diff --git a/_pages/en_US/bannerbomb3.txt b/_pages/en_US/bannerbomb3.txt index 97c993ea1f..5a11fffeff 100644 --- a/_pages/en_US/bannerbomb3.txt +++ b/_pages/en_US/bannerbomb3.txt @@ -56,11 +56,11 @@ In this section, you will copy the files needed to trigger the BannerBomb3 explo #### Section II - Hardware Button Check -In this section, you will test the SAFE_MODE function of your device. This will determine which method you will follow in the next page. +In this section, you will see whether you can access Safe Mode on your device. This will determine which method you will follow on the next page. 1. With your device still powered off, hold the following buttons: (Left Shoulder) + (Right Shoulder) + (D-Pad Up) + (A), and while holding these buttons together, power on your device - + Keep holding the buttons until the device boots into Safe Mode (a "system update" menu) -1. If prompted to update, press Cancel + + Keep holding the buttons until the device boots to a system update screen (this is Safe Mode) +1. If you see the system update screen, press Cancel + Your device will power off + If the device boots to the HOME Menu, just power off your device @@ -68,10 +68,10 @@ ___ ### Next steps: Choose an exploit -If your device booted into Safe Mode and prompted to you to do a system update in Section II, Safe Mode is working on your device. +If you saw the system update screen in the previous section, Safe Mode is working on your device. If your device booted into Safe Mode, continue to [Installing boot9strap (USM)](installing-boot9strap-(usm)) {: .notice--primary} If your device did NOT boot into Safe Mode, continue to [Installing boot9strap (Fredtool)](installing-boot9strap-(fredtool)) -{: .notice--warning} +{: .notice--info}