Gold 3DS**](http://www.nds-card.com/ProShow.asp?ProID=149) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | All RTS revisions are compatible. |
| [**R4i-SDHC 3DS RTS**](http://www.nds-card.com/ProShow.asp?ProID=146) | $13.99 | 1.87: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | |
| [**R4iSDHC GOLD Pro 20XX**](http://www.nds-card.com/ProShow.asp?ProID=490) | $9.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. 2013 models are incompatible. |
| [**R4iSDHC RTS LITE 20XX**](http://www.nds-card.com/ProShow.asp?ProID=450) | $13.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. 2013 models are incompatible. |
| **Ace3DS X** | | No | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot** (external switch to switch between ntrboot ("3DS") and NDS modes); do not manually flash with ntrboot. |
| **Ace3DS Plus** | | No | <= 11.9.0 | <= 1.4.5 | |
| **Gateway Blue** | | No | 4.1.0 - 4.5.0 | <= 1.4.5 | |
@ -49,7 +49,7 @@ If your flashcart comes pre-flashed with ntrboot (or you have already flashed nt
Note that the flashcart will not be able to be used for its standard functions while the ntrboot exploit is installed on it (except for in the case of the Acekard 2i, which remains functional *on NDS and custom firmware 3DS systems only*). זה אומר שרוב הכרטיסים אפילו לא יהיו מוצגים בתפריט הביית. יש שלבים אופטימלים בסוף הוראות צריבת ntrboot כדי למחוק אותו מכרטיס הפריצה אחרי שסיימתם.
שימו לב שבמקרים נדירים, יתכן שתהליך הצריבה **ישבור** כרטיס פריצה מזוייף ויגרום לו לא לעבוד. זה לא סביר שייקרה, אבל בכל זאת רק כרטיסי פריצה מקוריים שמפורטים נתמכים. To reduce the chance of receiving a counterfeit card, it is recommended that you use a reputable site to buy your flashcart (such as [NDS Card](http://www.nds-card.net/))
שימו לב שבמקרים נדירים, יתכן שתהליך הצריבה **ישבור** כרטיס פריצה מזוייף ויגרום לו לא לעבוד. זה לא סביר שייקרה, אבל בכל זאת רק כרטיסי פריצה מקוריים שמפורטים נתמכים. To reduce the chance of receiving a counterfeit card, it is recommended that you use a reputable site to buy your flashcart (such as [NDS Card](http://www.nds-card.com/))
{: .notice--danger}
___

View file

@ -63,9 +63,7 @@ There are two different methods for building on the Seedminer exploit (described
1. Open [Bruteforce Movable](https://bruteforcemovable.com/) on your computer
+ This site can automate the retrieval of `movable_part1.sed` (using a bot 3DS console) and the breaking of your device's DSiWare encryption (using a volunteer's computer to run Seedminer)
+ If you already have access to a 3DS capable of launching the Homebrew Launcher, you can manually retrieve your `movable_part1.sed` using that device by following [these](https://jisagi.github.io/SeedminerGuide/seedminerSelf/#section1) instructions
+ If you already have access to a PC with a powerful graphics card, you can manually calculate your `movable.sed` using it by following [these](https://jisagi.github.io/SeedminerGuide/seedminerSelf/#section2) instructions
+ If the automated service is nonfunctional and you cannot do one or both of those manually, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you
+ If the automated service is nonfunctional, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you
1. Enter your device's Friend Code (with no spaces or dashes) into the "Your friend code" field
1. Paste your device's 32 character long folder name into the "Your ID0" field
1. Complete the "I'm not a robot" captcha
@ -74,11 +72,11 @@ There are two different methods for building on the Seedminer exploit (described
1. When prompted, use the "Register Friend" button on your device to add the friend code of the bot 3DS console
1. Wait for the site to update
+ If it does not, wait a few minutes before refreshing the page once
1. Select "Continue"
1. Wait for the process to complete
+ This can take a while (up to an hour in some cases)
+ During this process, the bot may not show up on your 3ds. As long as the website updates, this is not an issue.
+ If you are still waiting after an hour, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you
1. Once the site processes your information, you will be given the option to "Continue" or "Do another device". Click the green "Continue" button
1. Wait for the remainder of the process to complete
+ This is usually fast (1-5 minutes) but in some cases, can take up to half an hour.
+ During this process, the bot you added may not show up on your 3ds. As long as the website updates, this is not an issue.
+ If you are still waiting after half an hour, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you
1. When the process has completed, download your `movable.sed` file from the site
+ Keep this file as you will need it in the upcoming pages
@ -102,7 +100,7 @@ ___
#### Seedminer + Steelhax + Frogtool
This method of using Seedminer for further exploitation uses your `movable.sed` file to gain access to the Homebrew Launcher using the Steelhax exploit for the purposes of injecting an exploitable DSiWare title into the DS Download Play application. This method requires you to already own (or download) the free "Steel Divers: Sub Wars" game from the eShop.
This method of using Seedminer for further exploitation uses your `movable.sed` file to gain access to the Homebrew Launcher using the Steelhax exploit for the purposes of injecting an exploitable DSiWare title into the DS Download Play application. This method requires you to already own (or download) the free "Steel Diver: Sub Wars" game from the eShop.
This method is only compatible with the EUR, JPN, and USA regions, and is somewhat more complicated than the above method. It is only recommended to use this method if you have a EUR region device and do not wish to pay for a DSiWare game, or if the above method does not work for you for some reason.

View file

@ -11,7 +11,7 @@ title: "הסרת CFW"
This is almost never the solution to fix any issues you encounter with your CFW installation. A better idea would be to read the [troubleshooting](troubleshooting) page or ask (in English) for help at [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp).
{: .notice--danger}
כל המשחקים הלא חתומים (פרוצים) יפסיקו לעבוד ותוכלו למחוק אותם ידנים בעזרת Data management בהגדרות. Use a [save manager](https://github.com/FlagBrew/Checkpoint/releases/latest) to backup any saves for these unsigned (illegitimate) games you care about.
Any unsigned (illegitimate) games will be rendered unusable and should be manually removed before starting this process by using the Data Management section of the System Settings. Use a [save manager](https://github.com/FlagBrew/Checkpoint/releases/latest) to backup any saves for these unsigned (illegitimate) games you care about.
זה לא ישפיע על הNNID שלכם, כל המשחקים הקנויים חוקית, או השמירות שלהם.
@ -26,21 +26,43 @@ If you have modified critical system software (such as editing the home menu, un
### הנחיות
#### חלק I - הכנות
#### Section I - Safety Test
1. תכבו את המכשיר
1. תכניסו את ה-SD שלכם למחשב
1. העתיקו את `GodMode9.firm` מהזיפ של GodMode9 אל תיקיית /luma/payloads/ ב- SD שלכם
1. תעתיקו את התיקייה `gm9` מתוך ה`.zip` של GodMode9 ל-SD שלכם
1. תכניסו מחדש את כרטיס הSD שלכם לתוך המכשיר שלכם
1. תפעילו את המכשיר
#### חלק II - הפעלת הסקריפט של ההסרה
1. תפתחו את GodMode9 על ידי החזקה של המקש (Start) בעת ההדלקה
1. אם תתבקשו לעשות גיבוי של קבצים חיוניים, תלחצו (A) כדי לעשות זאת, ואז תלחצו (A) כדי להמשיך אחרי שזה סיים
1. אם אתם מתבקשים לתקן את זמן ותאריך הRTC, תלחצו (A) כדי לעשות זאת, ואז תלחצו (A) כדי להמשיך
+ שימו לב, אם הייתם צריכים לתקן את תאריך וזמן הRTC, תצטרכו לתקן את הזמן בהגדרות המערכת גם כן אחרי המדריך הזה
1. Navigate to `[1:] SYSNAND CTRNAND > title > 00040138 > (X)0000002 > content`
+ On a "New" edition console, the (X) will instead be 2
+ On an "Old" edition console, the (X) will instead be 0
1. Select the `.app` file
1. Select `NCCH Image Options`
1. Select `Mount image to drive`
1. In the window that appears, open the `exefs` folder
1. In this folder, select the `.firm` file
1. Select "Firm Options"
1. Select "Boot Firm"
1. When prompted, choose to decrypt and make a copy
1. You should boot into the regular 3DS Home Menu. If you do, power your device off and continue to the next section
+ If you do NOT boot into the regular 3DS Home Menu, continuing with these instructions **WILL** brick your device. You should join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you
#### Section II - Prep Work
1. תפעילו את המכשיר
1. Navigate to System Settings > Data Management > Nintendo 3DS > Software
1. In this list of software, delete any non-Nintendo content you installed while using CFW
+ This includes common system software such as FBI, Anemone3DS, Luma Updater, Homebrew Launcher, Checkpoint, and others, along with any non-eShop games
+ Failure to remove CFW software before uninstalling CFW may break access to the Data Management menu after uninstalling CFW
1. תכבו את המכשיר
#### Section III - Running Uninstall Script
1. תפתחו את GodMode9 על ידי החזקה של המקש (Start) בעת ההדלקה
1. תלחצו על (Home) כדי להראות את תפריט הפעולה
1. תבחרו "Scripts..."
1. Select "GM9Megascript"

View file

@ -18,6 +18,8 @@ Ezen folyamat közben további programokat is telepítünk, melyek az alábbiak:
+ **Luma3DS Updater** *(egyszerűen frissíthető vele a CFW)*
+ **GodMode9** *(sokféle dologra használható eszköz, például NAND és kártya műveletekre)*
+ **Homebrew Launcher Loader** *(elindítja a Homebrew Launchert)*
+ **DSP1** *(allows homebrew applications to have sound)*
+ **ctr-no-timeoffset** *(removes the rtc offset so that the home menu and rtc timestamps match)*
### Amire szükséged lesz
@ -143,7 +145,7 @@ Amennyiben ezen leírás megkezdése előtt már rendelkeztél EmuNAND-dal, és
1. Nyomd meg a (B) gombot, hogy visszamenj a főmenübe
1. Az SD kártya leválasztásához az (R) gomb lenyomva tartása mellett nyomd meg a (B) gombot
1. Helyezd az SD kártyád a számítógépbe
1. Másold a `<dátum>_<sorozatszám>_sysnand_###.bin`, az `essential.exefs` és a `boot9.bin` fájlokat az SD kártyád `/gm9/out/` mappájából valami biztonságos helyre a számítógépeden
1. Copy `<date>_<serialnumber>_sysnand_###.bin`, `<date>_<serialnumber>_sysnand_###.bin.sha`, `essential.exefs`, and `boot9.bin` from the `/gm9/out/` folder on your SD card to a safe location on your computer
+ Tarts belőle biztonsági másolatokat több különböző helyen is (például online tárhelyen)
+ Ezek a biztonsági mentések fognak megmenteni, ha a későbbiekben brickelődne a konzolod, vagy bármi félresikerülne a jövőben
1. Töröld a `<dátum>_<sorozatszám>_sysnand_###.bin` és a `<dátum>_<sorozatszám>_sysnand_###.bin.sha` fájlokat az SD kártyád `/gm9/out/` mappájából, miután lemásoltad azokat

View file

@ -8,7 +8,7 @@ title: "Homebrew Launcher (Steelhax)"
This method of using Seedminer for further exploitation uses your `movable.sed` file to gain access to the Homebrew Launcher using the Steelhax exploit for the purposes of injecting an exploitable DSiWare title into the DS Download Play application. This method requires you to already own (or download) the free "Steel Divers: Sub Wars" game from the eShop.
If your device already has access to the Homebrew Launcher (whether through Steelhax or another exploit), you can skip to [Installing Boot9strap (Frogminer)](installing-boot9strap-(frogminer)).
If your device already has access to the Homebrew Launcher (whether through Steelhax or another exploit), you can skip to [Installing Boot9strap (Frogtool)](installing-boot9strap-(frogtool)).
{: .notice--success}
If you already have Steel Diver: Sub Wars, this process will overwrite your game's save file!
@ -17,6 +17,7 @@ If you already have Steel Diver: Sub Wars, this process will overwrite your game
### Amire szükséged lesz
* The free eShop game "Steel Diver: Sub Wars"
* Your `movable.sed` file from completing [Seedminer](seedminer)
* A [Homebrew Launcher](https://github.com/fincs/new-hbmenu/releases/latest) legújabb kiadása
* The latest release of [Steelhax](https://github.com/VegaRoXas/vegaroxas.github.io/raw/master/files/steelhax-installer.rar)
* Az [otherapp payload](https://smealum.github.io/3ds/#otherapp) *(a készüléked verziójának és régiójának megfelelő változat)*
@ -39,7 +40,7 @@ If you already have Steel Diver: Sub Wars, this process will overwrite your game
1. Exit "Steel Diver: Sub Wars"
1. Kapcsold ki a készüléked
1. Helyezd az SD kártyád a számítógépbe
1. Open [the Steelminer Injector website](http://steelminer.jisagi.net/injector) on your computer
1. Open [the Steelminer Injector website](https://bruteforcemovable.com/steelhax/) on your computer
1. Select your `movable.sed` file
1. Nyomd meg a "Start!" gombot
1. Várd meg, amíg a folyamat befejeződik

View file

@ -10,8 +10,6 @@ This method of using Seedminer for further exploitation uses your `movable.sed`
Ez egy jelenleg működő megvalósítása a "FIRM partitions known-plaintext" néven ismert exploitnak, amiről részletesebben olvashatsz [itt](https://www.3dbrew.org/wiki/3DS_System_Flaws).
Ahhoz, hogy használhasd a [magnet](https://wikipedia.org/wiki/Magnet_URI_scheme) linkeket ezen az oldalon, szükséged lesz egy torrent kliensre, mint például a [Deluge](http://dev.deluge-torrent.org/wiki/Download).
To extract the `.7z` and `.rar` files linked on this page, you will need a file archiver like [7-Zip](http://www.7-zip.org/) or [The Unarchiver](https://theunarchiver.com/).
### Amire szükséged lesz

View file

@ -17,14 +17,14 @@ Vedd figyelembe, hogy a "Time Bomb"-bal rendelkező kártyák nem lesznek képes
| Flashkártya neve | Jelenlegi ár | "Time Bomb"? | 3DS verziók? | DSi verziók? | Megjegyzések |
|-|-:|:-:|:-:|:-:|-|
| [**R4i-SDHC B9S**](http://www.nds-card.net/ProShow.asp?ProID=574) | $15.99 | September 3, 2019 | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot**; can be flashed back to an NDS flashcart. |
| [**R4i Gold 3DS Plus**](http://www.nds-card.net/ProShow.asp?ProID=575) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot** ([internal switch to switch between ntrboot and NDS modes]({{ "/images/screenshots/r4i-gold-3ds-plus.png" | absolute_url }})); do not manually flash with ntrboot. |
| [**Acekard 2i**](http://www.nds-card.net/ProShow.asp?ProID=160) | $20.99 | nem | <= 4.3.0 | <= 1.4.4 | |
| [**DSTT**](http://www.nds-card.net/ProShow.asp?ProID=157) | $9.99 | nem | nincs| nincs | Csak [bizonyos flash chipek](https://gist.github.com/yuukieve/6b48f1bb8dd15136403c15c39fafdb42) kompatibilisek ntrboot-tal. |
| [**R4i Gold 3DS**](http://www.nds-card.net/ProShow.asp?ProID=149) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | All RTS revisions are compatible. |
| [**R4i-SDHC 3DS RTS**](http://www.nds-card.net/ProShow.asp?ProID=146) | $13.99 | 1.87: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | |
| [**R4iSDHC GOLD Pro 20XX**](http://www.nds-card.net/ProShow.asp?ProID=490) | $9.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. A 2013-as modellek nem kompatibilisek. |
| [**R4iSDHC RTS LITE 20XX**](http://www.nds-card.net/ProShow.asp?ProID=450) | $13.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. A 2013-as modellek nem kompatibilisek. |
| [**R4i-SDHC B9S**](http://www.nds-card.com/ProShow.asp?ProID=574) | $15.99 | September 3, 2019 | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot**; can be flashed back to an NDS flashcart. |
| [**R4i Gold 3DS Plus**](http://www.nds-card.com/ProShow.asp?ProID=575) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot** ([internal switch to switch between ntrboot and NDS modes]({{ "/images/screenshots/r4i-gold-3ds-plus.png" | absolute_url }})); do not manually flash with ntrboot. |
| [**Acekard 2i**](http://www.nds-card.com/ProShow.asp?ProID=160) | $20.99 | No | <= 4.3.0 | <= 1.4.4 | |
| [**DSTT**](http://www.nds-card.com/ProShow.asp?ProID=157) | $9.99 | No | None | None | Only models with [certain flash chips](https://gist.github.com/yuukieve/6b48f1bb8dd15136403c15c39fafdb42) are compatible with ntrboot. |
| [**R4i Gold 3DS**](http://www.nds-card.com/ProShow.asp?ProID=149) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | All RTS revisions are compatible. |
| [**R4i-SDHC 3DS RTS**](http://www.nds-card.com/ProShow.asp?ProID=146) | $13.99 | 1.87: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | |
| [**R4iSDHC GOLD Pro 20XX**](http://www.nds-card.com/ProShow.asp?ProID=490) | $9.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. A 2013-as modellek nem kompatibilisek. |
| [**R4iSDHC RTS LITE 20XX**](http://www.nds-card.com/ProShow.asp?ProID=450) | $13.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. A 2013-as modellek nem kompatibilisek. |
| **Ace3DS X** | | No | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot** (external switch to switch between ntrboot ("3DS") and NDS modes); do not manually flash with ntrboot. |
| **Ace3DS Plus** | | No | <= 11.9.0 | <= 1.4.5 | |
| **Gateway Blue** | | nem | 4.1.0 - 4.5.0 | <= 1.4.5 | |
@ -49,7 +49,7 @@ Kipróbálhatod, hogy működik-e a mágnes úgy, hogy az (A), (B), (X), (Y) gom
Vedd figyelembe, hogy a flashkártya nem lesz használható az eredeti rendeltetése szerint addig, amíg az ntrboot exploit telepítve van rá. (Kivételt képez az Acekard 2i, ami működőképes marad *kizárólag NDS-eken, és azokon a 3DS-eken, melyekre egyedi firmware van telepítve*.) Ez azt jelenti, hogy a legtöbb flashkártya még csak a home menu-ben sem jelenik majd meg. Az ntrboot flashelési útmutatójának végén van néhány opcionális lépés arról, hogyan töröld azt a flashkártyádról, ha már végeztél.
Vedd figyelembe, hogy néhány ritka esetben lehetséges, hogy a flashelési folyamat során **brickelődjön** néhány hamisított flashkártya és végleg használhatatlanná váljon. Ez elég valószínűtlen, azonban éppen emiatt csak eredeti flashkártyákat támogatunk. Ajánlott jó hírű oldalakon vásárolni (mint például az [NDS Card](http://www.nds-card.net/)), hogy elkerüld a hamisított flashkártyákat
Vedd figyelembe, hogy néhány ritka esetben lehetséges, hogy a flashelési folyamat során **brickelődjön** néhány hamisított flashkártya és végleg használhatatlanná váljon. Ez elég valószínűtlen, azonban éppen emiatt csak eredeti flashkártyákat támogatunk. To reduce the chance of receiving a counterfeit card, it is recommended that you use a reputable site to buy your flashcart (such as [NDS Card](http://www.nds-card.com/))
{: .notice--danger}
___

View file

@ -63,9 +63,7 @@ There are two different methods for building on the Seedminer exploit (described
1. Open [Bruteforce Movable](https://bruteforcemovable.com/) on your computer
+ This site can automate the retrieval of `movable_part1.sed` (using a bot 3DS console) and the breaking of your device's DSiWare encryption (using a volunteer's computer to run Seedminer)
+ If you already have access to a 3DS capable of launching the Homebrew Launcher, you can manually retrieve your `movable_part1.sed` using that device by following [these](https://jisagi.github.io/SeedminerGuide/seedminerSelf/#section1) instructions
+ If you already have access to a PC with a powerful graphics card, you can manually calculate your `movable.sed` using it by following [these](https://jisagi.github.io/SeedminerGuide/seedminerSelf/#section2) instructions
+ If the automated service is nonfunctional and you cannot do one or both of those manually, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you
+ If the automated service is nonfunctional, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you
1. Enter your device's Friend Code (with no spaces or dashes) into the "Your friend code" field
1. Paste your device's 32 character long folder name into the "Your ID0" field
1. Teljesítsd a "Nem vagyok robot" captchát
@ -74,11 +72,11 @@ There are two different methods for building on the Seedminer exploit (described
1. When prompted, use the "Register Friend" button on your device to add the friend code of the bot 3DS console
1. Wait for the site to update
+ If it does not, wait a few minutes before refreshing the page once
1. Select "Continue"
1. Várd meg, amíg a folyamat befejeződik
+ This can take a while (up to an hour in some cases)
+ During this process, the bot may not show up on your 3ds. As long as the website updates, this is not an issue.
+ If you are still waiting after an hour, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you
1. Once the site processes your information, you will be given the option to "Continue" or "Do another device". Click the green "Continue" button
1. Wait for the remainder of the process to complete
+ This is usually fast (1-5 minutes) but in some cases, can take up to half an hour.
+ During this process, the bot you added may not show up on your 3ds. As long as the website updates, this is not an issue.
+ If you are still waiting after half an hour, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you
1. When the process has completed, download your `movable.sed` file from the site
+ Keep this file as you will need it in the upcoming pages
@ -102,7 +100,7 @@ ___
#### Seedminer + Steelhax + Frogtool
This method of using Seedminer for further exploitation uses your `movable.sed` file to gain access to the Homebrew Launcher using the Steelhax exploit for the purposes of injecting an exploitable DSiWare title into the DS Download Play application. This method requires you to already own (or download) the free "Steel Divers: Sub Wars" game from the eShop.
This method of using Seedminer for further exploitation uses your `movable.sed` file to gain access to the Homebrew Launcher using the Steelhax exploit for the purposes of injecting an exploitable DSiWare title into the DS Download Play application. This method requires you to already own (or download) the free "Steel Diver: Sub Wars" game from the eShop.
This method is only compatible with the EUR, JPN, and USA regions, and is somewhat more complicated than the above method. It is only recommended to use this method if you have a EUR region device and do not wish to pay for a DSiWare game, or if the above method does not work for you for some reason.

View file

@ -11,7 +11,7 @@ A következőkben teljes egészében el fogjuk távolítani a CFW-t a készülé
Ez az esetek többségében nem old meg semmilyen olyan problémát, ami a CFW telepítése közben felmerülhet. Javasolt inkább elolvasnod a [Hibaelhárítás](troubleshooting) oldalt, vagy segítséget kérni (angol nyelven) itt: [Nintendo Homebrew a Discord-on](https://discord.gg/MWxPgEp).
{: .notice--danger}
Minden aláíratlan (nem eredeti) játék instabillá fog válni, amiket kézileg törölhetsz majd a System Settings "Data Management" részében. Használj [mentéskezelőt](https://github.com/FlagBrew/Checkpoint/releases/latest), hogy biztonsági másolatot készíts azon (nem eredeti) játékok mentéséről, amik fontosak a számodra.
Any unsigned (illegitimate) games will be rendered unusable and should be manually removed before starting this process by using the Data Management section of the System Settings. Használj [mentéskezelőt](https://github.com/FlagBrew/Checkpoint/releases/latest), hogy biztonsági másolatot készíts azon (nem eredeti) játékok mentéséről, amik fontosak a számodra.
Ez az eljárás nem fogja befolyásolni sem az NNID-det, sem az eredeti játékaidat, sem bármilyen mentést, ami az eredeti, megvásárolt játékaidhoz tartozik.
@ -26,21 +26,43 @@ Vedd figyelembe, hogy amennyiben van más payload fájl a `GodMode9.firm` fájlo
### Utasítások
#### Első rész - Előkészületek
#### Section I - Safety Test
1. Kapcsold ki a készüléked
1. Helyezd az SD kártyád a számítógépbe
1. Másold át a `GodMode9.firm` fájlt a GodMode9 `.zip`-ből az SD kártyád `/luma/payloads/` mappájába
1. Másold át a `gm9` mappát a GodMode9 `.zip`-ből az SD kártyád gyökerébe
1. Tedd vissza az SD kártyád a készülékedbe
1. Kapcsold be a készülékedet
#### Második rész - Az eltávolító szkript futtatása
1. Indítsd el a GodMode9-et a (Start) lenyomva tartásával boot közben
1. Ha rákérdez arra, hogy csináljon-e egy biztonsági másolatot (essential files backup), akkor nyomd meg az (A) gombot, hogy csináljon, majd amikor végzett, nyomd meg ismét az (A) gombot a folytatáshoz
1. Ha rákérdez arra, hogy szeretnéd-e a valós dátumot és időt javítani (fix the RTC date&time), nyomd meg az (A) gombot, állítsd be a helyes dátumot és időt, majd nyomd meg az (A) gombot a folytatáshoz
+ Ne feledd, hogy amennyiben ezen a ponton szükséges volt a helyes dátum és idő beállítása, a System Settingsben is be kell majd állítanod a helyes időt az útmutató végén
1. Navigate to `[1:] SYSNAND CTRNAND > title > 00040138 > (X)0000002 > content`
+ On a "New" edition console, the (X) will instead be 2
+ On an "Old" edition console, the (X) will instead be 0
1. Select the `.app` file
1. Select `NCCH Image Options`
1. Select `Mount image to drive`
1. In the window that appears, open the `exefs` folder
1. In this folder, select the `.firm` file
1. Select "Firm Options"
1. Select "Boot Firm"
1. When prompted, choose to decrypt and make a copy
1. You should boot into the regular 3DS Home Menu. If you do, power your device off and continue to the next section
+ If you do NOT boot into the regular 3DS Home Menu, continuing with these instructions **WILL** brick your device. You should join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you
#### Section II - Prep Work
1. Kapcsold be a készülékedet
1. Navigate to System Settings > Data Management > Nintendo 3DS > Software
1. In this list of software, delete any non-Nintendo content you installed while using CFW
+ This includes common system software such as FBI, Anemone3DS, Luma Updater, Homebrew Launcher, Checkpoint, and others, along with any non-eShop games
+ Failure to remove CFW software before uninstalling CFW may break access to the Data Management menu after uninstalling CFW
1. Kapcsold ki a készüléked
#### Section III - Running Uninstall Script
1. Indítsd el a GodMode9-et a (Start) lenyomva tartásával boot közben
1. Nyomd meg a (Home) gombot, hogy megjelenjen a műveleti menü
1. Válaszd a "Scripts..." opciót
1. Válaszd ezt: "GM9Megascript"

View file

@ -18,6 +18,8 @@ During this process, we also setup programs such as the following:
+ **Luma3DS Updater** *(updates your CFW installation easily)*
+ **GodMode9** *(multipurpose tool which can do NAND and cartridge functions)*
+ **Homebrew Launcher Loader** *(launches the Homebrew Launcher)*
+ **DSP1** *(allows homebrew applications to have sound)*
+ **ctr-no-timeoffset** *(removes the rtc offset so that the home menu and rtc timestamps match)*
### What You Need
@ -143,7 +145,7 @@ If, before following this guide, you already had an EmuNAND setup and would like
1. Press (B) to return to the main menu
1. Hold (R) and press (B) at the same time to eject your SD card
1. Insert your SD card into your computer
1. Copy `<date>_<serialnumber>_sysnand_###.bin`, `essential.exefs`, and `boot9.bin` from the `/gm9/out/` folder on your SD card to a safe location on your computer
1. Copy `<date>_<serialnumber>_sysnand_###.bin`, `<date>_<serialnumber>_sysnand_###.bin.sha`, `essential.exefs`, and `boot9.bin` from the `/gm9/out/` folder on your SD card to a safe location on your computer
+ Make backups in multiple locations (such as online file storage)
+ These backups will save you from a brick and/or help you recover files from the NAND image if anything goes wrong in the future
1. Delete `<date>_<serialnumber>_sysnand_###.bin` and `<date>_<serialnumber>_sysnand_###.bin.sha` from the `/gm9/out/` folder on your SD card after copying it

Some files were not shown because too many files have changed in this diff Show more