--- title: "Movable dumpen (nimhax)" --- {% include toc title="Inhalt" %} {% capture technical_info %} Technische Details (optional) To install boot9strap on your console, we derive your console's unique encryption key. To accomplish this, we use the Homebrew Launcher to launch nimhax and dump the data encryption key (movable.sed) from your console. Für eine technischere Erklärung, siehe [hier](https://github.com/luigoalma/nimhax/) für mehr Informationen über den nimhax Exploit. {% endcapture %}
{{ technical_info | markdownify }}
{: .notice--info} ### Was du brauchst * Die neueste Version von [nimhax](https://github.com/luigoalma/nimhax/releases/latest) (die nimhax `.zip` Datei) ### Anleitung #### Abschnitt I - Vorbereitungen 1. Power off your console 1. Stecke deine SD-Karte in deinen Computer 1. Kopiere den `nimhax` Ordner aus der nimhax `.zip` in den `3ds` Ordner auf deiner SD-Karte 1. Reinsert your SD card into your console 1. Power on your console ![]({{ "/images/screenshots/nimhax-location.png" | absolute_url }}) {: .notice--info} #### Section II - nimhax 1. Open the Homebrew Launcher through your method of choice (likely the Internet Browser) 1. Launch nimhax from the list of homebrew 1. If the exploit was successful, a `movable.sed` file will appear on the root of your SD card ### Next step: Frogtool Once you have your console's encryption key (`movable.sed`), you can use it in conjunction with Frogtool, which uses your `movable.sed` file to inject and take advantage of JPN Flipnote Studio. \ While this method is faster, it requires downloading a file with a torrent client. Do not follow this method if you're unable to use a torrent client. Continue to [Installing boot9strap (Frogtool)](installing-boot9strap-(frogtool)) {: .notice--primary}