indeedBecause the trustzone code exec got fixed on 2.0.0 thats why
there seems to be a common misconception that sm:hax (3.0.0) == kernel hax (only 1.0.0 at present)
sm:hax offers retroarch etc and hbl, but for potential cfw/emunand, you’ll need kernel exploit
2.0.0 fixed a lot of the kernel vulnerabilities
of course there is potential for ninty to screw up again like they did for 3.0.0