I know recent pictures have shown that the switch may have been hacked, but let me reassure you that this is nothing but a simple website. All you gotta do is spoof your dns to make it bring you to a website everytime you go online.
Lmao, obviously. To be honest, I don't understand it all too well myself, but I'm still smart enough to check friggin twitter before i get on my soap box and start screaming hoax.i don't think he knows what any of that means
Its a webkit exploit. Exploit has already been released, its legit. This exploit alone won't get us anything though. For homebrew we still need a DEP bypass and for piracy we'd need a kernal exploit. Do some homework before you open your mouth next time. smh.
Its a proof-of-concept atm. I think you're reading a BIT too far into this. I'm not praising anything, simply explaining to OP that this isn't fake. I clearly said this exploit alone doesn't really do anything for us.Why do people keep praising "webkit exploit" like god is for Christians?
There most likely is no hack or exploit that actually allows anyone to do anything working right now, if you have to believe Luca's tweet it looks like he remote connected into the Switch, which is VERY unlikely
Its a proof-of-concept atm. I think you're reading a BIT too far into this. I'm not praising anything, simply explaining to OP that this isn't fake. I clearly said this exploit alone doesn't really do anything for us.
How many times do I have to say I know this doesn't actually do anything for us on its own? Ugh.... Are you even reading my posts? Its sandboxed (thus why I said we need a DEP bypass), and I also already said we'd need a kernal exploit for piracy. You are literally just repeating things I've already said back to me like I don't know.... None of that makes this less "real" however. Its not just some webpage on display as OP suggested.Nothing personal, but you were probably like the 5th or so person that told me it's real because "webkit exploit". I don't even think they know what it means and how one makes use of an actual exploit in the webkit framework.
Not only is webkit sandboxed, secured and running as a separate process. It's also running as a very low privileged user. Without any other exploits in assisting getting the exploit into root/kernel level it's totally useless and can't do much other then crashing the browser or the whole Switch
Its more of a step in the right direction. On its own, yes, its meaningless.What is the exact exploit? Depending on what it is it's probably 100% meaningless.
But still, what is the exact vulnerability used? If it's really been made public then we should know what it is, but nobody's even describing it.Its more of a step in the right direction. On its own, yes, its meaningless.
Unfortunately, I'm not experienced enough to give you technical details. You can find the code for the exploit here, however. Apparently its just an iOS webkit exploit with all the iOS specific code removed.But still, what is the exact vulnerability used? If it's really been made public then we should know what it is, but nobody's even describing it.
It's the same one used for the jbme on ios (jbme.qwertyoruiop.com).But still, what is the exact vulnerability used? If it's really been made public then we should know what it is, but nobody's even describing it.
That is not a hack. That's just the technical equivalent of running an ethernet cable through your mailbox slot.the op says it cant be hacked yet i am posting this on a switch
true i guessThat is not a hack. That's just the technical equivalent of running an ethernet cable through your mailbox slot.