Technical Details (optional)
To launch custom code, we exploit a flaw in the DSiWare Data Management window of the Settings application.
To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system.
For a more technical explanation, see here.
{: .notice--info}
### Compatibility Notes
Aceste instrucțiuni funcționează pe consolele din regiunea SUA, Europa, Japonia și Coreea, indicate de literele U, E, J, sau K după versiunea de sistem.
If you have a Taiwanese console (indicated by a T after the system version), follow [this page](bannerbomb3-fredtool-(twn)) instead.
{: .notice--warning}
### Ce aveți nevoie
* Fișierul 'movable.sed' de la completarea lui [Seedminer](seedminer)
#### Secțiunea I - Preparații
In this section, you will copy the files needed to trigger the BannerBomb3 exploit onto your device's SD card.
1. Închideți dispozitivul
1. Introduceți cardul SD în calculator
1. Open [Bannerbomb3 Injector](http://3dstools.nhnarwhal.com/#/bb3gen) on your computer
1. Upload your movable.sed using the “Choose File” option
1. Click “Build and Download”
+ This will download an exploit DSiWare called `F00D43D5.bin` and a payload called `bb3.bin` inside of a zip archive (`DSIWARE_EXPLOIT.zip`)
1. Copy `bb3.bin` from `DSIWARE_EXPLOIT.zip` to the root of your SD card
+ The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it
![]({{ "/images/screenshots/bb3/bb3-root-layout.png" | absolute_url }}){: .notice--info}
1. Navigate to `Nintendo 3DS` -> `