From f2742dd0710fc3c4a0e05fe392ebaed9a1d4a4f6 Mon Sep 17 00:00:00 2001 From: eip618 <36315290+eip618@users.noreply.github.com> Date: Mon, 29 Jul 2019 12:06:12 +1000 Subject: [PATCH] edit requirements for clarity exploit summary still said eshop title now it doesn't --- _pages/en_US/installing-boot9strap-(fredtool).txt | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/_pages/en_US/installing-boot9strap-(fredtool).txt b/_pages/en_US/installing-boot9strap-(fredtool).txt index 88c81dc53c..43653fc8c5 100644 --- a/_pages/en_US/installing-boot9strap-(fredtool).txt +++ b/_pages/en_US/installing-boot9strap-(fredtool).txt @@ -6,7 +6,7 @@ title: "Installing Boot9strap (Fredtool)" ### Required Reading -This method of using Seedminer for further exploitation uses your `movable.sed` file to decrypt any DSiWare eShop title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. This requires you to already own (or download / buy) a DSiWare game from the eShop. +This method of using Seedminer for further exploitation uses your `movable.sed` file to decrypt any DSiWare title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. This requires you to have a DSiWare backup, for example from BannerBomb or the DSiWare Dumper tool. This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws).