--- title: "BannerBomb3 (Legacy)" --- {% include toc title="條目內容" %} {% capture technical_info %} Technical Details (optional) To launch custom code, we exploit a flaw in the DSiWare Data Management window of the Settings application. To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system. For a more technical explanation, see [here](https://github.com/zoogie/Bannerbomb3). {% endcapture %}
{{ technical_info | markdownify }}
{: .notice--info} ### 相容性資訊 這些操作在美、歐、日、韓版可用,可透過系統版本號末尾的 「U、E、J、K」 字元來辨別。 ### 必備項目 * Your `movable.sed` file from completing Seedminer or nimhax #### 第一節 — 準備工作 {% include_relative include/bb3-prep.txt %} #### 第二節 — 按鍵檢查 In this section, you will see whether you can access Safe Mode on your device. This will determine which method you will follow on the next page. Your SD card should remain in your computer while you perform this check. {% include_relative include/safemodecheck.txt %} ___ ### Next steps: Choose an exploit If the camera appeared in the previous section, Safe Mode is likely to be working on your device. If the camera appeared, continue to [Installing boot9strap (USM)](installing-boot9strap-(usm)) {: .notice--primary} If the camera did NOT appear, continue to [Installing boot9strap (Fredtool, Legacy)](installing-boot9strap-(fredtool-legacy)) {: .notice--info}