nvm...Does this work or not because I'm getting tired of checking this thread.
. . .Does this work or not because I'm getting tired of checking this thread.
Does this work or not because I'm getting tired of checking this thread.
No, when you updated the emunand all the system updated well except the firm0 firm1 partition, if you have a xorpad of your firm0/firm1 partition you can change the firm0/firm1 with a version valid for your emunand version and you can inject it to the sysnand without problems. @"Apache Thunder" can corrobarete it, he taught me this method long time ago
For now it won't Work with normal N3DS or N3DSXL 10.4 or 10.5, Only Works with Hard Modded Devices. Do wait and have hope till when someone finds a exploit.
This method need a hard-mod is impossible to work without it
I do not know for sure that decrypt9 will be able to generate xorpads for or decrypt the firm partitions.Has anyone confirmed n3ds only?
I can hard mod with no issues and have 2 o3ds to use for experiment. So i should update one to the latest 10.5, use my older 9.2 to use decrypt9 to decrypt files. Than run them through your bat file with the 10.5 sysnand correct. Than flash patched nand to 3ds and it should boot to 10.3, where i can proceed to downgrade?
You can't swap CTR_NANDs around even if you managed to encrypt it right. The first thing that will break things is movable.sed as there's console unique stuff at the end of the file and a few bytes in the header that prevent it from being used on a different console. CTR_NAND changes too often to be able to encrypt to a console that isn't exploitable. FIRM partitions can be downgraded because the data in them is known. It doesn't change very often so we have reliable results when decrypting/encrypting them with xorpads.
Also this will work with n3DSs and o3DSs alike. They use the same encryption method for the FIRM partitions.
Has anyone confirmed n3ds only?
I can hard mod with no issues and have 2 o3ds to use for experiment. So i should update one to the latest 10.5, use my older 9.2 to use decrypt9 to decrypt files. Than run them through your bat file with the 10.5 sysnand correct. Than flash patched nand to 3ds and it should boot to 10.3, where i can proceed to downgrade?
Also the big reason aside from movable.sed that you can't encrypt a CTR_NAND from a different console to a different console that isn't exploitable is because the CTR_NAND contents of two 3DSes on the same FW version and region aren't the same. Thus as a result, the console you would try to replace the CTR_NAND on will be different and the changes can't be predicted without first decrypting it. (which can't be done without exploiting the console).
So a xorpad can't be made for CTR_NAND in the same manner. We can do with with FIRM0/FIRM1 because the contents of FIRM0/FIRM1 are the same for all consoles. CTR_NAND is not. CTR_NAND contains console unique stuff like tickets, movable.sed, system save data, etc. So a xorpad can't be made for that without knowing what the differences are and that requires decrypting it to do that.
Which build of Decrypt9 are you using. I think ShadowTrances and d0k3's version has NAND dumping features. I prefer d0k3's. There's a partition dump menu where you can jump individual partitions. Use that to dump FIRM0 and FIRM1. (It even lets you dump them from an emunand. Assuming emunand was updated correctly to 10.2 via system settings or you injected a sysnand as emunand, you can dump your 10.2 FIRM0/FIRM1 from there so you don't have to write it to sysnand)
I have a question to you because of the professionalism that aparentais have on this topic, Do you think that without hard-mod in the future may downgrade one 10.5.0-30E / U / J console through some kind of xploit or something? Thank you for all, seriously...
So, i must do the hard-mod on mi 3ds or i wont downgrade it? Bad news... u_uWell usually updates from system settings can update emunand correctly. CFWs that firm launch an newer FIRM prevent users running on older FIRMs from updating. But not sure about CFWs firm launching older firms. If you have a nand mod, you can just use a non firmlaunch cfw like rxTool's devmode (or pasta mode as they now call it) to update native_firm on sysnand to 10.2. (you don't really have to update everything else. You'll be replacing it with a nand backup afterwords anyway).
Then take that resulting sysnand you updated firm to 10.2 on and use that as your emunand partition. Decrypt9WIP can grab the firm partition from it. You can do the same for 10.4 if you feel the one on your emunand isn't correct.
No. If another exploit in Arm11 is found it's probably going to be well over another year before it happens if at all. You are going to need a NAND mod if you want to downgrade anytime in the near future.
From what has been stated yes. No proof yet. Ill attempt this today and provide proof if it actually works.So, i must do the hard-mod on mi 3ds or i wont downgrade it? Bad news... u_u
From what has been stated yes. No proof yet. Ill attempt this today and provide proof if it actually works.
So, i must do the hard-mod on mi 3ds or i wont downgrade it? Bad news... u_u
I dont understand ._.You will 100% NOT be downgrading using this process without a hardmod. Period.