By entering this site you need to consent to the use of cookies and their functional use according to this privacy policy. Cookies help us to provide the functional services of the website. Kindly read the below message of use and consent to the use.
The following cookies are stored and shared when accessing this website:
- Internal cookies for the MediaWiki site. This is used for user authentication and article modifications.
- Third-party cookies from Google providing services for Google AdSense and Google Analytics
We will never use data collected outside of the above scope.
| Due to the keystore being encrypted with AES-ECB, one can rearrange blocks and still have the NAND keystore decrypt in a deterministic way. Combining this with the arm9loaderhax and uncleared hash keydata vulnerabilities, one can achieve arm9loaderhax without downgrading to a system version that exposes the OTP data, or using a hardware method. The NAND keystore must be encrypted with console-unique data; therefore, this is not achievable on Old 3DS or 2DS.
+
| arm9loaderhax achieveable with no extra hardware and without downgrading to a system version which exposes the OTP.
+
| None
+
| [[11.1.0-34|11.1.0-X]]
+
| Early 2016
+
| 27 Sepetember 2016
+
| [[User:Dark samus|dark_samus]]
|-
|-
| Uncleared OTP hash keydata in console-unique 0x11 key-generation
| Uncleared OTP hash keydata in console-unique 0x11 key-generation