diff --git a/_data/navigation/es_ES.yml b/_data/navigation/es_ES.yml index fa17d600c0..474c3113b8 100644 --- a/_data/navigation/es_ES.yml +++ b/_data/navigation/es_ES.yml @@ -56,7 +56,7 @@ sidebar_pages: title: Comencemos url: get-started - - title: Cart Update + title: Actualizar con cartucho url: cart-update - title: ntrboot @@ -65,62 +65,62 @@ sidebar_pages: title: Seedminer url: seedminer - - title: Multiple Options + title: Múltiples opciones url: multiple-options - - title: Flashing ntrboot (3DS Single System) + title: Flashear ntrboot (Una consola 3DS) url: flashing-ntrboot-(3ds-single-system) - - title: Flashing ntrboot (3DS Multi System) + title: Flashear ntrboot (Dos consolas 3DS) url: flashing-ntrboot-(3ds-multi-system) - - title: Flashing ntrboot (DSi) + title: Flashear ntrboot (DSi) url: flashing-ntrboot-(dsi) - - title: Flashing ntrboot (NDS) + title: Flashear ntrboot (NDS) url: flashing-ntrboot-(nds) - - title: Flashing ntrboot (Powersaves) + title: Flashear ntrboot (Powersaves) url: flashing-ntrboot-(powersaves) - title: Homebrew Launcher (Soundhax) url: homebrew-launcher-(soundhax) - - title: Homebrew Launcher (Alternatives) + title: Homebrew Launcher (Alternativas) url: homebrew-launcher-(alternatives) - title: Homebrew Launcher (Steelhax) url: homebrew-launcher-(steelhax) - - title: NTR and Cubic Ninja + title: NTR y Cubic Ninja url: ntr-and-cubic-ninja - - title: Installing boot9strap (2xrsa) + title: Instalar boot9strap (2xrsa) url: installing-boot9strap-(2xrsa) - - title: Installing boot9strap (Browser) + title: Instalar boot9strap (navegador) url: installing-boot9strap-(browser) - - title: Installing boot9strap (Hardmod) + title: Instalar boot9strap (Hardmod) url: installing-boot9strap-(hardmod) - - title: Installing boot9strap (SafeB9SInstaller) + title: Instalar boot9strap (SafeB9SInstaller) url: installing-boot9strap-(safeb9sinstaller) - - title: Installing boot9strap (MSET) + title: Instalar boot9strap (MSET) url: installing-boot9strap-(mset) - - title: Installing boot9strap (ntrboot) + title: Instalar boot9strap (ntrboot) url: installing-boot9strap-(ntrboot) - - title: Installing boot9strap (Soundhax) + title: Instalar boot9strap (Soundhax) url: installing-boot9strap-(soundhax) - title: Installing boot9strap (Frogtool) url: installing-boot9strap-(frogtool) - - title: Installing boot9strap (Fredtool) + title: Instalar boot9strap (Fredtool) url: installing-boot9strap-(fredtool) - - title: Finalizing Setup + title: Finalizar instalación url: finalizing-setup diff --git a/_data/navigation/fr_FR.yml b/_data/navigation/fr_FR.yml index 77109ee06e..cda209f986 100644 --- a/_data/navigation/fr_FR.yml +++ b/_data/navigation/fr_FR.yml @@ -56,7 +56,7 @@ sidebar_pages: title: Pour commencer url: get-started - - title: Cart Update + title: Mise à jour par cartouche url: cart-update - title: ntrboot @@ -65,22 +65,22 @@ sidebar_pages: title: Seedminer url: seedminer - - title: Multiple Options + title: Options multiples url: multiple-options - - title: Flashing ntrboot (3DS Single System) + title: Flash de ntrboot (une seule 3DS) url: flashing-ntrboot-(3ds-single-system) - - title: Flashing ntrboot (3DS Multi System) + title: Flash de ntrboot (plusieurs 3DS) url: flashing-ntrboot-(3ds-multi-system) - - title: Flashing ntrboot (DSi) + title: Flash de ntrboot (DSi) url: flashing-ntrboot-(dsi) - - title: Flashing ntrboot (NDS) + title: Flash de ntrboot (NDS) url: flashing-ntrboot-(nds) - - title: Flashing ntrboot (Powersaves) + title: Flash de ntrboot (Powersaves) url: flashing-ntrboot-(powersaves) - title: Homebrew Launcher (Soundhax) @@ -89,38 +89,38 @@ sidebar_pages: title: Homebrew Launcher (Alternatives) url: homebrew-launcher-(alternatives) - - title: Homebrew Launcher (Steelhax) + title: Installing boot9strap (Steelhax) url: homebrew-launcher-(steelhax) - - title: NTR and Cubic Ninja + title: NTR et Cubic Ninja url: ntr-and-cubic-ninja - - title: Installing boot9strap (2xrsa) + title: Installation de boot9strap (2xrsa) url: installing-boot9strap-(2xrsa) - - title: Installing boot9strap (Browser) + title: Installation de boot9strap (Navigateur internet) url: installing-boot9strap-(browser) - - title: Installing boot9strap (Hardmod) + title: Installation de boot9strap (Hardmod) url: installing-boot9strap-(hardmod) - - title: Installing boot9strap (SafeB9SInstaller) + title: Installer boot9strap (SafeB9SInstaller) url: installing-boot9strap-(safeb9sinstaller) - - title: Installing boot9strap (MSET) + title: Installation de boot9strap (MSET) url: installing-boot9strap-(mset) - - title: Installing boot9strap (ntrboot) + title: Installation de boot9strap (ntrboot) url: installing-boot9strap-(ntrboot) - - title: Installing boot9strap (Soundhax) + title: Installation de boot9strap (Soundhax) url: installing-boot9strap-(soundhax) - - title: Installing boot9strap (Frogtool) + title: Installation de boot9strap (Frogtool) url: installing-boot9strap-(frogtool) - - title: Installing boot9strap (Fredtool) + title: Installation de boot9strap (Fredtool) url: installing-boot9strap-(fredtool) - - title: Finalizing Setup + title: Finalisation de la configuration url: finalizing-setup diff --git a/_pages/af_ZA/finalizing-setup.txt b/_pages/af_ZA/finalizing-setup.txt index 8ccda2a04f..f7c9c087d4 100644 --- a/_pages/af_ZA/finalizing-setup.txt +++ b/_pages/af_ZA/finalizing-setup.txt @@ -18,6 +18,8 @@ During this process, we also setup programs such as the following: + **Luma3DS Updater** *(updates your CFW installation easily)* + **GodMode9** *(multipurpose tool which can do NAND and cartridge functions)* + **Homebrew Launcher Loader** *(launches the Homebrew Launcher)* ++ **DSP1** *(allows homebrew applications to have sound)* ++ **ctr-no-timeoffset** *(removes the rtc offset so that the home menu and rtc timestamps match)* ### What You Need @@ -143,7 +145,7 @@ If, before following this guide, you already had an EmuNAND setup and would like 1. Press (B) to return to the main menu 1. Hold (R) and press (B) at the same time to eject your SD card 1. Insert your SD card into your computer -1. Copy `__sysnand_###.bin`, `essential.exefs`, and `boot9.bin` from the `/gm9/out/` folder on your SD card to a safe location on your computer +1. Copy `__sysnand_###.bin`, `__sysnand_###.bin.sha`, `essential.exefs`, and `boot9.bin` from the `/gm9/out/` folder on your SD card to a safe location on your computer + Make backups in multiple locations (such as online file storage) + These backups will save you from a brick and/or help you recover files from the NAND image if anything goes wrong in the future 1. Delete `__sysnand_###.bin` and `__sysnand_###.bin.sha` from the `/gm9/out/` folder on your SD card after copying it diff --git a/_pages/af_ZA/homebrew-launcher-(steelhax).txt b/_pages/af_ZA/homebrew-launcher-(steelhax).txt index 571fd1982d..568e53b124 100644 --- a/_pages/af_ZA/homebrew-launcher-(steelhax).txt +++ b/_pages/af_ZA/homebrew-launcher-(steelhax).txt @@ -8,7 +8,7 @@ title: "Homebrew Launcher (Steelhax)" This method of using Seedminer for further exploitation uses your `movable.sed` file to gain access to the Homebrew Launcher using the Steelhax exploit for the purposes of injecting an exploitable DSiWare title into the DS Download Play application. This method requires you to already own (or download) the free "Steel Divers: Sub Wars" game from the eShop. -If your device already has access to the Homebrew Launcher (whether through Steelhax or another exploit), you can skip to [Installing Boot9strap (Frogminer)](installing-boot9strap-(frogminer)). +If your device already has access to the Homebrew Launcher (whether through Steelhax or another exploit), you can skip to [Installing Boot9strap (Frogtool)](installing-boot9strap-(frogtool)). {: .notice--success} If you already have Steel Diver: Sub Wars, this process will overwrite your game's save file! @@ -17,6 +17,7 @@ If you already have Steel Diver: Sub Wars, this process will overwrite your game ### What You Need * The free eShop game "Steel Diver: Sub Wars" +* Your `movable.sed` file from completing [Seedminer](seedminer) * The latest release of [the Homebrew Launcher](https://github.com/fincs/new-hbmenu/releases/latest) * The latest release of [Steelhax](https://github.com/VegaRoXas/vegaroxas.github.io/raw/master/files/steelhax-installer.rar) * The [otherapp payload](https://smealum.github.io/3ds/#otherapp) *(for your region and version)* @@ -39,7 +40,7 @@ If you already have Steel Diver: Sub Wars, this process will overwrite your game 1. Exit "Steel Diver: Sub Wars" 1. Power off your device 1. Insert your SD card into your computer -1. Open [the Steelminer Injector website](http://steelminer.jisagi.net/injector) on your computer +1. Open [the Steelminer Injector website](https://bruteforcemovable.com/steelhax/) on your computer 1. Select your `movable.sed` file 1. Select "Start!" 1. Wait for the process to complete diff --git a/_pages/af_ZA/installing-boot9strap-(fredtool).txt b/_pages/af_ZA/installing-boot9strap-(fredtool).txt index ca3da37631..22a79f26c5 100644 --- a/_pages/af_ZA/installing-boot9strap-(fredtool).txt +++ b/_pages/af_ZA/installing-boot9strap-(fredtool).txt @@ -10,8 +10,6 @@ This method of using Seedminer for further exploitation uses your `movable.sed` This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). -To use the [magnet](https://wikipedia.org/wiki/Magnet_URI_scheme) links on this page, you will need a torrent client like [Deluge](http://dev.deluge-torrent.org/wiki/Download). - To extract the `.7z` and `.rar` files linked on this page, you will need a file archiver like [7-Zip](http://www.7-zip.org/) or [The Unarchiver](https://theunarchiver.com/). ### What You Need diff --git a/_pages/af_ZA/ntrboot.txt b/_pages/af_ZA/ntrboot.txt index a5c9bc16cd..35ffad7d57 100644 --- a/_pages/af_ZA/ntrboot.txt +++ b/_pages/af_ZA/ntrboot.txt @@ -17,14 +17,14 @@ Note that carts with a "Time Bomb" will no longer be able to launch `.nds` files | Flashcart Name | Current Price | "Time Bomb"? | 3DS Versions? | DSi Versions? | Other Notes | |-|-:|:-:|:-:|:-:|-| -| [**R4i-SDHC B9S**](http://www.nds-card.net/ProShow.asp?ProID=574) | $15.99 | September 3, 2019 | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot**; can be flashed back to an NDS flashcart. | -| [**R4i Gold 3DS Plus**](http://www.nds-card.net/ProShow.asp?ProID=575) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot** ([internal switch to switch between ntrboot and NDS modes]({{ "/images/screenshots/r4i-gold-3ds-plus.png" | absolute_url }})); do not manually flash with ntrboot. | -| [**Acekard 2i**](http://www.nds-card.net/ProShow.asp?ProID=160) | $20.99 | No | <= 4.3.0 | <= 1.4.4 | | -| [**DSTT**](http://www.nds-card.net/ProShow.asp?ProID=157) | $9.99 | No | None | None | Only models with [certain flash chips](https://gist.github.com/yuukieve/6b48f1bb8dd15136403c15c39fafdb42) are compatible with ntrboot. | -| [**R4i Gold 3DS**](http://www.nds-card.net/ProShow.asp?ProID=149) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | All RTS revisions are compatible. | -| [**R4i-SDHC 3DS RTS**](http://www.nds-card.net/ProShow.asp?ProID=146) | $13.99 | 1.87: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | | -| [**R4iSDHC GOLD Pro 20XX**](http://www.nds-card.net/ProShow.asp?ProID=490) | $9.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. 2013 models are incompatible. | -| [**R4iSDHC RTS LITE 20XX**](http://www.nds-card.net/ProShow.asp?ProID=450) | $13.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. 2013 models are incompatible. | +| [**R4i-SDHC B9S**](http://www.nds-card.com/ProShow.asp?ProID=574) | $15.99 | September 3, 2019 | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot**; can be flashed back to an NDS flashcart. | +| [**R4i Gold 3DS Plus**](http://www.nds-card.com/ProShow.asp?ProID=575) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot** ([internal switch to switch between ntrboot and NDS modes]({{ "/images/screenshots/r4i-gold-3ds-plus.png" | absolute_url }})); do not manually flash with ntrboot. | +| [**Acekard 2i**](http://www.nds-card.com/ProShow.asp?ProID=160) | $20.99 | No | <= 4.3.0 | <= 1.4.4 | | +| [**DSTT**](http://www.nds-card.com/ProShow.asp?ProID=157) | $9.99 | No | None | None | Only models with [certain flash chips](https://gist.github.com/yuukieve/6b48f1bb8dd15136403c15c39fafdb42) are compatible with ntrboot. | +| [**R4i Gold 3DS**](http://www.nds-card.com/ProShow.asp?ProID=149) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | All RTS revisions are compatible. | +| [**R4i-SDHC 3DS RTS**](http://www.nds-card.com/ProShow.asp?ProID=146) | $13.99 | 1.87: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | | +| [**R4iSDHC GOLD Pro 20XX**](http://www.nds-card.com/ProShow.asp?ProID=490) | $9.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. 2013 models are incompatible. | +| [**R4iSDHC RTS LITE 20XX**](http://www.nds-card.com/ProShow.asp?ProID=450) | $13.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. 2013 models are incompatible. | | **Ace3DS X** | | No | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot** (external switch to switch between ntrboot ("3DS") and NDS modes); do not manually flash with ntrboot. | | **Ace3DS Plus** | | No | <= 11.9.0 | <= 1.4.5 | | | **Gateway Blue** | | No | 4.1.0 - 4.5.0 | <= 1.4.5 | | @@ -49,7 +49,7 @@ To test if a magnet will work, hold it on or around the (A)(B)(X)(Y) buttons whi Note that the flashcart will not be able to be used for its standard functions while the ntrboot exploit is installed on it (except for in the case of the Acekard 2i, which remains functional *on NDS and custom firmware 3DS systems only*). This means that, for most flashcarts, it will not even display on the home menu. There are optional steps at the end of the ntrboot flashing instructions to remove it from your flashcart when you are done. -Note that in some rare circumstances, it may be possible for the flashing process to **brick** a counterfeit flashcart and render it permanently unusable. This is unlikely, but nevertheless only original listed flashcarts are supported. To reduce the chance of receiving a counterfeit card, it is recommended that you use a reputable site to buy your flashcart (such as [NDS Card](http://www.nds-card.net/)) +Note that in some rare circumstances, it may be possible for the flashing process to **brick** a counterfeit flashcart and render it permanently unusable. This is unlikely, but nevertheless only original listed flashcarts are supported. To reduce the chance of receiving a counterfeit card, it is recommended that you use a reputable site to buy your flashcart (such as [NDS Card](http://www.nds-card.com/)) {: .notice--danger} ___ diff --git a/_pages/af_ZA/seedminer.txt b/_pages/af_ZA/seedminer.txt index 4e8bfbaa60..0e0a6ee1b4 100644 --- a/_pages/af_ZA/seedminer.txt +++ b/_pages/af_ZA/seedminer.txt @@ -63,9 +63,7 @@ There are two different methods for building on the Seedminer exploit (described 1. Open [Bruteforce Movable](https://bruteforcemovable.com/) on your computer + This site can automate the retrieval of `movable_part1.sed` (using a bot 3DS console) and the breaking of your device's DSiWare encryption (using a volunteer's computer to run Seedminer) - + If you already have access to a 3DS capable of launching the Homebrew Launcher, you can manually retrieve your `movable_part1.sed` using that device by following [these](https://jisagi.github.io/SeedminerGuide/seedminerSelf/#section1) instructions - + If you already have access to a PC with a powerful graphics card, you can manually calculate your `movable.sed` using it by following [these](https://jisagi.github.io/SeedminerGuide/seedminerSelf/#section2) instructions - + If the automated service is nonfunctional and you cannot do one or both of those manually, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you + + If the automated service is nonfunctional, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you 1. Enter your device's Friend Code (with no spaces or dashes) into the "Your friend code" field 1. Paste your device's 32 character long folder name into the "Your ID0" field 1. Complete the "I'm not a robot" captcha @@ -74,11 +72,11 @@ There are two different methods for building on the Seedminer exploit (described 1. When prompted, use the "Register Friend" button on your device to add the friend code of the bot 3DS console 1. Wait for the site to update + If it does not, wait a few minutes before refreshing the page once -1. Select "Continue" -1. Wait for the process to complete - + This can take a while (up to an hour in some cases) - + During this process, the bot may not show up on your 3ds. As long as the website updates, this is not an issue. - + If you are still waiting after an hour, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you +1. Once the site processes your information, you will be given the option to "Continue" or "Do another device". Click the green "Continue" button +1. Wait for the remainder of the process to complete + + This is usually fast (1-5 minutes) but in some cases, can take up to half an hour. + + During this process, the bot you added may not show up on your 3ds. As long as the website updates, this is not an issue. + + If you are still waiting after half an hour, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you 1. When the process has completed, download your `movable.sed` file from the site + Keep this file as you will need it in the upcoming pages @@ -102,7 +100,7 @@ ___ #### Seedminer + Steelhax + Frogtool -This method of using Seedminer for further exploitation uses your `movable.sed` file to gain access to the Homebrew Launcher using the Steelhax exploit for the purposes of injecting an exploitable DSiWare title into the DS Download Play application. This method requires you to already own (or download) the free "Steel Divers: Sub Wars" game from the eShop. +This method of using Seedminer for further exploitation uses your `movable.sed` file to gain access to the Homebrew Launcher using the Steelhax exploit for the purposes of injecting an exploitable DSiWare title into the DS Download Play application. This method requires you to already own (or download) the free "Steel Diver: Sub Wars" game from the eShop. This method is only compatible with the EUR, JPN, and USA regions, and is somewhat more complicated than the above method. It is only recommended to use this method if you have a EUR region device and do not wish to pay for a DSiWare game, or if the above method does not work for you for some reason. diff --git a/_pages/af_ZA/uninstall-cfw.txt b/_pages/af_ZA/uninstall-cfw.txt index 4745050aab..584998ac19 100644 --- a/_pages/af_ZA/uninstall-cfw.txt +++ b/_pages/af_ZA/uninstall-cfw.txt @@ -11,7 +11,7 @@ This will completely remove CFW from your device, including Boot9Strap and Luma3 This is almost never the solution to fix any issues you encounter with your CFW installation. A better idea would be to read the [troubleshooting](troubleshooting) page or ask (in English) for help at [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp). {: .notice--danger} -Any unsigned (illegitimate) games will be rendered unusable and can be manually removed using the Data Management section of the System Settings. Use a [save manager](https://github.com/FlagBrew/Checkpoint/releases/latest) to backup any saves for these unsigned (illegitimate) games you care about. +Any unsigned (illegitimate) games will be rendered unusable and should be manually removed before starting this process by using the Data Management section of the System Settings. Use a [save manager](https://github.com/FlagBrew/Checkpoint/releases/latest) to backup any saves for these unsigned (illegitimate) games you care about. This will not affect your NNID, any legitimately purchased games, or any saves for those legitimately purchased games. @@ -26,21 +26,43 @@ Note that if you have any payload files other than `GodMode9.firm` in the `/luma ### Instructions -#### Section I - Prep Work +#### Section I - Safety Test 1. Power off your device 1. Insert your SD card into your computer 1. Copy `GodMode9.firm` from the GodMode9 `.zip` to the `/luma/payloads/` folder on your SD card 1. Copy the `gm9` folder from the GodMode9 `.zip` to the root of your SD card 1. Reinsert your SD card into your device -1. Power on your device - -#### Section II - Running Uninstall Script - 1. Launch GodMode9 by holding (Start) during boot 1. If you are prompted to create an essential files backup, press (A) to do so, then press (A) to continue once it has completed 1. If you are prompted to fix the RTC date&time, press (A) to do so, then set the date and time, then press (A) to continue + Note that, if you had to fix the RTC date and time, you will have to fix the time in the System Settings as well after this guide +1. Navigate to `[1:] SYSNAND CTRNAND > title > 00040138 > (X)0000002 > content` + + On a "New" edition console, the (X) will instead be 2 + + On an "Old" edition console, the (X) will instead be 0 +1. Select the `.app` file +1. Select `NCCH Image Options` +1. Select `Mount image to drive` +1. In the window that appears, open the `exefs` folder +1. In this folder, select the `.firm` file +1. Select "Firm Options" +1. Select "Boot Firm" +1. When prompted, choose to decrypt and make a copy +1. You should boot into the regular 3DS Home Menu. If you do, power your device off and continue to the next section + + If you do NOT boot into the regular 3DS Home Menu, continuing with these instructions **WILL** brick your device. You should join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you + +#### Section II - Prep Work + +1. Power on your device +1. Navigate to System Settings > Data Management > Nintendo 3DS > Software +1. In this list of software, delete any non-Nintendo content you installed while using CFW + + This includes common system software such as FBI, Anemone3DS, Luma Updater, Homebrew Launcher, Checkpoint, and others, along with any non-eShop games + + Failure to remove CFW software before uninstalling CFW may break access to the Data Management menu after uninstalling CFW +1. Power off your device + +#### Section III - Running Uninstall Script + +1. Launch GodMode9 by holding (Start) during boot 1. Press (Home) to bring up the action menu 1. Select "Scripts..." 1. Select "GM9Megascript" diff --git a/_pages/ar_SA/finalizing-setup.txt b/_pages/ar_SA/finalizing-setup.txt index 8ccda2a04f..f7c9c087d4 100644 --- a/_pages/ar_SA/finalizing-setup.txt +++ b/_pages/ar_SA/finalizing-setup.txt @@ -18,6 +18,8 @@ During this process, we also setup programs such as the following: + **Luma3DS Updater** *(updates your CFW installation easily)* + **GodMode9** *(multipurpose tool which can do NAND and cartridge functions)* + **Homebrew Launcher Loader** *(launches the Homebrew Launcher)* ++ **DSP1** *(allows homebrew applications to have sound)* ++ **ctr-no-timeoffset** *(removes the rtc offset so that the home menu and rtc timestamps match)* ### What You Need @@ -143,7 +145,7 @@ If, before following this guide, you already had an EmuNAND setup and would like 1. Press (B) to return to the main menu 1. Hold (R) and press (B) at the same time to eject your SD card 1. Insert your SD card into your computer -1. Copy `__sysnand_###.bin`, `essential.exefs`, and `boot9.bin` from the `/gm9/out/` folder on your SD card to a safe location on your computer +1. Copy `__sysnand_###.bin`, `__sysnand_###.bin.sha`, `essential.exefs`, and `boot9.bin` from the `/gm9/out/` folder on your SD card to a safe location on your computer + Make backups in multiple locations (such as online file storage) + These backups will save you from a brick and/or help you recover files from the NAND image if anything goes wrong in the future 1. Delete `__sysnand_###.bin` and `__sysnand_###.bin.sha` from the `/gm9/out/` folder on your SD card after copying it diff --git a/_pages/ar_SA/homebrew-launcher-(steelhax).txt b/_pages/ar_SA/homebrew-launcher-(steelhax).txt index 571fd1982d..568e53b124 100644 --- a/_pages/ar_SA/homebrew-launcher-(steelhax).txt +++ b/_pages/ar_SA/homebrew-launcher-(steelhax).txt @@ -8,7 +8,7 @@ title: "Homebrew Launcher (Steelhax)" This method of using Seedminer for further exploitation uses your `movable.sed` file to gain access to the Homebrew Launcher using the Steelhax exploit for the purposes of injecting an exploitable DSiWare title into the DS Download Play application. This method requires you to already own (or download) the free "Steel Divers: Sub Wars" game from the eShop. -If your device already has access to the Homebrew Launcher (whether through Steelhax or another exploit), you can skip to [Installing Boot9strap (Frogminer)](installing-boot9strap-(frogminer)). +If your device already has access to the Homebrew Launcher (whether through Steelhax or another exploit), you can skip to [Installing Boot9strap (Frogtool)](installing-boot9strap-(frogtool)). {: .notice--success} If you already have Steel Diver: Sub Wars, this process will overwrite your game's save file! @@ -17,6 +17,7 @@ If you already have Steel Diver: Sub Wars, this process will overwrite your game ### What You Need * The free eShop game "Steel Diver: Sub Wars" +* Your `movable.sed` file from completing [Seedminer](seedminer) * The latest release of [the Homebrew Launcher](https://github.com/fincs/new-hbmenu/releases/latest) * The latest release of [Steelhax](https://github.com/VegaRoXas/vegaroxas.github.io/raw/master/files/steelhax-installer.rar) * The [otherapp payload](https://smealum.github.io/3ds/#otherapp) *(for your region and version)* @@ -39,7 +40,7 @@ If you already have Steel Diver: Sub Wars, this process will overwrite your game 1. Exit "Steel Diver: Sub Wars" 1. Power off your device 1. Insert your SD card into your computer -1. Open [the Steelminer Injector website](http://steelminer.jisagi.net/injector) on your computer +1. Open [the Steelminer Injector website](https://bruteforcemovable.com/steelhax/) on your computer 1. Select your `movable.sed` file 1. Select "Start!" 1. Wait for the process to complete diff --git a/_pages/ar_SA/installing-boot9strap-(fredtool).txt b/_pages/ar_SA/installing-boot9strap-(fredtool).txt index ca3da37631..22a79f26c5 100644 --- a/_pages/ar_SA/installing-boot9strap-(fredtool).txt +++ b/_pages/ar_SA/installing-boot9strap-(fredtool).txt @@ -10,8 +10,6 @@ This method of using Seedminer for further exploitation uses your `movable.sed` This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). -To use the [magnet](https://wikipedia.org/wiki/Magnet_URI_scheme) links on this page, you will need a torrent client like [Deluge](http://dev.deluge-torrent.org/wiki/Download). - To extract the `.7z` and `.rar` files linked on this page, you will need a file archiver like [7-Zip](http://www.7-zip.org/) or [The Unarchiver](https://theunarchiver.com/). ### What You Need diff --git a/_pages/ar_SA/ntrboot.txt b/_pages/ar_SA/ntrboot.txt index a5c9bc16cd..35ffad7d57 100644 --- a/_pages/ar_SA/ntrboot.txt +++ b/_pages/ar_SA/ntrboot.txt @@ -17,14 +17,14 @@ Note that carts with a "Time Bomb" will no longer be able to launch `.nds` files | Flashcart Name | Current Price | "Time Bomb"? | 3DS Versions? | DSi Versions? | Other Notes | |-|-:|:-:|:-:|:-:|-| -| [**R4i-SDHC B9S**](http://www.nds-card.net/ProShow.asp?ProID=574) | $15.99 | September 3, 2019 | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot**; can be flashed back to an NDS flashcart. | -| [**R4i Gold 3DS Plus**](http://www.nds-card.net/ProShow.asp?ProID=575) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot** ([internal switch to switch between ntrboot and NDS modes]({{ "/images/screenshots/r4i-gold-3ds-plus.png" | absolute_url }})); do not manually flash with ntrboot. | -| [**Acekard 2i**](http://www.nds-card.net/ProShow.asp?ProID=160) | $20.99 | No | <= 4.3.0 | <= 1.4.4 | | -| [**DSTT**](http://www.nds-card.net/ProShow.asp?ProID=157) | $9.99 | No | None | None | Only models with [certain flash chips](https://gist.github.com/yuukieve/6b48f1bb8dd15136403c15c39fafdb42) are compatible with ntrboot. | -| [**R4i Gold 3DS**](http://www.nds-card.net/ProShow.asp?ProID=149) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | All RTS revisions are compatible. | -| [**R4i-SDHC 3DS RTS**](http://www.nds-card.net/ProShow.asp?ProID=146) | $13.99 | 1.87: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | | -| [**R4iSDHC GOLD Pro 20XX**](http://www.nds-card.net/ProShow.asp?ProID=490) | $9.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. 2013 models are incompatible. | -| [**R4iSDHC RTS LITE 20XX**](http://www.nds-card.net/ProShow.asp?ProID=450) | $13.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. 2013 models are incompatible. | +| [**R4i-SDHC B9S**](http://www.nds-card.com/ProShow.asp?ProID=574) | $15.99 | September 3, 2019 | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot**; can be flashed back to an NDS flashcart. | +| [**R4i Gold 3DS Plus**](http://www.nds-card.com/ProShow.asp?ProID=575) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot** ([internal switch to switch between ntrboot and NDS modes]({{ "/images/screenshots/r4i-gold-3ds-plus.png" | absolute_url }})); do not manually flash with ntrboot. | +| [**Acekard 2i**](http://www.nds-card.com/ProShow.asp?ProID=160) | $20.99 | No | <= 4.3.0 | <= 1.4.4 | | +| [**DSTT**](http://www.nds-card.com/ProShow.asp?ProID=157) | $9.99 | No | None | None | Only models with [certain flash chips](https://gist.github.com/yuukieve/6b48f1bb8dd15136403c15c39fafdb42) are compatible with ntrboot. | +| [**R4i Gold 3DS**](http://www.nds-card.com/ProShow.asp?ProID=149) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | All RTS revisions are compatible. | +| [**R4i-SDHC 3DS RTS**](http://www.nds-card.com/ProShow.asp?ProID=146) | $13.99 | 1.87: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | | +| [**R4iSDHC GOLD Pro 20XX**](http://www.nds-card.com/ProShow.asp?ProID=490) | $9.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. 2013 models are incompatible. | +| [**R4iSDHC RTS LITE 20XX**](http://www.nds-card.com/ProShow.asp?ProID=450) | $13.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. 2013 models are incompatible. | | **Ace3DS X** | | No | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot** (external switch to switch between ntrboot ("3DS") and NDS modes); do not manually flash with ntrboot. | | **Ace3DS Plus** | | No | <= 11.9.0 | <= 1.4.5 | | | **Gateway Blue** | | No | 4.1.0 - 4.5.0 | <= 1.4.5 | | @@ -49,7 +49,7 @@ To test if a magnet will work, hold it on or around the (A)(B)(X)(Y) buttons whi Note that the flashcart will not be able to be used for its standard functions while the ntrboot exploit is installed on it (except for in the case of the Acekard 2i, which remains functional *on NDS and custom firmware 3DS systems only*). This means that, for most flashcarts, it will not even display on the home menu. There are optional steps at the end of the ntrboot flashing instructions to remove it from your flashcart when you are done. -Note that in some rare circumstances, it may be possible for the flashing process to **brick** a counterfeit flashcart and render it permanently unusable. This is unlikely, but nevertheless only original listed flashcarts are supported. To reduce the chance of receiving a counterfeit card, it is recommended that you use a reputable site to buy your flashcart (such as [NDS Card](http://www.nds-card.net/)) +Note that in some rare circumstances, it may be possible for the flashing process to **brick** a counterfeit flashcart and render it permanently unusable. This is unlikely, but nevertheless only original listed flashcarts are supported. To reduce the chance of receiving a counterfeit card, it is recommended that you use a reputable site to buy your flashcart (such as [NDS Card](http://www.nds-card.com/)) {: .notice--danger} ___ diff --git a/_pages/ar_SA/seedminer.txt b/_pages/ar_SA/seedminer.txt index 4e8bfbaa60..0e0a6ee1b4 100644 --- a/_pages/ar_SA/seedminer.txt +++ b/_pages/ar_SA/seedminer.txt @@ -63,9 +63,7 @@ There are two different methods for building on the Seedminer exploit (described 1. Open [Bruteforce Movable](https://bruteforcemovable.com/) on your computer + This site can automate the retrieval of `movable_part1.sed` (using a bot 3DS console) and the breaking of your device's DSiWare encryption (using a volunteer's computer to run Seedminer) - + If you already have access to a 3DS capable of launching the Homebrew Launcher, you can manually retrieve your `movable_part1.sed` using that device by following [these](https://jisagi.github.io/SeedminerGuide/seedminerSelf/#section1) instructions - + If you already have access to a PC with a powerful graphics card, you can manually calculate your `movable.sed` using it by following [these](https://jisagi.github.io/SeedminerGuide/seedminerSelf/#section2) instructions - + If the automated service is nonfunctional and you cannot do one or both of those manually, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you + + If the automated service is nonfunctional, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you 1. Enter your device's Friend Code (with no spaces or dashes) into the "Your friend code" field 1. Paste your device's 32 character long folder name into the "Your ID0" field 1. Complete the "I'm not a robot" captcha @@ -74,11 +72,11 @@ There are two different methods for building on the Seedminer exploit (described 1. When prompted, use the "Register Friend" button on your device to add the friend code of the bot 3DS console 1. Wait for the site to update + If it does not, wait a few minutes before refreshing the page once -1. Select "Continue" -1. Wait for the process to complete - + This can take a while (up to an hour in some cases) - + During this process, the bot may not show up on your 3ds. As long as the website updates, this is not an issue. - + If you are still waiting after an hour, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you +1. Once the site processes your information, you will be given the option to "Continue" or "Do another device". Click the green "Continue" button +1. Wait for the remainder of the process to complete + + This is usually fast (1-5 minutes) but in some cases, can take up to half an hour. + + During this process, the bot you added may not show up on your 3ds. As long as the website updates, this is not an issue. + + If you are still waiting after half an hour, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you 1. When the process has completed, download your `movable.sed` file from the site + Keep this file as you will need it in the upcoming pages @@ -102,7 +100,7 @@ ___ #### Seedminer + Steelhax + Frogtool -This method of using Seedminer for further exploitation uses your `movable.sed` file to gain access to the Homebrew Launcher using the Steelhax exploit for the purposes of injecting an exploitable DSiWare title into the DS Download Play application. This method requires you to already own (or download) the free "Steel Divers: Sub Wars" game from the eShop. +This method of using Seedminer for further exploitation uses your `movable.sed` file to gain access to the Homebrew Launcher using the Steelhax exploit for the purposes of injecting an exploitable DSiWare title into the DS Download Play application. This method requires you to already own (or download) the free "Steel Diver: Sub Wars" game from the eShop. This method is only compatible with the EUR, JPN, and USA regions, and is somewhat more complicated than the above method. It is only recommended to use this method if you have a EUR region device and do not wish to pay for a DSiWare game, or if the above method does not work for you for some reason. diff --git a/_pages/ar_SA/uninstall-cfw.txt b/_pages/ar_SA/uninstall-cfw.txt index 4745050aab..584998ac19 100644 --- a/_pages/ar_SA/uninstall-cfw.txt +++ b/_pages/ar_SA/uninstall-cfw.txt @@ -11,7 +11,7 @@ This will completely remove CFW from your device, including Boot9Strap and Luma3 This is almost never the solution to fix any issues you encounter with your CFW installation. A better idea would be to read the [troubleshooting](troubleshooting) page or ask (in English) for help at [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp). {: .notice--danger} -Any unsigned (illegitimate) games will be rendered unusable and can be manually removed using the Data Management section of the System Settings. Use a [save manager](https://github.com/FlagBrew/Checkpoint/releases/latest) to backup any saves for these unsigned (illegitimate) games you care about. +Any unsigned (illegitimate) games will be rendered unusable and should be manually removed before starting this process by using the Data Management section of the System Settings. Use a [save manager](https://github.com/FlagBrew/Checkpoint/releases/latest) to backup any saves for these unsigned (illegitimate) games you care about. This will not affect your NNID, any legitimately purchased games, or any saves for those legitimately purchased games. @@ -26,21 +26,43 @@ Note that if you have any payload files other than `GodMode9.firm` in the `/luma ### Instructions -#### Section I - Prep Work +#### Section I - Safety Test 1. Power off your device 1. Insert your SD card into your computer 1. Copy `GodMode9.firm` from the GodMode9 `.zip` to the `/luma/payloads/` folder on your SD card 1. Copy the `gm9` folder from the GodMode9 `.zip` to the root of your SD card 1. Reinsert your SD card into your device -1. Power on your device - -#### Section II - Running Uninstall Script - 1. Launch GodMode9 by holding (Start) during boot 1. If you are prompted to create an essential files backup, press (A) to do so, then press (A) to continue once it has completed 1. If you are prompted to fix the RTC date&time, press (A) to do so, then set the date and time, then press (A) to continue + Note that, if you had to fix the RTC date and time, you will have to fix the time in the System Settings as well after this guide +1. Navigate to `[1:] SYSNAND CTRNAND > title > 00040138 > (X)0000002 > content` + + On a "New" edition console, the (X) will instead be 2 + + On an "Old" edition console, the (X) will instead be 0 +1. Select the `.app` file +1. Select `NCCH Image Options` +1. Select `Mount image to drive` +1. In the window that appears, open the `exefs` folder +1. In this folder, select the `.firm` file +1. Select "Firm Options" +1. Select "Boot Firm" +1. When prompted, choose to decrypt and make a copy +1. You should boot into the regular 3DS Home Menu. If you do, power your device off and continue to the next section + + If you do NOT boot into the regular 3DS Home Menu, continuing with these instructions **WILL** brick your device. You should join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you + +#### Section II - Prep Work + +1. Power on your device +1. Navigate to System Settings > Data Management > Nintendo 3DS > Software +1. In this list of software, delete any non-Nintendo content you installed while using CFW + + This includes common system software such as FBI, Anemone3DS, Luma Updater, Homebrew Launcher, Checkpoint, and others, along with any non-eShop games + + Failure to remove CFW software before uninstalling CFW may break access to the Data Management menu after uninstalling CFW +1. Power off your device + +#### Section III - Running Uninstall Script + +1. Launch GodMode9 by holding (Start) during boot 1. Press (Home) to bring up the action menu 1. Select "Scripts..." 1. Select "GM9Megascript" diff --git a/_pages/ca_ES/finalizing-setup.txt b/_pages/ca_ES/finalizing-setup.txt index 1b4dafcb09..d626678a6a 100644 --- a/_pages/ca_ES/finalizing-setup.txt +++ b/_pages/ca_ES/finalizing-setup.txt @@ -18,6 +18,8 @@ During this process, we also setup programs such as the following: + **Luma3DS Updater** *(updates your CFW installation easily)* + **GodMode9** *(multipurpose tool which can do NAND and cartridge functions)* + **Homebrew Launcher Loader** *(launches the Homebrew Launcher)* ++ **DSP1** *(allows homebrew applications to have sound)* ++ **ctr-no-timeoffset** *(removes the rtc offset so that the home menu and rtc timestamps match)* ### What You Need @@ -143,7 +145,7 @@ If, before following this guide, you already had an EmuNAND setup and would like 1. Press (B) to return to the main menu 1. Hold (R) and press (B) at the same time to eject your SD card 1. Insert your SD card into your computer -1. Copy `__sysnand_###.bin`, `essential.exefs`, and `boot9.bin` from the `/gm9/out/` folder on your SD card to a safe location on your computer +1. Copy `__sysnand_###.bin`, `__sysnand_###.bin.sha`, `essential.exefs`, and `boot9.bin` from the `/gm9/out/` folder on your SD card to a safe location on your computer + Make backups in multiple locations (such as online file storage) + These backups will save you from a brick and/or help you recover files from the NAND image if anything goes wrong in the future 1. Delete `__sysnand_###.bin` and `__sysnand_###.bin.sha` from the `/gm9/out/` folder on your SD card after copying it diff --git a/_pages/ca_ES/homebrew-launcher-(steelhax).txt b/_pages/ca_ES/homebrew-launcher-(steelhax).txt index 571fd1982d..568e53b124 100644 --- a/_pages/ca_ES/homebrew-launcher-(steelhax).txt +++ b/_pages/ca_ES/homebrew-launcher-(steelhax).txt @@ -8,7 +8,7 @@ title: "Homebrew Launcher (Steelhax)" This method of using Seedminer for further exploitation uses your `movable.sed` file to gain access to the Homebrew Launcher using the Steelhax exploit for the purposes of injecting an exploitable DSiWare title into the DS Download Play application. This method requires you to already own (or download) the free "Steel Divers: Sub Wars" game from the eShop. -If your device already has access to the Homebrew Launcher (whether through Steelhax or another exploit), you can skip to [Installing Boot9strap (Frogminer)](installing-boot9strap-(frogminer)). +If your device already has access to the Homebrew Launcher (whether through Steelhax or another exploit), you can skip to [Installing Boot9strap (Frogtool)](installing-boot9strap-(frogtool)). {: .notice--success} If you already have Steel Diver: Sub Wars, this process will overwrite your game's save file! @@ -17,6 +17,7 @@ If you already have Steel Diver: Sub Wars, this process will overwrite your game ### What You Need * The free eShop game "Steel Diver: Sub Wars" +* Your `movable.sed` file from completing [Seedminer](seedminer) * The latest release of [the Homebrew Launcher](https://github.com/fincs/new-hbmenu/releases/latest) * The latest release of [Steelhax](https://github.com/VegaRoXas/vegaroxas.github.io/raw/master/files/steelhax-installer.rar) * The [otherapp payload](https://smealum.github.io/3ds/#otherapp) *(for your region and version)* @@ -39,7 +40,7 @@ If you already have Steel Diver: Sub Wars, this process will overwrite your game 1. Exit "Steel Diver: Sub Wars" 1. Power off your device 1. Insert your SD card into your computer -1. Open [the Steelminer Injector website](http://steelminer.jisagi.net/injector) on your computer +1. Open [the Steelminer Injector website](https://bruteforcemovable.com/steelhax/) on your computer 1. Select your `movable.sed` file 1. Select "Start!" 1. Wait for the process to complete diff --git a/_pages/ca_ES/installing-boot9strap-(fredtool).txt b/_pages/ca_ES/installing-boot9strap-(fredtool).txt index ca3da37631..22a79f26c5 100644 --- a/_pages/ca_ES/installing-boot9strap-(fredtool).txt +++ b/_pages/ca_ES/installing-boot9strap-(fredtool).txt @@ -10,8 +10,6 @@ This method of using Seedminer for further exploitation uses your `movable.sed` This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). -To use the [magnet](https://wikipedia.org/wiki/Magnet_URI_scheme) links on this page, you will need a torrent client like [Deluge](http://dev.deluge-torrent.org/wiki/Download). - To extract the `.7z` and `.rar` files linked on this page, you will need a file archiver like [7-Zip](http://www.7-zip.org/) or [The Unarchiver](https://theunarchiver.com/). ### What You Need diff --git a/_pages/ca_ES/ntrboot.txt b/_pages/ca_ES/ntrboot.txt index a5c9bc16cd..35ffad7d57 100644 --- a/_pages/ca_ES/ntrboot.txt +++ b/_pages/ca_ES/ntrboot.txt @@ -17,14 +17,14 @@ Note that carts with a "Time Bomb" will no longer be able to launch `.nds` files | Flashcart Name | Current Price | "Time Bomb"? | 3DS Versions? | DSi Versions? | Other Notes | |-|-:|:-:|:-:|:-:|-| -| [**R4i-SDHC B9S**](http://www.nds-card.net/ProShow.asp?ProID=574) | $15.99 | September 3, 2019 | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot**; can be flashed back to an NDS flashcart. | -| [**R4i Gold 3DS Plus**](http://www.nds-card.net/ProShow.asp?ProID=575) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot** ([internal switch to switch between ntrboot and NDS modes]({{ "/images/screenshots/r4i-gold-3ds-plus.png" | absolute_url }})); do not manually flash with ntrboot. | -| [**Acekard 2i**](http://www.nds-card.net/ProShow.asp?ProID=160) | $20.99 | No | <= 4.3.0 | <= 1.4.4 | | -| [**DSTT**](http://www.nds-card.net/ProShow.asp?ProID=157) | $9.99 | No | None | None | Only models with [certain flash chips](https://gist.github.com/yuukieve/6b48f1bb8dd15136403c15c39fafdb42) are compatible with ntrboot. | -| [**R4i Gold 3DS**](http://www.nds-card.net/ProShow.asp?ProID=149) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | All RTS revisions are compatible. | -| [**R4i-SDHC 3DS RTS**](http://www.nds-card.net/ProShow.asp?ProID=146) | $13.99 | 1.87: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | | -| [**R4iSDHC GOLD Pro 20XX**](http://www.nds-card.net/ProShow.asp?ProID=490) | $9.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. 2013 models are incompatible. | -| [**R4iSDHC RTS LITE 20XX**](http://www.nds-card.net/ProShow.asp?ProID=450) | $13.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. 2013 models are incompatible. | +| [**R4i-SDHC B9S**](http://www.nds-card.com/ProShow.asp?ProID=574) | $15.99 | September 3, 2019 | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot**; can be flashed back to an NDS flashcart. | +| [**R4i Gold 3DS Plus**](http://www.nds-card.com/ProShow.asp?ProID=575) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot** ([internal switch to switch between ntrboot and NDS modes]({{ "/images/screenshots/r4i-gold-3ds-plus.png" | absolute_url }})); do not manually flash with ntrboot. | +| [**Acekard 2i**](http://www.nds-card.com/ProShow.asp?ProID=160) | $20.99 | No | <= 4.3.0 | <= 1.4.4 | | +| [**DSTT**](http://www.nds-card.com/ProShow.asp?ProID=157) | $9.99 | No | None | None | Only models with [certain flash chips](https://gist.github.com/yuukieve/6b48f1bb8dd15136403c15c39fafdb42) are compatible with ntrboot. | +| [**R4i Gold 3DS**](http://www.nds-card.com/ProShow.asp?ProID=149) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | All RTS revisions are compatible. | +| [**R4i-SDHC 3DS RTS**](http://www.nds-card.com/ProShow.asp?ProID=146) | $13.99 | 1.87: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | | +| [**R4iSDHC GOLD Pro 20XX**](http://www.nds-card.com/ProShow.asp?ProID=490) | $9.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. 2013 models are incompatible. | +| [**R4iSDHC RTS LITE 20XX**](http://www.nds-card.com/ProShow.asp?ProID=450) | $13.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. 2013 models are incompatible. | | **Ace3DS X** | | No | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot** (external switch to switch between ntrboot ("3DS") and NDS modes); do not manually flash with ntrboot. | | **Ace3DS Plus** | | No | <= 11.9.0 | <= 1.4.5 | | | **Gateway Blue** | | No | 4.1.0 - 4.5.0 | <= 1.4.5 | | @@ -49,7 +49,7 @@ To test if a magnet will work, hold it on or around the (A)(B)(X)(Y) buttons whi Note that the flashcart will not be able to be used for its standard functions while the ntrboot exploit is installed on it (except for in the case of the Acekard 2i, which remains functional *on NDS and custom firmware 3DS systems only*). This means that, for most flashcarts, it will not even display on the home menu. There are optional steps at the end of the ntrboot flashing instructions to remove it from your flashcart when you are done. -Note that in some rare circumstances, it may be possible for the flashing process to **brick** a counterfeit flashcart and render it permanently unusable. This is unlikely, but nevertheless only original listed flashcarts are supported. To reduce the chance of receiving a counterfeit card, it is recommended that you use a reputable site to buy your flashcart (such as [NDS Card](http://www.nds-card.net/)) +Note that in some rare circumstances, it may be possible for the flashing process to **brick** a counterfeit flashcart and render it permanently unusable. This is unlikely, but nevertheless only original listed flashcarts are supported. To reduce the chance of receiving a counterfeit card, it is recommended that you use a reputable site to buy your flashcart (such as [NDS Card](http://www.nds-card.com/)) {: .notice--danger} ___ diff --git a/_pages/ca_ES/seedminer.txt b/_pages/ca_ES/seedminer.txt index 4e8bfbaa60..0e0a6ee1b4 100644 --- a/_pages/ca_ES/seedminer.txt +++ b/_pages/ca_ES/seedminer.txt @@ -63,9 +63,7 @@ There are two different methods for building on the Seedminer exploit (described 1. Open [Bruteforce Movable](https://bruteforcemovable.com/) on your computer + This site can automate the retrieval of `movable_part1.sed` (using a bot 3DS console) and the breaking of your device's DSiWare encryption (using a volunteer's computer to run Seedminer) - + If you already have access to a 3DS capable of launching the Homebrew Launcher, you can manually retrieve your `movable_part1.sed` using that device by following [these](https://jisagi.github.io/SeedminerGuide/seedminerSelf/#section1) instructions - + If you already have access to a PC with a powerful graphics card, you can manually calculate your `movable.sed` using it by following [these](https://jisagi.github.io/SeedminerGuide/seedminerSelf/#section2) instructions - + If the automated service is nonfunctional and you cannot do one or both of those manually, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you + + If the automated service is nonfunctional, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you 1. Enter your device's Friend Code (with no spaces or dashes) into the "Your friend code" field 1. Paste your device's 32 character long folder name into the "Your ID0" field 1. Complete the "I'm not a robot" captcha @@ -74,11 +72,11 @@ There are two different methods for building on the Seedminer exploit (described 1. When prompted, use the "Register Friend" button on your device to add the friend code of the bot 3DS console 1. Wait for the site to update + If it does not, wait a few minutes before refreshing the page once -1. Select "Continue" -1. Wait for the process to complete - + This can take a while (up to an hour in some cases) - + During this process, the bot may not show up on your 3ds. As long as the website updates, this is not an issue. - + If you are still waiting after an hour, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you +1. Once the site processes your information, you will be given the option to "Continue" or "Do another device". Click the green "Continue" button +1. Wait for the remainder of the process to complete + + This is usually fast (1-5 minutes) but in some cases, can take up to half an hour. + + During this process, the bot you added may not show up on your 3ds. As long as the website updates, this is not an issue. + + If you are still waiting after half an hour, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you 1. When the process has completed, download your `movable.sed` file from the site + Keep this file as you will need it in the upcoming pages @@ -102,7 +100,7 @@ ___ #### Seedminer + Steelhax + Frogtool -This method of using Seedminer for further exploitation uses your `movable.sed` file to gain access to the Homebrew Launcher using the Steelhax exploit for the purposes of injecting an exploitable DSiWare title into the DS Download Play application. This method requires you to already own (or download) the free "Steel Divers: Sub Wars" game from the eShop. +This method of using Seedminer for further exploitation uses your `movable.sed` file to gain access to the Homebrew Launcher using the Steelhax exploit for the purposes of injecting an exploitable DSiWare title into the DS Download Play application. This method requires you to already own (or download) the free "Steel Diver: Sub Wars" game from the eShop. This method is only compatible with the EUR, JPN, and USA regions, and is somewhat more complicated than the above method. It is only recommended to use this method if you have a EUR region device and do not wish to pay for a DSiWare game, or if the above method does not work for you for some reason. diff --git a/_pages/ca_ES/uninstall-cfw.txt b/_pages/ca_ES/uninstall-cfw.txt index 4745050aab..584998ac19 100644 --- a/_pages/ca_ES/uninstall-cfw.txt +++ b/_pages/ca_ES/uninstall-cfw.txt @@ -11,7 +11,7 @@ This will completely remove CFW from your device, including Boot9Strap and Luma3 This is almost never the solution to fix any issues you encounter with your CFW installation. A better idea would be to read the [troubleshooting](troubleshooting) page or ask (in English) for help at [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp). {: .notice--danger} -Any unsigned (illegitimate) games will be rendered unusable and can be manually removed using the Data Management section of the System Settings. Use a [save manager](https://github.com/FlagBrew/Checkpoint/releases/latest) to backup any saves for these unsigned (illegitimate) games you care about. +Any unsigned (illegitimate) games will be rendered unusable and should be manually removed before starting this process by using the Data Management section of the System Settings. Use a [save manager](https://github.com/FlagBrew/Checkpoint/releases/latest) to backup any saves for these unsigned (illegitimate) games you care about. This will not affect your NNID, any legitimately purchased games, or any saves for those legitimately purchased games. @@ -26,21 +26,43 @@ Note that if you have any payload files other than `GodMode9.firm` in the `/luma ### Instructions -#### Section I - Prep Work +#### Section I - Safety Test 1. Power off your device 1. Insert your SD card into your computer 1. Copy `GodMode9.firm` from the GodMode9 `.zip` to the `/luma/payloads/` folder on your SD card 1. Copy the `gm9` folder from the GodMode9 `.zip` to the root of your SD card 1. Reinsert your SD card into your device -1. Power on your device - -#### Section II - Running Uninstall Script - 1. Launch GodMode9 by holding (Start) during boot 1. If you are prompted to create an essential files backup, press (A) to do so, then press (A) to continue once it has completed 1. If you are prompted to fix the RTC date&time, press (A) to do so, then set the date and time, then press (A) to continue + Note that, if you had to fix the RTC date and time, you will have to fix the time in the System Settings as well after this guide +1. Navigate to `[1:] SYSNAND CTRNAND > title > 00040138 > (X)0000002 > content` + + On a "New" edition console, the (X) will instead be 2 + + On an "Old" edition console, the (X) will instead be 0 +1. Select the `.app` file +1. Select `NCCH Image Options` +1. Select `Mount image to drive` +1. In the window that appears, open the `exefs` folder +1. In this folder, select the `.firm` file +1. Select "Firm Options" +1. Select "Boot Firm" +1. When prompted, choose to decrypt and make a copy +1. You should boot into the regular 3DS Home Menu. If you do, power your device off and continue to the next section + + If you do NOT boot into the regular 3DS Home Menu, continuing with these instructions **WILL** brick your device. You should join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you + +#### Section II - Prep Work + +1. Power on your device +1. Navigate to System Settings > Data Management > Nintendo 3DS > Software +1. In this list of software, delete any non-Nintendo content you installed while using CFW + + This includes common system software such as FBI, Anemone3DS, Luma Updater, Homebrew Launcher, Checkpoint, and others, along with any non-eShop games + + Failure to remove CFW software before uninstalling CFW may break access to the Data Management menu after uninstalling CFW +1. Power off your device + +#### Section III - Running Uninstall Script + +1. Launch GodMode9 by holding (Start) during boot 1. Press (Home) to bring up the action menu 1. Select "Scripts..." 1. Select "GM9Megascript" diff --git a/_pages/cs_CZ/finalizing-setup.txt b/_pages/cs_CZ/finalizing-setup.txt index 8ccda2a04f..f7c9c087d4 100644 --- a/_pages/cs_CZ/finalizing-setup.txt +++ b/_pages/cs_CZ/finalizing-setup.txt @@ -18,6 +18,8 @@ During this process, we also setup programs such as the following: + **Luma3DS Updater** *(updates your CFW installation easily)* + **GodMode9** *(multipurpose tool which can do NAND and cartridge functions)* + **Homebrew Launcher Loader** *(launches the Homebrew Launcher)* ++ **DSP1** *(allows homebrew applications to have sound)* ++ **ctr-no-timeoffset** *(removes the rtc offset so that the home menu and rtc timestamps match)* ### What You Need @@ -143,7 +145,7 @@ If, before following this guide, you already had an EmuNAND setup and would like 1. Press (B) to return to the main menu 1. Hold (R) and press (B) at the same time to eject your SD card 1. Insert your SD card into your computer -1. Copy `__sysnand_###.bin`, `essential.exefs`, and `boot9.bin` from the `/gm9/out/` folder on your SD card to a safe location on your computer +1. Copy `__sysnand_###.bin`, `__sysnand_###.bin.sha`, `essential.exefs`, and `boot9.bin` from the `/gm9/out/` folder on your SD card to a safe location on your computer + Make backups in multiple locations (such as online file storage) + These backups will save you from a brick and/or help you recover files from the NAND image if anything goes wrong in the future 1. Delete `__sysnand_###.bin` and `__sysnand_###.bin.sha` from the `/gm9/out/` folder on your SD card after copying it diff --git a/_pages/cs_CZ/homebrew-launcher-(steelhax).txt b/_pages/cs_CZ/homebrew-launcher-(steelhax).txt index 571fd1982d..568e53b124 100644 --- a/_pages/cs_CZ/homebrew-launcher-(steelhax).txt +++ b/_pages/cs_CZ/homebrew-launcher-(steelhax).txt @@ -8,7 +8,7 @@ title: "Homebrew Launcher (Steelhax)" This method of using Seedminer for further exploitation uses your `movable.sed` file to gain access to the Homebrew Launcher using the Steelhax exploit for the purposes of injecting an exploitable DSiWare title into the DS Download Play application. This method requires you to already own (or download) the free "Steel Divers: Sub Wars" game from the eShop. -If your device already has access to the Homebrew Launcher (whether through Steelhax or another exploit), you can skip to [Installing Boot9strap (Frogminer)](installing-boot9strap-(frogminer)). +If your device already has access to the Homebrew Launcher (whether through Steelhax or another exploit), you can skip to [Installing Boot9strap (Frogtool)](installing-boot9strap-(frogtool)). {: .notice--success} If you already have Steel Diver: Sub Wars, this process will overwrite your game's save file! @@ -17,6 +17,7 @@ If you already have Steel Diver: Sub Wars, this process will overwrite your game ### What You Need * The free eShop game "Steel Diver: Sub Wars" +* Your `movable.sed` file from completing [Seedminer](seedminer) * The latest release of [the Homebrew Launcher](https://github.com/fincs/new-hbmenu/releases/latest) * The latest release of [Steelhax](https://github.com/VegaRoXas/vegaroxas.github.io/raw/master/files/steelhax-installer.rar) * The [otherapp payload](https://smealum.github.io/3ds/#otherapp) *(for your region and version)* @@ -39,7 +40,7 @@ If you already have Steel Diver: Sub Wars, this process will overwrite your game 1. Exit "Steel Diver: Sub Wars" 1. Power off your device 1. Insert your SD card into your computer -1. Open [the Steelminer Injector website](http://steelminer.jisagi.net/injector) on your computer +1. Open [the Steelminer Injector website](https://bruteforcemovable.com/steelhax/) on your computer 1. Select your `movable.sed` file 1. Select "Start!" 1. Wait for the process to complete diff --git a/_pages/cs_CZ/installing-boot9strap-(fredtool).txt b/_pages/cs_CZ/installing-boot9strap-(fredtool).txt index ca3da37631..22a79f26c5 100644 --- a/_pages/cs_CZ/installing-boot9strap-(fredtool).txt +++ b/_pages/cs_CZ/installing-boot9strap-(fredtool).txt @@ -10,8 +10,6 @@ This method of using Seedminer for further exploitation uses your `movable.sed` This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). -To use the [magnet](https://wikipedia.org/wiki/Magnet_URI_scheme) links on this page, you will need a torrent client like [Deluge](http://dev.deluge-torrent.org/wiki/Download). - To extract the `.7z` and `.rar` files linked on this page, you will need a file archiver like [7-Zip](http://www.7-zip.org/) or [The Unarchiver](https://theunarchiver.com/). ### What You Need diff --git a/_pages/cs_CZ/ntrboot.txt b/_pages/cs_CZ/ntrboot.txt index a5c9bc16cd..35ffad7d57 100644 --- a/_pages/cs_CZ/ntrboot.txt +++ b/_pages/cs_CZ/ntrboot.txt @@ -17,14 +17,14 @@ Note that carts with a "Time Bomb" will no longer be able to launch `.nds` files | Flashcart Name | Current Price | "Time Bomb"? | 3DS Versions? | DSi Versions? | Other Notes | |-|-:|:-:|:-:|:-:|-| -| [**R4i-SDHC B9S**](http://www.nds-card.net/ProShow.asp?ProID=574) | $15.99 | September 3, 2019 | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot**; can be flashed back to an NDS flashcart. | -| [**R4i Gold 3DS Plus**](http://www.nds-card.net/ProShow.asp?ProID=575) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot** ([internal switch to switch between ntrboot and NDS modes]({{ "/images/screenshots/r4i-gold-3ds-plus.png" | absolute_url }})); do not manually flash with ntrboot. | -| [**Acekard 2i**](http://www.nds-card.net/ProShow.asp?ProID=160) | $20.99 | No | <= 4.3.0 | <= 1.4.4 | | -| [**DSTT**](http://www.nds-card.net/ProShow.asp?ProID=157) | $9.99 | No | None | None | Only models with [certain flash chips](https://gist.github.com/yuukieve/6b48f1bb8dd15136403c15c39fafdb42) are compatible with ntrboot. | -| [**R4i Gold 3DS**](http://www.nds-card.net/ProShow.asp?ProID=149) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | All RTS revisions are compatible. | -| [**R4i-SDHC 3DS RTS**](http://www.nds-card.net/ProShow.asp?ProID=146) | $13.99 | 1.87: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | | -| [**R4iSDHC GOLD Pro 20XX**](http://www.nds-card.net/ProShow.asp?ProID=490) | $9.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. 2013 models are incompatible. | -| [**R4iSDHC RTS LITE 20XX**](http://www.nds-card.net/ProShow.asp?ProID=450) | $13.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. 2013 models are incompatible. | +| [**R4i-SDHC B9S**](http://www.nds-card.com/ProShow.asp?ProID=574) | $15.99 | September 3, 2019 | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot**; can be flashed back to an NDS flashcart. | +| [**R4i Gold 3DS Plus**](http://www.nds-card.com/ProShow.asp?ProID=575) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot** ([internal switch to switch between ntrboot and NDS modes]({{ "/images/screenshots/r4i-gold-3ds-plus.png" | absolute_url }})); do not manually flash with ntrboot. | +| [**Acekard 2i**](http://www.nds-card.com/ProShow.asp?ProID=160) | $20.99 | No | <= 4.3.0 | <= 1.4.4 | | +| [**DSTT**](http://www.nds-card.com/ProShow.asp?ProID=157) | $9.99 | No | None | None | Only models with [certain flash chips](https://gist.github.com/yuukieve/6b48f1bb8dd15136403c15c39fafdb42) are compatible with ntrboot. | +| [**R4i Gold 3DS**](http://www.nds-card.com/ProShow.asp?ProID=149) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | All RTS revisions are compatible. | +| [**R4i-SDHC 3DS RTS**](http://www.nds-card.com/ProShow.asp?ProID=146) | $13.99 | 1.87: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | | +| [**R4iSDHC GOLD Pro 20XX**](http://www.nds-card.com/ProShow.asp?ProID=490) | $9.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. 2013 models are incompatible. | +| [**R4iSDHC RTS LITE 20XX**](http://www.nds-card.com/ProShow.asp?ProID=450) | $13.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. 2013 models are incompatible. | | **Ace3DS X** | | No | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot** (external switch to switch between ntrboot ("3DS") and NDS modes); do not manually flash with ntrboot. | | **Ace3DS Plus** | | No | <= 11.9.0 | <= 1.4.5 | | | **Gateway Blue** | | No | 4.1.0 - 4.5.0 | <= 1.4.5 | | @@ -49,7 +49,7 @@ To test if a magnet will work, hold it on or around the (A)(B)(X)(Y) buttons whi Note that the flashcart will not be able to be used for its standard functions while the ntrboot exploit is installed on it (except for in the case of the Acekard 2i, which remains functional *on NDS and custom firmware 3DS systems only*). This means that, for most flashcarts, it will not even display on the home menu. There are optional steps at the end of the ntrboot flashing instructions to remove it from your flashcart when you are done. -Note that in some rare circumstances, it may be possible for the flashing process to **brick** a counterfeit flashcart and render it permanently unusable. This is unlikely, but nevertheless only original listed flashcarts are supported. To reduce the chance of receiving a counterfeit card, it is recommended that you use a reputable site to buy your flashcart (such as [NDS Card](http://www.nds-card.net/)) +Note that in some rare circumstances, it may be possible for the flashing process to **brick** a counterfeit flashcart and render it permanently unusable. This is unlikely, but nevertheless only original listed flashcarts are supported. To reduce the chance of receiving a counterfeit card, it is recommended that you use a reputable site to buy your flashcart (such as [NDS Card](http://www.nds-card.com/)) {: .notice--danger} ___ diff --git a/_pages/cs_CZ/seedminer.txt b/_pages/cs_CZ/seedminer.txt index 4e8bfbaa60..0e0a6ee1b4 100644 --- a/_pages/cs_CZ/seedminer.txt +++ b/_pages/cs_CZ/seedminer.txt @@ -63,9 +63,7 @@ There are two different methods for building on the Seedminer exploit (described 1. Open [Bruteforce Movable](https://bruteforcemovable.com/) on your computer + This site can automate the retrieval of `movable_part1.sed` (using a bot 3DS console) and the breaking of your device's DSiWare encryption (using a volunteer's computer to run Seedminer) - + If you already have access to a 3DS capable of launching the Homebrew Launcher, you can manually retrieve your `movable_part1.sed` using that device by following [these](https://jisagi.github.io/SeedminerGuide/seedminerSelf/#section1) instructions - + If you already have access to a PC with a powerful graphics card, you can manually calculate your `movable.sed` using it by following [these](https://jisagi.github.io/SeedminerGuide/seedminerSelf/#section2) instructions - + If the automated service is nonfunctional and you cannot do one or both of those manually, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you + + If the automated service is nonfunctional, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you 1. Enter your device's Friend Code (with no spaces or dashes) into the "Your friend code" field 1. Paste your device's 32 character long folder name into the "Your ID0" field 1. Complete the "I'm not a robot" captcha @@ -74,11 +72,11 @@ There are two different methods for building on the Seedminer exploit (described 1. When prompted, use the "Register Friend" button on your device to add the friend code of the bot 3DS console 1. Wait for the site to update + If it does not, wait a few minutes before refreshing the page once -1. Select "Continue" -1. Wait for the process to complete - + This can take a while (up to an hour in some cases) - + During this process, the bot may not show up on your 3ds. As long as the website updates, this is not an issue. - + If you are still waiting after an hour, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you +1. Once the site processes your information, you will be given the option to "Continue" or "Do another device". Click the green "Continue" button +1. Wait for the remainder of the process to complete + + This is usually fast (1-5 minutes) but in some cases, can take up to half an hour. + + During this process, the bot you added may not show up on your 3ds. As long as the website updates, this is not an issue. + + If you are still waiting after half an hour, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you 1. When the process has completed, download your `movable.sed` file from the site + Keep this file as you will need it in the upcoming pages @@ -102,7 +100,7 @@ ___ #### Seedminer + Steelhax + Frogtool -This method of using Seedminer for further exploitation uses your `movable.sed` file to gain access to the Homebrew Launcher using the Steelhax exploit for the purposes of injecting an exploitable DSiWare title into the DS Download Play application. This method requires you to already own (or download) the free "Steel Divers: Sub Wars" game from the eShop. +This method of using Seedminer for further exploitation uses your `movable.sed` file to gain access to the Homebrew Launcher using the Steelhax exploit for the purposes of injecting an exploitable DSiWare title into the DS Download Play application. This method requires you to already own (or download) the free "Steel Diver: Sub Wars" game from the eShop. This method is only compatible with the EUR, JPN, and USA regions, and is somewhat more complicated than the above method. It is only recommended to use this method if you have a EUR region device and do not wish to pay for a DSiWare game, or if the above method does not work for you for some reason. diff --git a/_pages/cs_CZ/uninstall-cfw.txt b/_pages/cs_CZ/uninstall-cfw.txt index 4745050aab..584998ac19 100644 --- a/_pages/cs_CZ/uninstall-cfw.txt +++ b/_pages/cs_CZ/uninstall-cfw.txt @@ -11,7 +11,7 @@ This will completely remove CFW from your device, including Boot9Strap and Luma3 This is almost never the solution to fix any issues you encounter with your CFW installation. A better idea would be to read the [troubleshooting](troubleshooting) page or ask (in English) for help at [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp). {: .notice--danger} -Any unsigned (illegitimate) games will be rendered unusable and can be manually removed using the Data Management section of the System Settings. Use a [save manager](https://github.com/FlagBrew/Checkpoint/releases/latest) to backup any saves for these unsigned (illegitimate) games you care about. +Any unsigned (illegitimate) games will be rendered unusable and should be manually removed before starting this process by using the Data Management section of the System Settings. Use a [save manager](https://github.com/FlagBrew/Checkpoint/releases/latest) to backup any saves for these unsigned (illegitimate) games you care about. This will not affect your NNID, any legitimately purchased games, or any saves for those legitimately purchased games. @@ -26,21 +26,43 @@ Note that if you have any payload files other than `GodMode9.firm` in the `/luma ### Instructions -#### Section I - Prep Work +#### Section I - Safety Test 1. Power off your device 1. Insert your SD card into your computer 1. Copy `GodMode9.firm` from the GodMode9 `.zip` to the `/luma/payloads/` folder on your SD card 1. Copy the `gm9` folder from the GodMode9 `.zip` to the root of your SD card 1. Reinsert your SD card into your device -1. Power on your device - -#### Section II - Running Uninstall Script - 1. Launch GodMode9 by holding (Start) during boot 1. If you are prompted to create an essential files backup, press (A) to do so, then press (A) to continue once it has completed 1. If you are prompted to fix the RTC date&time, press (A) to do so, then set the date and time, then press (A) to continue + Note that, if you had to fix the RTC date and time, you will have to fix the time in the System Settings as well after this guide +1. Navigate to `[1:] SYSNAND CTRNAND > title > 00040138 > (X)0000002 > content` + + On a "New" edition console, the (X) will instead be 2 + + On an "Old" edition console, the (X) will instead be 0 +1. Select the `.app` file +1. Select `NCCH Image Options` +1. Select `Mount image to drive` +1. In the window that appears, open the `exefs` folder +1. In this folder, select the `.firm` file +1. Select "Firm Options" +1. Select "Boot Firm" +1. When prompted, choose to decrypt and make a copy +1. You should boot into the regular 3DS Home Menu. If you do, power your device off and continue to the next section + + If you do NOT boot into the regular 3DS Home Menu, continuing with these instructions **WILL** brick your device. You should join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you + +#### Section II - Prep Work + +1. Power on your device +1. Navigate to System Settings > Data Management > Nintendo 3DS > Software +1. In this list of software, delete any non-Nintendo content you installed while using CFW + + This includes common system software such as FBI, Anemone3DS, Luma Updater, Homebrew Launcher, Checkpoint, and others, along with any non-eShop games + + Failure to remove CFW software before uninstalling CFW may break access to the Data Management menu after uninstalling CFW +1. Power off your device + +#### Section III - Running Uninstall Script + +1. Launch GodMode9 by holding (Start) during boot 1. Press (Home) to bring up the action menu 1. Select "Scripts..." 1. Select "GM9Megascript" diff --git a/_pages/da_DK/finalizing-setup.txt b/_pages/da_DK/finalizing-setup.txt index 8ccda2a04f..f7c9c087d4 100644 --- a/_pages/da_DK/finalizing-setup.txt +++ b/_pages/da_DK/finalizing-setup.txt @@ -18,6 +18,8 @@ During this process, we also setup programs such as the following: + **Luma3DS Updater** *(updates your CFW installation easily)* + **GodMode9** *(multipurpose tool which can do NAND and cartridge functions)* + **Homebrew Launcher Loader** *(launches the Homebrew Launcher)* ++ **DSP1** *(allows homebrew applications to have sound)* ++ **ctr-no-timeoffset** *(removes the rtc offset so that the home menu and rtc timestamps match)* ### What You Need @@ -143,7 +145,7 @@ If, before following this guide, you already had an EmuNAND setup and would like 1. Press (B) to return to the main menu 1. Hold (R) and press (B) at the same time to eject your SD card 1. Insert your SD card into your computer -1. Copy `__sysnand_###.bin`, `essential.exefs`, and `boot9.bin` from the `/gm9/out/` folder on your SD card to a safe location on your computer +1. Copy `__sysnand_###.bin`, `__sysnand_###.bin.sha`, `essential.exefs`, and `boot9.bin` from the `/gm9/out/` folder on your SD card to a safe location on your computer + Make backups in multiple locations (such as online file storage) + These backups will save you from a brick and/or help you recover files from the NAND image if anything goes wrong in the future 1. Delete `__sysnand_###.bin` and `__sysnand_###.bin.sha` from the `/gm9/out/` folder on your SD card after copying it diff --git a/_pages/da_DK/homebrew-launcher-(steelhax).txt b/_pages/da_DK/homebrew-launcher-(steelhax).txt index 571fd1982d..568e53b124 100644 --- a/_pages/da_DK/homebrew-launcher-(steelhax).txt +++ b/_pages/da_DK/homebrew-launcher-(steelhax).txt @@ -8,7 +8,7 @@ title: "Homebrew Launcher (Steelhax)" This method of using Seedminer for further exploitation uses your `movable.sed` file to gain access to the Homebrew Launcher using the Steelhax exploit for the purposes of injecting an exploitable DSiWare title into the DS Download Play application. This method requires you to already own (or download) the free "Steel Divers: Sub Wars" game from the eShop. -If your device already has access to the Homebrew Launcher (whether through Steelhax or another exploit), you can skip to [Installing Boot9strap (Frogminer)](installing-boot9strap-(frogminer)). +If your device already has access to the Homebrew Launcher (whether through Steelhax or another exploit), you can skip to [Installing Boot9strap (Frogtool)](installing-boot9strap-(frogtool)). {: .notice--success} If you already have Steel Diver: Sub Wars, this process will overwrite your game's save file! @@ -17,6 +17,7 @@ If you already have Steel Diver: Sub Wars, this process will overwrite your game ### What You Need * The free eShop game "Steel Diver: Sub Wars" +* Your `movable.sed` file from completing [Seedminer](seedminer) * The latest release of [the Homebrew Launcher](https://github.com/fincs/new-hbmenu/releases/latest) * The latest release of [Steelhax](https://github.com/VegaRoXas/vegaroxas.github.io/raw/master/files/steelhax-installer.rar) * The [otherapp payload](https://smealum.github.io/3ds/#otherapp) *(for your region and version)* @@ -39,7 +40,7 @@ If you already have Steel Diver: Sub Wars, this process will overwrite your game 1. Exit "Steel Diver: Sub Wars" 1. Power off your device 1. Insert your SD card into your computer -1. Open [the Steelminer Injector website](http://steelminer.jisagi.net/injector) on your computer +1. Open [the Steelminer Injector website](https://bruteforcemovable.com/steelhax/) on your computer 1. Select your `movable.sed` file 1. Select "Start!" 1. Wait for the process to complete diff --git a/_pages/da_DK/installing-boot9strap-(fredtool).txt b/_pages/da_DK/installing-boot9strap-(fredtool).txt index ca3da37631..22a79f26c5 100644 --- a/_pages/da_DK/installing-boot9strap-(fredtool).txt +++ b/_pages/da_DK/installing-boot9strap-(fredtool).txt @@ -10,8 +10,6 @@ This method of using Seedminer for further exploitation uses your `movable.sed` This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). -To use the [magnet](https://wikipedia.org/wiki/Magnet_URI_scheme) links on this page, you will need a torrent client like [Deluge](http://dev.deluge-torrent.org/wiki/Download). - To extract the `.7z` and `.rar` files linked on this page, you will need a file archiver like [7-Zip](http://www.7-zip.org/) or [The Unarchiver](https://theunarchiver.com/). ### What You Need diff --git a/_pages/da_DK/ntrboot.txt b/_pages/da_DK/ntrboot.txt index a5c9bc16cd..35ffad7d57 100644 --- a/_pages/da_DK/ntrboot.txt +++ b/_pages/da_DK/ntrboot.txt @@ -17,14 +17,14 @@ Note that carts with a "Time Bomb" will no longer be able to launch `.nds` files | Flashcart Name | Current Price | "Time Bomb"? | 3DS Versions? | DSi Versions? | Other Notes | |-|-:|:-:|:-:|:-:|-| -| [**R4i-SDHC B9S**](http://www.nds-card.net/ProShow.asp?ProID=574) | $15.99 | September 3, 2019 | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot**; can be flashed back to an NDS flashcart. | -| [**R4i Gold 3DS Plus**](http://www.nds-card.net/ProShow.asp?ProID=575) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot** ([internal switch to switch between ntrboot and NDS modes]({{ "/images/screenshots/r4i-gold-3ds-plus.png" | absolute_url }})); do not manually flash with ntrboot. | -| [**Acekard 2i**](http://www.nds-card.net/ProShow.asp?ProID=160) | $20.99 | No | <= 4.3.0 | <= 1.4.4 | | -| [**DSTT**](http://www.nds-card.net/ProShow.asp?ProID=157) | $9.99 | No | None | None | Only models with [certain flash chips](https://gist.github.com/yuukieve/6b48f1bb8dd15136403c15c39fafdb42) are compatible with ntrboot. | -| [**R4i Gold 3DS**](http://www.nds-card.net/ProShow.asp?ProID=149) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | All RTS revisions are compatible. | -| [**R4i-SDHC 3DS RTS**](http://www.nds-card.net/ProShow.asp?ProID=146) | $13.99 | 1.87: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | | -| [**R4iSDHC GOLD Pro 20XX**](http://www.nds-card.net/ProShow.asp?ProID=490) | $9.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. 2013 models are incompatible. | -| [**R4iSDHC RTS LITE 20XX**](http://www.nds-card.net/ProShow.asp?ProID=450) | $13.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. 2013 models are incompatible. | +| [**R4i-SDHC B9S**](http://www.nds-card.com/ProShow.asp?ProID=574) | $15.99 | September 3, 2019 | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot**; can be flashed back to an NDS flashcart. | +| [**R4i Gold 3DS Plus**](http://www.nds-card.com/ProShow.asp?ProID=575) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot** ([internal switch to switch between ntrboot and NDS modes]({{ "/images/screenshots/r4i-gold-3ds-plus.png" | absolute_url }})); do not manually flash with ntrboot. | +| [**Acekard 2i**](http://www.nds-card.com/ProShow.asp?ProID=160) | $20.99 | No | <= 4.3.0 | <= 1.4.4 | | +| [**DSTT**](http://www.nds-card.com/ProShow.asp?ProID=157) | $9.99 | No | None | None | Only models with [certain flash chips](https://gist.github.com/yuukieve/6b48f1bb8dd15136403c15c39fafdb42) are compatible with ntrboot. | +| [**R4i Gold 3DS**](http://www.nds-card.com/ProShow.asp?ProID=149) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | All RTS revisions are compatible. | +| [**R4i-SDHC 3DS RTS**](http://www.nds-card.com/ProShow.asp?ProID=146) | $13.99 | 1.87: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | | +| [**R4iSDHC GOLD Pro 20XX**](http://www.nds-card.com/ProShow.asp?ProID=490) | $9.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. 2013 models are incompatible. | +| [**R4iSDHC RTS LITE 20XX**](http://www.nds-card.com/ProShow.asp?ProID=450) | $13.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. 2013 models are incompatible. | | **Ace3DS X** | | No | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot** (external switch to switch between ntrboot ("3DS") and NDS modes); do not manually flash with ntrboot. | | **Ace3DS Plus** | | No | <= 11.9.0 | <= 1.4.5 | | | **Gateway Blue** | | No | 4.1.0 - 4.5.0 | <= 1.4.5 | | @@ -49,7 +49,7 @@ To test if a magnet will work, hold it on or around the (A)(B)(X)(Y) buttons whi Note that the flashcart will not be able to be used for its standard functions while the ntrboot exploit is installed on it (except for in the case of the Acekard 2i, which remains functional *on NDS and custom firmware 3DS systems only*). This means that, for most flashcarts, it will not even display on the home menu. There are optional steps at the end of the ntrboot flashing instructions to remove it from your flashcart when you are done. -Note that in some rare circumstances, it may be possible for the flashing process to **brick** a counterfeit flashcart and render it permanently unusable. This is unlikely, but nevertheless only original listed flashcarts are supported. To reduce the chance of receiving a counterfeit card, it is recommended that you use a reputable site to buy your flashcart (such as [NDS Card](http://www.nds-card.net/)) +Note that in some rare circumstances, it may be possible for the flashing process to **brick** a counterfeit flashcart and render it permanently unusable. This is unlikely, but nevertheless only original listed flashcarts are supported. To reduce the chance of receiving a counterfeit card, it is recommended that you use a reputable site to buy your flashcart (such as [NDS Card](http://www.nds-card.com/)) {: .notice--danger} ___ diff --git a/_pages/da_DK/seedminer.txt b/_pages/da_DK/seedminer.txt index 4e8bfbaa60..0e0a6ee1b4 100644 --- a/_pages/da_DK/seedminer.txt +++ b/_pages/da_DK/seedminer.txt @@ -63,9 +63,7 @@ There are two different methods for building on the Seedminer exploit (described 1. Open [Bruteforce Movable](https://bruteforcemovable.com/) on your computer + This site can automate the retrieval of `movable_part1.sed` (using a bot 3DS console) and the breaking of your device's DSiWare encryption (using a volunteer's computer to run Seedminer) - + If you already have access to a 3DS capable of launching the Homebrew Launcher, you can manually retrieve your `movable_part1.sed` using that device by following [these](https://jisagi.github.io/SeedminerGuide/seedminerSelf/#section1) instructions - + If you already have access to a PC with a powerful graphics card, you can manually calculate your `movable.sed` using it by following [these](https://jisagi.github.io/SeedminerGuide/seedminerSelf/#section2) instructions - + If the automated service is nonfunctional and you cannot do one or both of those manually, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you + + If the automated service is nonfunctional, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you 1. Enter your device's Friend Code (with no spaces or dashes) into the "Your friend code" field 1. Paste your device's 32 character long folder name into the "Your ID0" field 1. Complete the "I'm not a robot" captcha @@ -74,11 +72,11 @@ There are two different methods for building on the Seedminer exploit (described 1. When prompted, use the "Register Friend" button on your device to add the friend code of the bot 3DS console 1. Wait for the site to update + If it does not, wait a few minutes before refreshing the page once -1. Select "Continue" -1. Wait for the process to complete - + This can take a while (up to an hour in some cases) - + During this process, the bot may not show up on your 3ds. As long as the website updates, this is not an issue. - + If you are still waiting after an hour, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you +1. Once the site processes your information, you will be given the option to "Continue" or "Do another device". Click the green "Continue" button +1. Wait for the remainder of the process to complete + + This is usually fast (1-5 minutes) but in some cases, can take up to half an hour. + + During this process, the bot you added may not show up on your 3ds. As long as the website updates, this is not an issue. + + If you are still waiting after half an hour, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you 1. When the process has completed, download your `movable.sed` file from the site + Keep this file as you will need it in the upcoming pages @@ -102,7 +100,7 @@ ___ #### Seedminer + Steelhax + Frogtool -This method of using Seedminer for further exploitation uses your `movable.sed` file to gain access to the Homebrew Launcher using the Steelhax exploit for the purposes of injecting an exploitable DSiWare title into the DS Download Play application. This method requires you to already own (or download) the free "Steel Divers: Sub Wars" game from the eShop. +This method of using Seedminer for further exploitation uses your `movable.sed` file to gain access to the Homebrew Launcher using the Steelhax exploit for the purposes of injecting an exploitable DSiWare title into the DS Download Play application. This method requires you to already own (or download) the free "Steel Diver: Sub Wars" game from the eShop. This method is only compatible with the EUR, JPN, and USA regions, and is somewhat more complicated than the above method. It is only recommended to use this method if you have a EUR region device and do not wish to pay for a DSiWare game, or if the above method does not work for you for some reason. diff --git a/_pages/da_DK/uninstall-cfw.txt b/_pages/da_DK/uninstall-cfw.txt index 4745050aab..584998ac19 100644 --- a/_pages/da_DK/uninstall-cfw.txt +++ b/_pages/da_DK/uninstall-cfw.txt @@ -11,7 +11,7 @@ This will completely remove CFW from your device, including Boot9Strap and Luma3 This is almost never the solution to fix any issues you encounter with your CFW installation. A better idea would be to read the [troubleshooting](troubleshooting) page or ask (in English) for help at [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp). {: .notice--danger} -Any unsigned (illegitimate) games will be rendered unusable and can be manually removed using the Data Management section of the System Settings. Use a [save manager](https://github.com/FlagBrew/Checkpoint/releases/latest) to backup any saves for these unsigned (illegitimate) games you care about. +Any unsigned (illegitimate) games will be rendered unusable and should be manually removed before starting this process by using the Data Management section of the System Settings. Use a [save manager](https://github.com/FlagBrew/Checkpoint/releases/latest) to backup any saves for these unsigned (illegitimate) games you care about. This will not affect your NNID, any legitimately purchased games, or any saves for those legitimately purchased games. @@ -26,21 +26,43 @@ Note that if you have any payload files other than `GodMode9.firm` in the `/luma ### Instructions -#### Section I - Prep Work +#### Section I - Safety Test 1. Power off your device 1. Insert your SD card into your computer 1. Copy `GodMode9.firm` from the GodMode9 `.zip` to the `/luma/payloads/` folder on your SD card 1. Copy the `gm9` folder from the GodMode9 `.zip` to the root of your SD card 1. Reinsert your SD card into your device -1. Power on your device - -#### Section II - Running Uninstall Script - 1. Launch GodMode9 by holding (Start) during boot 1. If you are prompted to create an essential files backup, press (A) to do so, then press (A) to continue once it has completed 1. If you are prompted to fix the RTC date&time, press (A) to do so, then set the date and time, then press (A) to continue + Note that, if you had to fix the RTC date and time, you will have to fix the time in the System Settings as well after this guide +1. Navigate to `[1:] SYSNAND CTRNAND > title > 00040138 > (X)0000002 > content` + + On a "New" edition console, the (X) will instead be 2 + + On an "Old" edition console, the (X) will instead be 0 +1. Select the `.app` file +1. Select `NCCH Image Options` +1. Select `Mount image to drive` +1. In the window that appears, open the `exefs` folder +1. In this folder, select the `.firm` file +1. Select "Firm Options" +1. Select "Boot Firm" +1. When prompted, choose to decrypt and make a copy +1. You should boot into the regular 3DS Home Menu. If you do, power your device off and continue to the next section + + If you do NOT boot into the regular 3DS Home Menu, continuing with these instructions **WILL** brick your device. You should join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you + +#### Section II - Prep Work + +1. Power on your device +1. Navigate to System Settings > Data Management > Nintendo 3DS > Software +1. In this list of software, delete any non-Nintendo content you installed while using CFW + + This includes common system software such as FBI, Anemone3DS, Luma Updater, Homebrew Launcher, Checkpoint, and others, along with any non-eShop games + + Failure to remove CFW software before uninstalling CFW may break access to the Data Management menu after uninstalling CFW +1. Power off your device + +#### Section III - Running Uninstall Script + +1. Launch GodMode9 by holding (Start) during boot 1. Press (Home) to bring up the action menu 1. Select "Scripts..." 1. Select "GM9Megascript" diff --git a/_pages/de_DE/finalizing-setup.txt b/_pages/de_DE/finalizing-setup.txt index fea27fbb9d..78a7cb5ad8 100644 --- a/_pages/de_DE/finalizing-setup.txt +++ b/_pages/de_DE/finalizing-setup.txt @@ -18,6 +18,8 @@ Während dieses Prozesses richtest du auch folgende Programme ein: + **Luma3DS Updater** *(aktualisiert deine CFW Installation)* + **GodMode9** *(Multifunktionstool, welches NAND- und Cartridge-Funktionen ausführen kann)* + **Homebrew Launcher Loader** *(startet den Homebrew Launcher)* ++ **DSP1** *(allows homebrew applications to have sound)* ++ **ctr-no-timeoffset** *(removes the rtc offset so that the home menu and rtc timestamps match)* ### Was du brauchst @@ -143,7 +145,7 @@ Wenn du vor dieser Anleitung bereits einen EmuNAND hattest und dessen Inhalte in 1. Drücke (B), um zum Hauptmenü zurückzukehren 1. Drücke (R) und (B) gleichzeitig um die SD-Karte auszuwerfen 1. Stecke deine SD-Karte in deinen Computer -1. Copy `__sysnand_###.bin`, `essential.exefs`, and `boot9.bin` from the `/gm9/out/` folder on your SD card to a safe location on your computer +1. Copy `__sysnand_###.bin`, `__sysnand_###.bin.sha`, `essential.exefs`, and `boot9.bin` from the `/gm9/out/` folder on your SD card to a safe location on your computer + Erstelle Backup Dateien an mehreren Orten (USB-Stick, PC, Externe Festplatte, Online-Speicher, etc.) + Diese Backups werden im Falle eines Bricks benötigt, um Daten aus dem NAND-Image wieder herzustellen, wenn etwas schief gehen sollte 1. Lösche `__sysnand_###.bin` und `__sysnand_###.bin.sha`aus dem `/gm9/out/` Ordner der SD-Karte nachdem du diese kopiert hast diff --git a/_pages/de_DE/homebrew-launcher-(steelhax).txt b/_pages/de_DE/homebrew-launcher-(steelhax).txt index 8bba7a0d2c..973e4605d1 100644 --- a/_pages/de_DE/homebrew-launcher-(steelhax).txt +++ b/_pages/de_DE/homebrew-launcher-(steelhax).txt @@ -8,7 +8,7 @@ title: "Homebrew Launcher (Steelhax)" This method of using Seedminer for further exploitation uses your `movable.sed` file to gain access to the Homebrew Launcher using the Steelhax exploit for the purposes of injecting an exploitable DSiWare title into the DS Download Play application. This method requires you to already own (or download) the free "Steel Divers: Sub Wars" game from the eShop. -If your device already has access to the Homebrew Launcher (whether through Steelhax or another exploit), you can skip to [Installing Boot9strap (Frogminer)](installing-boot9strap-(frogminer)). +If your device already has access to the Homebrew Launcher (whether through Steelhax or another exploit), you can skip to [Installing Boot9strap (Frogtool)](installing-boot9strap-(frogtool)). {: .notice--success} If you already have Steel Diver: Sub Wars, this process will overwrite your game's save file! @@ -17,6 +17,7 @@ If you already have Steel Diver: Sub Wars, this process will overwrite your game ### Was du brauchst * The free eShop game "Steel Diver: Sub Wars" +* Your `movable.sed` file from completing [Seedminer](seedminer) * The latest release of [the Homebrew Launcher](https://github.com/fincs/new-hbmenu/releases/latest) * The latest release of [Steelhax](https://github.com/VegaRoXas/vegaroxas.github.io/raw/master/files/steelhax-installer.rar) * The [otherapp payload](https://smealum.github.io/3ds/#otherapp) *(for your region and version)* @@ -39,7 +40,7 @@ If you already have Steel Diver: Sub Wars, this process will overwrite your game 1. Exit "Steel Diver: Sub Wars" 1. Schalte deinen 3DS aus 1. Stecke deine SD-Karte in deinen Computer -1. Open [the Steelminer Injector website](http://steelminer.jisagi.net/injector) on your computer +1. Open [the Steelminer Injector website](https://bruteforcemovable.com/steelhax/) on your computer 1. Select your `movable.sed` file 1. Select "Start!" 1. Wait for the process to complete diff --git a/_pages/de_DE/installing-boot9strap-(fredtool).txt b/_pages/de_DE/installing-boot9strap-(fredtool).txt index e1767ce12e..38d7ae466a 100644 --- a/_pages/de_DE/installing-boot9strap-(fredtool).txt +++ b/_pages/de_DE/installing-boot9strap-(fredtool).txt @@ -10,8 +10,6 @@ This method of using Seedminer for further exploitation uses your `movable.sed` Dies ist eine zurzeit funktionierende Implementation des "FIRM Partitions Known-Plaintext"-Exploits. Details findest du [hier](https://www.3dbrew.org/wiki/3DS_System_Flaws). -To use the [magnet](https://wikipedia.org/wiki/Magnet_URI_scheme) links on this page, you will need a torrent client like [Deluge](http://dev.deluge-torrent.org/wiki/Download). - To extract the `.7z` and `.rar` files linked on this page, you will need a file archiver like [7-Zip](http://www.7-zip.org/) or [The Unarchiver](https://theunarchiver.com/). ### Was du brauchst @@ -83,7 +81,7 @@ If you would prefer a visual guide to this section, one is available [here](http 1. Scroll left until reel "1/3" is selected 1. Tap the fourth box with the letter "A" in it 1. If the exploit was successful, your device will have loaded b9sTool -1. Wähle "Install boot9strap" und bestätige es +1. Select "Install boot9strap" and confirm 1. Schließe b9stool, schalte dann dein Gerät aus + Unter Umständen musst du das Ausschalten der Konsole erzwingen indem du den Power-Knopf gedrückt hälst + If you see the Luma Configuration screen, continue with the guide without powering off diff --git a/_pages/de_DE/ntrboot.txt b/_pages/de_DE/ntrboot.txt index 2077202038..b734fed144 100644 --- a/_pages/de_DE/ntrboot.txt +++ b/_pages/de_DE/ntrboot.txt @@ -17,14 +17,14 @@ Karten mit 'Time Bomb' sind nicht länger in der Lage '.nds' Dateien zu starten, | Flashcart Name | Derzeitiger Preis | "Time Bomb"? | 3DS Versionen? | DSi Versionen? | Anmerkungen | |-|-:|:-:|:-:|:-:|-| -| [**R4i-SDHC B9S**](http://www.nds-card.net/ProShow.asp?ProID=574) | $15.99 | September 3, 2019 | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot**; can be flashed back to an NDS flashcart. | -| [**R4i Gold 3DS Plus**](http://www.nds-card.net/ProShow.asp?ProID=575) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot** ([internal switch to switch between ntrboot and NDS modes]({{ "/images/screenshots/r4i-gold-3ds-plus.png" | absolute_url }})); do not manually flash with ntrboot. | -| [**Acekard 2i**](http://www.nds-card.net/ProShow.asp?ProID=160) | $20.99 | No | <= 4.3.0 | <= 1.4.4 | | -| [**DSTT**](http://www.nds-card.net/ProShow.asp?ProID=157) | $9.99 | No | None | None | Only models with [certain flash chips](https://gist.github.com/yuukieve/6b48f1bb8dd15136403c15c39fafdb42) are compatible with ntrboot. | -| [**R4i Gold 3DS**](http://www.nds-card.net/ProShow.asp?ProID=149) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | All RTS revisions are compatible. | -| [**R4i-SDHC 3DS RTS**](http://www.nds-card.net/ProShow.asp?ProID=146) | $13.99 | 1.87: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | | -| [**R4iSDHC GOLD Pro 20XX**](http://www.nds-card.net/ProShow.asp?ProID=490) | $9.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. 2013er Modelle sind nicht kompatibel. | -| [**R4iSDHC RTS LITE 20XX**](http://www.nds-card.net/ProShow.asp?ProID=450) | $13.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. 2013er Modelle sind nicht kompatibel. | +| [**R4i-SDHC B9S**](http://www.nds-card.com/ProShow.asp?ProID=574) | $15.99 | September 3, 2019 | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot**; can be flashed back to an NDS flashcart. | +| [**R4i Gold 3DS Plus**](http://www.nds-card.com/ProShow.asp?ProID=575) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot** ([internal switch to switch between ntrboot and NDS modes]({{ "/images/screenshots/r4i-gold-3ds-plus.png" | absolute_url }})); do not manually flash with ntrboot. | +| [**Acekard 2i**](http://www.nds-card.com/ProShow.asp?ProID=160) | $20.99 | No | <= 4.3.0 | <= 1.4.4 | | +| [**DSTT**](http://www.nds-card.com/ProShow.asp?ProID=157) | $9.99 | No | None | None | Only models with [certain flash chips](https://gist.github.com/yuukieve/6b48f1bb8dd15136403c15c39fafdb42) are compatible with ntrboot. | +| [**R4i Gold 3DS**](http://www.nds-card.com/ProShow.asp?ProID=149) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | All RTS revisions are compatible. | +| [**R4i-SDHC 3DS RTS**](http://www.nds-card.com/ProShow.asp?ProID=146) | $13.99 | 1.87: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | | +| [**R4iSDHC GOLD Pro 20XX**](http://www.nds-card.com/ProShow.asp?ProID=490) | $9.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. 2013er Modelle sind nicht kompatibel. | +| [**R4iSDHC RTS LITE 20XX**](http://www.nds-card.com/ProShow.asp?ProID=450) | $13.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. 2013er Modelle sind nicht kompatibel. | | **Ace3DS X** | | No | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot** (external switch to switch between ntrboot ("3DS") and NDS modes); do not manually flash with ntrboot. | | **Ace3DS Plus** | | No | <= 11.9.0 | <= 1.4.5 | | | **Gateway Blue** | | Nein | 4.1.0 - 4.5.0 | <= 1.4.5 | | @@ -49,7 +49,7 @@ Um zu testen ob ein Magnet funktionieren wird, halte es auf oder in die Nähe de Beachte dass die Flashkarte nicht in der Lage ist, ihre Standardfunktionen auszuführen, solange der ntrboot exploit installiert ist (Ausnahme ist die Acekard 2i, welche weiterhin funktioniert *auf NDS und 3DS Custom Firmware Systemen*). Dass heißt, dass die meisten Flashcarts nicht einmal im Homemenü angezeigt werden. Am Ende der ntrboot flashen Anleitung findest du optional weitere Schritte, welche dir erklären, wie du ntrboot wieder von deiner Flashkarte entfernen und diese wieder wie gewohnt nutzen kannst. -In manchen seltenen Fällen ist es möglich, dass während des Flashens einer gefälschten Flashkarte diese **gebrickt** wird und somit permanent unbenutzbar wird. Dies ist unwahrscheinlich, aber dennoch nur originale und aufgeführte Flashkarten werden unterstützt. To reduce the chance of receiving a counterfeit card, it is recommended that you use a reputable site to buy your flashcart (such as [NDS Card](http://www.nds-card.net/)) +In manchen seltenen Fällen ist es möglich, dass während des Flashens einer gefälschten Flashkarte diese **gebrickt** wird und somit permanent unbenutzbar wird. Dies ist unwahrscheinlich, aber dennoch nur originale und aufgeführte Flashkarten werden unterstützt. To reduce the chance of receiving a counterfeit card, it is recommended that you use a reputable site to buy your flashcart (such as [NDS Card](http://www.nds-card.com/)) {: .notice--danger} ___ diff --git a/_pages/de_DE/seedminer.txt b/_pages/de_DE/seedminer.txt index eb1b0b36bd..221fca5612 100644 --- a/_pages/de_DE/seedminer.txt +++ b/_pages/de_DE/seedminer.txt @@ -63,9 +63,7 @@ There are two different methods for building on the Seedminer exploit (described 1. Open [Bruteforce Movable](https://bruteforcemovable.com/) on your computer + This site can automate the retrieval of `movable_part1.sed` (using a bot 3DS console) and the breaking of your device's DSiWare encryption (using a volunteer's computer to run Seedminer) - + If you already have access to a 3DS capable of launching the Homebrew Launcher, you can manually retrieve your `movable_part1.sed` using that device by following [these](https://jisagi.github.io/SeedminerGuide/seedminerSelf/#section1) instructions - + If you already have access to a PC with a powerful graphics card, you can manually calculate your `movable.sed` using it by following [these](https://jisagi.github.io/SeedminerGuide/seedminerSelf/#section2) instructions - + If the automated service is nonfunctional and you cannot do one or both of those manually, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you + + If the automated service is nonfunctional, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you 1. Enter your device's Friend Code (with no spaces or dashes) into the "Your friend code" field 1. Paste your device's 32 character long folder name into the "Your ID0" field 1. Complete the "I'm not a robot" captcha @@ -74,11 +72,11 @@ There are two different methods for building on the Seedminer exploit (described 1. When prompted, use the "Register Friend" button on your device to add the friend code of the bot 3DS console 1. Wait for the site to update + If it does not, wait a few minutes before refreshing the page once -1. Select "Continue" -1. Wait for the process to complete - + This can take a while (up to an hour in some cases) - + During this process, the bot may not show up on your 3ds. As long as the website updates, this is not an issue. - + If you are still waiting after an hour, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you +1. Once the site processes your information, you will be given the option to "Continue" or "Do another device". Click the green "Continue" button +1. Wait for the remainder of the process to complete + + This is usually fast (1-5 minutes) but in some cases, can take up to half an hour. + + During this process, the bot you added may not show up on your 3ds. As long as the website updates, this is not an issue. + + If you are still waiting after half an hour, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you 1. When the process has completed, download your `movable.sed` file from the site + Keep this file as you will need it in the upcoming pages @@ -102,7 +100,7 @@ ___ #### Seedminer + Steelhax + Frogtool -This method of using Seedminer for further exploitation uses your `movable.sed` file to gain access to the Homebrew Launcher using the Steelhax exploit for the purposes of injecting an exploitable DSiWare title into the DS Download Play application. This method requires you to already own (or download) the free "Steel Divers: Sub Wars" game from the eShop. +This method of using Seedminer for further exploitation uses your `movable.sed` file to gain access to the Homebrew Launcher using the Steelhax exploit for the purposes of injecting an exploitable DSiWare title into the DS Download Play application. This method requires you to already own (or download) the free "Steel Diver: Sub Wars" game from the eShop. This method is only compatible with the EUR, JPN, and USA regions, and is somewhat more complicated than the above method. It is only recommended to use this method if you have a EUR region device and do not wish to pay for a DSiWare game, or if the above method does not work for you for some reason. diff --git a/_pages/de_DE/uninstall-cfw.txt b/_pages/de_DE/uninstall-cfw.txt index a6d7ffab77..049e934227 100644 --- a/_pages/de_DE/uninstall-cfw.txt +++ b/_pages/de_DE/uninstall-cfw.txt @@ -11,7 +11,7 @@ Dies wird die CFW, einschließlich Boot9Strap und Luma3DS, vollständig von dein Die CFW zu deinstallieren ist fast nie die Lösung der Probleme, welche bei der CFW-Installation auftreten. A better idea would be to read the [troubleshooting](troubleshooting) page or ask (in English) for help at [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp). {: .notice--danger} -Alle unsignierten (nicht-legitimen) Spiele werden unbrauchbar und können manuell mit der Datenverwaltung in den Systemeinstellungen entfernt werden. Use a [save manager](https://github.com/FlagBrew/Checkpoint/releases/latest) to backup any saves for these unsigned (illegitimate) games you care about. +Any unsigned (illegitimate) games will be rendered unusable and should be manually removed before starting this process by using the Data Management section of the System Settings. Use a [save manager](https://github.com/FlagBrew/Checkpoint/releases/latest) to backup any saves for these unsigned (illegitimate) games you care about. Dies wird deine NNID, alle legitim gekauften Spielen und deren Speicherstände nicht beeinträchtigen. @@ -26,21 +26,43 @@ Beachte: Sollten noch weitere Dateien als nur die`GodMode9.firm` Datei im `/luma ### Anleitung -#### Schritt I - Vorbereitungen +#### Section I - Safety Test 1. Schalte deinen 3DS aus 1. Stecke deine SD-Karte in deinen Computer 1. Kopiere `Godmode9.firm`von der `Godmode9.zip`-Datei nach `/luma/payloads/` auf deiner SD Karte 1. Kopiere den Ordner `gm9` aus der GodMode9 `.zip` in das Stammverzeichnis deiner SD-Karte 1. Stecke deine SD-Karte nun wieder in deinen 3DS -1. Schalte deine Konsole an - -#### Schritt II - Ausführen des Deinstallations-Scripts - 1. Starte GodMode9, indem du während dem Starten deiner Konsole die Taste (Start) gedrückt hältst 1. Wenn du aufgefordert wirst, ein "essential files backup" durchzuführen, drücke (A). Drücke erneut (A) nachdem es abgeschlossen ist 1. Wenn du aufgefordert wirst Datum und Uhrzeit der "RTC" (Real Time Clock, Echtzeituhr) zu korrigieren, drücke (A), stelle Datum und Uhrzeit ein und drücke (A) um fortzufahren + Bitte beachte, falls du die RTC korrigieren musstest, dass du nach beenden der Anleitung auch Datum und Uhrzeit in den Systemeinstellungen korrigieren musst +1. Navigate to `[1:] SYSNAND CTRNAND > title > 00040138 > (X)0000002 > content` + + On a "New" edition console, the (X) will instead be 2 + + On an "Old" edition console, the (X) will instead be 0 +1. Select the `.app` file +1. Select `NCCH Image Options` +1. Select `Mount image to drive` +1. In the window that appears, open the `exefs` folder +1. In this folder, select the `.firm` file +1. Select "Firm Options" +1. Select "Boot Firm" +1. When prompted, choose to decrypt and make a copy +1. You should boot into the regular 3DS Home Menu. If you do, power your device off and continue to the next section + + If you do NOT boot into the regular 3DS Home Menu, continuing with these instructions **WILL** brick your device. You should join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you + +#### Section II - Prep Work + +1. Schalte deine Konsole an +1. Navigate to System Settings > Data Management > Nintendo 3DS > Software +1. In this list of software, delete any non-Nintendo content you installed while using CFW + + This includes common system software such as FBI, Anemone3DS, Luma Updater, Homebrew Launcher, Checkpoint, and others, along with any non-eShop games + + Failure to remove CFW software before uninstalling CFW may break access to the Data Management menu after uninstalling CFW +1. Schalte deinen 3DS aus + +#### Section III - Running Uninstall Script + +1. Starte GodMode9, indem du während dem Starten deiner Konsole die Taste (Start) gedrückt hältst 1. Drücke (HOME) um das Aktionsmenü aufzurufen 1. Wähle "Scripts" 1. Select "GM9Megascript" diff --git a/_pages/el_GR/finalizing-setup.txt b/_pages/el_GR/finalizing-setup.txt index 81fa61babb..749e8463da 100644 --- a/_pages/el_GR/finalizing-setup.txt +++ b/_pages/el_GR/finalizing-setup.txt @@ -18,6 +18,8 @@ The file `boot.firm` is what is launched by boot9strap itself after it finishes + **Luma3DS Updater** *(ενημερώνει εύκολα την εγκατάσταση του CFW)* + **GodMode9** *(multipurpose tool which can do NAND and cartridge functions)* + **Homebrew Launcher Loader** *(launches the Homebrew Launcher)* ++ **DSP1** *(allows homebrew applications to have sound)* ++ **ctr-no-timeoffset** *(removes the rtc offset so that the home menu and rtc timestamps match)* ### What You Need @@ -143,7 +145,7 @@ If, before following this guide, you already had an EmuNAND setup and would like 1. Press (B) to return to the main menu 1. Κρατήστε πατημένο το (R) και πατήστε ταυτόχρονα το (B) για να αφαιρέσετε την κάρτα SD 1. Εισάγετε την κάρτα SD στον υπολογιστή σας -1. Copy `__sysnand_###.bin`, `essential.exefs`, and `boot9.bin` from the `/gm9/out/` folder on your SD card to a safe location on your computer +1. Copy `__sysnand_###.bin`, `__sysnand_###.bin.sha`, `essential.exefs`, and `boot9.bin` from the `/gm9/out/` folder on your SD card to a safe location on your computer + Make backups in multiple locations (such as online file storage) + These backups will save you from a brick and/or help you recover files from the NAND image if anything goes wrong in the future 1. Delete `__sysnand_###.bin` and `__sysnand_###.bin.sha` from the `/gm9/out/` folder on your SD card after copying it diff --git a/_pages/el_GR/homebrew-launcher-(steelhax).txt b/_pages/el_GR/homebrew-launcher-(steelhax).txt index d2a15ce0a6..0ce3f1dd13 100644 --- a/_pages/el_GR/homebrew-launcher-(steelhax).txt +++ b/_pages/el_GR/homebrew-launcher-(steelhax).txt @@ -8,7 +8,7 @@ title: "Homebrew Launcher (Steelhax)" This method of using Seedminer for further exploitation uses your `movable.sed` file to gain access to the Homebrew Launcher using the Steelhax exploit for the purposes of injecting an exploitable DSiWare title into the DS Download Play application. This method requires you to already own (or download) the free "Steel Divers: Sub Wars" game from the eShop. -If your device already has access to the Homebrew Launcher (whether through Steelhax or another exploit), you can skip to [Installing Boot9strap (Frogminer)](installing-boot9strap-(frogminer)). +If your device already has access to the Homebrew Launcher (whether through Steelhax or another exploit), you can skip to [Installing Boot9strap (Frogtool)](installing-boot9strap-(frogtool)). {: .notice--success} If you already have Steel Diver: Sub Wars, this process will overwrite your game's save file! @@ -17,6 +17,7 @@ If you already have Steel Diver: Sub Wars, this process will overwrite your game ### What You Need * The free eShop game "Steel Diver: Sub Wars" +* Your `movable.sed` file from completing [Seedminer](seedminer) * The latest release of [the Homebrew Launcher](https://github.com/fincs/new-hbmenu/releases/latest) * The latest release of [Steelhax](https://github.com/VegaRoXas/vegaroxas.github.io/raw/master/files/steelhax-installer.rar) * The [otherapp payload](https://smealum.github.io/3ds/#otherapp) *(for your region and version)* @@ -39,7 +40,7 @@ If you already have Steel Diver: Sub Wars, this process will overwrite your game 1. Exit "Steel Diver: Sub Wars" 1. Power off your device 1. Εισάγετε την κάρτα SD στον υπολογιστή σας -1. Open [the Steelminer Injector website](http://steelminer.jisagi.net/injector) on your computer +1. Open [the Steelminer Injector website](https://bruteforcemovable.com/steelhax/) on your computer 1. Select your `movable.sed` file 1. Select "Start!" 1. Wait for the process to complete diff --git a/_pages/el_GR/installing-boot9strap-(fredtool).txt b/_pages/el_GR/installing-boot9strap-(fredtool).txt index 81c9c0d034..6b0011fc92 100644 --- a/_pages/el_GR/installing-boot9strap-(fredtool).txt +++ b/_pages/el_GR/installing-boot9strap-(fredtool).txt @@ -10,8 +10,6 @@ This method of using Seedminer for further exploitation uses your `movable.sed` This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). -To use the [magnet](https://wikipedia.org/wiki/Magnet_URI_scheme) links on this page, you will need a torrent client like [Deluge](http://dev.deluge-torrent.org/wiki/Download). - To extract the `.7z` and `.rar` files linked on this page, you will need a file archiver like [7-Zip](http://www.7-zip.org/) or [The Unarchiver](https://theunarchiver.com/). ### What You Need diff --git a/_pages/el_GR/ntrboot.txt b/_pages/el_GR/ntrboot.txt index a5c9bc16cd..35ffad7d57 100644 --- a/_pages/el_GR/ntrboot.txt +++ b/_pages/el_GR/ntrboot.txt @@ -17,14 +17,14 @@ Note that carts with a "Time Bomb" will no longer be able to launch `.nds` files | Flashcart Name | Current Price | "Time Bomb"? | 3DS Versions? | DSi Versions? | Other Notes | |-|-:|:-:|:-:|:-:|-| -| [**R4i-SDHC B9S**](http://www.nds-card.net/ProShow.asp?ProID=574) | $15.99 | September 3, 2019 | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot**; can be flashed back to an NDS flashcart. | -| [**R4i Gold 3DS Plus**](http://www.nds-card.net/ProShow.asp?ProID=575) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot** ([internal switch to switch between ntrboot and NDS modes]({{ "/images/screenshots/r4i-gold-3ds-plus.png" | absolute_url }})); do not manually flash with ntrboot. | -| [**Acekard 2i**](http://www.nds-card.net/ProShow.asp?ProID=160) | $20.99 | No | <= 4.3.0 | <= 1.4.4 | | -| [**DSTT**](http://www.nds-card.net/ProShow.asp?ProID=157) | $9.99 | No | None | None | Only models with [certain flash chips](https://gist.github.com/yuukieve/6b48f1bb8dd15136403c15c39fafdb42) are compatible with ntrboot. | -| [**R4i Gold 3DS**](http://www.nds-card.net/ProShow.asp?ProID=149) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | All RTS revisions are compatible. | -| [**R4i-SDHC 3DS RTS**](http://www.nds-card.net/ProShow.asp?ProID=146) | $13.99 | 1.87: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | | -| [**R4iSDHC GOLD Pro 20XX**](http://www.nds-card.net/ProShow.asp?ProID=490) | $9.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. 2013 models are incompatible. | -| [**R4iSDHC RTS LITE 20XX**](http://www.nds-card.net/ProShow.asp?ProID=450) | $13.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. 2013 models are incompatible. | +| [**R4i-SDHC B9S**](http://www.nds-card.com/ProShow.asp?ProID=574) | $15.99 | September 3, 2019 | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot**; can be flashed back to an NDS flashcart. | +| [**R4i Gold 3DS Plus**](http://www.nds-card.com/ProShow.asp?ProID=575) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot** ([internal switch to switch between ntrboot and NDS modes]({{ "/images/screenshots/r4i-gold-3ds-plus.png" | absolute_url }})); do not manually flash with ntrboot. | +| [**Acekard 2i**](http://www.nds-card.com/ProShow.asp?ProID=160) | $20.99 | No | <= 4.3.0 | <= 1.4.4 | | +| [**DSTT**](http://www.nds-card.com/ProShow.asp?ProID=157) | $9.99 | No | None | None | Only models with [certain flash chips](https://gist.github.com/yuukieve/6b48f1bb8dd15136403c15c39fafdb42) are compatible with ntrboot. | +| [**R4i Gold 3DS**](http://www.nds-card.com/ProShow.asp?ProID=149) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | All RTS revisions are compatible. | +| [**R4i-SDHC 3DS RTS**](http://www.nds-card.com/ProShow.asp?ProID=146) | $13.99 | 1.87: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | | +| [**R4iSDHC GOLD Pro 20XX**](http://www.nds-card.com/ProShow.asp?ProID=490) | $9.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. 2013 models are incompatible. | +| [**R4iSDHC RTS LITE 20XX**](http://www.nds-card.com/ProShow.asp?ProID=450) | $13.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. 2013 models are incompatible. | | **Ace3DS X** | | No | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot** (external switch to switch between ntrboot ("3DS") and NDS modes); do not manually flash with ntrboot. | | **Ace3DS Plus** | | No | <= 11.9.0 | <= 1.4.5 | | | **Gateway Blue** | | No | 4.1.0 - 4.5.0 | <= 1.4.5 | | @@ -49,7 +49,7 @@ To test if a magnet will work, hold it on or around the (A)(B)(X)(Y) buttons whi Note that the flashcart will not be able to be used for its standard functions while the ntrboot exploit is installed on it (except for in the case of the Acekard 2i, which remains functional *on NDS and custom firmware 3DS systems only*). This means that, for most flashcarts, it will not even display on the home menu. There are optional steps at the end of the ntrboot flashing instructions to remove it from your flashcart when you are done. -Note that in some rare circumstances, it may be possible for the flashing process to **brick** a counterfeit flashcart and render it permanently unusable. This is unlikely, but nevertheless only original listed flashcarts are supported. To reduce the chance of receiving a counterfeit card, it is recommended that you use a reputable site to buy your flashcart (such as [NDS Card](http://www.nds-card.net/)) +Note that in some rare circumstances, it may be possible for the flashing process to **brick** a counterfeit flashcart and render it permanently unusable. This is unlikely, but nevertheless only original listed flashcarts are supported. To reduce the chance of receiving a counterfeit card, it is recommended that you use a reputable site to buy your flashcart (such as [NDS Card](http://www.nds-card.com/)) {: .notice--danger} ___ diff --git a/_pages/el_GR/seedminer.txt b/_pages/el_GR/seedminer.txt index b97785e653..42c90b40b1 100644 --- a/_pages/el_GR/seedminer.txt +++ b/_pages/el_GR/seedminer.txt @@ -63,9 +63,7 @@ There are two different methods for building on the Seedminer exploit (described 1. Open [Bruteforce Movable](https://bruteforcemovable.com/) on your computer + This site can automate the retrieval of `movable_part1.sed` (using a bot 3DS console) and the breaking of your device's DSiWare encryption (using a volunteer's computer to run Seedminer) - + If you already have access to a 3DS capable of launching the Homebrew Launcher, you can manually retrieve your `movable_part1.sed` using that device by following [these](https://jisagi.github.io/SeedminerGuide/seedminerSelf/#section1) instructions - + If you already have access to a PC with a powerful graphics card, you can manually calculate your `movable.sed` using it by following [these](https://jisagi.github.io/SeedminerGuide/seedminerSelf/#section2) instructions - + If the automated service is nonfunctional and you cannot do one or both of those manually, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you + + If the automated service is nonfunctional, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you 1. Enter your device's Friend Code (with no spaces or dashes) into the "Your friend code" field 1. Paste your device's 32 character long folder name into the "Your ID0" field 1. Complete the "I'm not a robot" captcha @@ -74,11 +72,11 @@ There are two different methods for building on the Seedminer exploit (described 1. When prompted, use the "Register Friend" button on your device to add the friend code of the bot 3DS console 1. Wait for the site to update + If it does not, wait a few minutes before refreshing the page once -1. Select "Continue" -1. Wait for the process to complete - + This can take a while (up to an hour in some cases) - + During this process, the bot may not show up on your 3ds. As long as the website updates, this is not an issue. - + If you are still waiting after an hour, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you +1. Once the site processes your information, you will be given the option to "Continue" or "Do another device". Click the green "Continue" button +1. Wait for the remainder of the process to complete + + This is usually fast (1-5 minutes) but in some cases, can take up to half an hour. + + During this process, the bot you added may not show up on your 3ds. As long as the website updates, this is not an issue. + + If you are still waiting after half an hour, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you 1. When the process has completed, download your `movable.sed` file from the site + Keep this file as you will need it in the upcoming pages @@ -102,7 +100,7 @@ ___ #### Seedminer + Steelhax + Frogtool -This method of using Seedminer for further exploitation uses your `movable.sed` file to gain access to the Homebrew Launcher using the Steelhax exploit for the purposes of injecting an exploitable DSiWare title into the DS Download Play application. This method requires you to already own (or download) the free "Steel Divers: Sub Wars" game from the eShop. +This method of using Seedminer for further exploitation uses your `movable.sed` file to gain access to the Homebrew Launcher using the Steelhax exploit for the purposes of injecting an exploitable DSiWare title into the DS Download Play application. This method requires you to already own (or download) the free "Steel Diver: Sub Wars" game from the eShop. This method is only compatible with the EUR, JPN, and USA regions, and is somewhat more complicated than the above method. It is only recommended to use this method if you have a EUR region device and do not wish to pay for a DSiWare game, or if the above method does not work for you for some reason. diff --git a/_pages/el_GR/uninstall-cfw.txt b/_pages/el_GR/uninstall-cfw.txt index 102416c33c..2b2d1ae9f4 100644 --- a/_pages/el_GR/uninstall-cfw.txt +++ b/_pages/el_GR/uninstall-cfw.txt @@ -11,7 +11,7 @@ This will completely remove CFW from your device, including Boot9Strap and Luma3 This is almost never the solution to fix any issues you encounter with your CFW installation. A better idea would be to read the [troubleshooting](troubleshooting) page or ask (in English) for help at [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp). {: .notice--danger} -Any unsigned (illegitimate) games will be rendered unusable and can be manually removed using the Data Management section of the System Settings. Use a [save manager](https://github.com/FlagBrew/Checkpoint/releases/latest) to backup any saves for these unsigned (illegitimate) games you care about. +Any unsigned (illegitimate) games will be rendered unusable and should be manually removed before starting this process by using the Data Management section of the System Settings. Use a [save manager](https://github.com/FlagBrew/Checkpoint/releases/latest) to backup any saves for these unsigned (illegitimate) games you care about. This will not affect your NNID, any legitimately purchased games, or any saves for those legitimately purchased games. @@ -26,21 +26,43 @@ Note that if you have any payload files other than `GodMode9.firm` in the `/luma ### Instructions -#### Section I - Prep Work +#### Section I - Safety Test 1. Power off your device 1. Εισάγετε την κάρτα SD στον υπολογιστή σας 1. Copy `GodMode9.firm` from the GodMode9 `.zip` to the `/luma/payloads/` folder on your SD card 1. Copy the `gm9` folder from the GodMode9 `.zip` to the root of your SD card 1. Reinsert your SD card into your device -1. Power on your device - -#### Section II - Running Uninstall Script - 1. Launch GodMode9 by holding (Start) during boot 1. If you are prompted to create an essential files backup, press (A) to do so, then press (A) to continue once it has completed 1. If you are prompted to fix the RTC date&time, press (A) to do so, then set the date and time, then press (A) to continue + Note that, if you had to fix the RTC date and time, you will have to fix the time in the System Settings as well after this guide +1. Navigate to `[1:] SYSNAND CTRNAND > title > 00040138 > (X)0000002 > content` + + On a "New" edition console, the (X) will instead be 2 + + On an "Old" edition console, the (X) will instead be 0 +1. Select the `.app` file +1. Select `NCCH Image Options` +1. Select `Mount image to drive` +1. In the window that appears, open the `exefs` folder +1. In this folder, select the `.firm` file +1. Select "Firm Options" +1. Select "Boot Firm" +1. When prompted, choose to decrypt and make a copy +1. You should boot into the regular 3DS Home Menu. If you do, power your device off and continue to the next section + + If you do NOT boot into the regular 3DS Home Menu, continuing with these instructions **WILL** brick your device. You should join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you + +#### Section II - Prep Work + +1. Power on your device +1. Navigate to System Settings > Data Management > Nintendo 3DS > Software +1. In this list of software, delete any non-Nintendo content you installed while using CFW + + This includes common system software such as FBI, Anemone3DS, Luma Updater, Homebrew Launcher, Checkpoint, and others, along with any non-eShop games + + Failure to remove CFW software before uninstalling CFW may break access to the Data Management menu after uninstalling CFW +1. Power off your device + +#### Section III - Running Uninstall Script + +1. Launch GodMode9 by holding (Start) during boot 1. Press (Home) to bring up the action menu 1. Select "Scripts..." 1. Select "GM9Megascript" diff --git a/_pages/en_PT/finalizing-setup.txt b/_pages/en_PT/finalizing-setup.txt index 4d25f295c3..c090dc6874 100644 --- a/_pages/en_PT/finalizing-setup.txt +++ b/_pages/en_PT/finalizing-setup.txt @@ -18,6 +18,8 @@ Durin' 'tis process, we also setup programs such as th' followin': + **Luma3DS Updater** *(updates ye CFW installation easily)* + **GodMode9** *(multipurpose tool which can do NAND and cartridge functions)* + **Homebrew Launcher Loader** *(launches the Homebrew Launcher)* ++ **DSP1** *(allows homebrew applications to have sound)* ++ **ctr-no-timeoffset** *(removes the rtc offset so that the home menu and rtc timestamps match)* ### What You Need @@ -143,7 +145,7 @@ If, before following this guide, you already had an EmuNAND setup and would like 1. Press (B) to return to the main menu 1. Hold (R) and press (B) at the same time to eject your SD card 1. Insert ye SD card into ye computer -1. Copy `__sysnand_###.bin`, `essential.exefs`, and `boot9.bin` from the `/gm9/out/` folder on your SD card to a safe location on your computer +1. Copy `__sysnand_###.bin`, `__sysnand_###.bin.sha`, `essential.exefs`, and `boot9.bin` from the `/gm9/out/` folder on your SD card to a safe location on your computer + Make backups in multiple locations (such as online file storage) + These backups gunna be savin' ye from any brick, 'n they may help ye recover files, especially th' NAND image, if anythin' be off or wrong in th' future 1. Delete `__sysnand_###.bin` and `__sysnand_###.bin.sha` from the `/gm9/out/` folder on your SD card after copying it diff --git a/_pages/en_PT/homebrew-launcher-(steelhax).txt b/_pages/en_PT/homebrew-launcher-(steelhax).txt index 1e5cc06bdb..38fc4f5a99 100644 --- a/_pages/en_PT/homebrew-launcher-(steelhax).txt +++ b/_pages/en_PT/homebrew-launcher-(steelhax).txt @@ -8,7 +8,7 @@ title: "Homebrew Launcher (Steelhax)" This method of using Seedminer for further exploitation uses your `movable.sed` file to gain access to the Homebrew Launcher using the Steelhax exploit for the purposes of injecting an exploitable DSiWare title into the DS Download Play application. This method requires you to already own (or download) the free "Steel Divers: Sub Wars" game from the eShop. -If your device already has access to the Homebrew Launcher (whether through Steelhax or another exploit), you can skip to [Installing Boot9strap (Frogminer)](installing-boot9strap-(frogminer)). +If your device already has access to the Homebrew Launcher (whether through Steelhax or another exploit), you can skip to [Installing Boot9strap (Frogtool)](installing-boot9strap-(frogtool)). {: .notice--success} If you already have Steel Diver: Sub Wars, this process will overwrite your game's save file! @@ -17,6 +17,7 @@ If you already have Steel Diver: Sub Wars, this process will overwrite your game ### What You Need * The free eShop game "Steel Diver: Sub Wars" +* Your `movable.sed` file from completing [Seedminer](seedminer) * The latest release of [the Homebrew Launcher](https://github.com/fincs/new-hbmenu/releases/latest) * The latest release of [Steelhax](https://github.com/VegaRoXas/vegaroxas.github.io/raw/master/files/steelhax-installer.rar) * The [otherapp payload](https://smealum.github.io/3ds/#otherapp) *(for your region and version)* @@ -39,7 +40,7 @@ If you already have Steel Diver: Sub Wars, this process will overwrite your game 1. Exit "Steel Diver: Sub Wars" 1. Power off ye device 1. Insert ye SD card into ye computer -1. Open [the Steelminer Injector website](http://steelminer.jisagi.net/injector) on your computer +1. Open [the Steelminer Injector website](https://bruteforcemovable.com/steelhax/) on your computer 1. Select your `movable.sed` file 1. Select "Start!" 1. Wait for the process to complete diff --git a/_pages/en_PT/installing-boot9strap-(fredtool).txt b/_pages/en_PT/installing-boot9strap-(fredtool).txt index 4a8fc85689..4575905051 100644 --- a/_pages/en_PT/installing-boot9strap-(fredtool).txt +++ b/_pages/en_PT/installing-boot9strap-(fredtool).txt @@ -10,8 +10,6 @@ This method of using Seedminer for further exploitation uses your `movable.sed` This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). -To use the [magnet](https://wikipedia.org/wiki/Magnet_URI_scheme) links on this page, you will need a torrent client like [Deluge](http://dev.deluge-torrent.org/wiki/Download). - To extract the `.7z` and `.rar` files linked on this page, you will need a file archiver like [7-Zip](http://www.7-zip.org/) or [The Unarchiver](https://theunarchiver.com/). ### What You Need diff --git a/_pages/en_PT/ntrboot.txt b/_pages/en_PT/ntrboot.txt index 870935d868..227c4dda99 100644 --- a/_pages/en_PT/ntrboot.txt +++ b/_pages/en_PT/ntrboot.txt @@ -17,14 +17,14 @@ Note that carts with a "Time Bomb" will no longer be able to launch `.nds` files | Flashcart Name | Current Price | "Time Bomb"? | 3DS Versions? | DSi Versions? | Other Notes | |-|-:|:-:|:-:|:-:|-| -| [**R4i-SDHC B9S**](http://www.nds-card.net/ProShow.asp?ProID=574) | $15.99 | September 3, 2019 | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot**; can be flashed back to an NDS flashcart. | -| [**R4i Gold 3DS Plus**](http://www.nds-card.net/ProShow.asp?ProID=575) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot** ([internal switch to switch between ntrboot and NDS modes]({{ "/images/screenshots/r4i-gold-3ds-plus.png" | absolute_url }})); do not manually flash with ntrboot. | -| [**Acekard 2i**](http://www.nds-card.net/ProShow.asp?ProID=160) | $20.99 | No | <= 4.3.0 | <= 1.4.4 | | -| [**DSTT**](http://www.nds-card.net/ProShow.asp?ProID=157) | $9.99 | No | None | None | Only models with [certain flash chips](https://gist.github.com/yuukieve/6b48f1bb8dd15136403c15c39fafdb42) are compatible with ntrboot. | -| [**R4i Gold 3DS**](http://www.nds-card.net/ProShow.asp?ProID=149) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | All RTS revisions are compatible. | -| [**R4i-SDHC 3DS RTS**](http://www.nds-card.net/ProShow.asp?ProID=146) | $13.99 | 1.87: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | | -| [**R4iSDHC GOLD Pro 20XX**](http://www.nds-card.net/ProShow.asp?ProID=490) | $9.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. 2013 models are incompatible. | -| [**R4iSDHC RTS LITE 20XX**](http://www.nds-card.net/ProShow.asp?ProID=450) | $13.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. 2013 models are incompatible. | +| [**R4i-SDHC B9S**](http://www.nds-card.com/ProShow.asp?ProID=574) | $15.99 | September 3, 2019 | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot**; can be flashed back to an NDS flashcart. | +| [**R4i Gold 3DS Plus**](http://www.nds-card.com/ProShow.asp?ProID=575) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot** ([internal switch to switch between ntrboot and NDS modes]({{ "/images/screenshots/r4i-gold-3ds-plus.png" | absolute_url }})); do not manually flash with ntrboot. | +| [**Acekard 2i**](http://www.nds-card.com/ProShow.asp?ProID=160) | $20.99 | No | <= 4.3.0 | <= 1.4.4 | | +| [**DSTT**](http://www.nds-card.com/ProShow.asp?ProID=157) | $9.99 | No | None | None | Only models with [certain flash chips](https://gist.github.com/yuukieve/6b48f1bb8dd15136403c15c39fafdb42) are compatible with ntrboot. | +| [**R4i Gold 3DS**](http://www.nds-card.com/ProShow.asp?ProID=149) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | All RTS revisions are compatible. | +| [**R4i-SDHC 3DS RTS**](http://www.nds-card.com/ProShow.asp?ProID=146) | $13.99 | 1.87: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | | +| [**R4iSDHC GOLD Pro 20XX**](http://www.nds-card.com/ProShow.asp?ProID=490) | $9.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. 2013 models are incompatible. | +| [**R4iSDHC RTS LITE 20XX**](http://www.nds-card.com/ProShow.asp?ProID=450) | $13.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. 2013 models are incompatible. | | **Ace3DS X** | | No | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot** (external switch to switch between ntrboot ("3DS") and NDS modes); do not manually flash with ntrboot. | | **Ace3DS Plus** | | No | <= 11.9.0 | <= 1.4.5 | | | **Gateway Blue** | | No | 4.1.0 - 4.5.0 | <= 1.4.5 | | @@ -49,7 +49,7 @@ To test if a magnet gunna work, hold it on or around th' (A)(B)(X)(Y) buttons wh Note that the flashcart will not be able to be used for its standard functions while the ntrboot exploit is installed on it (except for in the case of the Acekard 2i, which remains functional *on NDS and custom firmware 3DS systems only*). This means that, for most flashcarts, it will not even display on the home menu. There be optional steps at th' end 'o th' ntrboot flashin' instructions to remove it from ye flashcart when ye be done. -Note that in some rare cases, it may be possible fer th' flashin' process to **brick** a counterfeit flashcart n' render it permanently unusable. 'Tis be unlikely, but nevertheless only original listed flashcarts be supported. To reduce the chance of receiving a counterfeit card, it is recommended that you use a reputable site to buy your flashcart (such as [NDS Card](http://www.nds-card.net/)) +Note that in some rare cases, it may be possible fer th' flashin' process to **brick** a counterfeit flashcart n' render it permanently unusable. 'Tis be unlikely, but nevertheless only original listed flashcarts be supported. To reduce the chance of receiving a counterfeit card, it is recommended that you use a reputable site to buy your flashcart (such as [NDS Card](http://www.nds-card.com/)) {: .notice--danger} ___ diff --git a/_pages/en_PT/seedminer.txt b/_pages/en_PT/seedminer.txt index 934f1b03c2..f649d02cfb 100644 --- a/_pages/en_PT/seedminer.txt +++ b/_pages/en_PT/seedminer.txt @@ -63,9 +63,7 @@ There are two different methods for building on the Seedminer exploit (described 1. Open [Bruteforce Movable](https://bruteforcemovable.com/) on your computer + This site can automate the retrieval of `movable_part1.sed` (using a bot 3DS console) and the breaking of your device's DSiWare encryption (using a volunteer's computer to run Seedminer) - + If you already have access to a 3DS capable of launching the Homebrew Launcher, you can manually retrieve your `movable_part1.sed` using that device by following [these](https://jisagi.github.io/SeedminerGuide/seedminerSelf/#section1) instructions - + If you already have access to a PC with a powerful graphics card, you can manually calculate your `movable.sed` using it by following [these](https://jisagi.github.io/SeedminerGuide/seedminerSelf/#section2) instructions - + If the automated service is nonfunctional and you cannot do one or both of those manually, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you + + If the automated service is nonfunctional, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you 1. Enter your device's Friend Code (with no spaces or dashes) into the "Your friend code" field 1. Paste your device's 32 character long folder name into the "Your ID0" field 1. Complete the "I'm not a robot" captcha @@ -74,11 +72,11 @@ There are two different methods for building on the Seedminer exploit (described 1. When prompted, use the "Register Friend" button on your device to add the friend code of the bot 3DS console 1. Wait for the site to update + If it does not, wait a few minutes before refreshing the page once -1. Select "Continue" -1. Wait for the process to complete - + This can take a while (up to an hour in some cases) - + During this process, the bot may not show up on your 3ds. As long as the website updates, this is not an issue. - + If you are still waiting after an hour, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you +1. Once the site processes your information, you will be given the option to "Continue" or "Do another device". Click the green "Continue" button +1. Wait for the remainder of the process to complete + + This is usually fast (1-5 minutes) but in some cases, can take up to half an hour. + + During this process, the bot you added may not show up on your 3ds. As long as the website updates, this is not an issue. + + If you are still waiting after half an hour, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you 1. When the process has completed, download your `movable.sed` file from the site + Keep this file as you will need it in the upcoming pages @@ -102,7 +100,7 @@ ___ #### Seedminer + Steelhax + Frogtool -This method of using Seedminer for further exploitation uses your `movable.sed` file to gain access to the Homebrew Launcher using the Steelhax exploit for the purposes of injecting an exploitable DSiWare title into the DS Download Play application. This method requires you to already own (or download) the free "Steel Divers: Sub Wars" game from the eShop. +This method of using Seedminer for further exploitation uses your `movable.sed` file to gain access to the Homebrew Launcher using the Steelhax exploit for the purposes of injecting an exploitable DSiWare title into the DS Download Play application. This method requires you to already own (or download) the free "Steel Diver: Sub Wars" game from the eShop. This method is only compatible with the EUR, JPN, and USA regions, and is somewhat more complicated than the above method. It is only recommended to use this method if you have a EUR region device and do not wish to pay for a DSiWare game, or if the above method does not work for you for some reason. diff --git a/_pages/en_PT/uninstall-cfw.txt b/_pages/en_PT/uninstall-cfw.txt index e9bc0986c9..772a4051f8 100644 --- a/_pages/en_PT/uninstall-cfw.txt +++ b/_pages/en_PT/uninstall-cfw.txt @@ -11,7 +11,7 @@ This will completely remove CFW from your device, including Boot9Strap and Luma3 This is almost never the solution to fix any issues you encounter with your CFW installation. A better idea would be to read the [troubleshooting](troubleshooting) page or ask (in English) for help at [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp). {: .notice--danger} -Any unsigned (illegitimate) games will be rendered unusable and can be manually removed using the Data Management section of the System Settings. Use a [save manager](https://github.com/FlagBrew/Checkpoint/releases/latest) to backup any saves for these unsigned (illegitimate) games you care about. +Any unsigned (illegitimate) games will be rendered unusable and should be manually removed before starting this process by using the Data Management section of the System Settings. Use a [save manager](https://github.com/FlagBrew/Checkpoint/releases/latest) to backup any saves for these unsigned (illegitimate) games you care about. This will not affect your NNID, any legitimately purchased games, or any saves for those legitimately purchased games. @@ -26,21 +26,43 @@ Note that if ye have any payload files other than `GodMode9.firm` in th' `/luma/ ### Instructions -#### Section I - Prep Work +#### Section I - Safety Test 1. Power off ye device 1. Insert ye SD card into ye computer 1. Copy `GodMode9.firm` from th' GodMode9 `.zip` to th' `/luma/payloads/` folder on ye SD card 1. Copy th' `gm9` folder from th' GodMode9 `.zip` to th' root 'o ye SD card 1. Reinsert ye SD card into ye device -1. Power on your device - -#### Section II - Running Uninstall Script - 1. Launch GodMode9 by holdin' (Start) durin' boot 1. If ye be prompted to create an essential files backup, press (A) to do so, then press (A) to continue once it has completed 1. If ye be prompted to fix th' RTC date&time, press (A) to do so, then set th' date 'n time, then press (A) to continue + Note that, if you had to fix the RTC date and time, you will have to fix the time in the System Settings as well after this guide +1. Navigate to `[1:] SYSNAND CTRNAND > title > 00040138 > (X)0000002 > content` + + On a "New" edition console, the (X) will instead be 2 + + On an "Old" edition console, the (X) will instead be 0 +1. Select the `.app` file +1. Select `NCCH Image Options` +1. Select `Mount image to drive` +1. In the window that appears, open the `exefs` folder +1. In this folder, select the `.firm` file +1. Select "Firm Options" +1. Select "Boot Firm" +1. When prompted, choose to decrypt and make a copy +1. You should boot into the regular 3DS Home Menu. If you do, power your device off and continue to the next section + + If you do NOT boot into the regular 3DS Home Menu, continuing with these instructions **WILL** brick your device. You should join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you + +#### Section II - Prep Work + +1. Power on your device +1. Navigate to System Settings > Data Management > Nintendo 3DS > Software +1. In this list of software, delete any non-Nintendo content you installed while using CFW + + This includes common system software such as FBI, Anemone3DS, Luma Updater, Homebrew Launcher, Checkpoint, and others, along with any non-eShop games + + Failure to remove CFW software before uninstalling CFW may break access to the Data Management menu after uninstalling CFW +1. Power off ye device + +#### Section III - Running Uninstall Script + +1. Launch GodMode9 by holdin' (Start) durin' boot 1. Press (Home) to bring up th' action menu 1. Select "Scripts..." 1. Select "GM9Megascript" diff --git a/_pages/es_ES/finalizing-setup.txt b/_pages/es_ES/finalizing-setup.txt index 68bfaf8bed..41c97a7dd6 100644 --- a/_pages/es_ES/finalizing-setup.txt +++ b/_pages/es_ES/finalizing-setup.txt @@ -18,6 +18,8 @@ Durante este proceso, también instalaremos programas como los siguientes: + **Luma3DS Updater** *(actualiza tu instalación de CFW fácilmente)* + **GodMode9** *(herramienta multipropósito que puede realizar funciones sobre la NAND y cartridges)* + **Homebrew Launcher Loader** *(inicia el Homebrew Launcher)* +**DSP1** *(permite que las aplicaciones homebrew tengan sonido)* ++ **ctr-no-timeoffset** *(elimina la diferencia de rtc para que la hora en el Menú HOME y el rtc coincidan)* ### Qué necesitas @@ -88,7 +90,7 @@ Si, antes de seguir esta guía, ya tenías una configuración EmuNAND y deseas m 1. Presiona (A) para definir el offset en 0 + Esto ajustará el reloj del sistema para que coincida con la fecha y hora RTC (la cual se definiremos pronto) 1. Presiona (Start) para volver al Homebrew Launcher - + If you previously followed [Installing boot9strap (Frogtool)](installing-boot9strap-(frogtool)), you should now use the "RESTORE clean DS Download Play" option in Frogtool to restore the DS Download Play application to its original state + + Si anteriormente seguiste [Instalar boot9strap (Frogtool)](installing-boot9strap-(frogtool)), ahora deberías usar la opción "RESTORE clean DS Download Play" en Frogtool para restaurar la aplicación Modo Descarga de DS a su estado original 1. Inicia FBI desde la lista de homebrew #### Sección IV - Instalar CIAs @@ -143,7 +145,7 @@ Si, antes de seguir esta guía, ya tenías una configuración EmuNAND y deseas m 1. Presiona (B) para volver al menú principal 1. Mantén (R) y presiona (B) al mismo tiempo para extraer la SD 1. Inserta tu tarjeta SD en tu computadora -1. Copia `__sysnand###.bin`, `essential.exefs` y `boot9.bin` desde la carpeta `/gm9/out/` en tu tarjeta SD a una ubicación segura en tu computadora +1. Copia `__sysnand_###.bin`, `__sysnand_###.bin.sha`, `essential.exefs` y `boot9.bin` desde la carpeta `/gm9/out/` en tu tarjeta SD a un lugar seguro en tu computadora + Haz copias de seguridad en múltiples sitios (como por ejemplo, en un pendrive o almacenamiento online) + Estos respaldos podrán prevenir que se inutilice la consola y/o ayudarte a recuperar archivos de la memoria de tu consola si algo sale mal en el futuro 1. Elimina `__sysnand_###.bin` y `__sysnand_###.bin.sha` de la carpeta `/gm9/out/` de tu tarjeta SD después de copiarla diff --git a/_pages/es_ES/homebrew-launcher-(alternatives).txt b/_pages/es_ES/homebrew-launcher-(alternatives).txt index 5a0e2555ae..35c002f338 100644 --- a/_pages/es_ES/homebrew-launcher-(alternatives).txt +++ b/_pages/es_ES/homebrew-launcher-(alternatives).txt @@ -80,5 +80,5 @@ Para extraer los archivos `.7z` enlazados esta página, necesitarás un gestor d ![]({{ "/images/screenshots/homebrew-launcher.png" | absolute_url }}) {: .notice--info} -### Continue to [Installing boot9strap (SafeB9SInstaller)](installing-boot9strap-(safeb9sinstaller)) +### Continúa a [Instalar boot9strap (SafeB9SInstaller)](installing-boot9strap-(safeb9sinstaller)) {: .notice--primary} diff --git a/_pages/es_ES/homebrew-launcher-(soundhax).txt b/_pages/es_ES/homebrew-launcher-(soundhax).txt index 2037786aa6..a0a707b71c 100644 --- a/_pages/es_ES/homebrew-launcher-(soundhax).txt +++ b/_pages/es_ES/homebrew-launcher-(soundhax).txt @@ -77,5 +77,5 @@ Ten en cuenta que las actualizaciones con cartucho sólo actualizarán los eleme ___ -### Continue to [Installing boot9strap (SafeB9SInstaller)](installing-boot9strap-(safeb9sinstaller)) +### Continúa en [Instalar boot9strap (SafeB9SInstaller)](installing-boot9strap-(safeb9sinstaller)) {: .notice--primary} diff --git a/_pages/es_ES/homebrew-launcher-(steelhax).txt b/_pages/es_ES/homebrew-launcher-(steelhax).txt index 87eee55ba7..79947288fe 100644 --- a/_pages/es_ES/homebrew-launcher-(steelhax).txt +++ b/_pages/es_ES/homebrew-launcher-(steelhax).txt @@ -6,17 +6,18 @@ title: "Homebrew Launcher (Steelhax)" ### Lectura requerida -This method of using Seedminer for further exploitation uses your `movable.sed` file to gain access to the Homebrew Launcher using the Steelhax exploit for the purposes of injecting an exploitable DSiWare title into the DS Download Play application. This method requires you to already own (or download) the free "Steel Divers: Sub Wars" game from the eShop. +Este método de uso de Seedminer, para hacer un mejor exploit, utiliza tu archivo `movable.sed` para obtener acceso al Homebrew Launcher por medio del exploit Steelhax, tras lo cual inyectar un juego vulnerable de DSiWare en la aplicación de Modo Descarga de DS. Este método requiere que poseas (o descargues si no lo tienes) el juego gratuito "Steel Divers: Sub Wars" desde la eShop. -If your device already has access to the Homebrew Launcher (whether through Steelhax or another exploit), you can skip to [Installing Boot9strap (Frogminer)](installing-boot9strap-(frogminer)). +Si tu dispositivo ya posee acceso al Homebrew Launcher (ya sea a través de Steelhax o de otro exploit), puedes saltar a [Instalar Boot9strap (Frogtool)](installing-boot9strap-(frogtool)). {: .notice--success} -If you already have Steel Diver: Sub Wars, this process will overwrite your game's save file! +Si ya tenías Steel Diver: Sub Wars, ¡este proceso sobreescribirá tu archivo de guardado! {: .notice--warning} ### Qué necesitas -* The free eShop game "Steel Diver: Sub Wars" +* El juego gratuito "Steel Diver: Sub Wars" de la eShop +* Tu archivo `movable.sed` proveniente de haber completado [Seedminer](seedminer) * La última versión [del Homebrew Launcher](https://github.com/fincs/new-hbmenu/releases/latest) * La última versión de [Steelhax](https://github.com/VegaRoXas/vegaroxas.github.io/raw/master/files/steelhax-installer.rar) * El [otherapp payload](https://smealum.github.io/3ds/#otherapp) *(correspondiente a tu versión del sistema y región)* @@ -30,16 +31,16 @@ If you already have Steel Diver: Sub Wars, this process will overwrite your game 1. Copia la carpeta `steelhax` contenida en el `.rar` de Steelhax a la raíz de tu tarjeta SD 1. Copia el otherapp payload a la carpeta `steelhax` en tu tarjeta SD y cambia su nombre a `payload.bin` -#### Section II - Steelminer +#### Sección II - Steelminer -1. Insert your SD card into your device +1. Inserta tu tarjeta SD en tu consola 1. Inicia "Steel Diver: Sub Wars" y selecciona un Mii para crear un archivo de guardado + Rechaza la actualización del juego cuando lo pregunte + Si ya has actualizado el juego, usa el menú de Gestión de datos en la Configuración de la consola para eliminar la actualización 1. Sal de "Steel Diver: Sub Wars" 1. Apaga tu consola 1. Inserta tu tarjeta SD en tu computadora -1. Abre [el sitio web de inyección de Steelminer](http://steelminer.jisagi.net/injector) en tu computadora +1. Abre [el sitio web de inyección de Steelminer](https://bruteforcemovable.com/steelhax/) en tu computadora 1. Selecciona tu archivo `movable.sed` 1. Selecciona "Start!" 1. Espera a que el procesos se complete @@ -53,10 +54,10 @@ If you already have Steel Diver: Sub Wars, this process will overwrite your game 1. Enciende tu consola 1. Inicia "Steel Diver: Sub Wars" 1. Si el exploit fue exitoso, tu consola habrá cargado el Hombrew Launcher - + You may see an error stating there are no applications found. -1. Power off your device. + + Es posible que aparezca un error diciendo que no se han encontrado aplicaciones. +1. Apaga tu consola. ___ -### Continue to [Installing Boot9strap (Frogtool)](installing-boot9strap-(frogtool)) +### Continúa a [Instalar Boot9strap (Frogtool)](installing-boot9strap-(frogtool)) {: .notice--primary} diff --git a/_pages/es_ES/installing-boot9strap-(fredtool).txt b/_pages/es_ES/installing-boot9strap-(fredtool).txt index aa0a60ef6e..7aca445451 100644 --- a/_pages/es_ES/installing-boot9strap-(fredtool).txt +++ b/_pages/es_ES/installing-boot9strap-(fredtool).txt @@ -1,26 +1,24 @@ --- -title: "Installing Boot9strap (Fredtool)" +title: "Instalar Boot9strap (Fredtool)" --- {% include toc title="Tabla de contenidos" %} ### Lectura requerida -This method of using Seedminer for further exploitation uses your `movable.sed` file to decrypt any DSiWare eShop title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. This requires you to already own (or download / buy) a DSiWare game from the eShop. +Este método de uso de Seedminer, para hacer un mejor exploit, utiliza tu archivo `movable.sed` para desencriptar cualquier título de DSiWare de la eShop que haya disponible con el objetivo de inyectar un título de DSiWare vulnerable en la aplicación de Configuración de Internet de DS. Esto requiere que ya poseas (o descargues/compres) un juego de DSiWare de la eShop. Todo esto son implementaciones funcionales del exploit "Particiones FIRM de texto plano conocido" detallado [aquí](https://www.3dbrew.org/wiki/3DS_System_Flaws) (*en inglés*). -Para utilizar los enlaces [magnet](https://wikipedia.org/wiki/Magnet_URI_scheme) de esta página, vas a necesitar un cliente torrent como [Deluge](http://dev.deluge-torrent.org/wiki/Download). - Para extraer los archivos `.7z` y `.rar` enlazados esta página, necesitarás un gestor de archivos como [7-Zip](http://www.7-zip.org/) o [The Unarchiver](https://theunarchiver.com/). ### Qué necesitas -* Any eShop DSiWare game - + JPN region users can download the free title "ほぼ日の健康手帳™" ([![]({{ "/images/qrcodes/50010000005133.png" | absolute_url }}){: height="24px" width="24px"})]({{ "/images/qrcodes/50010000005133.png" | absolute_url }}) - + USA region users can download the free title "Nintendo Fan Network" ([![]({{ "/images/qrcodes/50010000013696.png" | absolute_url }}){: height="24px" width="24px"})]({{ "/images/qrcodes/50010000013696.png" | absolute_url }}) -* Your `movable.sed` file from completing [Seedminer](seedminer) -* The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) +* Cualquier juego de DSiWare de la eShop + + Los usuarios de región JPN pueden descargar gratis el título "ほぼ日の健康手帳™" ([![]({{ "/images/qrcodes/50010000005133.png" | absolute_url }}){: height="24px" width="24px"})]({{ "/images/qrcodes/50010000005133.png" | absolute_url }}) + + Los usuarios de región USA pueden descargar gratis el título "Nintendo Fan Network" ([![]({{ "/images/qrcodes/50010000013696.png" | absolute_url }}){: height="24px" width="24px"})]({{ "/images/qrcodes/50010000013696.png" | absolute_url }}) +* Tu archivo `movable.sed` proveniente de haber completado [Seedminer](seedminer) +* La última versión de [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) * La ultima versión de [b9sTool](https://github.com/zoogie/b9sTool/releases/latest) * La última versión de [Luma3DS](https://github.com/AuroraWright/Luma3DS/releases/latest) *(el archivo`.7z`)* * La última versión [del Homebrew Launcher](https://github.com/fincs/new-hbmenu/releases/latest) @@ -29,55 +27,55 @@ Para extraer los archivos `.7z` y `.rar` enlazados esta página, necesitarás un 1. Entra a Configuración de la consola 1. Ve a `Data Management` -> `DSiWare` -1. Under the "System Memory" section, select your DSiWare game +1. Ve a la sección "Memoria de la Consola" y selecciona tu juego de DSiWare 1. Selecciona "Copiar", luego "OK" + Si se te pide, sobreescribe la copia en caso de existir 1. Apaga tu consola 1. Inserta tu tarjeta SD en tu computadora -1. Copy your `movable.sed` file to the root of your SD card +1. Copia tu archivo `movable.sed` a la raíz de tu tarjeta SD 1. Copia el archivo `boot.firm` desde el `.7z` de Luma3DS a la raíz de tu tarjeta SD 1. Copia `boot.nds` (B9STool) a la raíz de tu tarjeta SD 1. Copia `boot.3dsx` a la raíz de tu tarjeta SD -1. Copy the `private` folder from the Frogminer_save `.zip` to the root of your SD card -1. Navigate to `Nintendo 3DS` -> `` -> `<32-character-id>` -> `Nintendo DSiWare` on your SD card - + This `` will be the same one that you used in [Seedminer](seedminer) +1. Copia la carpeta `private` contenida en el `.zip` de Frogminer_save a la raíz de tu tarjeta SD +1. Ve a `Nintendo 3DS` -> `` -> `` -> `Nintendo DSiWare` en tu tarjeta SD + + La `` en cuestión es la misma que usaste en [Seedminer](seedminer) 1. Copia `.bin` a una carpeta en tu computadora - + If there are multiple `<8-character-id>.bin` files, just pick one. It doesn't matter which you use. + + Si hay varios archivos llamados `.bin`, elige uno cualquiera. No importa cuál uses. -#### Section II - Fredtool +#### Sección II - Fredtool -1. Open [Fredtool](https://fredtool.bruteforcemovable.com/) on your computer -1. Select your `movable.sed` file for the "Your movable.sed" field -1. Select your `<8-character-id>.bin` file for the "Your dsiware.bin" field +1. Abre [Fredtool](https://fredtool.bruteforcemovable.com/) en tu computadora +1. Selecciona tu archivo `movable.sed` para completar el campo "Your movable.sed" +1. Selecciona tu archivo `.bin` para completar el campo "Your dsiware.bin" 1. Completa el captcha que dice "I'm not a robot" -1. Select "Start" +1. Selecciona "Start" 1. Espera a que el procesos se complete -1. When the process has completed, download your modified DSiWare archive from the site -1. Copy the `42383841.bin` file from the `output/hax/` folder of the downloaded DSiWare archive to the `Nintendo 3DS//<32-character-id>/Nintendo DSiWare/` folder on your SD card - + This should be different than your initial `<8-character-id>.bin` file - + Do not remove any existing `<8-character-id>.bin` files +1. Cuando el proceso haya finalizado, descarga tu archivo modificado de DSiWare desde el sitio +1. Copia el archivo `42383841.bin` presente en la carpeta `output/hax/` del archivo DSiWare que descargaste, a la carpeta `Nintendo 3DS//<32-character-id>/Nintendo DSiWare/` en tu tarjeta SD + + El mismo debería ser distinto al archivo `.bin` inicial + + No remuevas ninguno de los archivos `.bin` 1. Vuelve a insertar tu tarjeta SD en tu consola 1. Enciende tu consola 1. Entra a Configuración de la consola 1. Ve a `Data Management` -> `DSiWare` -1. Under the "SD Card" section, select the "Haxxxxxxxxx!" title +1. En la sección "Tarjeta SD", elige el título "Haxxxxxxxxx!" 1. Selecciona "Copiar", luego "OK" -1. Return to main menu of the System Settings -1. Navigate to `Internet Settings` -> `Nintendo DS Connections`, then select "OK" +1. Regresa al menú principal de Configuración de la Consola +1. Ve a `Configuraciones de Internet` -> `Conexiones de Nintendo DS`, luego elige "OK" 1. Si el exploit fue exitoso, tu consola habrá cargado la versión japonesa de Flipnote Studio -#### Section III - Flipnote Exploit +#### Sección III - Exploit de Flipnote -If you would prefer a visual guide to this section, one is available [here](https://zoogie.github.io/web/flipnote_directions/). +Si prefieres una guía visual para esta parte, hay una disponible [aquí](https://zoogie.github.io/web/flipnote_directions/). {: .notice--info} 1. Completa la configuración del juego hasta que llegues al menú principal + Selecciona la opción de la izquierda cuando te lo pida durante la configuración inicial 1. Utilizando la pantalla táctil, selecciona el cuadrado grande de la izquierda, luego selecciona el cuadrado con el ícono de una tarjeta SD 1. Una vez que cargue el menú, selecciona el ícono con una cara, luego el ícono abajo a la derecha de la pantalla para continuar -1. Select the frog icon at the bottom left - + Alternatively, press (X) or (UP) on the D-Pad depending on which is shown on the top screen -1. Select the second button along the top with a film-reel icon +1. Elige el ícono de la rana abajo del todo a la izquierda + + Alternativamente, puedes presionar (X) o (Arriba) en el D-Pad dependiendo de cuál que se muestre en la pantalla superior +1. Elige el segundo botón de los que están en la parte de arriba, con un ícono de rollo de película 1. Ve hacia la derecha hasta seleccionar el carrete "3/3" 1. Toca el tercer cuadrado con una letra "A" en él 1. Ve hacia la izquierda hasta el carrete "1/3" @@ -86,7 +84,7 @@ If you would prefer a visual guide to this section, one is available [here](http 1. Selecciona "Install boot9strap" y confirma 1. Sal de b9sTool, luego apaga tu consola + Puede que tengas que forzar el apagado manteniendo pulsado el botón de encendido - + If you see the Luma Configuration screen, continue with the guide without powering off + + Si ves la pantalla de configuración de Luma, continúa con la guía sin apagar la consola #### Sección IV - Configurar Luma3DS @@ -97,17 +95,17 @@ If you would prefer a visual guide to this section, one is available [here](http 1. Presiona (Start) para guardar y reiniciar + Si la pantalla se queda en negro, [sigue la guía de problemas](troubleshooting#black-screen-on-sysnand-boot-after-installing-boot9strap) -#### Section V - Restoring DS Connection Settings +#### Sección V - Restaurar el menú de Configuración de Internet de DS 1. Apaga tu consola 1. Inserta tu tarjeta SD en tu computadora -1. Copy the `42383841.bin` file from the `output/clean/` folder of the downloaded DSiWare archive to the `Nintendo 3DS//<32-character-id>/Nintendo DSiWare/` folder on your SD card - + Replace the existing `42383841.bin` file +1. Copia el archivo `42383841.bin` presente en la carpeta `output/clean/` del archivo de DSiWare que descargaste a la carpeta `Nintendo 3DS//<32-character-id>/Nintendo DSiWare/` en tu tarjeta SD + + Reemplaza el archivo `42383841.bin` ya existente 1. Vuelve a insertar tu tarjeta SD en tu consola 1. Enciende tu consola 1. Entra a Configuración de la consola 1. Ve a `Data Management` -> `DSiWare` -1. Under the "SD Card" section, select the "Nintendo DSi™" title +1. En la sección "Tarjeta SD", elige el título "Nintendo DSi™" 1. Selecciona "Copiar", luego "OK" ___ diff --git a/_pages/es_ES/installing-boot9strap-(frogtool).txt b/_pages/es_ES/installing-boot9strap-(frogtool).txt index dbadf6224f..e9b7764e96 100644 --- a/_pages/es_ES/installing-boot9strap-(frogtool).txt +++ b/_pages/es_ES/installing-boot9strap-(frogtool).txt @@ -1,12 +1,12 @@ --- -title: "Installing Boot9strap (Frogtool)" +title: "Instalar boot9strap (Frogtool)" --- {% include toc title="Tabla de contenidos" %} ### Lectura requerida -We will now use our Homebrew Launcher access to run the Frogtool utility in order to inject the exploitable Japanese version of the "Flipnote Studio" title, which we then use to run b9sTool and install boot9strap. +Ahora aprovecharemos el acceso al Homebrew Launcher para ejecutar la aplicación Frogtool e inyectar la versión japonesa del título "Flipnote Studio", la cual usaremos posteriormente para ejecutar b9sTool e instalar boot9strap. Todo esto son implementaciones funcionales del exploit "Particiones FIRM de texto plano conocido" detallado [aquí](https://www.3dbrew.org/wiki/3DS_System_Flaws) (*en inglés*). @@ -16,7 +16,7 @@ Para extraer los archivos `.7z` y `.rar` enlazados esta página, necesitarás un ### Qué necesitas -* Your `movable.sed` file from completing [Seedminer](seedminer) +* Tu archivo `movable.sed` proveniente de haber completado [Seedminer](seedminer) * - [frogcert.bin](magnet:?xt=urn:btih:d12278ea50bb3574f1fbd327f3d0e2292c70941f&dn=frogcert.bin&tr=https%3a%2f%2ftracker.fastdownload.xyz%3a443%2fannounce&tr=https%3a%2f%2fopentracker.xyz%3a443%2fannounce&tr=http%3a%2f%2fopen.trackerlist.xyz%3a80%2fannounce&tr=http%3a%2f%2ft.nyaatracker.com%3a80%2fannounce&tr=udp%3a%2f%2ftracker.tiny-vps.com%3a6969%2fannounce&tr=udp%3a%2f%2fopen.demonii.si%3a1337%2fannounce&tr=udp%3a%2f%2ftracker.port443.xyz%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.vanitycore.co%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.torrent.eu.org%3a451%2fannounce&tr=udp%3a%2f%2fretracker.lanta-net.ru%3a2710%2fannounce&tr=udp%3a%2f%2fthetracker.org%3a80%2fannounce&tr=http%3a%2f%2ftorrent.nwps.ws%3a80%2fannounce&tr=udp%3a%2f%2ftracker.coppersurfer.tk%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.iamhansen.xyz%3a2000%2fannounce&tr=udp%3a%2f%2fbt.xxx-tracker.com%3a2710%2fannounce&tr=http%3a%2f%2f0d.kebhana.mx%3a443%2fannounce&tr=udp%3a%2f%2fexodus.desync.com%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.opentrackr.org%3a1337%2fannounce&tr=udp%3a%2f%2ftracker4.itzmx.com%3a2710%2fannounce&tr=udp%3a%2f%2ftracker.justseed.it%3a1337%2fannounce&tr=http%3a%2f%2ftherightsize.net%3a1337%2fannounce&tr=udp%3a%2f%2fretracker.hotplug.ru%3a2710%2fannounce&tr=udp%3a%2f%2ftracker.internetwarriors.net%3a1337%2fannounce&tr=udp%3a%2f%2f9.rarbg.com%3a2800%2fannounce&tr=https%3a%2f%2f2.track.ga%3a443%2fannounce&tr=udp%3a%2f%2fbigfoot1942.sektori.org%3a6969%2fannounce) * La última versión de [Frogtool](https://github.com/zoogie/Frogtool/releases/latest) * La ultima versión de [b9sTool](https://github.com/zoogie/b9sTool/releases/latest) @@ -25,7 +25,7 @@ Para extraer los archivos `.7z` y `.rar` enlazados esta página, necesitarás un #### Sección I - Preparativos 1. Inserta tu tarjeta SD en tu computadora -1. Copy your `movable.sed` file to the root of your SD card +1. Copia tu archivo `movable.sed` a la raíz de tu tarjeta SD 1. Copia el archivo `boot.firm` desde el `.7z` de Luma3DS a la raíz de tu tarjeta SD 1. Copia `boot.nds` (B9STool) a la raíz de tu tarjeta SD 1. Copia `Frogtool.3dsx` a la carpeta `/3ds/` en tu tarjeta SD @@ -33,27 +33,27 @@ Para extraer los archivos `.7z` y `.rar` enlazados esta página, necesitarás un 1. Vuelve a insertar tu tarjeta SD en tu consola 1. Enciende tu consola -#### Section II - Patching DS Download Play +#### Sección II - Parchear el Modo Descarga de DS -1. Open the Homebrew Launcher using any method +1. Abre el Homebrew Launcher usando cualquier método 1. Inicia Frogtool desde la lista de homebrew 1. Selecciona la opción "INJECT patched DS Download Play" 1. Frogtool automáticamente ejecutará e inyectará la versión JPN de Flipnote Studio en tu Modo Descarga de DS 1. Una vez terminada la operación, presiona la pantalla táctil selecciona "BOOT patched DS Download Play" 1. Si el exploit fue exitoso, tu consola habrá cargado la versión japonesa de Flipnote Studio -#### Section III - Flipnote Exploit +#### Sección III - Exploit de Flipnote -If you would prefer a visual guide to this section, one is available [here](https://zoogie.github.io/web/flipnote_directions/). +Si prefieres una guía visual para esta parte, hay una disponible [aquí](https://zoogie.github.io/web/flipnote_directions/). {: .notice--info} 1. Completa la configuración del juego hasta que llegues al menú principal + Selecciona la opción de la izquierda cuando te lo pida durante la configuración inicial 1. Utilizando la pantalla táctil, selecciona el cuadrado grande de la izquierda, luego selecciona el cuadrado con el ícono de una tarjeta SD 1. Una vez que cargue el menú, selecciona el ícono con una cara, luego el ícono abajo a la derecha de la pantalla para continuar -1. Select the frog icon at the bottom left - + Alternatively, press (X) or (UP) on the D-Pad depending on which is shown on the top screen -1. Select the second button along the top with a film-reel icon +1. Elige el ícono de la rana abajo del todo a la izquierda + + Alternativamente, puedes presionar (X) o (Arriba) en el D-Pad dependiendo de cuál que se muestre en la pantalla superior +1. Elige el segundo botón de los que están en la parte de arriba, con un ícono de rollo de película 1. Ve hacia la derecha hasta seleccionar el carrete "3/3" 1. Toca el tercer cuadrado con una letra "A" en él 1. Ve hacia la izquierda hasta el carrete "1/3" @@ -62,7 +62,7 @@ If you would prefer a visual guide to this section, one is available [here](http 1. Selecciona "Install boot9strap" y confirma 1. Sal de b9sTool, luego apaga tu consola + Puede que tengas que forzar el apagado manteniendo pulsado el botón de encendido - + If you see the Luma configuration menu, continue without powering off + + Si ves el menú de configuración de Luma, continúa sin apagar la consola #### Sección IV - Configurar Luma3DS diff --git a/_pages/es_ES/installing-boot9strap-(safeb9sinstaller).txt b/_pages/es_ES/installing-boot9strap-(safeb9sinstaller).txt index 378828e6cd..a49fd8229f 100644 --- a/_pages/es_ES/installing-boot9strap-(safeb9sinstaller).txt +++ b/_pages/es_ES/installing-boot9strap-(safeb9sinstaller).txt @@ -1,5 +1,5 @@ --- -title: "Installing boot9strap (SafeB9SInstaller)" +title: "Instalar boot9strap (SafeB9SInstaller)" --- {% include toc title="Tabla de contenidos" %} diff --git a/_pages/es_ES/ntrboot.txt b/_pages/es_ES/ntrboot.txt index 01988af2b0..c29aa117c7 100644 --- a/_pages/es_ES/ntrboot.txt +++ b/_pages/es_ES/ntrboot.txt @@ -17,14 +17,14 @@ Ten en cuenta que cartuchos que tengan una "Bomba de tiempo" incorporados no pod | Nombre de la flashcart | Precio actual |¿Tiene "bomba de tiempo"? | ¿Versiones de 3DS? | ¿Versiones de DSi? | Notas Adicionales | |-|-:|:-:|:-:|:-:|-| -| [**R4i-SDHC B9S**](http://www.nds-card.net/ProShow.asp?ProID=574) | $15.99 | 3 de Septiembre de 2019 | <= 11.9.0 | <= 1.4.5 | **Viene pre-flasheado con ntrboot**; puede ser flasheado de nuevo a un flashcart NDS. | -| [**R4i Gold 3DS Plus**](http://www.nds-card.net/ProShow.asp?ProID=575) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | **Viene pre-flasheado con ntrboot** ([interruptor interno para cambiar entre los modos ntrboot y NDS]({{ "/images/screenshots/r4i-gold-3ds-plus.png" | absolute_url }})); no flashear manualmente con ntrboot. | -| [**Acekard 2i**](http://www.nds-card.net/ProShow.asp?ProID=160) | $20.99 | No | <= 4.3.0 | <= 1.4.4 | | -| [**DSTT**](http://www.nds-card.net/ProShow.asp?ProID=157) | $9.99 | No | Ninguna | Ninguna | Solo modelos con [ciertos chips flash](https://gist.github.com/yuukieve/6b48f1bb8dd15136403c15c39fafdb42) son compatibles con ntrboot. | -| [**R4i Gold 3DS**](http://www.nds-card.net/ProShow.asp?ProID=149) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | Todas las revisiones RTS son compatibles. | -| [**R4i-SDHC 3DS RTS**](http://www.nds-card.net/ProShow.asp?ProID=146) | $13.99 | 1.87: 3 de septiembre de 2019 | <= 11.9.0 | <= 1.4.5 | | -| [**R4iSDHC GOLD Pro 20XX**](http://www.nds-card.net/ProShow.asp?ProID=490) | $9.99 | 3.9b: 3 de septiembre de 2019 | <= 11.9.0 | <= 1.4.5 | Todos los flashcarts R4iSDHC 20XX son idénticos. Los modelos de 2013 son incompatibles. | -| [**R4iSDHC RTS LITE 20XX**](http://www.nds-card.net/ProShow.asp?ProID=450) | $13.99 | 3.9b: 3 de septiembre de 2019 | <= 11.9.0 | <= 1.4.5 | Todos los flashcarts R4iSDHC 20XX son idénticos. Los modelos de 2013 son incompatibles. | +| [**R4i-SDHC B9S**](http://www.nds-card.com/ProShow.asp?ProID=574) | $15.99 | 3 de Septiembre de 2019 | <= 11.9.0 | <= 1.4.5 | **Viene pre-flasheado con ntrboot**; puede ser flasheado de nuevo a un flashcart NDS. | +| [**R4i Gold 3DS Plus**](http://www.nds-card.com/ProShow.asp?ProID=575) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | **Viene pre-flasheado con ntrboot** ([interruptor interno para cambiar entre los modos ntrboot y NDS]({{ "/images/screenshots/r4i-gold-3ds-plus.png" | absolute_url }})); no flashear manualmente con ntrboot. | +| [**Acekard 2i**](http://www.nds-card.com/ProShow.asp?ProID=160) | $20.99 | No | <= 4.3.0 | <= 1.4.4 | | +| [**DSTT**](http://www.nds-card.com/ProShow.asp?ProID=157) | $9.99 | No | Ninguna | Ninguna | Sólo los modelos con [ciertos chips flash](https://gist.github.com/yuukieve/6b48f1bb8dd15136403c15c39fafdb42) son compatibles con ntrboot. | +| [**R4i Gold 3DS**](http://www.nds-card.com/ProShow.asp?ProID=149) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | Todas las revisiones RTS son compatibles. | +| [**R4i-SDHC 3DS RTS**](http://www.nds-card.com/ProShow.asp?ProID=146) | $13.99 | 1.87: 3 de septiembre de 2019 | <= 11.9.0 | <= 1.4.5 | | +| [**R4iSDHC GOLD Pro 20XX**](http://www.nds-card.com/ProShow.asp?ProID=490) | $9.99 | 3.9b: 3 de septiembre de 2019 | <= 11.9.0 | <= 1.4.5 | Todos los flashcarts R4iSDHC 20XX son idénticos. Los modelos de 2013 son incompatibles. | +| [**R4iSDHC RTS LITE 20XX**](http://www.nds-card.com/ProShow.asp?ProID=450) | $13.99 | 3.9b: 3 de septiembre de 2019 | <= 11.9.0 | <= 1.4.5 | Todos los flashcarts R4iSDHC 20XX son idénticos. Los modelos de 2013 son incompatibles. | | **Ace3DS X** | | No | <= 11.9.0 | <= 1.4.5 | **Viene con ntrboot pre-flasheado** (posee interruptor externo para alternar entre modo ntrboot ("3DS") y modo NDS); no flashear manualmente con ntrboot. | | **Ace3DS Plus** | | No | <= 11.9.0 | <= 1.4.5 | | | **Gateway Blue** | | No | 4.1.0 - 4.5.0 | <= 1.4.5 | | @@ -49,7 +49,7 @@ Para probar si un imán sirve, mantenlo en o alrededor de los botones (A)(B)(X)( Ten en cuenta que no podrás usar las funciones estándar del flashcart mientras tenga instalado el exploit de ntrboot (excepto en el caso de la Acekard 2i, que sigue funcional *en NDS y sistemas 3DS con custom firmware*). Esto significa que, para la mayoría de las flashcarts, ni siquiera se mostrarán en el Menú HOME. Hay pasos opcionales al final de las instrucciones de flasheo de ntrboot para eliminarlo de la flashcart cuando termines. -Ten en cuenta que en raras ocasiones, es posible que realizar el proceso de flasheo en un clon de flashcart podría dejarla **permanentemente inutilizable**. Esto es poco probable, pero sin embargo, sólo las flashcarts originales mencionadas tienen soporte. Para reducir la posibilidad de recibir una tarjeta clon, se recomienda que utilices un sitio con buena reputación para comprar tu flashcart (como [NDS Card](http://www.nds-card.net/)) +Ten en cuenta que en raras ocasiones, es posible que realizar el proceso de flasheo en un clon de flashcart podría dejarla **permanentemente inutilizable**. Esto es poco probable, pero sin embargo, sólo las flashcarts originales mencionadas tienen soporte. Para reducir la posibilidad de recibir un clon, se recomienda que utilizar un sitio de confianza para comprar una flashcart (como [NDS Card](http://www.nds-card.com/)) {: .notice--danger} ___ diff --git a/_pages/es_ES/seedminer.txt b/_pages/es_ES/seedminer.txt index 56898f724c..5b15043efc 100644 --- a/_pages/es_ES/seedminer.txt +++ b/_pages/es_ES/seedminer.txt @@ -6,81 +6,79 @@ title: "Seedminer" ### Lectura requerida -To install boot9strap on your device, we exploit an oversight in the security restrictions applied to "DSiWare" applications. +Para instalar boot9strap en tu consola nos aprovecharemos de un descuido existente en las restricciones de seguridad aplicadas a las aplicaciones "DSiWare". -To accomplish this, we use a tool called Seedminer to calculate the DSiWare encryption key (`movable.sed`) for your device. We then use this DSiWare encryption key to decrypt a compatible DSiWare application and inject an exploit into it to run our own code (the exact exploit used will depend on your device's region). +Para lograrlo, utilizaremos una herramienta llamada Seedminer para calcular la clave de encriptación (`movable.sed`) de tu consola. Luego usaremos esta llave de encriptación de DSiWare para desencriptar una aplicación de DSiWare compatible, e inyectar un exploit en ella para así poder ejecutar nuestro propio código (el exploit específico a utilizar dependerá de la región de tu consola). -If this key were completely random, the encryption key would be impossible to break on current computing hardware. Fortunately, the first half of the key (`movable_part1.sed`) is actually mathematically related to your device's Friend Code, allowing us to break the encryption. For information on how Seedminer works, please see [this presentation](https://zoogie.github.io/web/34⅕c3). +Si esta llave fuese completamente aleatoria, sería imposible calcularla con el hardware de computación que existe actualmente. Afortunadamente, la primera mitad de la clave (`movable_part1.sed`) está relacionada matemáticamente con el código de amigo de tu consola, permitiéndonos romper la encriptación. Para más información sobre cómo funciona Seedminer, por favor echa un vistazo a [esta presentación](https://zoogie.github.io/web/34⅕c3). -Note that this tool requires a PC with a powerful graphics card to break your device's DSiWare encryption. If you do not have access to one of these, there also exists several online helper services where a volunteer running automated software will do this for you. +Ten en cuenta que esta herramienta requiere de un PC con una tarjeta gráfica muy poderosa para que pueda romper la encriptación DSiWare de tu consola. Si no tienes acceso a uno, también existen varios servicios de ayuda en línea donde un voluntario ejecutando software automatizado hará esto por ti. ### Instrucciones -#### Section I - Compatibility Tests +#### Sección I - Pruebas de compatibilidad -While these tests are not strictly necessary to perform the Seedminer exploit, the follow-up exploits to this do require this test to be performed and it would be a waste of time and effort to perform Seedminer without the ability to use the other exploits. +Si bien estas pruebas no son estrictamente necesarias para poder ejecutar el exploit Seedminer, los exploits posteriores a éste requieren que las pruebas se realicen y sería una pérdida de tiempo y esfuerzo ejecutar Seedminer sin ser capaz de ejecutar el resto de exploits. -There are two different methods for building on the Seedminer exploit (described in more detail at the bottom of this page), so even if one of these test fails you can still use another method as long as the other does not fail. +Existen dos métodos diferentes que se basan en el exploit Seedminer (descriptos en más detalle al pie de la página), de modo que si una de las pruebas falla todavía puedes utilizar el otro método siempre y cuando la otra prueba no falle. -#### DS Internet Settings Test (used for Fredtool) +#### Prueba de la Configuración de Internet de DS (utilizada para Fredtool) -1. Go to System Settings, then "Internet Settings", then "Nintendo DS Connections" -1. Press "OK" -1. If your device loads into a "Nintendo Wi-Fi Connection Setup" menu, the test was successful - + If the screen stays black or appears to freeze, the test has failed and you will not be able to use the Fredtool method which requires a functioning DS Internet Settings -1. Exit this menu +1. Ve a Configuración de la Consola, luego a "Ajustes de Internet", luego a "Conexiones de Nintendo DS" +1. Presiona "OK" +1. Si tu consola carga un menú que dice "Nintendo Wi-Fi Connection Setup", la prueba fue exitosa + + Si la pantalla se queda en negro o parece estar congelada, la prueba ha fallado; no podrás utilizar el método de Fredtool ya que es necesario que la Configuración de Internet de DS funcione correctamente +1. Sal de este menú -#### DS Download Play Test (used for Frogtool) +#### Prueba del Modo Descarga de DS (utilizado para Frogtool) 1. Ejecuta la aplicación Modo Descarga (![]({{ "/images/download-play-icon.png" | absolute_url }}){: height="24px" width="24px"}) -1. Select "Nintendo DS" -1. If your device loads into a "Download software via DS Download Play" menu, the test was successful - + If the screen stays black or appears to freeze, the test has failed and you will not be able to use the Frogtool method which requires a functioning DS Download Play -1. Exit this menu +1. Selecciona "Nintendo DS" +1. Si tu consola carga un menú que dice "Download software via DS Download Play", la prueba fue exitosa + + Si la pantalla se queda en negro o parece estar congelada, la prueba ha fallado; no podrás utilizar el método de Frogtool ya que es necesario que el Modo Descarga de DS funcione correctamente +1. Sal de este menú -#### Section II - Prep Work +#### Sección II - Preparativos 1. Inserta tu tarjeta SD en tu computadora -1. Navigate to the `Nintendo 3DS` folder on your SD card -1. Copy the 32 character long name of the folder you see - + If you see multiple folders like this, perform the following: - + Rename the `Nintendo 3DS` folder to `BACKUP_Nintendo 3DS` - + Reinsert your SD card into your device and power on your device - + Wait for the device to generate the SD card data - + Power off your device and reinsert your SD card into your computer - + Navigate to the `Nintendo 3DS` folder on your SD card - + Copy the 32 character long name of the folder you see - + Delete the `Nintendo 3DS` folder - + Rename the `BACKUP_Nintendo 3DS` folder to `Nintendo 3DS` -1. Paste your 32 character long folder name into a document you can reference later - + This folder name is also known as your "ID0" +1. Ve a la carpeta `Nintendo 3DS` en tu tarjeta SD +1. Copia el nombre de 32 caracteres que posee la carpeta que hay dentro + + Si hay más de una carpeta, haz lo siguiente: + + Renombra la carpeta `Nintendo 3DS` como `BACKUP_Nintendo 3DS` + + Reinserta la tarjeta SD en tu consola y enciéndela + + Espera a que la consola genere los datos necesarios en la tarjeta SD + + Apaga la consola y vuelve a insertar la tarjeta SD en tu computadora + + Ve a la carpeta `Nintendo 3DS` que se generó de nuevo en tu tarjeta SD + + Copia el nombre de 32 caracteres que posee la carpeta que hay dentro + + Borra la carpeta `Nintendo 3DS` que se generó + + Renombra la carpeta `BACKUP_Nintendo 3DS` de vuelta a `Nintendo 3DS` +1. Pega el nombre de 32 caracteres en un documento que puedas tener a mano más tarde + + Este nombre se conoce también como el "ID0" de tu consola 1. Enciende tu consola 1. Ve a tu Lista de Amigos (el [Icono Naranja con una cara]({{ "/images/friend-list-icon.png" | absolute_url }}) en la fila superior de tu Menú HOME) - + If you receive an error and are kicked out of the menu, you either must create a new Mii or your console cannot connect to Nintendo's servers (due to a ban or connection issues) -1. Find your Mii profile, then find the "Friend Code" field on the top screen + + Si recibes un error y eres expulsado del menú, es posible que debas crear un nuevo Mii o tu consola no pueda conectarse a los servidores de Nintendo (debido a un ban o problemas de conexión) +1. Encuentra el perfil de tu Mii, luego busca donde dice "Código de amigo" en la pantalla superior -#### Section III - Seedminer +#### Sección III - Seedminer -1. Open [Bruteforce Movable](https://bruteforcemovable.com/) on your computer - + This site can automate the retrieval of `movable_part1.sed` (using a bot 3DS console) and the breaking of your device's DSiWare encryption (using a volunteer's computer to run Seedminer) - + If you already have access to a 3DS capable of launching the Homebrew Launcher, you can manually retrieve your `movable_part1.sed` using that device by following [these](https://jisagi.github.io/SeedminerGuide/seedminerSelf/#section1) instructions - + If you already have access to a PC with a powerful graphics card, you can manually calculate your `movable.sed` using it by following [these](https://jisagi.github.io/SeedminerGuide/seedminerSelf/#section2) instructions - + If the automated service is nonfunctional and you cannot do one or both of those manually, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you -1. Enter your device's Friend Code (with no spaces or dashes) into the "Your friend code" field -1. Paste your device's 32 character long folder name into the "Your ID0" field +1. Entra a [Bruteforce Movable](https://bruteforcemovable.com/) en tu computadora + + Este sitio puede automatizar la obtención del `movable_part1.sed` (utilizando un bot que simula una consola 3DS) y la ruptura de la encriptación DSiWare de tu consola (utilizando la computadora de un voluntario para ejecutar Seedminer) + + Si el sistema automático no está operativo, únete al [Discord de Nintendo Homebrew](https://discord.gg/MWxPgEp) (en inglés) y pide ayuda a alguien de allí +1. Ingresa el código de amigo de tu consola (sin espacios ni guiones) en donde dice "Your friend code" +1. Copia y pega el nombre de 32 caracteres donde dice "Your ID0" 1. Completa el captcha que dice "I'm not a robot" -1. Select "Go" - + If the site immediately goes to step 4, download your `movable.sed` file and continue with the next section. -1. When prompted, use the "Register Friend" button on your device to add the friend code of the bot 3DS console -1. Wait for the site to update - + If it does not, wait a few minutes before refreshing the page once -1. Select "Continue" -1. Espera a que el procesos se complete - + This can take a while (up to an hour in some cases) - + During this process, the bot may not show up on your 3ds. As long as the website updates, this is not an issue. - + If you are still waiting after an hour, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you -1. When the process has completed, download your `movable.sed` file from the site - + Keep this file as you will need it in the upcoming pages +1. Selecciona "Go" + + Si el sitio se mueve inmediatamente al paso 4, descarga tu archivo `movable.sed` y continúa con la siguiente sección. +1. Cuando te lo pida, utiliza el botón de "Añadir amigo" en tu consola para añadir el código de amigo del bot que simula una consola 3DS +1. Espera a que el sitio se actualice + + Si no lo hace, espera unos minutos antes de recargar la página una vez +1. Una vez que el sitio procesa tu información, te dará la opción para "Continue" (Continuar) o "Do another device" (Hacer otro dispositivo). Haz click en el botón verde que dice "Continue" +1. Espera a que el resto del proceso termine + + Esto es generalmente rápido (1-5 minutos) pero en algunos casos, puede tomar hasta media hora. + + Durante este proceso, el bot que agregaste podría no ser mostrado en tu 3DS. Mientras no se actualice el sitio web, esto no es un problema. + + Si todavía estás esperando luego de media hora, únete al [Discord de Nintendo Homebrew](https://discord.gg/MWxPgEp) (en inglés) y pide ayuda a alguien de allí +1. Cuando el proceso haya finalizado, descarga tu archivo `movable.sed` desde el sitio + + Conserva este archivo ya que lo necesitarás en las próximas páginas ___ ### Métodos @@ -89,25 +87,25 @@ ___ #### Seedminer + Fredtool -This method of using Seedminer for further exploitation uses your `movable.sed` file to decrypt any DSiWare eShop title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. This requires you to already own (or download / buy) a DSiWare game from the eShop. +Este método de uso de Seedminer, para hacer un mejor exploit, utiliza tu archivo `movable.sed` para desencriptar cualquier título de DSiWare de la eShop que haya disponible con el objetivo de inyectar un título de DSiWare vulnerable en la aplicación de Configuración de Internet de DS. Esto requiere que ya poseas (o descargues/compres) un juego de DSiWare de la eShop. -This method is compatible with all regions, though only the JPN and USA regions have free DSiWare titles in the eShop. +Este método es compatible con todas las regiones, aunque solamente las regiones JPN y USA poseen títulos de DSiWare gratuitos en la eShop. -This method requires that the DS Internet Settings be functioning properly (see the test at the top of this page). +Este método requiere que la Configuración de Internet de DS funcione correctamente (ver la prueba realizada al comienzo de la página). -Continue to [Installing boot9strap (Fredtool)](installing-boot9strap-(fredtool)) +Continúa en [Instalar boot9strap (Fredtool)](installing-boot9strap-(fredtool)) {: .notice--primary} ___ #### Seedminer + Steelhax + Frogtool -This method of using Seedminer for further exploitation uses your `movable.sed` file to gain access to the Homebrew Launcher using the Steelhax exploit for the purposes of injecting an exploitable DSiWare title into the DS Download Play application. This method requires you to already own (or download) the free "Steel Divers: Sub Wars" game from the eShop. +Este método de uso de Seedminer, para hacer un mejor exploit, utiliza tu archivo `movable.sed` para obtener acceso al Homebrew Launcher por medio del exploit Steelhax, tras lo cual inyectar un juego vulnerable de DSiWare en la aplicación de Modo Descarga de DS. Este método requiere que poseas de antemano (o que descargues) el juego gratuito "Steel Divers: Sub Wars" desde la eShop. -This method is only compatible with the EUR, JPN, and USA regions, and is somewhat more complicated than the above method. It is only recommended to use this method if you have a EUR region device and do not wish to pay for a DSiWare game, or if the above method does not work for you for some reason. +Este método sólo es compatible con las regiones EUR, JPN y USA, y es un poco más complicado que el método anterior. Se recomienda utilizar este método solamente si posees una consola de región EUR y no deseas pagar por un juego de DSiWare, o si el método anterior no te sirve por algún motivo. -This method requires that the DS Download Play be functioning properly (see the test at the top of this page). +Este método requiere que el Modo Descarga de DS funcione correctamente (ver la prueba realizada el inicio de la página). -Continue to [Homebrew Launcher (Steelhax)](homebrew-launcher-(steelhax)) +Continúa en [Homebrew Launcher (Steelhax)](homebrew-launcher-(steelhax)) {: .notice--primary} diff --git a/_pages/es_ES/site-navigation.txt b/_pages/es_ES/site-navigation.txt index 8cce1a168f..6e2877538b 100644 --- a/_pages/es_ES/site-navigation.txt +++ b/_pages/es_ES/site-navigation.txt @@ -9,7 +9,7 @@ sitemap: false + [Finalizar Instalación](finalizing-setup) + [Homebrew Launcher (Soundhax)](homebrew-launcher-(soundhax)) -+ [Installing boot9strap (SafeB9SInstaller)](installing-boot9strap-(SafeB9SInstaller)) ++ [Instalar boot9strap (SafeB9SInstaller)](installing-boot9strap-(SafeB9SInstaller)) {% endcapture %}
{{ notice-1 | markdownify }}
@@ -39,12 +39,12 @@ sitemap: false + [Homebrew Launcher (Steelhax)](homebrew-launcher-(steelhax)) + [Instalar boot9strap (2xrsa)](installing-boot9strap-(2xrsa)) + [Instalar boot9strap (Navegador)](installing-boot9strap-(browser)) -+ [Installing boot9strap (Fredtool)](installing-boot9strap-(fredtool)) -+ [Installing boot9strap (Frogtool)](installing-boot9strap-(frogtool)) ++ [Instalar boot9strap (Fredtool)](installing-boot9strap-(fredtool)) ++ [Instalar boot9strap (Frogtool)](installing-boot9strap-(frogtool)) + [Instalar boot9strap (Hardmod)](installing-boot9strap-(hardmod)) + [Instalar boot9strap (MSET)](installing-boot9strap-(mset)) + [Instalar boot9strap (ntrboot)](installing-boot9strap-(ntrboot)) -+ [Installing boot9strap (SafeB9SInstaller)](installing-boot9strap-(SafeB9SInstaller)) ++ [Instalar boot9strap (SafeB9SInstaller)](installing-boot9strap-(SafeB9SInstaller)) + [Instalar boot9strap (Soundhax)](installing-boot9strap-(soundhax)) + [Mover EmuNAND](move-emunand) + [ntrboot](ntrboot) diff --git a/_pages/es_ES/uninstall-cfw.txt b/_pages/es_ES/uninstall-cfw.txt index 12b9627781..2b552619a3 100644 --- a/_pages/es_ES/uninstall-cfw.txt +++ b/_pages/es_ES/uninstall-cfw.txt @@ -11,7 +11,7 @@ Esto removerá completamente el CFW de tu consola, incluyendo Boot9Strap y Luma3 Esto casi nunca es la solución para arreglar cualquier problema que encuentres en tu instalación del CFW. Una mejor idea sería leer la página de [solución de problemas](troubleshooting) o pedir ayuda en [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) (*en inglés*). {: .notice--danger} -Cualquier juego sin firmar (ilegítimo) se volverá inutilizable y puede ser manualmente removido usando la sección de "Gestión de Datos" en la Configuración de la consola. Utiliza un [gestor de datos de guardado](https://github.com/FlagBrew/Checkpoint/releases/latest) para respaldar los datos de guardado de cualquier juego sin firmar (ilegítimo) que te sea de importancia conservar. +Cualquier juego sin firmar (ilegítimo) se volverá inutilizable y debe ser eliminado manualmente antes de comenzar este proceso yendo a la sección Gestión de datos en la Configuración de la consola. Utiliza un [gestor de datos de guardado](https://github.com/FlagBrew/Checkpoint/releases/latest) para respaldar los datos de guardado de cualquier juego sin firmar (ilegítimo) que te sea de importancia conservar. Esto no afectará a tu NNID, ningún juego comprado legalmente o a los datos de guardado pertenecientes a dichos juegos. @@ -26,21 +26,43 @@ Ten en cuenta que si tienes archivos de payloads distintos de `GodMode9.firm` en ### Instrucciones -#### Sección I - Preparativos +#### Sección I - Prueba de seguridad 1. Apaga tu consola 1. Inserta tu tarjeta SD en tu computadora 1. Copia el archivo `GodMode9.firm` desde el `.zip` de GodMode9 a la carpeta `/luma/payloads/` en tu tarjeta SD 1. Copia la carpeta `gm9`contenida en el `.zip`de GodMode9 al directorio raíz de tu tarjeta SD 1. Vuelve a insertar tu tarjeta SD en tu consola -1. Enciende tu consola - -#### Sección II - Ejecutar script de desinstalación - 1. Inicia GodMode9 manteniendo presionado (Start) mientras enciendes la consola 1. Si se te pide crear copias de seguridad de archivos esenciales, presiona (A) para hacerlo y luego presiona (A) para continuar una vez que haya terminado 1. Si se te pide fijar la fecha y hora RTC, presiona (A) para hacerlo, luego define la fecha y la hora, y después presiona (A) para continuar + Ten en cuenta que, si tuviste que cambiar la fecha y hora RTC, también deberás cambiar la hora en la Configuración de la consola después de hacer esta guía +1. Ve a `[1:] SYSNAND CTRNAND > title > 00040138 > (X)0000002 > content` + + En una consola "New", la (X) será un 2 + + En una consola "Old", la (X) será un 0 +1. Selecciona el archivo `.app` +1. Selecciona `NCCH Image Options` +1. Selecciona `Mount image to drive` +1. En la ventana que aparece, abre la carpeta `exefs` +1. En esta carpeta, selecciona el archivo `.firm` +1. Selecciona "Firm Options" +1. Selecciona "Boot Firm" +1. Cuando se solicite, elige "decrypt and make a copy" +1. Deberías iniciar en el Menú HOME normal de 3DS. Si lo haces, apaga tu consola y continúa en la siguiente sección + + Si NO inicias en el Menú HOME normal de 3DS, continuar con estas instrucciones **INHABILITARÁ** tu consola. Deberías unirte al [Discord de Nintendo Homebrew](https://discord.gg/MWxPgEp) y pide (en inglés) ayuda a alguien de allí + +#### Sección II - Preparativos + +1. Enciende tu consola +1. Ve a Configuración de la consola > Gestión de datos > Nintendo 3DS > Software +1. En esta lista de software, elimina cualquier contenido que no sea de Nintendo que hayas instalado durante el uso de CFW + + Esto incluye software de sistema de uso común como FBI, Anemone3DS, Luma Updater, Homebrew Launcher, Checkpoint, y otros, junto a los juegos que no sean de eShop + + No quitar software de CFW antes de desinstalarlo podría inhabilitar el acceso al menú Gestión de datos luego de desinstalar el CFW +1. Apaga tu consola + +#### Sección III - Ejecutar script de desinstalación + +1. Inicia GodMode9 manteniendo presionado (Start) mientras enciendes la consola 1. Presiona el botón (Home) para abrir el menú de acción 1. Selecciona "Scripts..." 1. Selecciona "GM9Megascript" diff --git a/_pages/fi_FI/finalizing-setup.txt b/_pages/fi_FI/finalizing-setup.txt index eaa61857e2..094f020eaf 100644 --- a/_pages/fi_FI/finalizing-setup.txt +++ b/_pages/fi_FI/finalizing-setup.txt @@ -18,6 +18,8 @@ Tämän prosessin aikana myös asennetaan muun muassa seuraavat ohjelmat: + **Luma3DS Updater** *(päivittää CFW-asennuksesi helposti)* + **GodMode9** *(monikäyttöinen työkalu, jolla voi tehdä NANDiin ja pelikorttiin liittyviä toimintoja)* + **Homebrew Launcher Loader** *(avaa Homebrew Launcherin)* ++ **DSP1** *(allows homebrew applications to have sound)* ++ **ctr-no-timeoffset** *(removes the rtc offset so that the home menu and rtc timestamps match)* ### Tarpeet @@ -143,7 +145,7 @@ Jos sinulla oli ennen tämän oppaan aloittamista EmuNAND-kokoonpano, ja haluais 1. Paina (B):tä palataksesi päävalikkoon 1. Pidä (R):ää pohjassa ja paina samalla (B):tä irrottaaksesi SD-korttisi 1. Aseta SD-korttisi tietokoneeseesi -1. Copy `__sysnand_###.bin`, `essential.exefs`, and `boot9.bin` from the `/gm9/out/` folder on your SD card to a safe location on your computer +1. Copy `__sysnand_###.bin`, `__sysnand_###.bin.sha`, `essential.exefs`, and `boot9.bin` from the `/gm9/out/` folder on your SD card to a safe location on your computer + Varmuuskopioi useaan eri paikkaan (kuten pilvipalveluihin) + Nämä varmuuskopiot pelastavat sinut konsolin vioittumiselta ja/tai auttavat palauttamaan tiedostoja NAND-näköistiedostosta, jos jokin menee pieleen tulevaisuudessa 1. Kun olet varmuuskopioinut NANDin, poista `__sysnand_###.bin` ja `__sysnand_###.bin.sha` SD-korttisi `/gm9/out/`-kansiosta diff --git a/_pages/fi_FI/homebrew-launcher-(steelhax).txt b/_pages/fi_FI/homebrew-launcher-(steelhax).txt index ea9d258d98..06836d9740 100644 --- a/_pages/fi_FI/homebrew-launcher-(steelhax).txt +++ b/_pages/fi_FI/homebrew-launcher-(steelhax).txt @@ -8,7 +8,7 @@ title: "Homebrew Launcher (Steelhax)" This method of using Seedminer for further exploitation uses your `movable.sed` file to gain access to the Homebrew Launcher using the Steelhax exploit for the purposes of injecting an exploitable DSiWare title into the DS Download Play application. This method requires you to already own (or download) the free "Steel Divers: Sub Wars" game from the eShop. -If your device already has access to the Homebrew Launcher (whether through Steelhax or another exploit), you can skip to [Installing Boot9strap (Frogminer)](installing-boot9strap-(frogminer)). +If your device already has access to the Homebrew Launcher (whether through Steelhax or another exploit), you can skip to [Installing Boot9strap (Frogtool)](installing-boot9strap-(frogtool)). {: .notice--success} If you already have Steel Diver: Sub Wars, this process will overwrite your game's save file! @@ -17,6 +17,7 @@ If you already have Steel Diver: Sub Wars, this process will overwrite your game ### Tarpeet * The free eShop game "Steel Diver: Sub Wars" +* Your `movable.sed` file from completing [Seedminer](seedminer) * The latest release of [the Homebrew Launcher](https://github.com/fincs/new-hbmenu/releases/latest) * The latest release of [Steelhax](https://github.com/VegaRoXas/vegaroxas.github.io/raw/master/files/steelhax-installer.rar) * The [otherapp payload](https://smealum.github.io/3ds/#otherapp) *(for your region and version)* @@ -39,7 +40,7 @@ If you already have Steel Diver: Sub Wars, this process will overwrite your game 1. Exit "Steel Diver: Sub Wars" 1. Sammuta konsolisi 1. Aseta SD-korttisi tietokoneeseesi -1. Open [the Steelminer Injector website](http://steelminer.jisagi.net/injector) on your computer +1. Open [the Steelminer Injector website](https://bruteforcemovable.com/steelhax/) on your computer 1. Select your `movable.sed` file 1. Select "Start!" 1. Wait for the process to complete diff --git a/_pages/fi_FI/installing-boot9strap-(fredtool).txt b/_pages/fi_FI/installing-boot9strap-(fredtool).txt index d329f32f51..ec73045c45 100644 --- a/_pages/fi_FI/installing-boot9strap-(fredtool).txt +++ b/_pages/fi_FI/installing-boot9strap-(fredtool).txt @@ -10,8 +10,6 @@ This method of using Seedminer for further exploitation uses your `movable.sed` Tämä menetelmä käyttää FIRM-osioiden salaamatonta muotoa (known-plaintext, selitetty [täällä](https://www.3dbrew.org/wiki/3DS_System_Flaws)) hyödyntävää haavoittuvuutta. -To use the [magnet](https://wikipedia.org/wiki/Magnet_URI_scheme) links on this page, you will need a torrent client like [Deluge](http://dev.deluge-torrent.org/wiki/Download). - To extract the `.7z` and `.rar` files linked on this page, you will need a file archiver like [7-Zip](http://www.7-zip.org/) or [The Unarchiver](https://theunarchiver.com/). ### Tarpeet diff --git a/_pages/fi_FI/ntrboot.txt b/_pages/fi_FI/ntrboot.txt index 1eb61540f3..c2e48ba021 100644 --- a/_pages/fi_FI/ntrboot.txt +++ b/_pages/fi_FI/ntrboot.txt @@ -17,14 +17,14 @@ Huomaa, että "aikapommin" sisältävät kortit eivät voi enää avata `.nds`-t | Flash-kortin nimi | Nykyinen hinta | "Aika­pommi"? | 3DS-versiot? | DSi-versiot? | Muita huomioita | |-|-:|:-:|:-:|:-:|-| -| [**R4i-SDHC B9S**](http://www.nds-card.net/ProShow.asp?ProID=574) | $15.99 | September 3, 2019 | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot**; can be flashed back to an NDS flashcart. | -| [**R4i Gold 3DS Plus**](http://www.nds-card.net/ProShow.asp?ProID=575) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot** ([internal switch to switch between ntrboot and NDS modes]({{ "/images/screenshots/r4i-gold-3ds-plus.png" | absolute_url }})); do not manually flash with ntrboot. | -| [**Acekard 2i**](http://www.nds-card.net/ProShow.asp?ProID=160) | $20.99 | No | <= 4.3.0 | <= 1.4.4 | | -| [**DSTT**](http://www.nds-card.net/ProShow.asp?ProID=157) | $9.99 | No | None | None | Only models with [certain flash chips](https://gist.github.com/yuukieve/6b48f1bb8dd15136403c15c39fafdb42) are compatible with ntrboot. | -| [**R4i Gold 3DS**](http://www.nds-card.net/ProShow.asp?ProID=149) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | All RTS revisions are compatible. | -| [**R4i-SDHC 3DS RTS**](http://www.nds-card.net/ProShow.asp?ProID=146) | $13.99 | 1.87: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | | -| [**R4iSDHC GOLD Pro 20XX**](http://www.nds-card.net/ProShow.asp?ProID=490) | $9.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. 2013-mallit eivät ole yhteensopivia. | -| [**R4iSDHC RTS LITE 20XX**](http://www.nds-card.net/ProShow.asp?ProID=450) | $13.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. 2013-mallit eivät ole yhteensopivia. | +| [**R4i-SDHC B9S**](http://www.nds-card.com/ProShow.asp?ProID=574) | $15.99 | September 3, 2019 | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot**; can be flashed back to an NDS flashcart. | +| [**R4i Gold 3DS Plus**](http://www.nds-card.com/ProShow.asp?ProID=575) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot** ([internal switch to switch between ntrboot and NDS modes]({{ "/images/screenshots/r4i-gold-3ds-plus.png" | absolute_url }})); do not manually flash with ntrboot. | +| [**Acekard 2i**](http://www.nds-card.com/ProShow.asp?ProID=160) | $20.99 | No | <= 4.3.0 | <= 1.4.4 | | +| [**DSTT**](http://www.nds-card.com/ProShow.asp?ProID=157) | $9.99 | No | None | None | Only models with [certain flash chips](https://gist.github.com/yuukieve/6b48f1bb8dd15136403c15c39fafdb42) are compatible with ntrboot. | +| [**R4i Gold 3DS**](http://www.nds-card.com/ProShow.asp?ProID=149) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | All RTS revisions are compatible. | +| [**R4i-SDHC 3DS RTS**](http://www.nds-card.com/ProShow.asp?ProID=146) | $13.99 | 1.87: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | | +| [**R4iSDHC GOLD Pro 20XX**](http://www.nds-card.com/ProShow.asp?ProID=490) | $9.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. 2013-mallit eivät ole yhteensopivia. | +| [**R4iSDHC RTS LITE 20XX**](http://www.nds-card.com/ProShow.asp?ProID=450) | $13.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. 2013-mallit eivät ole yhteensopivia. | | **Ace3DS X** | | No | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot** (external switch to switch between ntrboot ("3DS") and NDS modes); do not manually flash with ntrboot. | | **Ace3DS Plus** | | No | <= 11.9.0 | <= 1.4.5 | | | **Gateway Blue** | | No | 4.1.0 - 4.5.0 | <= 1.4.5 | | @@ -49,7 +49,7 @@ Kokeillaksesi magneetin toimivuutta pidä sitä (A)-, (B)-, (X)- ja (Y)-painikke Huomaa, että flash-korttia ei voi käyttää sen normaaleihin käyttötarkoituksiin silloin, kun ntrboot on asennettuna sille (lukuun ottamatta Acekard 2i -korttia, joka toimii edelleen normaalisti *NDS:llä sekä 3DS:llä, jossa on mukautettu laiteohjelmisto*). Suurin osa flash-korteista ei edes näy HOME-valikossa. Asennusohjeiden lopussa on valinnaiset ohjeet, joiden avulla voit poistaa ntrbootin flash-kortiltasi asennettuasi boot9strapin. -Huomaa, että joissain harvinaisissa yhteensattumissa asennusprosessi saattaa **vioittaa** jäljitelmä-flash-korttia ja tehdä siitä pysyvästi käyttökelvottoman. Vaikka tämä onkin epätodennäköistä, on suositeltavaa käyttää vain alkuperäisiä kortteja. To reduce the chance of receiving a counterfeit card, it is recommended that you use a reputable site to buy your flashcart (such as [NDS Card](http://www.nds-card.net/)) +Huomaa, että joissain harvinaisissa yhteensattumissa asennusprosessi saattaa **vioittaa** jäljitelmä-flash-korttia ja tehdä siitä pysyvästi käyttökelvottoman. Vaikka tämä onkin epätodennäköistä, on suositeltavaa käyttää vain alkuperäisiä kortteja. To reduce the chance of receiving a counterfeit card, it is recommended that you use a reputable site to buy your flashcart (such as [NDS Card](http://www.nds-card.com/)) {: .notice--danger} ___ diff --git a/_pages/fi_FI/seedminer.txt b/_pages/fi_FI/seedminer.txt index dfb720bd7d..92a09d7af8 100644 --- a/_pages/fi_FI/seedminer.txt +++ b/_pages/fi_FI/seedminer.txt @@ -63,9 +63,7 @@ There are two different methods for building on the Seedminer exploit (described 1. Open [Bruteforce Movable](https://bruteforcemovable.com/) on your computer + This site can automate the retrieval of `movable_part1.sed` (using a bot 3DS console) and the breaking of your device's DSiWare encryption (using a volunteer's computer to run Seedminer) - + If you already have access to a 3DS capable of launching the Homebrew Launcher, you can manually retrieve your `movable_part1.sed` using that device by following [these](https://jisagi.github.io/SeedminerGuide/seedminerSelf/#section1) instructions - + If you already have access to a PC with a powerful graphics card, you can manually calculate your `movable.sed` using it by following [these](https://jisagi.github.io/SeedminerGuide/seedminerSelf/#section2) instructions - + If the automated service is nonfunctional and you cannot do one or both of those manually, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you + + If the automated service is nonfunctional, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you 1. Enter your device's Friend Code (with no spaces or dashes) into the "Your friend code" field 1. Paste your device's 32 character long folder name into the "Your ID0" field 1. Complete the "I'm not a robot" captcha @@ -74,11 +72,11 @@ There are two different methods for building on the Seedminer exploit (described 1. When prompted, use the "Register Friend" button on your device to add the friend code of the bot 3DS console 1. Wait for the site to update + If it does not, wait a few minutes before refreshing the page once -1. Select "Continue" -1. Wait for the process to complete - + This can take a while (up to an hour in some cases) - + During this process, the bot may not show up on your 3ds. As long as the website updates, this is not an issue. - + If you are still waiting after an hour, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you +1. Once the site processes your information, you will be given the option to "Continue" or "Do another device". Click the green "Continue" button +1. Wait for the remainder of the process to complete + + This is usually fast (1-5 minutes) but in some cases, can take up to half an hour. + + During this process, the bot you added may not show up on your 3ds. As long as the website updates, this is not an issue. + + If you are still waiting after half an hour, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you 1. When the process has completed, download your `movable.sed` file from the site + Keep this file as you will need it in the upcoming pages @@ -102,7 +100,7 @@ ___ #### Seedminer + Steelhax + Frogtool -This method of using Seedminer for further exploitation uses your `movable.sed` file to gain access to the Homebrew Launcher using the Steelhax exploit for the purposes of injecting an exploitable DSiWare title into the DS Download Play application. This method requires you to already own (or download) the free "Steel Divers: Sub Wars" game from the eShop. +This method of using Seedminer for further exploitation uses your `movable.sed` file to gain access to the Homebrew Launcher using the Steelhax exploit for the purposes of injecting an exploitable DSiWare title into the DS Download Play application. This method requires you to already own (or download) the free "Steel Diver: Sub Wars" game from the eShop. This method is only compatible with the EUR, JPN, and USA regions, and is somewhat more complicated than the above method. It is only recommended to use this method if you have a EUR region device and do not wish to pay for a DSiWare game, or if the above method does not work for you for some reason. diff --git a/_pages/fi_FI/uninstall-cfw.txt b/_pages/fi_FI/uninstall-cfw.txt index 5e3581f20d..b17da99986 100644 --- a/_pages/fi_FI/uninstall-cfw.txt +++ b/_pages/fi_FI/uninstall-cfw.txt @@ -11,7 +11,7 @@ Tämä poistaa kokonaan mukautetun laiteohjelmiston konsolistasi, mukaan lukien Tämä ei lähes koskaan ole ratkaisu CFW-asennuksessasi ilmenevien ongelmien korjaamiseen. A better idea would be to read the [troubleshooting](troubleshooting) page or ask (in English) for help at [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp). {: .notice--danger} -Kaikista digitaalisesti allekirjoittamattomista (laittomista) peleistä tulee käyttökelvottomia, ja ne voi poistaa käsin järjestelmäasetusten (System Settings) tiedonhallinnasta (Data Management). Use a [save manager](https://github.com/FlagBrew/Checkpoint/releases/latest) to backup any saves for these unsigned (illegitimate) games you care about. +Any unsigned (illegitimate) games will be rendered unusable and should be manually removed before starting this process by using the Data Management section of the System Settings. Use a [save manager](https://github.com/FlagBrew/Checkpoint/releases/latest) to backup any saves for these unsigned (illegitimate) games you care about. Tämä ei vaikuta sinun NNID-käyttäjääsi, laillisesti ostettuihin peleihisi eikä niiden tallennuksiin. @@ -26,21 +26,43 @@ Huomaa, että jos sinulla on muita käynnistystiedostoja kuin `GodMode9.firm` SD ### Ohjeet -#### Vaihe I – Valmistelut +#### Section I - Safety Test 1. Sammuta konsolisi 1. Aseta SD-korttisi tietokoneeseesi 1. Kopioi GodMode9-`.zip`-pakkauksesta `GodMode9.firm` SD-korttisi `/luma/payloads/`-kansioon 1. Kopioi GodMode9-`.zip`-pakkauksesta `gm9`-kansio SD-korttisi juureen 1. Aseta SD-korttisi takaisin konsoliisi -1. Käynnistä konsolisi - -#### Vaihe II – Poisto-ohjelman ajaminen - 1. Avaa GodMode9 pitämällä (START)-painiketta pohjassa konsolin käynnistyessä 1. Jos ohjelma kehottaa luomaan varmuuskopion tärkeistä tiedostoista (essential files), paina (A):ta tehdäksesi sen, ja kun varmuuskopio on valmis, paina (A):ta uudelleen jatkaaksesi 1. Jos sinua kehotetaan korjaamaan RTC-aika ja -päivämäärä, paina (A):ta ja aseta ne oikein, paina sitten (A):ta jatkaaksesi + Huomaa, että jos jouduit korjaamaan RTC-ajan ja -päivämäärän, sinun täytyy korjata ne myös järjestelmäasetuksista (System Settings) näiden ohjeiden jälkeen +1. Navigate to `[1:] SYSNAND CTRNAND > title > 00040138 > (X)0000002 > content` + + On a "New" edition console, the (X) will instead be 2 + + On an "Old" edition console, the (X) will instead be 0 +1. Select the `.app` file +1. Select `NCCH Image Options` +1. Select `Mount image to drive` +1. In the window that appears, open the `exefs` folder +1. In this folder, select the `.firm` file +1. Select "Firm Options" +1. Select "Boot Firm" +1. When prompted, choose to decrypt and make a copy +1. You should boot into the regular 3DS Home Menu. If you do, power your device off and continue to the next section + + If you do NOT boot into the regular 3DS Home Menu, continuing with these instructions **WILL** brick your device. You should join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you + +#### Section II - Prep Work + +1. Käynnistä konsolisi +1. Navigate to System Settings > Data Management > Nintendo 3DS > Software +1. In this list of software, delete any non-Nintendo content you installed while using CFW + + This includes common system software such as FBI, Anemone3DS, Luma Updater, Homebrew Launcher, Checkpoint, and others, along with any non-eShop games + + Failure to remove CFW software before uninstalling CFW may break access to the Data Management menu after uninstalling CFW +1. Sammuta konsolisi + +#### Section III - Running Uninstall Script + +1. Avaa GodMode9 pitämällä (START)-painiketta pohjassa konsolin käynnistyessä 1. Paina (HOME)-painiketta näyttääksesi toimintovalikon 1. Select "Scripts..." 1. Select "GM9Megascript" diff --git a/_pages/fr_FR/a9lh-to-b9s.txt b/_pages/fr_FR/a9lh-to-b9s.txt index fffd989b1f..e73d3def62 100644 --- a/_pages/fr_FR/a9lh-to-b9s.txt +++ b/_pages/fr_FR/a9lh-to-b9s.txt @@ -10,7 +10,7 @@ Cette page est faite pour que les utilisateurs actuels de arm9loaderhax puissent Toutes les futures versions de Luma3DS ne seront faites qu'exclusivement dans le format ".firm", lequel ne sera compatible qu'boot9strap et sighax. Cela veut dire que pour pouvoir recevoir les dernières mises à jour de Luma3DS, vous devez utiliser cette page pour mettre à jour votre installation. -To use the [magnet](https://wikipedia.org/wiki/Magnet_URI_scheme) links on this page, you will need a torrent client like [Deluge](http://dev.deluge-torrent.org/wiki/Download). +Pour utiliser les liens suivants [magnet](https://fr.wikipedia.org/wiki/Magnet_(standard)), vous avez besoin d'un client Torrent comme [Deluge](http://dev.deluge-torrent.org/wiki/Download). Pour extraire les fichiers `.7z` sur cette page, vous aurez besoin d'un programme d'archives comme [7-Zip](http://www.7-zip.org/) ou [The Unarchiver](https://theunarchiver.com). @@ -41,13 +41,13 @@ Notez que le fichier requis nommé `secret_sector.bin` est le même que celui se Notez que, seulement sur New 3DS, `secret_sector.bin` est nécessaire pour revenir sur l'exploit arm9loaderhax, c'est pourquoi il n'est pas nécessaire pour l'installation de boot9strap sur une console non-modifiée. Si vous n'avez pas de New 3DS, vous n'avez pas besoin de `secret_sector.bin`. {: .notice--info} -* - **New 3DS Users Only:** [secret_sector.bin](magnet:?xt=urn:btih:15a3c97acf17d67af98ae8657cc66820cc58f655&dn=secret_sector.bin&tr=udp%3A%2F%2F9.rarbg.to%3A2710%2Fannounce&tr=udp%3A%2F%2Fbt.xxx-tracker.com%3A2710%2Fannounce&tr=udp%3A%2F%2Fexodus.desync.com%3A6969%2Fannounce&tr=udp%3A%2F%2Fmgtracker.org%3A6969%2Fannounce&tr=udp%3A%2F%2Fopen.demonii.si%3A1337%2Fannounce&tr=udp%3A%2F%2Fpublic.popcorn-tracker.org%3A6969%2Fannounce&tr=udp%3A%2F%2Fthetracker.org%3A80%2Fannounce&tr=udp%3A%2F%2Ftracker.coppersurfer.tk%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker.cypherpunks.ru%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker.ds.is%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker.internetwarriors.net%3A1337%2Fannounce&tr=udp%3A%2F%2Ftracker.mg64.net%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker.open-internet.nl%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker.opentrackr.org%3A1337%2Fannounce&tr=udp%3A%2F%2Ftracker.port443.xyz%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker.qt.is%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker.tiny-vps.com%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker.torrent.eu.org%3A451%2Fannounce&tr=udp%3A%2F%2Ftracker.vanitycore.co%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker-2.msm8916.com%3A6969%2Fannounce) -* The latest release of [Luma3DS](https://github.com/AuroraWright/Luma3DS/releases/latest) *(the `.7z` file)* +* - **Seulement pour les utilisateurs d'une New 3DS:** [secret_sector.bin](magnet:?xt=urn:btih:15a3c97acf17d67af98ae8657cc66820cc58f655&dn=secret_sector.bin&tr=udp%3A%2F%2F9.rarbg.to%3A2710%2Fannounce&tr=udp%3A%2F%2Fbt.xxx-tracker.com%3A2710%2Fannounce&tr=udp%3A%2F%2Fexodus.desync.com%3A6969%2Fannounce&tr=udp%3A%2F%2Fmgtracker.org%3A6969%2Fannounce&tr=udp%3A%2F%2Fopen.demonii.si%3A1337%2Fannounce&tr=udp%3A%2F%2Fpublic.popcorn-tracker.org%3A6969%2Fannounce&tr=udp%3A%2F%2Fthetracker.org%3A80%2Fannounce&tr=udp%3A%2F%2Ftracker.coppersurfer.tk%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker.cypherpunks.ru%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker.ds.is%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker.internetwarriors.net%3A1337%2Fannounce&tr=udp%3A%2F%2Ftracker.mg64.net%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker.open-internet.nl%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker.opentrackr.org%3A1337%2Fannounce&tr=udp%3A%2F%2Ftracker.port443.xyz%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker.qt.is%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker.tiny-vps.com%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker.torrent.eu.org%3A451%2Fannounce&tr=udp%3A%2F%2Ftracker.vanitycore.co%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker-2.msm8916.com%3A6969%2Fannounce) +* La dernière version de [Luma3DS](https://github.com/AuroraWright/Luma3DS/releases/latest) *(le fichier`.7z`)* * La version 7.0.5 de [Luma3DS](https://github.com/AuroraWright/Luma3DS/releases/tag/v7.0.5) *(le fichier `.7z`)* * La dernière version de [SafeB9SInstaller](https://github.com/d0k3/SafeB9SInstaller/releases/latest) * La dernière version de [boot9strap](https://github.com/SciresM/boot9strap/releases/latest) *(boot9strap standard, ni le fichier `devkit`, ni le fichier `ntr`)* * La dernière version de [Anemone3DS](https://github.com/astronautlevel2/Anemone3DS/releases/latest) *(le fichier`.cia`)* -* The latest release of [Checkpoint](https://github.com/FlagBrew/Checkpoint/releases/latest) *(the `.cia` file)* +* La dernière version de [Checkpoint] (https://github.com/FlagBrew/Checkpoint/releases/latest) *(the `.cia` file) * * La dernière version de [Homebrew Launcher Wrapper](https://github.com/mariohackandglitch/homebrew_launcher_dummy/releases/latest) * La dernière version de [GodMode9](https://github.com/d0k3/GodMode9/releases/latest) * La dernière version de [DSP1](https://github.com/zoogie/DSP1/releases/latest) @@ -97,7 +97,7 @@ Pour toutes les étapes de cette section, remplacez tous les fichiers existants + Si vous voyez l'écran de configuration de Luma à la place de celui de SafeBS9Installer, appuyez tout simplement sur (Start), puis éteignez votre 3DS et réessayez + Si vous obtenez une erreur, essayez soit en utilisant une nouvelle carte SD, soit en formatant votre carte SD actuelle (sauvegardez d'abord les fichiers existants) 1. Attendez que tous les tests de sécurité soient finis - + Si vous obtenez une erreur "OTP Crypto Fail", télécharger - [aeskeydb.bin](magnet:?xt=urn:btih:d25dab06a7e127922d70ddaa4fe896709dc99a1e&dn=aeskeydb.bin&tr=udp%3A%2F%2F9.rarbg.to%3A2710%2Fannounce&tr=udp%3A%2F%2Fbt.xxx-tracker.com%3A2710%2Fannounce&tr=udp%3A%2F%2Fexodus.desync.com%3A6969%2Fannounce&tr=udp%3A%2F%2Fmgtracker.org%3A6969%2Fannounce&tr=udp%3A%2F%2Fopen.demonii.si%3A1337%2Fannounce&tr=udp%3A%2F%2Fpublic.popcorn-tracker.org%3A6969%2Fannounce&tr=udp%3A%2F%2Fthetracker.org%3A80%2Fannounce&tr=udp%3A%2F%2Ftracker.coppersurfer.tk%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker.cypherpunks.ru%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker.ds.is%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker.internetwarriors.net%3A1337%2Fannounce&tr=udp%3A%2F%2Ftracker.mg64.net%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker.open-internet.nl%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker.opentrackr.org%3A1337%2Fannounce&tr=udp%3A%2F%2Ftracker.port443.xyz%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker.qt.is%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker.tiny-vps.com%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker.torrent.eu.org%3A451%2Fannounce&tr=udp%3A%2F%2Ftracker.vanitycore.co%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker-2.msm8916.com%3A6969%2Fannounce), then put it in the `/boot9strap/` folder on your SD card and try again + + Si vous obtenez une erreur "OTP Crypto Fail", télécharger - [aeskeydb.bin](magnet:?xt=urn:btih:d25dab06a7e127922d70ddaa4fe896709dc99a1e&dn=aeskeydb.bin&tr=udp%3A%2F%2F9.rarbg.to%3A2710%2Fannounce&tr=udp%3A%2F%2Fbt.xxx-tracker.com%3A2710%2Fannounce&tr=udp%3A%2F%2Fexodus.desync.com%3A6969%2Fannounce&tr=udp%3A%2F%2Fmgtracker.org%3A6969%2Fannounce&tr=udp%3A%2F%2Fopen.demonii.si%3A1337%2Fannounce&tr=udp%3A%2F%2Fpublic.popcorn-tracker.org%3A6969%2Fannounce&tr=udp%3A%2F%2Fthetracker.org%3A80%2Fannounce&tr=udp%3A%2F%2Ftracker.coppersurfer.tk%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker.cypherpunks.ru%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker.ds.is%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker.internetwarriors.net%3A1337%2Fannounce&tr=udp%3A%2F%2Ftracker.mg64.net%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker.open-internet.nl%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker.opentrackr.org%3A1337%2Fannounce&tr=udp%3A%2F%2Ftracker.port443.xyz%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker.qt.is%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker.tiny-vps.com%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker.torrent.eu.org%3A451%2Fannounce&tr=udp%3A%2F%2Ftracker.vanitycore.co%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker-2.msm8916.com%3A6969%2Fannounce), puis placez le dans le dossier `/boot9strap/` sur votre carte SD et réessayez 1. Quand cela est demandé, appuyez sur la combinaison de boutons donnée pour installer boot9strap 1. Une fois que c'est fini, appuez sur (A) pour redémarrer l'appareil. + Si votre appareil s’éteint au démarrage, assurez-vous que vous avez copié `boot.firm` du dossier Luma3DS`.7z` à la racine de votre carte SD @@ -120,7 +120,7 @@ Si, avant d'avoir suivi ce guide, vous aviez une installation EmuNAND et que vou #### Section V - Homebrew Launcher -1. Launch the Download Play application (this [icon]({{ "/images/download-play-icon.png" | absolute_url }}) +1. Lancez l'application Mode téléchargement (cette [icône]({{ "/images/download-play-icon.png" | absolute_url }}) 1. Appuyez simultanément sur (L) + (Bas) + (Select) pour ouvrir le menu Rosalina 1. Sélectionnez "Miscellaneous options" 1. Sélectionnez "Switch the hb. title to the current app." @@ -136,7 +136,7 @@ Si, avant d'avoir suivi ce guide, vous aviez une installation EmuNAND et que vou 1. Appuyez sur (Start) pour retourner à l'Homebrew Launcher 1. Lancez FBI que vous trouverez dans la liste des homebrews -#### Section VI - Installing CIAs +#### Section VI - Installation des CIAs 1. Naviguez vers `SD` -> `cias` 1. Sélectionnez "\" @@ -163,14 +163,14 @@ Si, avant d'avoir suivi ce guide, vous aviez une installation EmuNAND et que vou 1. Appuyez sur (A) pour autoriser l'écriture (lv2) sur votre SysNAND, puis entrez la combinaison de touches demandée 1. Appuyez sur (A) pour continuer -#### Section IX - Cleanup SD Card +#### Section IX - Nettoyer la Carte SD 1. Sélectionnez "Cleanup SD Card" 1. Lorsque vous êtes invité, appuyez sur (A) 1. Appuyez sur (A) pour continuer 1. Appuyez sur (B) pour revenir au menu principal -#### Section X - Backup Essential Files +#### Section X - Sauvegarde des fichiers essentiels 1. Sélectionnez "Backup Options" 1. Sélectionnez "SysNAND Backup" @@ -181,14 +181,14 @@ Si, avant d'avoir suivi ce guide, vous aviez une installation EmuNAND et que vou 1. Appuyez sur (B) pour revenir au menu principal 1. Sélectionnez "Exit" 1. Appuyez (A) pour reverrouiller autorisations en écriture si vous êtes invité -1. Navigate to `[M:] MEMORY VIRTUAL` -1. Press (A) on `boot9.bin` to select it -1. Select "Copy to 0:/gm9/out" +1. Naviguez vers `[M:] MEMORY VIRTUAL` +1. Appuyez sur (A) sur `boot9.bin` pour le sélectionner +1. Sélectionnez "Copy to 0:/gm9/out" 1. Appuyez sur (A) pour continuer 1. Appuyez sur (B) pour revenir au menu principal 1. Maintenez (R) et appuyez sur (B) en même temps pour éjecter votre carte SD 1. Insérez votre carte SD dans votre ordinateur -1. Copy `__sysnand_###.bin`, `essential.exefs`, and `boot9.bin` from the `/gm9/out/` folder on your SD card to a safe location on your computer +1. Copiez `__sysnand_###.bin`, `essential.exefs` et `boot9.bin` du dossier `/gm9/out/` de votre carte SD vers un emplacement sûr de votre ordinateur + Faites des sauvegardes dans plusieurs endroits (tels que des stockages de fichiers en ligne par exemple) Ces sauvegardes vous sauveront d'un brick et/ou vous aideront à récupérer des fichiers de l'image de la NAND si quelque chose se passe mal plus tard 1. Supprimez `__sysnand_###.bin` et `__sysnand_###.bin.sha` du dossier `/gm9/out/` de votre carte SD après l'avoir copiée diff --git a/_pages/fr_FR/ctrtransfer.txt b/_pages/fr_FR/ctrtransfer.txt index 68f45a101a..1712216cf6 100644 --- a/_pages/fr_FR/ctrtransfer.txt +++ b/_pages/fr_FR/ctrtransfer.txt @@ -8,7 +8,7 @@ title : "CTRTransfer" Ceci est une section complémentaire pour ceux qui voudraient installer une image CTRTransfer 11.5.0 sur leur machine. -To use the [magnet](https://wikipedia.org/wiki/Magnet_URI_scheme) links on this page, you will need a torrent client like [Deluge](http://dev.deluge-torrent.org/wiki/Download). +Pour utiliser les liens suivants [magnet](https://fr.wikipedia.org/wiki/Magnet_(standard)), vous avez besoin d'un client Torrent comme [Deluge](http://dev.deluge-torrent.org/wiki/Download). Notez que si vous avez n’importe quel autre payload que `GodMode9.firm` dans le dossier `/luma/payloads/` sur votre carte SD, appuyer sur (Start) au démarrage affiche un "chainloader menu" où vous devrez utiliser le D-Pad et le bouton (A) pour sélectionner "GodMode9" . @@ -78,7 +78,7 @@ Vous DEVEZ avoir déjà installé Luma3DS et boot9strap pour utiliser ceci. #### Section III - Lancez FBI -1. Launch the Download Play application (this [icon]({{ "/images/download-play-icon.png" | absolute_url }}) +1. Lancez l'application Mode téléchargement (cette [icône]({{ "/images/download-play-icon.png" | absolute_url }}) 1. Appuyez simultanément sur (L) + (Bas) + (Select) pour ouvrir le menu Rosalina 1. Sélectionnez "Miscellaneous options" 1. Sélectionnez "Switch the hb. title to the current app." diff --git a/_pages/fr_FR/faq.txt b/_pages/fr_FR/faq.txt index 4c91e8357d..69bb4d0396 100644 --- a/_pages/fr_FR/faq.txt +++ b/_pages/fr_FR/faq.txt @@ -27,7 +27,7 @@ title: "FAQ" **R :** Oui. C’est sûr, arrêtez de demander. **Q :** *Où dois-je aller pour avoir de l'aide ?* -**A:** For support (in English), ask for help at [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp). +**R :** Pour obtenir de l'aide (en anglais), demandez sur le [Discord Nintendo Homebrew](https://discord.gg/MWxPgEp). **Q :** *Puis-je faire cela avec une carte SD 4 Go (ou moins)  ?* **R :** Oui ! diff --git a/_pages/fr_FR/finalizing-setup.txt b/_pages/fr_FR/finalizing-setup.txt index 66ad91e4a1..85476da350 100644 --- a/_pages/fr_FR/finalizing-setup.txt +++ b/_pages/fr_FR/finalizing-setup.txt @@ -18,11 +18,13 @@ Durant cette étape, nous allons également configurer les programmes suivants : + **Luma3DS Updater** *(Permet de mettre facilement à jour votre CFW)* + **GodMode9** *(Programme multifonction qui peut effectuer des opérations relatives à la NAND et aux cartouches)* + **Homebrew Launcher Loader** *(lance le Homebrew Launcher) * ++ **DSP1** *(allows homebrew applications to have sound)* ++ **ctr-no-timeoffset** *(removes the rtc offset so that the home menu and rtc timestamps match)* ## Ce dont vous avez besoin * La dernière version de [Anemone3DS](https://github.com/astronautlevel2/Anemone3DS/releases/latest) *(le fichier`.cia`)* -* The latest release of [Checkpoint](https://github.com/FlagBrew/Checkpoint/releases/latest) *(the `.cia` file)* +* La dernière version de [Checkpoint] (https://github.com/FlagBrew/Checkpoint/releases/latest) *(the `.cia` file) * * La dernière version de [Homebrew Launcher Wrapper](https://github.com/mariohackandglitch/homebrew_launcher_dummy/releases/latest) * La dernière version de [GodMode9](https://github.com/d0k3/GodMode9/releases/latest) * La dernière version de [DSP1](https://github.com/zoogie/DSP1/releases/latest) @@ -61,7 +63,7 @@ Durant cette étape, nous allons également configurer les programmes suivants : #### Section II - Mise à jour du système -If, while following a previous version of this guide, you CTRTransfered your *New 3DS* to 2.1.0, you should now [restore your NAND backup](godmode9-usage#restoring-a-nand-backup) before doing this section. +Si, en suivant une version précédente de ce guide, vous avez CTRTransféré votre *New 3DS* en 2.1.0, vous devrez maintenant [restaurer votre sauvegarde de la NAND](godmode9-usage#restoring-a-nand-backup) avant de faire cette section. {: .notice--danger} Si, avant d'avoir suivi ce guide, vous aviez une installation EmuNAND et que vous souhaitez transférer le contenu de votre précédent EmuNAND sur votre nouvelle SysNAND CFW, il est temps de [Transférer votre EmuNAND](move-emunand) avant de suivre cette section. @@ -74,7 +76,7 @@ Si, avant d'avoir suivi ce guide, vous aviez une installation EmuNAND et que vou #### Section III - Homebrew Launcher -1. Launch the Download Play application (![]({{ "/images/download-play-icon.png" | absolute_url }}){: height="24px" width="24px"}) +1. Lancez l'application Mode Téléchargement (![]({{ "/images/download-play-icon.png" | absolute_url }}){: height="24px" width="24px"}) 1. Appuyez simultanément sur (L) + (Bas) + (Select) pour ouvrir le menu Rosalina 1. Sélectionnez "Miscellaneous options" 1. Sélectionnez "Switch the hb. title to the current app." @@ -88,7 +90,7 @@ Si, avant d'avoir suivi ce guide, vous aviez une installation EmuNAND et que vou 1. Appuyez sur (A) pour mettre l’offset à 0 + Ainsi, l'horloge système correspondra à la date et heure du RTC (que nous allons régler bientôt) 1. Appuyez sur (Start) pour retourner à l'Homebrew Launcher - + If you previously followed [Installing boot9strap (Frogtool)](installing-boot9strap-(frogtool)), you should now use the "RESTORE clean DS Download Play" option in Frogtool to restore the DS Download Play application to its original state + + Si vous avez suivi précédemment la section [Installation de boot9strap (Frogtool)](installing-boot9strap-(frogtool)), vous devriez maintenant utiliser l'option "RESTORE clean DS Download Play" de Frogtool afin de restaurer l'application Mode téléchargement à son état original 1. Lancez FBI que vous trouverez dans la liste des homebrews #### Section IV - Installation des CIAs @@ -136,14 +138,14 @@ Si, avant d'avoir suivi ce guide, vous aviez une installation EmuNAND et que vou 1. Appuyez sur (B) pour revenir au menu principal 1. Sélectionnez "Exit" 1. Appuyez (A) pour reverrouiller autorisations en écriture si vous êtes invité -1. Navigate to `[M:] MEMORY VIRTUAL` -1. Press (A) on `boot9.bin` to select it -1. Select "Copy to 0:/gm9/out" +1. Naviguez vers `[M:] MEMORY VIRTUAL` +1. Appuyez sur (A) sur `boot9.bin` pour le sélectionner +1. Sélectionnez "Copy to 0:/gm9/out" 1. Appuyez sur (A) pour continuer 1. Appuyez sur (B) pour revenir au menu principal 1. Maintenez (R) et appuyez sur (B) en même temps pour éjecter votre carte SD 1. Insérez votre carte SD dans votre ordinateur -1. Copy `__sysnand_###.bin`, `essential.exefs`, and `boot9.bin` from the `/gm9/out/` folder on your SD card to a safe location on your computer +1. Copy `__sysnand_###.bin`, `__sysnand_###.bin.sha`, `essential.exefs`, and `boot9.bin` from the `/gm9/out/` folder on your SD card to a safe location on your computer + Faites des sauvegardes dans plusieurs endroits (tels que des stockages de fichiers en ligne par exemple) Ces sauvegardes vous sauveront d'un brick et/ou vous aideront à récupérer des fichiers de l'image de la NAND si quelque chose se passe mal plus tard 1. Supprimez `__sysnand_###.bin` et `__sysnand_###.bin.sha` du dossier `/gm9/out/` de votre carte SD après l'avoir copiée diff --git a/_pages/fr_FR/homebrew-launcher-(alternatives).txt b/_pages/fr_FR/homebrew-launcher-(alternatives).txt index 5e79dc242b..f63a7f106b 100644 --- a/_pages/fr_FR/homebrew-launcher-(alternatives).txt +++ b/_pages/fr_FR/homebrew-launcher-(alternatives).txt @@ -21,7 +21,7 @@ Pour extraire les fichiers `.7z` sur cette page, vous aurez besoin d'un programm * La dernière version de [boot9strap](https://github.com/SciresM/boot9strap/releases/latest) *(boot9strap standard, ni le fichier `devkit`, ni le fichier `ntr`)* - La dernière version de [safehax](https://github.com/TiniVi/safehax/releases/latest) * La dernière version de [udsploit](https://github.com/smealum/udsploit/releases/latest) -* The latest release of [Luma3DS](https://github.com/AuroraWright/Luma3DS/releases/latest) *(the `.7z` file)* +* La dernière version de [Luma3DS](https://github.com/AuroraWright/Luma3DS/releases/latest) *(le fichier`.7z`)* ### Instructions diff --git a/_pages/fr_FR/homebrew-launcher-(steelhax).txt b/_pages/fr_FR/homebrew-launcher-(steelhax).txt index 12928a849a..b355c511eb 100644 --- a/_pages/fr_FR/homebrew-launcher-(steelhax).txt +++ b/_pages/fr_FR/homebrew-launcher-(steelhax).txt @@ -6,19 +6,20 @@ title: "Homebrew Launcher (Steelhax)" ### Lecture requise -This method of using Seedminer for further exploitation uses your `movable.sed` file to gain access to the Homebrew Launcher using the Steelhax exploit for the purposes of injecting an exploitable DSiWare title into the DS Download Play application. This method requires you to already own (or download) the free "Steel Divers: Sub Wars" game from the eShop. +Cette méthode d'utilisation de Seedminer pour une exploitation ultérieure utilise votre fichier `movable.sed` pour accéder à l'Homebrew Launcher en utilisant l'exploit Steelhax pour injecter un titre DSiWare exploitable dans l'application Mode téléchargement. Cette méthode vous oblige à posséder (ou télécharger) le jeu gratuit "Steel Diver: Sub Wars" de l'eShop. -If your device already has access to the Homebrew Launcher (whether through Steelhax or another exploit), you can skip to [Installing Boot9strap (Frogminer)](installing-boot9strap-(frogminer)). +Si votre console a déjà accès à l'Homebrew Launcher (que ce soit via Steelhax ou un autre exploit), vous pouvez passer à [Installer Boot9strap (Frogtool)](installing-boot9strap-(frogtool)). {: .notice--success} -If you already have Steel Diver: Sub Wars, this process will overwrite your game's save file! +Si vous avez déjà Steel Diver: Sub Wars, ce processus écrasera votre fichier de sauvegarde du jeu ! {: .notice--warning} ## Ce dont vous avez besoin -* The free eShop game "Steel Diver: Sub Wars" -* La dernière version de [Homebrew Launcher](https://github.com/fincs/new-hbmenu/releases/latest) -* The latest release of [Steelhax](https://github.com/VegaRoXas/vegaroxas.github.io/raw/master/files/steelhax-installer.rar) +* Le jeu eShop gratuit "Steel Diver: Sub Wars" depuis l'eShop +* Votre fichier `movable.sed` obtenu grâce à [Seedminer](seedminer) +* The latest release of [the Homebrew Launcher](https://github.com/fincs/new-hbmenu/releases/latest) +* La dernière version de [Steelhax](https://github.com/VegaRoXas/vegaroxas.github.io/raw/master/files/steelhax-installer.rar) * Le [payload otherapp](https://smealum.github.io/3ds/#otherapp) *(en fonction de votre région et de votre version)* ### Instructions @@ -27,36 +28,36 @@ If you already have Steel Diver: Sub Wars, this process will overwrite your game 1. Créez un dossier nommé `3ds` à la racine de votre carte SD si celui ci n'existe pas 1. Copiez `boot.3dsx` à la racine de votre carte SD -1. Copy the `steelhax` folder from the Steelhax `.rar` to the root of your SD card -1. Copy the otherapp payload to the `steelhax` folder on your SD card and rename it to `payload.bin` +1. Copiez le dossier `steelhax` du fichier `.rar` de Steelhax à la racine de votre carte SD +1. Copiez le payload otherapp vers le dossier `steelhax` sur votre carte SD et renommez-le `payload.bin` #### Section II - Steelminer -1. Insert your SD card into your device -1. Launch "Steel Diver: Sub Wars" once and select a Mii to initialize your save file - + Decline the game update when prompted - + If you have already updated the game, use the Data Management menu of the System Settings to delete the update -1. Exit "Steel Diver: Sub Wars" +1. Insérez votre carte SD dans votre 3DS +1. Lancez "Steel Diver: Sub Wars" une fois et sélectionnez un Mii afin d'initialiser votre fichier de sauvegarde + + Refusez la mise à jour du jeu lorsque cela vous sera demandé + + Si vous avez déjà mis à jour le jeu, utilisez le menu Gestion des données des Paramètres de la console afin de supprimer la mise à jour +1. Quittez "Steel Diver: Sub Wars" 1. Éteignez votre 3DS 1. Insérez votre carte SD dans votre ordinateur -1. Open [the Steelminer Injector website](http://steelminer.jisagi.net/injector) on your computer -1. Select your `movable.sed` file -1. Select "Start!" -1. Wait for the process to complete -1. Navigate to `Nintendo 3DS` -> `` -> `<32-character-id>` -> `title` -> `00040000` -> `<8-character-region>` -> `data` on your SD card - + **EUR Region**: `000d7e00` - + **JPN Region**: `000d7c00` - + **USA Region**: `000d7d00` -1. Copy the new downloaded save file to the `data` folder on your SD card - + Overwrite the old save file when prompted +1. Ouvez le [site web de Steelminer Injector](https://bruteforcemovable.com/steelhax/) sur votre ordinateur +1. Sélectionnez votre fichier `movable.sed` +1. Sélectionnez "Start!" +1. Attendez la fin de l'opération +1. Naviguez vers `Nintendo 3DS` -> `` -> `<32-character-id>` -> `title` -> `00040000` -> `<8-character-region>` -> `data` sur votre carte SD + + **Région EUR** : `000d7e00` + + **Région JPN** : `000d7c00` + + **Région USA** : `000d7d00` +1. Copiez le nouveau fichier de sauvegarde téléchargé vers le dossier `data` sur votre carte SD + + Remplacez l'ancien fichier de sauvegarde lorsque cela vous sera demandé 1. Réinsérez votre carte SD dans votre 3DS 1. Allumez à présent votre 3DS -1. Launch "Steel Diver: Sub Wars" +1. Lancez "Steel Diver: Sub Wars" 1. Si l'exploit a réussi, votre console devrait avoir démarré l'Homebrew Launcher - + You may see an error stating there are no applications found. -1. Power off your device. + + Vous pouvez voir une erreur indiquant qu'il n'y a pas d'applications trouvées. +1. Éteignez votre console. ___ -### Continue to [Installing Boot9strap (Frogtool)](installing-boot9strap-(frogtool)) +### Continuez vers [Installation de Boot9strap (Frogtool)](installing-boot9strap-(frogtool)) {: .notice--primary} diff --git a/_pages/fr_FR/installing-boot9strap-(2xrsa).txt b/_pages/fr_FR/installing-boot9strap-(2xrsa).txt index 46abd0c62a..f28785ac7c 100644 --- a/_pages/fr_FR/installing-boot9strap-(2xrsa).txt +++ b/_pages/fr_FR/installing-boot9strap-(2xrsa).txt @@ -14,8 +14,8 @@ Pour extraire les fichiers `.7z` sur cette page, vous aurez besoin d'un programm * La dernière version de [SafeB9SInstaller](https://github.com/d0k3/SafeB9SInstaller/releases/latest) * La dernière version de [boot9strap](https://github.com/SciresM/boot9strap/releases/latest) *(boot9strap standard, ni le fichier `devkit`, ni le fichier `ntr`)* -* The latest release of [Luma3DS](https://github.com/AuroraWright/Luma3DS/releases/latest) *(the `.7z` file)* -* La dernière version de [Homebrew Launcher](https://github.com/fincs/new-hbmenu/releases/latest) +* La dernière version de [Luma3DS](https://github.com/AuroraWright/Luma3DS/releases/latest) *(le fichier`.7z`)* +* The latest release of [the Homebrew Launcher](https://github.com/fincs/new-hbmenu/releases/latest) ### Instructions diff --git a/_pages/fr_FR/installing-boot9strap-(browser).txt b/_pages/fr_FR/installing-boot9strap-(browser).txt index 13013782f9..b3e9798499 100644 --- a/_pages/fr_FR/installing-boot9strap-(browser).txt +++ b/_pages/fr_FR/installing-boot9strap-(browser).txt @@ -14,7 +14,7 @@ Pour extraire les fichiers `.7z` sur cette page, vous aurez besoin d'un programm * La dernière version de [SafeB9SInstaller](https://github.com/d0k3/SafeB9SInstaller/releases/latest) * La dernière version de [boot9strap](https://github.com/SciresM/boot9strap/releases/latest) *(boot9strap standard, ni le fichier `devkit`, ni le fichier `ntr`)* -* The latest release of [Luma3DS](https://github.com/AuroraWright/Luma3DS/releases/latest) *(the `.7z` file)* +* La dernière version de [Luma3DS](https://github.com/AuroraWright/Luma3DS/releases/latest) *(le fichier`.7z`)* * La dernière version de [Homebrew Launcher](https://github.com/fincs/new-hbmenu/releases/latest) ### Instructions diff --git a/_pages/fr_FR/installing-boot9strap-(fredtool).txt b/_pages/fr_FR/installing-boot9strap-(fredtool).txt index e2c0f27a81..23491df9b4 100644 --- a/_pages/fr_FR/installing-boot9strap-(fredtool).txt +++ b/_pages/fr_FR/installing-boot9strap-(fredtool).txt @@ -10,20 +10,18 @@ This method of using Seedminer for further exploitation uses your `movable.sed` Ceci est une implémentation de l'exploit "FIRM partitions known-plaintext" qui est décrit [ici](https://www.3dbrew.org/wiki/3DS_System_Flaws). -To use the [magnet](https://wikipedia.org/wiki/Magnet_URI_scheme) links on this page, you will need a torrent client like [Deluge](http://dev.deluge-torrent.org/wiki/Download). - -To extract the `.7z` and `.rar` files linked on this page, you will need a file archiver like [7-Zip](http://www.7-zip.org/) or [The Unarchiver](https://theunarchiver.com/). +Pour extraire les fichiers `.7z` et `.rar` sur cette page, vous aurez besoin d'un programme d'archives comme [7-Zip](http://www.7-zip.org/) ou [The Unarchiver](https://theunarchiver.com). ## Ce dont vous avez besoin * Any eShop DSiWare game + JPN region users can download the free title "ほぼ日の健康手帳™" ([![]({{ "/images/qrcodes/50010000005133.png" | absolute_url }}){: height="24px" width="24px"})]({{ "/images/qrcodes/50010000005133.png" | absolute_url }}) + USA region users can download the free title "Nintendo Fan Network" ([![]({{ "/images/qrcodes/50010000013696.png" | absolute_url }}){: height="24px" width="24px"})]({{ "/images/qrcodes/50010000013696.png" | absolute_url }}) -* Your `movable.sed` file from completing [Seedminer](seedminer) +* Votre fichier `movable.sed` obtenu grâce à [Seedminer](seedminer) * The latest release of [Frogminer_save](https://github.com/zoogie/Frogminer/releases/latest) * The latest release of [b9sTool](https://github.com/zoogie/b9sTool/releases/latest) -* The latest release of [Luma3DS](https://github.com/AuroraWright/Luma3DS/releases/latest) *(the `.7z` file)* -* La dernière version de [Homebrew Launcher](https://github.com/fincs/new-hbmenu/releases/latest) +* La dernière version de [Luma3DS](https://github.com/AuroraWright/Luma3DS/releases/latest) *(le fichier`.7z`)* +* The latest release of [the Homebrew Launcher](https://github.com/fincs/new-hbmenu/releases/latest) #### Section I - Préparatifs @@ -34,9 +32,9 @@ To extract the `.7z` and `.rar` files linked on this page, you will need a file + If prompted, overwrite any existing copy 1. Éteignez votre 3DS 1. Insérez votre carte SD dans votre ordinateur -1. Copy your `movable.sed` file to the root of your SD card +1. Copiez votre fichier `movable.sed` à la racine de votre carte SD 1. Copiez `boot.firm` de Luma3DS `.7z` dans la racine de votre carte SD -1. Copy `boot.nds` (B9STool) to the root of your SD card +1. Copiez le fichier `boot.nds`(B9STool) vers la racine de votre carte SD 1. Copiez `boot.3dsx` à la racine de votre carte SD 1. Copy the `private` folder from the Frogminer_save `.zip` to the root of your SD card 1. Navigate to `Nintendo 3DS` -> `` -> `<32-character-id>` -> `Nintendo DSiWare` on your SD card @@ -51,7 +49,7 @@ To extract the `.7z` and `.rar` files linked on this page, you will need a file 1. Select your `<8-character-id>.bin` file for the "Your dsiware.bin" field 1. Complete the "I'm not a robot" captcha 1. Select "Start" -1. Wait for the process to complete +1. Attendez la fin de l'opération 1. When the process has completed, download your modified DSiWare archive from the site 1. Copy the `42383841.bin` file from the `output/hax/` folder of the downloaded DSiWare archive to the `Nintendo 3DS//<32-character-id>/Nintendo DSiWare/` folder on your SD card + This should be different than your initial `<8-character-id>.bin` file diff --git a/_pages/fr_FR/installing-boot9strap-(frogtool).txt b/_pages/fr_FR/installing-boot9strap-(frogtool).txt index fa4a25ae3a..87f94cf1c0 100644 --- a/_pages/fr_FR/installing-boot9strap-(frogtool).txt +++ b/_pages/fr_FR/installing-boot9strap-(frogtool).txt @@ -10,26 +10,26 @@ We will now use our Homebrew Launcher access to run the Frogtool utility in orde Ceci est une implémentation de l'exploit "FIRM partitions known-plaintext" qui est décrit [ici](https://www.3dbrew.org/wiki/3DS_System_Flaws). -To use the [magnet](https://wikipedia.org/wiki/Magnet_URI_scheme) links on this page, you will need a torrent client like [Deluge](http://dev.deluge-torrent.org/wiki/Download). +Pour utiliser les liens suivants [magnet](https://fr.wikipedia.org/wiki/Magnet_(standard)), vous avez besoin d'un client Torrent comme [Deluge](http://dev.deluge-torrent.org/wiki/Download). -To extract the `.7z` and `.rar` files linked on this page, you will need a file archiver like [7-Zip](http://www.7-zip.org/) or [The Unarchiver](https://theunarchiver.com/). +Pour extraire les fichiers `.7z` et `.rar` sur cette page, vous aurez besoin d'un programme d'archives comme [7-Zip](http://www.7-zip.org/) ou [The Unarchiver](https://theunarchiver.com). ## Ce dont vous avez besoin -* Your `movable.sed` file from completing [Seedminer](seedminer) +* Votre fichier `movable.sed` obtenu grâce à [Seedminer](seedminer) * - [frogcert.bin](magnet:?xt=urn:btih:d12278ea50bb3574f1fbd327f3d0e2292c70941f&dn=frogcert.bin&tr=https%3a%2f%2ftracker.fastdownload.xyz%3a443%2fannounce&tr=https%3a%2f%2fopentracker.xyz%3a443%2fannounce&tr=http%3a%2f%2fopen.trackerlist.xyz%3a80%2fannounce&tr=http%3a%2f%2ft.nyaatracker.com%3a80%2fannounce&tr=udp%3a%2f%2ftracker.tiny-vps.com%3a6969%2fannounce&tr=udp%3a%2f%2fopen.demonii.si%3a1337%2fannounce&tr=udp%3a%2f%2ftracker.port443.xyz%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.vanitycore.co%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.torrent.eu.org%3a451%2fannounce&tr=udp%3a%2f%2fretracker.lanta-net.ru%3a2710%2fannounce&tr=udp%3a%2f%2fthetracker.org%3a80%2fannounce&tr=http%3a%2f%2ftorrent.nwps.ws%3a80%2fannounce&tr=udp%3a%2f%2ftracker.coppersurfer.tk%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.iamhansen.xyz%3a2000%2fannounce&tr=udp%3a%2f%2fbt.xxx-tracker.com%3a2710%2fannounce&tr=http%3a%2f%2f0d.kebhana.mx%3a443%2fannounce&tr=udp%3a%2f%2fexodus.desync.com%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.opentrackr.org%3a1337%2fannounce&tr=udp%3a%2f%2ftracker4.itzmx.com%3a2710%2fannounce&tr=udp%3a%2f%2ftracker.justseed.it%3a1337%2fannounce&tr=http%3a%2f%2ftherightsize.net%3a1337%2fannounce&tr=udp%3a%2f%2fretracker.hotplug.ru%3a2710%2fannounce&tr=udp%3a%2f%2ftracker.internetwarriors.net%3a1337%2fannounce&tr=udp%3a%2f%2f9.rarbg.com%3a2800%2fannounce&tr=https%3a%2f%2f2.track.ga%3a443%2fannounce&tr=udp%3a%2f%2fbigfoot1942.sektori.org%3a6969%2fannounce) -* The latest release of [Frogtool](https://github.com/zoogie/Frogtool/releases/latest) +* La dernière version de [Frogtool](https://github.com/zoogie/Frogtool/releases/latest) * The latest release of [b9sTool](https://github.com/zoogie/b9sTool/releases/latest) -* The latest release of [Luma3DS](https://github.com/AuroraWright/Luma3DS/releases/latest) *(the `.7z` file)* +* La dernière version de [Luma3DS](https://github.com/AuroraWright/Luma3DS/releases/latest) *(le fichier`.7z`)* #### Section I - Préparatifs 1. Insérez votre carte SD dans votre ordinateur -1. Copy your `movable.sed` file to the root of your SD card +1. Copiez votre fichier `movable.sed` à la racine de votre carte SD 1. Copiez `boot.firm` de Luma3DS `.7z` dans la racine de votre carte SD -1. Copy `boot.nds` (B9STool) to the root of your SD card -1. Copy `Frogtool.3dsx` to the `/3ds/` folder on your SD card -1. Copy `frogcert.bin` to the root of your SD card +1. Copiez le fichier `boot.nds`(B9STool) vers la racine de votre carte SD +1. Copiez `Frogtool.3dsx` dans le dossier `/3ds/` de votre carte SD +1. Copiez `frogcert.bin` à la racine de votre carte SD 1. Réinsérez votre carte SD dans votre 3DS 1. Allumez à présent votre 3DS diff --git a/_pages/fr_FR/installing-boot9strap-(hardmod).txt b/_pages/fr_FR/installing-boot9strap-(hardmod).txt index 6d69c3aaa1..362786e99b 100644 --- a/_pages/fr_FR/installing-boot9strap-(hardmod).txt +++ b/_pages/fr_FR/installing-boot9strap-(hardmod).txt @@ -10,7 +10,7 @@ Un excellent guide pour obtenir un hardmod se trouve [ici](https://gbatemp.net/t Ceci est une implémentation de l'exploit "FIRM partitions known-plaintext" qui est décrit [ici](https://www.3dbrew.org/wiki/3DS_System_Flaws). -To use the [magnet](https://wikipedia.org/wiki/Magnet_URI_scheme) links on this page, you will need a torrent client like [Deluge](http://dev.deluge-torrent.org/wiki/Download). +Pour utiliser les liens suivants [magnet](https://fr.wikipedia.org/wiki/Magnet_(standard)), vous avez besoin d'un client Torrent comme [Deluge](http://dev.deluge-torrent.org/wiki/Download). Pour extraire les fichiers `.7z` sur cette page, vous aurez besoin d'un programme d'archives comme [7-Zip](http://www.7-zip.org/) ou [The Unarchiver](https://theunarchiver.com). @@ -22,7 +22,7 @@ Cela fonctionne sur la New3DS, Old3DS, New 2DS et Old 3DS sur *toutes* les versi * La dernière version de [boot9strap](https://github.com/SciresM/boot9strap/releases/latest) *(boot9strap standard, ni le fichier `devkit`, ni le fichier `ntr`)* * La dernière version de [hardmod-b9s-installer](https://github.com/ihaveamac/hardmod-b9s-installer/releases/latest) + Les utilisateurs de Windows peuvent utiliser le `.exe` compilé, tandis que les utilisateurs Mac et Linux devront avoir [Python 3](https://www.python.org/downloads/) installé pour exécuter le `.py` -* The latest release of [Luma3DS](https://github.com/AuroraWright/Luma3DS/releases/latest) *(the `.7z` file)* +* La dernière version de [Luma3DS](https://github.com/AuroraWright/Luma3DS/releases/latest) *(le fichier`.7z`)* * La dernière version de [Homebrew Launcher](https://github.com/fincs/new-hbmenu/releases/latest) * Le `.firm` correspondant à votre console et version: diff --git a/_pages/fr_FR/installing-boot9strap-(mset).txt b/_pages/fr_FR/installing-boot9strap-(mset).txt index 79eadbfd6f..c3e1591abf 100644 --- a/_pages/fr_FR/installing-boot9strap-(mset).txt +++ b/_pages/fr_FR/installing-boot9strap-(mset).txt @@ -15,7 +15,7 @@ Pour extraire les fichiers `.7z` sur cette page, vous aurez besoin d'un programm * N'importe quelle cartouche DS qui fonctionne sur la version de votre console * La dernière version de [SafeB9SInstaller](https://github.com/d0k3/SafeB9SInstaller/releases/latest) * La dernière version de [boot9strap](https://github.com/SciresM/boot9strap/releases/latest) *(boot9strap standard, ni le fichier `devkit`, ni le fichier `ntr`)* -* The latest release of [Luma3DS](https://github.com/AuroraWright/Luma3DS/releases/latest) *(the `.7z` file)* +* La dernière version de [Luma3DS](https://github.com/AuroraWright/Luma3DS/releases/latest) *(le fichier`.7z`)* * La dernière version de [Homebrew Launcher](https://github.com/fincs/new-hbmenu/releases/latest) ### Instructions diff --git a/_pages/fr_FR/installing-boot9strap-(ntrboot).txt b/_pages/fr_FR/installing-boot9strap-(ntrboot).txt index 35287da3aa..5548b354a2 100644 --- a/_pages/fr_FR/installing-boot9strap-(ntrboot).txt +++ b/_pages/fr_FR/installing-boot9strap-(ntrboot).txt @@ -8,7 +8,7 @@ title: "Installer boot9strap (ntrboot)" Ceci est une implémentation de l'exploit "FIRM partitions known-plaintext" qui est décrit [ici](https://www.3dbrew.org/wiki/3DS_System_Flaws). -To use the [magnet](https://wikipedia.org/wiki/Magnet_URI_scheme) links on this page, you will need a torrent client like [Deluge](http://dev.deluge-torrent.org/wiki/Download). +Pour utiliser les liens suivants [magnet](https://fr.wikipedia.org/wiki/Magnet_(standard)), vous avez besoin d'un client Torrent comme [Deluge](http://dev.deluge-torrent.org/wiki/Download). Pour extraire les fichiers `.7z` sur cette page, vous aurez besoin d'un programme d'archives comme [7-Zip](http://www.7-zip.org/) ou [The Unarchiver](https://theunarchiver.com). @@ -18,8 +18,8 @@ Pour extraire les fichiers `.7z` sur cette page, vous aurez besoin d'un programm * Votre linker DS * La dernière version de [SafeB9SInstaller](https://github.com/d0k3/SafeB9SInstaller/releases/latest) * La dernière version de [boot9strap](https://github.com/SciresM/boot9strap/releases/latest) *(boot9strap standard, ni le fichier `devkit`, ni le fichier `ntr`)* -* The latest release of [Luma3DS](https://github.com/AuroraWright/Luma3DS/releases/latest) *(the `.7z` file)* -* La dernière version de [Homebrew Launcher](https://github.com/fincs/new-hbmenu/releases/latest) +* La dernière version de [Luma3DS](https://github.com/AuroraWright/Luma3DS/releases/latest) *(le fichier`.7z`)* +* The latest release of [the Homebrew Launcher](https://github.com/fincs/new-hbmenu/releases/latest) ### Instructions diff --git a/_pages/fr_FR/installing-boot9strap-(soundhax).txt b/_pages/fr_FR/installing-boot9strap-(soundhax).txt index 87efa92fbf..58ac3fcbc2 100644 --- a/_pages/fr_FR/installing-boot9strap-(soundhax).txt +++ b/_pages/fr_FR/installing-boot9strap-(soundhax).txt @@ -26,8 +26,8 @@ Cela signifie que l’utilisation d’une mise à jour via cartouche depuis une * The latest release of [Soundhax](http://soundhax.com) *(for your region, device, and version)* * La dernière version de [SafeB9SInstaller](https://github.com/d0k3/SafeB9SInstaller/releases/latest) * La dernière version de [boot9strap](https://github.com/SciresM/boot9strap/releases/latest) *(boot9strap standard, ni le fichier `devkit`, ni le fichier `ntr`)* -* The latest release of [Luma3DS](https://github.com/AuroraWright/Luma3DS/releases/latest) *(the `.7z` file)* -* La dernière version de [Homebrew Launcher](https://github.com/fincs/new-hbmenu/releases/latest) +* La dernière version de [Luma3DS](https://github.com/AuroraWright/Luma3DS/releases/latest) *(le fichier`.7z`)* +* The latest release of [the Homebrew Launcher](https://github.com/fincs/new-hbmenu/releases/latest) * The latest release of [pre9otherapp](https://github.com/Pirater12/otherapp/releases/latest) *(the `.bin` file corresponding to your firmware version)* ### Instructions diff --git a/_pages/fr_FR/ntrboot.txt b/_pages/fr_FR/ntrboot.txt index 0d8acd2a11..8263d325e5 100644 --- a/_pages/fr_FR/ntrboot.txt +++ b/_pages/fr_FR/ntrboot.txt @@ -17,14 +17,14 @@ Note : les linkers avec une "bombe à retardement" ne seront plus capables de la | Linker | Prix actuel | "Bombe à retardement" ? | Compatible 3DS ? | Compatible DSi ? | Autres notes | |-|-:|:-:|:-:|:-:|-| -| [**R4i-SDHC B9S**](http://www.nds-card.net/ProShow.asp?ProID=574) | $15.99 | September 3, 2019 | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot**; can be flashed back to an NDS flashcart. | -| [**R4i Gold 3DS Plus**](http://www.nds-card.net/ProShow.asp?ProID=575) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot** ([internal switch to switch between ntrboot and NDS modes]({{ "/images/screenshots/r4i-gold-3ds-plus.png" | absolute_url }})); do not manually flash with ntrboot. | -| [**Acekard 2i**](http://www.nds-card.net/ProShow.asp?ProID=160) | $20.99 | No | <= 4.3.0 | <= 1.4.4 | | -| [**DSTT**](http://www.nds-card.net/ProShow.asp?ProID=157) | $9.99 | No | None | None | Only models with [certain flash chips](https://gist.github.com/yuukieve/6b48f1bb8dd15136403c15c39fafdb42) are compatible with ntrboot. | -| [**R4i Gold 3DS**](http://www.nds-card.net/ProShow.asp?ProID=149) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | All RTS revisions are compatible. | -| [**R4i-SDHC 3DS RTS**](http://www.nds-card.net/ProShow.asp?ProID=146) | $13.99 | 1.87: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | | -| [**R4iSDHC GOLD Pro 20XX**](http://www.nds-card.net/ProShow.asp?ProID=490) | $9.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. Les modèles 2013 sont incompatibles. | -| [**R4iSDHC RTS LITE 20XX**](http://www.nds-card.net/ProShow.asp?ProID=450) | $13.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. Les modèles 2013 sont incompatibles. | +| [**R4i-SDHC B9S**](http://www.nds-card.com/ProShow.asp?ProID=574) | $15.99 | September 3, 2019 | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot**; can be flashed back to an NDS flashcart. | +| [**R4i Gold 3DS Plus**](http://www.nds-card.com/ProShow.asp?ProID=575) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot** ([internal switch to switch between ntrboot and NDS modes]({{ "/images/screenshots/r4i-gold-3ds-plus.png" | absolute_url }})); do not manually flash with ntrboot. | +| [**Acekard 2i**](http://www.nds-card.com/ProShow.asp?ProID=160) | $20.99 | No | <= 4.3.0 | <= 1.4.4 | | +| [**DSTT**](http://www.nds-card.com/ProShow.asp?ProID=157) | $9.99 | No | None | None | Only models with [certain flash chips](https://gist.github.com/yuukieve/6b48f1bb8dd15136403c15c39fafdb42) are compatible with ntrboot. | +| [**R4i Gold 3DS**](http://www.nds-card.com/ProShow.asp?ProID=149) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | All RTS revisions are compatible. | +| [**R4i-SDHC 3DS RTS**](http://www.nds-card.com/ProShow.asp?ProID=146) | $13.99 | 1.87: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | | +| [**R4iSDHC GOLD Pro 20XX**](http://www.nds-card.com/ProShow.asp?ProID=490) | $9.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. Les modèles 2013 sont incompatibles. | +| [**R4iSDHC RTS LITE 20XX**](http://www.nds-card.com/ProShow.asp?ProID=450) | $13.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. Les modèles 2013 sont incompatibles. | | **Ace3DS X** | | No | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot** (external switch to switch between ntrboot ("3DS") and NDS modes); do not manually flash with ntrboot. | | **Ace3DS Plus** | | No | <= 11.9.0 | <= 1.4.5 | | | **Gateway Blue** | | Non | 4.1.0 - 4.5.0 | <= 1.4.5 | | @@ -50,7 +50,7 @@ puis de voir si l'appareil se met en mode veille . Si cela fonctionne , l'écran Notez que le Linker ne pourra pas être utilisé pour ses fonctions standards tant que l’exploit de ntrboot est installé dessus (sauf dans le cas de l’Acekard 2i, qui reste fonctionnel *sur NDS et 3DS avec custom firmware installé seulement*). Cela signifie que, pour la plupart des linkers, il ne sera même pas affiché sur le menu HOME. Des étapes facultatives se trouvent à la fin des instructions de flash Ntrboot , concernant la suppresion de l'exploit de votre Linker . -Notez qu'il est possible que pendant le flash sur un clone celui-ci devienne **inutilisable**. C'est peu probable, mais notez que seuls les originaux sont supportés. To reduce the chance of receiving a counterfeit card, it is recommended that you use a reputable site to buy your flashcart (such as [NDS Card](http://www.nds-card.net/)) +Notez qu'il est possible que pendant le flash sur un clone celui-ci devienne **inutilisable**. C'est peu probable, mais notez que seuls les originaux sont supportés. To reduce the chance of receiving a counterfeit card, it is recommended that you use a reputable site to buy your flashcart (such as [NDS Card](http://www.nds-card.com/)) {: .notice--danger} ___ diff --git a/_pages/fr_FR/region-changing.txt b/_pages/fr_FR/region-changing.txt index 7839ad05ba..9419bdcffd 100644 --- a/_pages/fr_FR/region-changing.txt +++ b/_pages/fr_FR/region-changing.txt @@ -10,7 +10,7 @@ Ceci est une section complémentaire pour ceux qui voudraient changer la région Note that region changing is almost completely unnecessary since Luma3DS supports out-of-region games and individual title [Locale Emulation](https://github.com/AuroraWright/Luma3DS/wiki/Optional-features). Additionally, running NDS games with alternative out-of-region languages is supported [DSiMenu++](https://github.com/Robz8/TWiLightMenu/releases). -To use the [magnet](https://wikipedia.org/wiki/Magnet_URI_scheme) links on this page, you will need a torrent client like [Deluge](http://dev.deluge-torrent.org/wiki/Download). +Pour utiliser les liens suivants [magnet](https://fr.wikipedia.org/wiki/Magnet_(standard)), vous avez besoin d'un client Torrent comme [Deluge](http://dev.deluge-torrent.org/wiki/Download). Notez que si vous avez n’importe quel autre payload que `GodMode9.firm` dans le dossier `/luma/payloads/` sur votre carte SD, appuyez (Start) au démarrage affiche un "chainloader menu" où vous devrez utiliser le D-Pad et le bouton (A) pour sélectionner "GodMode9" . @@ -89,7 +89,7 @@ Vous DEVEZ avoir déjà installé Luma3DS et boot9strap pour utiliser ceci. #### Section III - Lancez FBI -1. Launch the Download Play application (this [icon]({{ "/images/download-play-icon.png" | absolute_url }}) +1. Lancez l'application Mode téléchargement (cette [icône]({{ "/images/download-play-icon.png" | absolute_url }}) 1. Appuyez simultanément sur (L) + (Bas) + (Select) pour ouvrir le menu Rosalina 1. Sélectionnez "Miscellaneous options" 1. Sélectionnez "Switch the hb. title to the current app." diff --git a/_pages/fr_FR/seedminer.txt b/_pages/fr_FR/seedminer.txt index ba987360a1..efd2ef1e8a 100644 --- a/_pages/fr_FR/seedminer.txt +++ b/_pages/fr_FR/seedminer.txt @@ -63,9 +63,7 @@ There are two different methods for building on the Seedminer exploit (described 1. Open [Bruteforce Movable](https://bruteforcemovable.com/) on your computer + This site can automate the retrieval of `movable_part1.sed` (using a bot 3DS console) and the breaking of your device's DSiWare encryption (using a volunteer's computer to run Seedminer) - + If you already have access to a 3DS capable of launching the Homebrew Launcher, you can manually retrieve your `movable_part1.sed` using that device by following [these](https://jisagi.github.io/SeedminerGuide/seedminerSelf/#section1) instructions - + If you already have access to a PC with a powerful graphics card, you can manually calculate your `movable.sed` using it by following [these](https://jisagi.github.io/SeedminerGuide/seedminerSelf/#section2) instructions - + If the automated service is nonfunctional and you cannot do one or both of those manually, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you + + If the automated service is nonfunctional, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you 1. Enter your device's Friend Code (with no spaces or dashes) into the "Your friend code" field 1. Paste your device's 32 character long folder name into the "Your ID0" field 1. Complete the "I'm not a robot" captcha @@ -74,11 +72,11 @@ There are two different methods for building on the Seedminer exploit (described 1. When prompted, use the "Register Friend" button on your device to add the friend code of the bot 3DS console 1. Wait for the site to update + If it does not, wait a few minutes before refreshing the page once -1. Select "Continue" -1. Wait for the process to complete - + This can take a while (up to an hour in some cases) - + During this process, the bot may not show up on your 3ds. As long as the website updates, this is not an issue. - + If you are still waiting after an hour, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you +1. Once the site processes your information, you will be given the option to "Continue" or "Do another device". Click the green "Continue" button +1. Wait for the remainder of the process to complete + + This is usually fast (1-5 minutes) but in some cases, can take up to half an hour. + + During this process, the bot you added may not show up on your 3ds. As long as the website updates, this is not an issue. + + If you are still waiting after half an hour, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you 1. When the process has completed, download your `movable.sed` file from the site + Keep this file as you will need it in the upcoming pages @@ -102,7 +100,7 @@ ___ #### Seedminer + Steelhax + Frogtool -This method of using Seedminer for further exploitation uses your `movable.sed` file to gain access to the Homebrew Launcher using the Steelhax exploit for the purposes of injecting an exploitable DSiWare title into the DS Download Play application. This method requires you to already own (or download) the free "Steel Divers: Sub Wars" game from the eShop. +Cette méthode d'utilisation de Seedminer pour une exploitation ultérieure utilise votre fichier `movable.sed` pour accéder à l'Homebrew Launcher en utilisant l'exploit Steelhax pour injecter un titre DSiWare exploitable dans l'application Mode téléchargement. This method requires you to already own (or download) the free "Steel Diver: Sub Wars" game from the eShop. This method is only compatible with the EUR, JPN, and USA regions, and is somewhat more complicated than the above method. It is only recommended to use this method if you have a EUR region device and do not wish to pay for a DSiWare game, or if the above method does not work for you for some reason. diff --git a/_pages/fr_FR/troubleshooting.txt b/_pages/fr_FR/troubleshooting.txt index 2c3a56ba4f..b1635d37a0 100644 --- a/_pages/fr_FR/troubleshooting.txt +++ b/_pages/fr_FR/troubleshooting.txt @@ -12,7 +12,7 @@ Si vous ne parvenez pas à démarrer votre 3DS, recherchez la section qui vous c Notez que si vous avez n’importe quel autre payload que `GodMode9.firm` dans le dossier `/luma/payloads/` sur votre carte SD, appuyer sur (Start) au démarrage affiche un "chainloader menu" où vous devrez utiliser le D-Pad et le bouton (A) pour sélectionner "GodMode9" . -To use the [magnet](https://wikipedia.org/wiki/Magnet_URI_scheme) links on this page, you will need a torrent client like [Deluge](http://dev.deluge-torrent.org/wiki/Download). +Pour utiliser les liens suivants [magnet](https://fr.wikipedia.org/wiki/Magnet_(standard)), vous avez besoin d'un client Torrent comme [Deluge](http://dev.deluge-torrent.org/wiki/Download). ## La fonctionnalité DSi / DS ne fonctionne plus après avoir fini le guide diff --git a/_pages/fr_FR/uninstall-cfw.txt b/_pages/fr_FR/uninstall-cfw.txt index 03655e4ada..f1efb7c93e 100644 --- a/_pages/fr_FR/uninstall-cfw.txt +++ b/_pages/fr_FR/uninstall-cfw.txt @@ -11,7 +11,7 @@ Ceci supprimera complètement le CFW de votre console, y compris Boot9Strap et L Ce n'est presque jamais la solution pour résoudre les problèmes que vous pouvez rencontrez lors de l'installation d'un CFW. A better idea would be to read the [troubleshooting](troubleshooting) page or ask (in English) for help at [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp). {: .notice--danger} -Tous les jeux (illégitimes) non signés seront rendues inutilisables et peuvent être supprimés manuellement à l’aide de la section de gestion des données des paramètres système. Use a [save manager](https://github.com/FlagBrew/Checkpoint/releases/latest) to backup any saves for these unsigned (illegitimate) games you care about. +Any unsigned (illegitimate) games will be rendered unusable and should be manually removed before starting this process by using the Data Management section of the System Settings. Use a [save manager](https://github.com/FlagBrew/Checkpoint/releases/latest) to backup any saves for these unsigned (illegitimate) games you care about. Cela n’affectera pas votre NNID, n’importe quel jeux légitimement achetés ou des sauvegardes pour ces jeux légitimement achetés. @@ -26,21 +26,43 @@ Notez que si vous avez n’importe quel autre payload que `GodMode9.firm` dans l ### Instructions -#### Section I - Préparatifs +#### Section I - Safety Test 1. Éteignez votre 3DS 1. Insérez votre carte SD dans votre ordinateur 1. Copiez le fichier `GodMode9.firm` de l'archive GodMode9 `.zip` dans le dossier `/luma/payloads/` sur votre carte SD 1. Copiez le dossier `gm9` de GodMode9 `.zip` à la racine de votre carte SD 1. Réinsérez votre carte SD dans votre 3DS -1. Allumez à présent votre 3DS - -#### Section II - Exécution du script pour désinstaller CFW - 1. Ouvrez Godmode9 en maintenant (Start) au démarrage 1. Si vous êtes invité à créer une sauvegarde de fichiers essentiels, appuyez sur (A) pour le faire, puis appuyez sur (A) pour continuer une fois qu’elle a complété 1. Si vous êtes invité à régler la date et l'heure du RTC, appuyez sur (A) pour le faire, puis réglez la date et l'heure, puis appuyez sur (A) pour continuer Notez que, si vous avez dû régler la date et l'heure du RTC, vous devrez également régler l'heure dans les Paramètres du système après ce guide +1. Navigate to `[1:] SYSNAND CTRNAND > title > 00040138 > (X)0000002 > content` + + On a "New" edition console, the (X) will instead be 2 + + On an "Old" edition console, the (X) will instead be 0 +1. Select the `.app` file +1. Select `NCCH Image Options` +1. Select `Mount image to drive` +1. In the window that appears, open the `exefs` folder +1. In this folder, select the `.firm` file +1. Select "Firm Options" +1. Select "Boot Firm" +1. When prompted, choose to decrypt and make a copy +1. You should boot into the regular 3DS Home Menu. If you do, power your device off and continue to the next section + + If you do NOT boot into the regular 3DS Home Menu, continuing with these instructions **WILL** brick your device. You should join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you + +#### Section II - Prep Work + +1. Allumez à présent votre 3DS +1. Navigate to System Settings > Data Management > Nintendo 3DS > Software +1. In this list of software, delete any non-Nintendo content you installed while using CFW + + This includes common system software such as FBI, Anemone3DS, Luma Updater, Homebrew Launcher, Checkpoint, and others, along with any non-eShop games + + Failure to remove CFW software before uninstalling CFW may break access to the Data Management menu after uninstalling CFW +1. Éteignez votre 3DS + +#### Section III - Running Uninstall Script + +1. Ouvrez Godmode9 en maintenant (Start) au démarrage 1. Appuyez sur (Home) pour faire apparaître le menu d’actions (action menu) 1. Sélectionnez "Scripts" 1. Sélectionnez "GM9Megascript" diff --git a/_pages/fr_FR/updating-b9s.txt b/_pages/fr_FR/updating-b9s.txt index 6404890594..bc8a4c9d74 100644 --- a/_pages/fr_FR/updating-b9s.txt +++ b/_pages/fr_FR/updating-b9s.txt @@ -31,7 +31,7 @@ Il y a eu des informations concernant une vague de bannissements contre les util * La dernière version de [SafeB9SInstaller](https://github.com/d0k3/SafeB9SInstaller/releases/latest) * La dernière version de [boot9strap](https://github.com/SciresM/boot9strap/releases/latest) *(boot9strap standard, ni le fichier `devkit`, ni le fichier `ntr`)* * La dernière version de [GodMode9](https://github.com/d0k3/GodMode9/releases/latest) -* The latest release of [Luma3DS](https://github.com/AuroraWright/Luma3DS/releases/latest) *(the `.7z` file)* +* La dernière version de [Luma3DS](https://github.com/AuroraWright/Luma3DS/releases/latest) *(le fichier`.7z`)* ### Instructions diff --git a/_pages/he_IL/finalizing-setup.txt b/_pages/he_IL/finalizing-setup.txt index dcb9919757..a4640fc332 100644 --- a/_pages/he_IL/finalizing-setup.txt +++ b/_pages/he_IL/finalizing-setup.txt @@ -18,6 +18,8 @@ title: "סיום התהליך" + **Luma3DS Updater** *(עדכון לCFW בקלות)* + **GodMode9** *(כלי רב שימושי אשר מסוגל לבצע פונקציות הקשורות ל-NAND ולקלטות משחק)* + **Homebrew Launcher Loader** *(מפעיל את הHomebrew Launcher)* ++ **DSP1** *(allows homebrew applications to have sound)* ++ **ctr-no-timeoffset** *(removes the rtc offset so that the home menu and rtc timestamps match)* ### What You Need @@ -143,7 +145,7 @@ If, while following a previous version of this guide, you CTRTransfered your *Ne 1. תלחצו (B) כדי לחזור לתפריט הראשי 1. תחזיקו (R) ולחצו (B) באותו הזמן כדי להוציא את הSD 1. תכניסו את ה-SD שלכם למחשב -1. Copy `__sysnand_###.bin`, `essential.exefs`, and `boot9.bin` from the `/gm9/out/` folder on your SD card to a safe location on your computer +1. Copy `__sysnand_###.bin`, `__sysnand_###.bin.sha`, `essential.exefs`, and `boot9.bin` from the `/gm9/out/` folder on your SD card to a safe location on your computer + תיצרו גיבויים במקומות שונים (כמו אחסון בענן) + These backups will save you from a brick and/or help you recover files from the NAND image if anything goes wrong in the future 1. Delete `__sysnand_###.bin` and `__sysnand_###.bin.sha` from the `/gm9/out/` folder on your SD card after copying it diff --git a/_pages/he_IL/homebrew-launcher-(steelhax).txt b/_pages/he_IL/homebrew-launcher-(steelhax).txt index 23375ff2f7..6c178bd2c4 100644 --- a/_pages/he_IL/homebrew-launcher-(steelhax).txt +++ b/_pages/he_IL/homebrew-launcher-(steelhax).txt @@ -8,7 +8,7 @@ title: "Homebrew Launcher (Steelhax)" This method of using Seedminer for further exploitation uses your `movable.sed` file to gain access to the Homebrew Launcher using the Steelhax exploit for the purposes of injecting an exploitable DSiWare title into the DS Download Play application. This method requires you to already own (or download) the free "Steel Divers: Sub Wars" game from the eShop. -If your device already has access to the Homebrew Launcher (whether through Steelhax or another exploit), you can skip to [Installing Boot9strap (Frogminer)](installing-boot9strap-(frogminer)). +If your device already has access to the Homebrew Launcher (whether through Steelhax or another exploit), you can skip to [Installing Boot9strap (Frogtool)](installing-boot9strap-(frogtool)). {: .notice--success} If you already have Steel Diver: Sub Wars, this process will overwrite your game's save file! @@ -17,6 +17,7 @@ If you already have Steel Diver: Sub Wars, this process will overwrite your game ### What You Need * The free eShop game "Steel Diver: Sub Wars" +* Your `movable.sed` file from completing [Seedminer](seedminer) * The latest release of [the Homebrew Launcher](https://github.com/fincs/new-hbmenu/releases/latest) * The latest release of [Steelhax](https://github.com/VegaRoXas/vegaroxas.github.io/raw/master/files/steelhax-installer.rar) * The [otherapp payload](https://smealum.github.io/3ds/#otherapp) *(for your region and version)* @@ -39,7 +40,7 @@ If you already have Steel Diver: Sub Wars, this process will overwrite your game 1. Exit "Steel Diver: Sub Wars" 1. תכבו את המכשיר 1. תכניסו את ה-SD שלכם למחשב -1. Open [the Steelminer Injector website](http://steelminer.jisagi.net/injector) on your computer +1. Open [the Steelminer Injector website](https://bruteforcemovable.com/steelhax/) on your computer 1. Select your `movable.sed` file 1. Select "Start!" 1. Wait for the process to complete diff --git a/_pages/he_IL/installing-boot9strap-(fredtool).txt b/_pages/he_IL/installing-boot9strap-(fredtool).txt index 78631d3d77..4ad160b9c3 100644 --- a/_pages/he_IL/installing-boot9strap-(fredtool).txt +++ b/_pages/he_IL/installing-boot9strap-(fredtool).txt @@ -10,8 +10,6 @@ This method of using Seedminer for further exploitation uses your `movable.sed` זה כרגע יישום עובד של הפירצה "PLAINTEXT ידוע למחיצת הFIRM" עם הסבר [כאן](https://www.3dbrew.org/wiki/3DS_System_Flaws). -To use the [magnet](https://wikipedia.org/wiki/Magnet_URI_scheme) links on this page, you will need a torrent client like [Deluge](http://dev.deluge-torrent.org/wiki/Download). - To extract the `.7z` and `.rar` files linked on this page, you will need a file archiver like [7-Zip](http://www.7-zip.org/) or [The Unarchiver](https://theunarchiver.com/). ### What You Need diff --git a/_pages/he_IL/ntrboot.txt b/_pages/he_IL/ntrboot.txt index 7ba3f07a91..7bb056b76b 100644 --- a/_pages/he_IL/ntrboot.txt +++ b/_pages/he_IL/ntrboot.txt @@ -17,14 +17,14 @@ If your flashcart comes pre-flashed with ntrboot (or you have already flashed nt | שם הכרטיס | מחיר נוכחי | "פצצת זמן"? | גרסאות 3DS? | גירסאות DSi? | הערות אחרות | |-|-:|:-:|:-:|:-:|-| -| [**R4i-SDHC B9S**](http://www.nds-card.net/ProShow.asp?ProID=574) | $15.99 | September 3, 2019 | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot**; can be flashed back to an NDS flashcart. | -| [**R4i Gold 3DS Plus**](http://www.nds-card.net/ProShow.asp?ProID=575) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot** ([internal switch to switch between ntrboot and NDS modes]({{ "/images/screenshots/r4i-gold-3ds-plus.png" | absolute_url }})); do not manually flash with ntrboot. | -| [**Acekard 2i**](http://www.nds-card.net/ProShow.asp?ProID=160) | $20.99 | No | <= 4.3.0 | <= 1.4.4 | | -| [**DSTT**](http://www.nds-card.net/ProShow.asp?ProID=157) | $9.99 | No | None | None | Only models with [certain flash chips](https://gist.github.com/yuukieve/6b48f1bb8dd15136403c15c39fafdb42) are compatible with ntrboot. | -| [**R4i Gold 3DS**](http://www.nds-card.net/ProShow.asp?ProID=149) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | All RTS revisions are compatible. | -| [**R4i-SDHC 3DS RTS**](http://www.nds-card.net/ProShow.asp?ProID=146) | $13.99 | 1.87: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | | -| [**R4iSDHC GOLD Pro 20XX**](http://www.nds-card.net/ProShow.asp?ProID=490) | $9.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. 2013 models are incompatible. | -| [**R4iSDHC RTS LITE 20XX**](http://www.nds-card.net/ProShow.asp?ProID=450) | $13.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. 2013 models are incompatible. | +| [**R4i-SDHC B9S**](http://www.nds-card.com/ProShow.asp?ProID=574) | $15.99 | September 3, 2019 | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot**; can be flashed back to an NDS flashcart. | +| [**R4i Gold 3DS Plus**](http://www.nds-card.com/ProShow.asp?ProID=575) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot** ([internal switch to switch between ntrboot and NDS modes]({{ "/images/screenshots/r4i-gold-3ds-plus.png" | absolute_url }})); do not manually flash with ntrboot. | +| [**Acekard 2i**](http://www.nds-card.com/ProShow.asp?ProID=160) | $20.99 | No | <= 4.3.0 | <= 1.4.4 | | +| [**DSTT**](http://www.nds-card.com/ProShow.asp?ProID=157) | $9.99 | No | None | None | Only models with [certain flash chips](https://gist.github.com/yuukieve/6b48f1bb8dd15136403c15c39fafdb42) are compatible with ntrboot. | +| [**R4i Gold 3DS**](http://www.nds-card.com/ProShow.asp?ProID=149) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | All RTS revisions are compatible. | +| [**R4i-SDHC 3DS RTS**](http://www.nds-card.com/ProShow.asp?ProID=146) | $13.99 | 1.87: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | | +| [**R4iSDHC GOLD Pro 20XX**](http://www.nds-card.com/ProShow.asp?ProID=490) | $9.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. 2013 models are incompatible. | +| [**R4iSDHC RTS LITE 20XX**](http://www.nds-card.com/ProShow.asp?ProID=450) | $13.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. 2013 models are incompatible. | | **Ace3DS X** | | No | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot** (external switch to switch between ntrboot ("3DS") and NDS modes); do not manually flash with ntrboot. | | **Ace3DS Plus** | | No | <= 11.9.0 | <= 1.4.5 | | | **Gateway Blue** | | No | 4.1.0 - 4.5.0 | <= 1.4.5 | | @@ -49,7 +49,7 @@ If your flashcart comes pre-flashed with ntrboot (or you have already flashed nt Note that the flashcart will not be able to be used for its standard functions while the ntrboot exploit is installed on it (except for in the case of the Acekard 2i, which remains functional *on NDS and custom firmware 3DS systems only*). זה אומר שרוב הכרטיסים אפילו לא יהיו מוצגים בתפריט הביית. יש שלבים אופטימלים בסוף הוראות צריבת ntrboot כדי למחוק אותו מכרטיס הפריצה אחרי שסיימתם. -שימו לב שבמקרים נדירים, יתכן שתהליך הצריבה **ישבור** כרטיס פריצה מזוייף ויגרום לו לא לעבוד. זה לא סביר שייקרה, אבל בכל זאת רק כרטיסי פריצה מקוריים שמפורטים נתמכים. To reduce the chance of receiving a counterfeit card, it is recommended that you use a reputable site to buy your flashcart (such as [NDS Card](http://www.nds-card.net/)) +שימו לב שבמקרים נדירים, יתכן שתהליך הצריבה **ישבור** כרטיס פריצה מזוייף ויגרום לו לא לעבוד. זה לא סביר שייקרה, אבל בכל זאת רק כרטיסי פריצה מקוריים שמפורטים נתמכים. To reduce the chance of receiving a counterfeit card, it is recommended that you use a reputable site to buy your flashcart (such as [NDS Card](http://www.nds-card.com/)) {: .notice--danger} ___ diff --git a/_pages/he_IL/seedminer.txt b/_pages/he_IL/seedminer.txt index 372b95ab4b..63b46fb914 100644 --- a/_pages/he_IL/seedminer.txt +++ b/_pages/he_IL/seedminer.txt @@ -63,9 +63,7 @@ There are two different methods for building on the Seedminer exploit (described 1. Open [Bruteforce Movable](https://bruteforcemovable.com/) on your computer + This site can automate the retrieval of `movable_part1.sed` (using a bot 3DS console) and the breaking of your device's DSiWare encryption (using a volunteer's computer to run Seedminer) - + If you already have access to a 3DS capable of launching the Homebrew Launcher, you can manually retrieve your `movable_part1.sed` using that device by following [these](https://jisagi.github.io/SeedminerGuide/seedminerSelf/#section1) instructions - + If you already have access to a PC with a powerful graphics card, you can manually calculate your `movable.sed` using it by following [these](https://jisagi.github.io/SeedminerGuide/seedminerSelf/#section2) instructions - + If the automated service is nonfunctional and you cannot do one or both of those manually, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you + + If the automated service is nonfunctional, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you 1. Enter your device's Friend Code (with no spaces or dashes) into the "Your friend code" field 1. Paste your device's 32 character long folder name into the "Your ID0" field 1. Complete the "I'm not a robot" captcha @@ -74,11 +72,11 @@ There are two different methods for building on the Seedminer exploit (described 1. When prompted, use the "Register Friend" button on your device to add the friend code of the bot 3DS console 1. Wait for the site to update + If it does not, wait a few minutes before refreshing the page once -1. Select "Continue" -1. Wait for the process to complete - + This can take a while (up to an hour in some cases) - + During this process, the bot may not show up on your 3ds. As long as the website updates, this is not an issue. - + If you are still waiting after an hour, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you +1. Once the site processes your information, you will be given the option to "Continue" or "Do another device". Click the green "Continue" button +1. Wait for the remainder of the process to complete + + This is usually fast (1-5 minutes) but in some cases, can take up to half an hour. + + During this process, the bot you added may not show up on your 3ds. As long as the website updates, this is not an issue. + + If you are still waiting after half an hour, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you 1. When the process has completed, download your `movable.sed` file from the site + Keep this file as you will need it in the upcoming pages @@ -102,7 +100,7 @@ ___ #### Seedminer + Steelhax + Frogtool -This method of using Seedminer for further exploitation uses your `movable.sed` file to gain access to the Homebrew Launcher using the Steelhax exploit for the purposes of injecting an exploitable DSiWare title into the DS Download Play application. This method requires you to already own (or download) the free "Steel Divers: Sub Wars" game from the eShop. +This method of using Seedminer for further exploitation uses your `movable.sed` file to gain access to the Homebrew Launcher using the Steelhax exploit for the purposes of injecting an exploitable DSiWare title into the DS Download Play application. This method requires you to already own (or download) the free "Steel Diver: Sub Wars" game from the eShop. This method is only compatible with the EUR, JPN, and USA regions, and is somewhat more complicated than the above method. It is only recommended to use this method if you have a EUR region device and do not wish to pay for a DSiWare game, or if the above method does not work for you for some reason. diff --git a/_pages/he_IL/uninstall-cfw.txt b/_pages/he_IL/uninstall-cfw.txt index d9297c25a3..8d9ae36e47 100644 --- a/_pages/he_IL/uninstall-cfw.txt +++ b/_pages/he_IL/uninstall-cfw.txt @@ -11,7 +11,7 @@ title: "הסרת CFW" This is almost never the solution to fix any issues you encounter with your CFW installation. A better idea would be to read the [troubleshooting](troubleshooting) page or ask (in English) for help at [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp). {: .notice--danger} -כל המשחקים הלא חתומים (פרוצים) יפסיקו לעבוד ותוכלו למחוק אותם ידנים בעזרת Data management בהגדרות. Use a [save manager](https://github.com/FlagBrew/Checkpoint/releases/latest) to backup any saves for these unsigned (illegitimate) games you care about. +Any unsigned (illegitimate) games will be rendered unusable and should be manually removed before starting this process by using the Data Management section of the System Settings. Use a [save manager](https://github.com/FlagBrew/Checkpoint/releases/latest) to backup any saves for these unsigned (illegitimate) games you care about. זה לא ישפיע על הNNID שלכם, כל המשחקים הקנויים חוקית, או השמירות שלהם. @@ -26,21 +26,43 @@ If you have modified critical system software (such as editing the home menu, un ### הנחיות -#### חלק I - הכנות +#### Section I - Safety Test 1. תכבו את המכשיר 1. תכניסו את ה-SD שלכם למחשב 1. העתיקו את `GodMode9.firm` מהזיפ של GodMode9 אל תיקיית /luma/payloads/ ב- SD שלכם 1. תעתיקו את התיקייה `gm9` מתוך ה`.zip` של GodMode9 ל-SD שלכם 1. תכניסו מחדש את כרטיס הSD שלכם לתוך המכשיר שלכם -1. תפעילו את המכשיר - -#### חלק II - הפעלת הסקריפט של ההסרה - 1. תפתחו את GodMode9 על ידי החזקה של המקש (Start) בעת ההדלקה 1. אם תתבקשו לעשות גיבוי של קבצים חיוניים, תלחצו (A) כדי לעשות זאת, ואז תלחצו (A) כדי להמשיך אחרי שזה סיים 1. אם אתם מתבקשים לתקן את זמן ותאריך הRTC, תלחצו (A) כדי לעשות זאת, ואז תלחצו (A) כדי להמשיך + שימו לב, אם הייתם צריכים לתקן את תאריך וזמן הRTC, תצטרכו לתקן את הזמן בהגדרות המערכת גם כן אחרי המדריך הזה +1. Navigate to `[1:] SYSNAND CTRNAND > title > 00040138 > (X)0000002 > content` + + On a "New" edition console, the (X) will instead be 2 + + On an "Old" edition console, the (X) will instead be 0 +1. Select the `.app` file +1. Select `NCCH Image Options` +1. Select `Mount image to drive` +1. In the window that appears, open the `exefs` folder +1. In this folder, select the `.firm` file +1. Select "Firm Options" +1. Select "Boot Firm" +1. When prompted, choose to decrypt and make a copy +1. You should boot into the regular 3DS Home Menu. If you do, power your device off and continue to the next section + + If you do NOT boot into the regular 3DS Home Menu, continuing with these instructions **WILL** brick your device. You should join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you + +#### Section II - Prep Work + +1. תפעילו את המכשיר +1. Navigate to System Settings > Data Management > Nintendo 3DS > Software +1. In this list of software, delete any non-Nintendo content you installed while using CFW + + This includes common system software such as FBI, Anemone3DS, Luma Updater, Homebrew Launcher, Checkpoint, and others, along with any non-eShop games + + Failure to remove CFW software before uninstalling CFW may break access to the Data Management menu after uninstalling CFW +1. תכבו את המכשיר + +#### Section III - Running Uninstall Script + +1. תפתחו את GodMode9 על ידי החזקה של המקש (Start) בעת ההדלקה 1. תלחצו על (Home) כדי להראות את תפריט הפעולה 1. תבחרו "Scripts..." 1. Select "GM9Megascript" diff --git a/_pages/hu_HU/finalizing-setup.txt b/_pages/hu_HU/finalizing-setup.txt index 1b7de4f6c4..6d3eeabece 100644 --- a/_pages/hu_HU/finalizing-setup.txt +++ b/_pages/hu_HU/finalizing-setup.txt @@ -18,6 +18,8 @@ Ezen folyamat közben további programokat is telepítünk, melyek az alábbiak: + **Luma3DS Updater** *(egyszerűen frissíthető vele a CFW)* + **GodMode9** *(sokféle dologra használható eszköz, például NAND és kártya műveletekre)* + **Homebrew Launcher Loader** *(elindítja a Homebrew Launchert)* ++ **DSP1** *(allows homebrew applications to have sound)* ++ **ctr-no-timeoffset** *(removes the rtc offset so that the home menu and rtc timestamps match)* ### Amire szükséged lesz @@ -143,7 +145,7 @@ Amennyiben ezen leírás megkezdése előtt már rendelkeztél EmuNAND-dal, és 1. Nyomd meg a (B) gombot, hogy visszamenj a főmenübe 1. Az SD kártya leválasztásához az (R) gomb lenyomva tartása mellett nyomd meg a (B) gombot 1. Helyezd az SD kártyád a számítógépbe -1. Másold a `__sysnand_###.bin`, az `essential.exefs` és a `boot9.bin` fájlokat az SD kártyád `/gm9/out/` mappájából valami biztonságos helyre a számítógépeden +1. Copy `__sysnand_###.bin`, `__sysnand_###.bin.sha`, `essential.exefs`, and `boot9.bin` from the `/gm9/out/` folder on your SD card to a safe location on your computer + Tarts belőle biztonsági másolatokat több különböző helyen is (például online tárhelyen) + Ezek a biztonsági mentések fognak megmenteni, ha a későbbiekben brickelődne a konzolod, vagy bármi félresikerülne a jövőben 1. Töröld a `__sysnand_###.bin` és a `__sysnand_###.bin.sha` fájlokat az SD kártyád `/gm9/out/` mappájából, miután lemásoltad azokat diff --git a/_pages/hu_HU/homebrew-launcher-(steelhax).txt b/_pages/hu_HU/homebrew-launcher-(steelhax).txt index b73cd69aae..a10750ae53 100644 --- a/_pages/hu_HU/homebrew-launcher-(steelhax).txt +++ b/_pages/hu_HU/homebrew-launcher-(steelhax).txt @@ -8,7 +8,7 @@ title: "Homebrew Launcher (Steelhax)" This method of using Seedminer for further exploitation uses your `movable.sed` file to gain access to the Homebrew Launcher using the Steelhax exploit for the purposes of injecting an exploitable DSiWare title into the DS Download Play application. This method requires you to already own (or download) the free "Steel Divers: Sub Wars" game from the eShop. -If your device already has access to the Homebrew Launcher (whether through Steelhax or another exploit), you can skip to [Installing Boot9strap (Frogminer)](installing-boot9strap-(frogminer)). +If your device already has access to the Homebrew Launcher (whether through Steelhax or another exploit), you can skip to [Installing Boot9strap (Frogtool)](installing-boot9strap-(frogtool)). {: .notice--success} If you already have Steel Diver: Sub Wars, this process will overwrite your game's save file! @@ -17,6 +17,7 @@ If you already have Steel Diver: Sub Wars, this process will overwrite your game ### Amire szükséged lesz * The free eShop game "Steel Diver: Sub Wars" +* Your `movable.sed` file from completing [Seedminer](seedminer) * A [Homebrew Launcher](https://github.com/fincs/new-hbmenu/releases/latest) legújabb kiadása * The latest release of [Steelhax](https://github.com/VegaRoXas/vegaroxas.github.io/raw/master/files/steelhax-installer.rar) * Az [otherapp payload](https://smealum.github.io/3ds/#otherapp) *(a készüléked verziójának és régiójának megfelelő változat)* @@ -39,7 +40,7 @@ If you already have Steel Diver: Sub Wars, this process will overwrite your game 1. Exit "Steel Diver: Sub Wars" 1. Kapcsold ki a készüléked 1. Helyezd az SD kártyád a számítógépbe -1. Open [the Steelminer Injector website](http://steelminer.jisagi.net/injector) on your computer +1. Open [the Steelminer Injector website](https://bruteforcemovable.com/steelhax/) on your computer 1. Select your `movable.sed` file 1. Nyomd meg a "Start!" gombot 1. Várd meg, amíg a folyamat befejeződik diff --git a/_pages/hu_HU/installing-boot9strap-(fredtool).txt b/_pages/hu_HU/installing-boot9strap-(fredtool).txt index 57e3e5d3cc..d868b796b9 100644 --- a/_pages/hu_HU/installing-boot9strap-(fredtool).txt +++ b/_pages/hu_HU/installing-boot9strap-(fredtool).txt @@ -10,8 +10,6 @@ This method of using Seedminer for further exploitation uses your `movable.sed` Ez egy jelenleg működő megvalósítása a "FIRM partitions known-plaintext" néven ismert exploitnak, amiről részletesebben olvashatsz [itt](https://www.3dbrew.org/wiki/3DS_System_Flaws). -Ahhoz, hogy használhasd a [magnet](https://wikipedia.org/wiki/Magnet_URI_scheme) linkeket ezen az oldalon, szükséged lesz egy torrent kliensre, mint például a [Deluge](http://dev.deluge-torrent.org/wiki/Download). - To extract the `.7z` and `.rar` files linked on this page, you will need a file archiver like [7-Zip](http://www.7-zip.org/) or [The Unarchiver](https://theunarchiver.com/). ### Amire szükséged lesz diff --git a/_pages/hu_HU/ntrboot.txt b/_pages/hu_HU/ntrboot.txt index 5f8c94c931..2019296bde 100644 --- a/_pages/hu_HU/ntrboot.txt +++ b/_pages/hu_HU/ntrboot.txt @@ -17,14 +17,14 @@ Vedd figyelembe, hogy a "Time Bomb"-bal rendelkező kártyák nem lesznek képes | Flashkártya neve | Jelenlegi ár | "Time Bomb"? | 3DS verziók? | DSi verziók? | Megjegyzések | |-|-:|:-:|:-:|:-:|-| -| [**R4i-SDHC B9S**](http://www.nds-card.net/ProShow.asp?ProID=574) | $15.99 | September 3, 2019 | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot**; can be flashed back to an NDS flashcart. | -| [**R4i Gold 3DS Plus**](http://www.nds-card.net/ProShow.asp?ProID=575) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot** ([internal switch to switch between ntrboot and NDS modes]({{ "/images/screenshots/r4i-gold-3ds-plus.png" | absolute_url }})); do not manually flash with ntrboot. | -| [**Acekard 2i**](http://www.nds-card.net/ProShow.asp?ProID=160) | $20.99 | nem | <= 4.3.0 | <= 1.4.4 | | -| [**DSTT**](http://www.nds-card.net/ProShow.asp?ProID=157) | $9.99 | nem | nincs| nincs | Csak [bizonyos flash chipek](https://gist.github.com/yuukieve/6b48f1bb8dd15136403c15c39fafdb42) kompatibilisek ntrboot-tal. | -| [**R4i Gold 3DS**](http://www.nds-card.net/ProShow.asp?ProID=149) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | All RTS revisions are compatible. | -| [**R4i-SDHC 3DS RTS**](http://www.nds-card.net/ProShow.asp?ProID=146) | $13.99 | 1.87: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | | -| [**R4iSDHC GOLD Pro 20XX**](http://www.nds-card.net/ProShow.asp?ProID=490) | $9.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. A 2013-as modellek nem kompatibilisek. | -| [**R4iSDHC RTS LITE 20XX**](http://www.nds-card.net/ProShow.asp?ProID=450) | $13.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. A 2013-as modellek nem kompatibilisek. | +| [**R4i-SDHC B9S**](http://www.nds-card.com/ProShow.asp?ProID=574) | $15.99 | September 3, 2019 | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot**; can be flashed back to an NDS flashcart. | +| [**R4i Gold 3DS Plus**](http://www.nds-card.com/ProShow.asp?ProID=575) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot** ([internal switch to switch between ntrboot and NDS modes]({{ "/images/screenshots/r4i-gold-3ds-plus.png" | absolute_url }})); do not manually flash with ntrboot. | +| [**Acekard 2i**](http://www.nds-card.com/ProShow.asp?ProID=160) | $20.99 | No | <= 4.3.0 | <= 1.4.4 | | +| [**DSTT**](http://www.nds-card.com/ProShow.asp?ProID=157) | $9.99 | No | None | None | Only models with [certain flash chips](https://gist.github.com/yuukieve/6b48f1bb8dd15136403c15c39fafdb42) are compatible with ntrboot. | +| [**R4i Gold 3DS**](http://www.nds-card.com/ProShow.asp?ProID=149) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | All RTS revisions are compatible. | +| [**R4i-SDHC 3DS RTS**](http://www.nds-card.com/ProShow.asp?ProID=146) | $13.99 | 1.87: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | | +| [**R4iSDHC GOLD Pro 20XX**](http://www.nds-card.com/ProShow.asp?ProID=490) | $9.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. A 2013-as modellek nem kompatibilisek. | +| [**R4iSDHC RTS LITE 20XX**](http://www.nds-card.com/ProShow.asp?ProID=450) | $13.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. A 2013-as modellek nem kompatibilisek. | | **Ace3DS X** | | No | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot** (external switch to switch between ntrboot ("3DS") and NDS modes); do not manually flash with ntrboot. | | **Ace3DS Plus** | | No | <= 11.9.0 | <= 1.4.5 | | | **Gateway Blue** | | nem | 4.1.0 - 4.5.0 | <= 1.4.5 | | @@ -49,7 +49,7 @@ Kipróbálhatod, hogy működik-e a mágnes úgy, hogy az (A), (B), (X), (Y) gom Vedd figyelembe, hogy a flashkártya nem lesz használható az eredeti rendeltetése szerint addig, amíg az ntrboot exploit telepítve van rá. (Kivételt képez az Acekard 2i, ami működőképes marad *kizárólag NDS-eken, és azokon a 3DS-eken, melyekre egyedi firmware van telepítve*.) Ez azt jelenti, hogy a legtöbb flashkártya még csak a home menu-ben sem jelenik majd meg. Az ntrboot flashelési útmutatójának végén van néhány opcionális lépés arról, hogyan töröld azt a flashkártyádról, ha már végeztél. -Vedd figyelembe, hogy néhány ritka esetben lehetséges, hogy a flashelési folyamat során **brickelődjön** néhány hamisított flashkártya és végleg használhatatlanná váljon. Ez elég valószínűtlen, azonban éppen emiatt csak eredeti flashkártyákat támogatunk. Ajánlott jó hírű oldalakon vásárolni (mint például az [NDS Card](http://www.nds-card.net/)), hogy elkerüld a hamisított flashkártyákat +Vedd figyelembe, hogy néhány ritka esetben lehetséges, hogy a flashelési folyamat során **brickelődjön** néhány hamisított flashkártya és végleg használhatatlanná váljon. Ez elég valószínűtlen, azonban éppen emiatt csak eredeti flashkártyákat támogatunk. To reduce the chance of receiving a counterfeit card, it is recommended that you use a reputable site to buy your flashcart (such as [NDS Card](http://www.nds-card.com/)) {: .notice--danger} ___ diff --git a/_pages/hu_HU/seedminer.txt b/_pages/hu_HU/seedminer.txt index b3a0f67edc..05ba85dced 100644 --- a/_pages/hu_HU/seedminer.txt +++ b/_pages/hu_HU/seedminer.txt @@ -63,9 +63,7 @@ There are two different methods for building on the Seedminer exploit (described 1. Open [Bruteforce Movable](https://bruteforcemovable.com/) on your computer + This site can automate the retrieval of `movable_part1.sed` (using a bot 3DS console) and the breaking of your device's DSiWare encryption (using a volunteer's computer to run Seedminer) - + If you already have access to a 3DS capable of launching the Homebrew Launcher, you can manually retrieve your `movable_part1.sed` using that device by following [these](https://jisagi.github.io/SeedminerGuide/seedminerSelf/#section1) instructions - + If you already have access to a PC with a powerful graphics card, you can manually calculate your `movable.sed` using it by following [these](https://jisagi.github.io/SeedminerGuide/seedminerSelf/#section2) instructions - + If the automated service is nonfunctional and you cannot do one or both of those manually, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you + + If the automated service is nonfunctional, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you 1. Enter your device's Friend Code (with no spaces or dashes) into the "Your friend code" field 1. Paste your device's 32 character long folder name into the "Your ID0" field 1. Teljesítsd a "Nem vagyok robot" captchát @@ -74,11 +72,11 @@ There are two different methods for building on the Seedminer exploit (described 1. When prompted, use the "Register Friend" button on your device to add the friend code of the bot 3DS console 1. Wait for the site to update + If it does not, wait a few minutes before refreshing the page once -1. Select "Continue" -1. Várd meg, amíg a folyamat befejeződik - + This can take a while (up to an hour in some cases) - + During this process, the bot may not show up on your 3ds. As long as the website updates, this is not an issue. - + If you are still waiting after an hour, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you +1. Once the site processes your information, you will be given the option to "Continue" or "Do another device". Click the green "Continue" button +1. Wait for the remainder of the process to complete + + This is usually fast (1-5 minutes) but in some cases, can take up to half an hour. + + During this process, the bot you added may not show up on your 3ds. As long as the website updates, this is not an issue. + + If you are still waiting after half an hour, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you 1. When the process has completed, download your `movable.sed` file from the site + Keep this file as you will need it in the upcoming pages @@ -102,7 +100,7 @@ ___ #### Seedminer + Steelhax + Frogtool -This method of using Seedminer for further exploitation uses your `movable.sed` file to gain access to the Homebrew Launcher using the Steelhax exploit for the purposes of injecting an exploitable DSiWare title into the DS Download Play application. This method requires you to already own (or download) the free "Steel Divers: Sub Wars" game from the eShop. +This method of using Seedminer for further exploitation uses your `movable.sed` file to gain access to the Homebrew Launcher using the Steelhax exploit for the purposes of injecting an exploitable DSiWare title into the DS Download Play application. This method requires you to already own (or download) the free "Steel Diver: Sub Wars" game from the eShop. This method is only compatible with the EUR, JPN, and USA regions, and is somewhat more complicated than the above method. It is only recommended to use this method if you have a EUR region device and do not wish to pay for a DSiWare game, or if the above method does not work for you for some reason. diff --git a/_pages/hu_HU/uninstall-cfw.txt b/_pages/hu_HU/uninstall-cfw.txt index 085035f08f..e17fc683bc 100644 --- a/_pages/hu_HU/uninstall-cfw.txt +++ b/_pages/hu_HU/uninstall-cfw.txt @@ -11,7 +11,7 @@ A következőkben teljes egészében el fogjuk távolítani a CFW-t a készülé Ez az esetek többségében nem old meg semmilyen olyan problémát, ami a CFW telepítése közben felmerülhet. Javasolt inkább elolvasnod a [Hibaelhárítás](troubleshooting) oldalt, vagy segítséget kérni (angol nyelven) itt: [Nintendo Homebrew a Discord-on](https://discord.gg/MWxPgEp). {: .notice--danger} -Minden aláíratlan (nem eredeti) játék instabillá fog válni, amiket kézileg törölhetsz majd a System Settings "Data Management" részében. Használj [mentéskezelőt](https://github.com/FlagBrew/Checkpoint/releases/latest), hogy biztonsági másolatot készíts azon (nem eredeti) játékok mentéséről, amik fontosak a számodra. +Any unsigned (illegitimate) games will be rendered unusable and should be manually removed before starting this process by using the Data Management section of the System Settings. Használj [mentéskezelőt](https://github.com/FlagBrew/Checkpoint/releases/latest), hogy biztonsági másolatot készíts azon (nem eredeti) játékok mentéséről, amik fontosak a számodra. Ez az eljárás nem fogja befolyásolni sem az NNID-det, sem az eredeti játékaidat, sem bármilyen mentést, ami az eredeti, megvásárolt játékaidhoz tartozik. @@ -26,21 +26,43 @@ Vedd figyelembe, hogy amennyiben van más payload fájl a `GodMode9.firm` fájlo ### Utasítások -#### Első rész - Előkészületek +#### Section I - Safety Test 1. Kapcsold ki a készüléked 1. Helyezd az SD kártyád a számítógépbe 1. Másold át a `GodMode9.firm` fájlt a GodMode9 `.zip`-ből az SD kártyád `/luma/payloads/` mappájába 1. Másold át a `gm9` mappát a GodMode9 `.zip`-ből az SD kártyád gyökerébe 1. Tedd vissza az SD kártyád a készülékedbe -1. Kapcsold be a készülékedet - -#### Második rész - Az eltávolító szkript futtatása - 1. Indítsd el a GodMode9-et a (Start) lenyomva tartásával boot közben 1. Ha rákérdez arra, hogy csináljon-e egy biztonsági másolatot (essential files backup), akkor nyomd meg az (A) gombot, hogy csináljon, majd amikor végzett, nyomd meg ismét az (A) gombot a folytatáshoz 1. Ha rákérdez arra, hogy szeretnéd-e a valós dátumot és időt javítani (fix the RTC date&time), nyomd meg az (A) gombot, állítsd be a helyes dátumot és időt, majd nyomd meg az (A) gombot a folytatáshoz + Ne feledd, hogy amennyiben ezen a ponton szükséges volt a helyes dátum és idő beállítása, a System Settingsben is be kell majd állítanod a helyes időt az útmutató végén +1. Navigate to `[1:] SYSNAND CTRNAND > title > 00040138 > (X)0000002 > content` + + On a "New" edition console, the (X) will instead be 2 + + On an "Old" edition console, the (X) will instead be 0 +1. Select the `.app` file +1. Select `NCCH Image Options` +1. Select `Mount image to drive` +1. In the window that appears, open the `exefs` folder +1. In this folder, select the `.firm` file +1. Select "Firm Options" +1. Select "Boot Firm" +1. When prompted, choose to decrypt and make a copy +1. You should boot into the regular 3DS Home Menu. If you do, power your device off and continue to the next section + + If you do NOT boot into the regular 3DS Home Menu, continuing with these instructions **WILL** brick your device. You should join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you + +#### Section II - Prep Work + +1. Kapcsold be a készülékedet +1. Navigate to System Settings > Data Management > Nintendo 3DS > Software +1. In this list of software, delete any non-Nintendo content you installed while using CFW + + This includes common system software such as FBI, Anemone3DS, Luma Updater, Homebrew Launcher, Checkpoint, and others, along with any non-eShop games + + Failure to remove CFW software before uninstalling CFW may break access to the Data Management menu after uninstalling CFW +1. Kapcsold ki a készüléked + +#### Section III - Running Uninstall Script + +1. Indítsd el a GodMode9-et a (Start) lenyomva tartásával boot közben 1. Nyomd meg a (Home) gombot, hogy megjelenjen a műveleti menü 1. Válaszd a "Scripts..." opciót 1. Válaszd ezt: "GM9Megascript" diff --git a/_pages/id_ID/finalizing-setup.txt b/_pages/id_ID/finalizing-setup.txt index 8ccda2a04f..f7c9c087d4 100644 --- a/_pages/id_ID/finalizing-setup.txt +++ b/_pages/id_ID/finalizing-setup.txt @@ -18,6 +18,8 @@ During this process, we also setup programs such as the following: + **Luma3DS Updater** *(updates your CFW installation easily)* + **GodMode9** *(multipurpose tool which can do NAND and cartridge functions)* + **Homebrew Launcher Loader** *(launches the Homebrew Launcher)* ++ **DSP1** *(allows homebrew applications to have sound)* ++ **ctr-no-timeoffset** *(removes the rtc offset so that the home menu and rtc timestamps match)* ### What You Need @@ -143,7 +145,7 @@ If, before following this guide, you already had an EmuNAND setup and would like 1. Press (B) to return to the main menu 1. Hold (R) and press (B) at the same time to eject your SD card 1. Insert your SD card into your computer -1. Copy `__sysnand_###.bin`, `essential.exefs`, and `boot9.bin` from the `/gm9/out/` folder on your SD card to a safe location on your computer +1. Copy `__sysnand_###.bin`, `__sysnand_###.bin.sha`, `essential.exefs`, and `boot9.bin` from the `/gm9/out/` folder on your SD card to a safe location on your computer + Make backups in multiple locations (such as online file storage) + These backups will save you from a brick and/or help you recover files from the NAND image if anything goes wrong in the future 1. Delete `__sysnand_###.bin` and `__sysnand_###.bin.sha` from the `/gm9/out/` folder on your SD card after copying it diff --git a/_pages/id_ID/homebrew-launcher-(steelhax).txt b/_pages/id_ID/homebrew-launcher-(steelhax).txt index 571fd1982d..568e53b124 100644 --- a/_pages/id_ID/homebrew-launcher-(steelhax).txt +++ b/_pages/id_ID/homebrew-launcher-(steelhax).txt @@ -8,7 +8,7 @@ title: "Homebrew Launcher (Steelhax)" This method of using Seedminer for further exploitation uses your `movable.sed` file to gain access to the Homebrew Launcher using the Steelhax exploit for the purposes of injecting an exploitable DSiWare title into the DS Download Play application. This method requires you to already own (or download) the free "Steel Divers: Sub Wars" game from the eShop. -If your device already has access to the Homebrew Launcher (whether through Steelhax or another exploit), you can skip to [Installing Boot9strap (Frogminer)](installing-boot9strap-(frogminer)). +If your device already has access to the Homebrew Launcher (whether through Steelhax or another exploit), you can skip to [Installing Boot9strap (Frogtool)](installing-boot9strap-(frogtool)). {: .notice--success} If you already have Steel Diver: Sub Wars, this process will overwrite your game's save file! @@ -17,6 +17,7 @@ If you already have Steel Diver: Sub Wars, this process will overwrite your game ### What You Need * The free eShop game "Steel Diver: Sub Wars" +* Your `movable.sed` file from completing [Seedminer](seedminer) * The latest release of [the Homebrew Launcher](https://github.com/fincs/new-hbmenu/releases/latest) * The latest release of [Steelhax](https://github.com/VegaRoXas/vegaroxas.github.io/raw/master/files/steelhax-installer.rar) * The [otherapp payload](https://smealum.github.io/3ds/#otherapp) *(for your region and version)* @@ -39,7 +40,7 @@ If you already have Steel Diver: Sub Wars, this process will overwrite your game 1. Exit "Steel Diver: Sub Wars" 1. Power off your device 1. Insert your SD card into your computer -1. Open [the Steelminer Injector website](http://steelminer.jisagi.net/injector) on your computer +1. Open [the Steelminer Injector website](https://bruteforcemovable.com/steelhax/) on your computer 1. Select your `movable.sed` file 1. Select "Start!" 1. Wait for the process to complete diff --git a/_pages/id_ID/installing-boot9strap-(fredtool).txt b/_pages/id_ID/installing-boot9strap-(fredtool).txt index ca3da37631..22a79f26c5 100644 --- a/_pages/id_ID/installing-boot9strap-(fredtool).txt +++ b/_pages/id_ID/installing-boot9strap-(fredtool).txt @@ -10,8 +10,6 @@ This method of using Seedminer for further exploitation uses your `movable.sed` This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). -To use the [magnet](https://wikipedia.org/wiki/Magnet_URI_scheme) links on this page, you will need a torrent client like [Deluge](http://dev.deluge-torrent.org/wiki/Download). - To extract the `.7z` and `.rar` files linked on this page, you will need a file archiver like [7-Zip](http://www.7-zip.org/) or [The Unarchiver](https://theunarchiver.com/). ### What You Need diff --git a/_pages/id_ID/ntrboot.txt b/_pages/id_ID/ntrboot.txt index a5c9bc16cd..35ffad7d57 100644 --- a/_pages/id_ID/ntrboot.txt +++ b/_pages/id_ID/ntrboot.txt @@ -17,14 +17,14 @@ Note that carts with a "Time Bomb" will no longer be able to launch `.nds` files | Flashcart Name | Current Price | "Time Bomb"? | 3DS Versions? | DSi Versions? | Other Notes | |-|-:|:-:|:-:|:-:|-| -| [**R4i-SDHC B9S**](http://www.nds-card.net/ProShow.asp?ProID=574) | $15.99 | September 3, 2019 | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot**; can be flashed back to an NDS flashcart. | -| [**R4i Gold 3DS Plus**](http://www.nds-card.net/ProShow.asp?ProID=575) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot** ([internal switch to switch between ntrboot and NDS modes]({{ "/images/screenshots/r4i-gold-3ds-plus.png" | absolute_url }})); do not manually flash with ntrboot. | -| [**Acekard 2i**](http://www.nds-card.net/ProShow.asp?ProID=160) | $20.99 | No | <= 4.3.0 | <= 1.4.4 | | -| [**DSTT**](http://www.nds-card.net/ProShow.asp?ProID=157) | $9.99 | No | None | None | Only models with [certain flash chips](https://gist.github.com/yuukieve/6b48f1bb8dd15136403c15c39fafdb42) are compatible with ntrboot. | -| [**R4i Gold 3DS**](http://www.nds-card.net/ProShow.asp?ProID=149) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | All RTS revisions are compatible. | -| [**R4i-SDHC 3DS RTS**](http://www.nds-card.net/ProShow.asp?ProID=146) | $13.99 | 1.87: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | | -| [**R4iSDHC GOLD Pro 20XX**](http://www.nds-card.net/ProShow.asp?ProID=490) | $9.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. 2013 models are incompatible. | -| [**R4iSDHC RTS LITE 20XX**](http://www.nds-card.net/ProShow.asp?ProID=450) | $13.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. 2013 models are incompatible. | +| [**R4i-SDHC B9S**](http://www.nds-card.com/ProShow.asp?ProID=574) | $15.99 | September 3, 2019 | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot**; can be flashed back to an NDS flashcart. | +| [**R4i Gold 3DS Plus**](http://www.nds-card.com/ProShow.asp?ProID=575) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot** ([internal switch to switch between ntrboot and NDS modes]({{ "/images/screenshots/r4i-gold-3ds-plus.png" | absolute_url }})); do not manually flash with ntrboot. | +| [**Acekard 2i**](http://www.nds-card.com/ProShow.asp?ProID=160) | $20.99 | No | <= 4.3.0 | <= 1.4.4 | | +| [**DSTT**](http://www.nds-card.com/ProShow.asp?ProID=157) | $9.99 | No | None | None | Only models with [certain flash chips](https://gist.github.com/yuukieve/6b48f1bb8dd15136403c15c39fafdb42) are compatible with ntrboot. | +| [**R4i Gold 3DS**](http://www.nds-card.com/ProShow.asp?ProID=149) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | All RTS revisions are compatible. | +| [**R4i-SDHC 3DS RTS**](http://www.nds-card.com/ProShow.asp?ProID=146) | $13.99 | 1.87: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | | +| [**R4iSDHC GOLD Pro 20XX**](http://www.nds-card.com/ProShow.asp?ProID=490) | $9.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. 2013 models are incompatible. | +| [**R4iSDHC RTS LITE 20XX**](http://www.nds-card.com/ProShow.asp?ProID=450) | $13.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. 2013 models are incompatible. | | **Ace3DS X** | | No | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot** (external switch to switch between ntrboot ("3DS") and NDS modes); do not manually flash with ntrboot. | | **Ace3DS Plus** | | No | <= 11.9.0 | <= 1.4.5 | | | **Gateway Blue** | | No | 4.1.0 - 4.5.0 | <= 1.4.5 | | @@ -49,7 +49,7 @@ To test if a magnet will work, hold it on or around the (A)(B)(X)(Y) buttons whi Note that the flashcart will not be able to be used for its standard functions while the ntrboot exploit is installed on it (except for in the case of the Acekard 2i, which remains functional *on NDS and custom firmware 3DS systems only*). This means that, for most flashcarts, it will not even display on the home menu. There are optional steps at the end of the ntrboot flashing instructions to remove it from your flashcart when you are done. -Note that in some rare circumstances, it may be possible for the flashing process to **brick** a counterfeit flashcart and render it permanently unusable. This is unlikely, but nevertheless only original listed flashcarts are supported. To reduce the chance of receiving a counterfeit card, it is recommended that you use a reputable site to buy your flashcart (such as [NDS Card](http://www.nds-card.net/)) +Note that in some rare circumstances, it may be possible for the flashing process to **brick** a counterfeit flashcart and render it permanently unusable. This is unlikely, but nevertheless only original listed flashcarts are supported. To reduce the chance of receiving a counterfeit card, it is recommended that you use a reputable site to buy your flashcart (such as [NDS Card](http://www.nds-card.com/)) {: .notice--danger} ___ diff --git a/_pages/id_ID/seedminer.txt b/_pages/id_ID/seedminer.txt index 4e8bfbaa60..0e0a6ee1b4 100644 --- a/_pages/id_ID/seedminer.txt +++ b/_pages/id_ID/seedminer.txt @@ -63,9 +63,7 @@ There are two different methods for building on the Seedminer exploit (described 1. Open [Bruteforce Movable](https://bruteforcemovable.com/) on your computer + This site can automate the retrieval of `movable_part1.sed` (using a bot 3DS console) and the breaking of your device's DSiWare encryption (using a volunteer's computer to run Seedminer) - + If you already have access to a 3DS capable of launching the Homebrew Launcher, you can manually retrieve your `movable_part1.sed` using that device by following [these](https://jisagi.github.io/SeedminerGuide/seedminerSelf/#section1) instructions - + If you already have access to a PC with a powerful graphics card, you can manually calculate your `movable.sed` using it by following [these](https://jisagi.github.io/SeedminerGuide/seedminerSelf/#section2) instructions - + If the automated service is nonfunctional and you cannot do one or both of those manually, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you + + If the automated service is nonfunctional, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you 1. Enter your device's Friend Code (with no spaces or dashes) into the "Your friend code" field 1. Paste your device's 32 character long folder name into the "Your ID0" field 1. Complete the "I'm not a robot" captcha @@ -74,11 +72,11 @@ There are two different methods for building on the Seedminer exploit (described 1. When prompted, use the "Register Friend" button on your device to add the friend code of the bot 3DS console 1. Wait for the site to update + If it does not, wait a few minutes before refreshing the page once -1. Select "Continue" -1. Wait for the process to complete - + This can take a while (up to an hour in some cases) - + During this process, the bot may not show up on your 3ds. As long as the website updates, this is not an issue. - + If you are still waiting after an hour, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you +1. Once the site processes your information, you will be given the option to "Continue" or "Do another device". Click the green "Continue" button +1. Wait for the remainder of the process to complete + + This is usually fast (1-5 minutes) but in some cases, can take up to half an hour. + + During this process, the bot you added may not show up on your 3ds. As long as the website updates, this is not an issue. + + If you are still waiting after half an hour, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you 1. When the process has completed, download your `movable.sed` file from the site + Keep this file as you will need it in the upcoming pages @@ -102,7 +100,7 @@ ___ #### Seedminer + Steelhax + Frogtool -This method of using Seedminer for further exploitation uses your `movable.sed` file to gain access to the Homebrew Launcher using the Steelhax exploit for the purposes of injecting an exploitable DSiWare title into the DS Download Play application. This method requires you to already own (or download) the free "Steel Divers: Sub Wars" game from the eShop. +This method of using Seedminer for further exploitation uses your `movable.sed` file to gain access to the Homebrew Launcher using the Steelhax exploit for the purposes of injecting an exploitable DSiWare title into the DS Download Play application. This method requires you to already own (or download) the free "Steel Diver: Sub Wars" game from the eShop. This method is only compatible with the EUR, JPN, and USA regions, and is somewhat more complicated than the above method. It is only recommended to use this method if you have a EUR region device and do not wish to pay for a DSiWare game, or if the above method does not work for you for some reason. diff --git a/_pages/id_ID/uninstall-cfw.txt b/_pages/id_ID/uninstall-cfw.txt index 4745050aab..584998ac19 100644 --- a/_pages/id_ID/uninstall-cfw.txt +++ b/_pages/id_ID/uninstall-cfw.txt @@ -11,7 +11,7 @@ This will completely remove CFW from your device, including Boot9Strap and Luma3 This is almost never the solution to fix any issues you encounter with your CFW installation. A better idea would be to read the [troubleshooting](troubleshooting) page or ask (in English) for help at [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp). {: .notice--danger} -Any unsigned (illegitimate) games will be rendered unusable and can be manually removed using the Data Management section of the System Settings. Use a [save manager](https://github.com/FlagBrew/Checkpoint/releases/latest) to backup any saves for these unsigned (illegitimate) games you care about. +Any unsigned (illegitimate) games will be rendered unusable and should be manually removed before starting this process by using the Data Management section of the System Settings. Use a [save manager](https://github.com/FlagBrew/Checkpoint/releases/latest) to backup any saves for these unsigned (illegitimate) games you care about. This will not affect your NNID, any legitimately purchased games, or any saves for those legitimately purchased games. @@ -26,21 +26,43 @@ Note that if you have any payload files other than `GodMode9.firm` in the `/luma ### Instructions -#### Section I - Prep Work +#### Section I - Safety Test 1. Power off your device 1. Insert your SD card into your computer 1. Copy `GodMode9.firm` from the GodMode9 `.zip` to the `/luma/payloads/` folder on your SD card 1. Copy the `gm9` folder from the GodMode9 `.zip` to the root of your SD card 1. Reinsert your SD card into your device -1. Power on your device - -#### Section II - Running Uninstall Script - 1. Launch GodMode9 by holding (Start) during boot 1. If you are prompted to create an essential files backup, press (A) to do so, then press (A) to continue once it has completed 1. If you are prompted to fix the RTC date&time, press (A) to do so, then set the date and time, then press (A) to continue + Note that, if you had to fix the RTC date and time, you will have to fix the time in the System Settings as well after this guide +1. Navigate to `[1:] SYSNAND CTRNAND > title > 00040138 > (X)0000002 > content` + + On a "New" edition console, the (X) will instead be 2 + + On an "Old" edition console, the (X) will instead be 0 +1. Select the `.app` file +1. Select `NCCH Image Options` +1. Select `Mount image to drive` +1. In the window that appears, open the `exefs` folder +1. In this folder, select the `.firm` file +1. Select "Firm Options" +1. Select "Boot Firm" +1. When prompted, choose to decrypt and make a copy +1. You should boot into the regular 3DS Home Menu. If you do, power your device off and continue to the next section + + If you do NOT boot into the regular 3DS Home Menu, continuing with these instructions **WILL** brick your device. You should join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you + +#### Section II - Prep Work + +1. Power on your device +1. Navigate to System Settings > Data Management > Nintendo 3DS > Software +1. In this list of software, delete any non-Nintendo content you installed while using CFW + + This includes common system software such as FBI, Anemone3DS, Luma Updater, Homebrew Launcher, Checkpoint, and others, along with any non-eShop games + + Failure to remove CFW software before uninstalling CFW may break access to the Data Management menu after uninstalling CFW +1. Power off your device + +#### Section III - Running Uninstall Script + +1. Launch GodMode9 by holding (Start) during boot 1. Press (Home) to bring up the action menu 1. Select "Scripts..." 1. Select "GM9Megascript" diff --git a/_pages/it_IT/finalizing-setup.txt b/_pages/it_IT/finalizing-setup.txt index d10a441f24..f9f3c710ca 100644 --- a/_pages/it_IT/finalizing-setup.txt +++ b/_pages/it_IT/finalizing-setup.txt @@ -18,6 +18,8 @@ Durante la guida verranno anche configurate le seguenti applicazioni: + **Luma3DS Updater** *(aggiorna facilmente il CFW)* + **GodMode9** *(applicazione multifunzione per gestire NAND e schede di gioco)* + **Homebrew Launcher Loader** *(avvia l'Homebrew Launcher)* ++ **DSP1** *(allows homebrew applications to have sound)* ++ **ctr-no-timeoffset** *(removes the rtc offset so that the home menu and rtc timestamps match)* ### Cosa serve @@ -143,7 +145,7 @@ Se prima di seguire questa guida avevi già un'installazione EmuNAND presente e 1. Premi (B) per ritornare al menu principale 1. Tenendo premuto (R), premi (B) per rimuovere la scheda SD 1. Inserisci la scheda SD nel tuo computer -1. Copia il file `__sysnand_###.bin`, `essential.exefs` e `boot9.bin` dalla cartella `/gm9/out/` della tua scheda SD in una posizione sicura sul tuo computer +1. Copy `__sysnand_###.bin`, `__sysnand_###.bin.sha`, `essential.exefs`, and `boot9.bin` from the `/gm9/out/` folder on your SD card to a safe location on your computer + Crea dei backup in più posti (come ad esempio un servizio di storage dei file online) + Questi backup ti salveranno da un brick e/o ti aiuteranno a recuperare i file dalla NAND nel caso dovesse accadere qualcosa in futuro 1. Dopo la copia, elimina i file `__sysnand_###.bin` e `__sysnand_###.bin.sha` dalla cartella `/gm9/out/` della tua scheda SD diff --git a/_pages/it_IT/homebrew-launcher-(steelhax).txt b/_pages/it_IT/homebrew-launcher-(steelhax).txt index cd8b26bcc1..4e5150f582 100644 --- a/_pages/it_IT/homebrew-launcher-(steelhax).txt +++ b/_pages/it_IT/homebrew-launcher-(steelhax).txt @@ -8,7 +8,7 @@ title: "Homebrew Launcher (Steelhax)" Seedminer utilizza il tuo file `movable.sed` per ottenere accesso all'Homebrew Launcher tramite l'exploit Steelhax per iniettare una particolare applicazione DSiWare nell'applicazione DS "Modalità download". Questo metodo richiede il possesso (o lo scaricamento) del gioco gratuito "Steel Diver: Sub Wars" dall'eShop. -Se la tua console ha già accesso all'Homebrew Launcher (tramite Steelhax o con un altro exploit), puoi passare direttamente all'[Installazione di Boot9strap (Frogminer)](installing-boot9strap-(frogminer)). +Se la tua console ha già accesso all'Homebrew Launcher (tramite Steelhax o con un altro exploit), puoi passare direttamente all'[Installazione di Boot9strap (Frogtool)](installing-boot9strap-(frogtool)). {: .notice--success} Se possiedi già Steel Diver: Sub Wars, questo processo sovrascriverà il tuo salvataggio! @@ -17,6 +17,7 @@ Se possiedi già Steel Diver: Sub Wars, questo processo sovrascriverà il tuo sa ### Cosa serve * Il gioco gratuito "Steel Diver: Sub Wars" scaricabile dall'eShop +* Il tuo file `movable.sed` dalla sezione [Seedminer](seedminer) * L'ultima versione di [Homebrew Launcher](https://github.com/fincs/new-hbmenu/releases/latest) * L'ultima versione di [Steelhax](https://github.com/VegaRoXas/vegaroxas.github.io/raw/master/files/steelhax-installer.rar) * Il file [otherapp payload](https://smealum.github.io/3ds/#otherapp) *(adatto alla versione e alla regione della console)* @@ -39,7 +40,7 @@ Se possiedi già Steel Diver: Sub Wars, questo processo sovrascriverà il tuo sa 1. Chiudi "Steel Diver: Sub Wars" 1. Spegni il tuo 3DS 1. Inserisci la scheda SD nel tuo computer -1. Apri [il sito di Steelminer Injector](http://steelminer.jisagi.net/injector) sul tuo computer +1. Apri [il sito di Steelminer Injector](https://bruteforcemovable.com/steelhax/) sul tuo computer 1. Seleziona il tuo file `movable.sed` 1. Seleziona "Start!" 1. Attendi il termine del processo diff --git a/_pages/it_IT/installing-boot9strap-(fredtool).txt b/_pages/it_IT/installing-boot9strap-(fredtool).txt index f008daedc6..00c838a963 100644 --- a/_pages/it_IT/installing-boot9strap-(fredtool).txt +++ b/_pages/it_IT/installing-boot9strap-(fredtool).txt @@ -10,8 +10,6 @@ Seedminer utilizza il tuo file `movable.sed` per decriptare un qualunque titolo Questa è un'implementazione funzionante dell'exploit del "testo in chiaro noto nelle partizioni FIRM" spiegato [qui](https://www.3dbrew.org/wiki/3DS_System_Flaws). -Per usare i link [magnet](https://wikipedia.org/wiki/Magnet_URI_scheme) di questa guida avrai bisogno di un client torrent come [Deluge](http://dev.deluge-torrent.org/wiki/Download). - Per estrarre i file `.7z` e `.rar` presenti in questa pagina, avrai bisogno di un gestore di file compressi come [7-Zip](http://www.7-zip.org/) o [The Unarchiver](https://theunarchiver.com/). ### Cosa serve @@ -53,9 +51,9 @@ Per estrarre i file `.7z` e `.rar` presenti in questa pagina, avrai bisogno di u 1. Seleziona "Start" 1. Attendi il termine del processo 1. Al termine del processo, scarica il tuo DSiWare modificato dal sito -1. Copy the `42383841.bin` file from the `output/hax/` folder of the downloaded DSiWare archive to the `Nintendo 3DS//<32-character-id>/Nintendo DSiWare/` folder on your SD card - + This should be different than your initial `<8-character-id>.bin` file - + Do not remove any existing `<8-character-id>.bin` files +1. Copia il file `42383841.bin` dalla cartella `output/hax/` dall'archivio DSiWare appena scaricato nella cartella `Nintendo 3DS///Nintendo DSiWare/` della tua scheda SD + + Dovrebbe essere differente dal file `.bin` iniziale + + Non rimuovere alcun file `.bin` preesistente 1. Reinserisci la scheda SD nella tua console 1. Accendi la console 1. Avvia "Impostazioni della console" @@ -97,17 +95,17 @@ Se desideri una guida visiva per questa parte, è disponibile [qui](https://zoog 1. Premi (Start) per salvare e riavviare il 3DS + Se ottieni uno schermo nero, [segui questa guida per risolvere il problema](troubleshooting#black-screen-on-sysnand-boot-after-installing-boot9strap) -#### Section V - Restoring DS Connection Settings +#### Sezione V - Ripristino delle Impostazioni di Connessione DS 1. Spegni il tuo 3DS 1. Inserisci la scheda SD nel tuo computer -1. Copy the `42383841.bin` file from the `output/clean/` folder of the downloaded DSiWare archive to the `Nintendo 3DS//<32-character-id>/Nintendo DSiWare/` folder on your SD card - + Replace the existing `42383841.bin` file +1. Copia il file `42383841.bin` dalla cartella `output/clean/` dall'archivio DSiWare appena scaricato nella cartella `Nintendo 3DS///Nintendo DSiWare/` della tua scheda SD + + Sostituisci il file `423841.bin` esistente 1. Reinserisci la scheda SD nella tua console 1. Accendi la console 1. Avvia "Impostazioni della console" 1. Entra in `Gestione dati` -> `DSiWare` -1. Under the "SD Card" section, select the "Nintendo DSi™" title +1. Nella sezione "Scheda SD", scegli il titolo "Nintendo DSi™" 1. Seleziona "Copia", quindi "OK" ___ diff --git a/_pages/it_IT/ntrboot.txt b/_pages/it_IT/ntrboot.txt index 9306f066f1..bf659ba226 100644 --- a/_pages/it_IT/ntrboot.txt +++ b/_pages/it_IT/ntrboot.txt @@ -17,15 +17,15 @@ Tieni presente che alcune cartucce hanno una "bomba a tempo" che impedirà loro | Nome della Flashcart | Prezzo Attuale | "Bomba ad orologeria"? | Versioni 3DS? | Versioni DSi? | Note aggiuntive | |-|-:|:-:|:-:|:-:|-| -| [**R4i-SDHC B9S**](http://www.nds-card.net/ProShow.asp?ProID=574) | €15.99 | 3 Settembre 2019 | <= 11.9.0 | <= 1.4.5 | **Venduta con ntrboot preinstallato**; è possibile riflasharla per ripristinarla a flashcart NDS. | -| [**R4i Gold 3DS Plus**](http://www.nds-card.net/ProShow.asp?ProID=575) | €19.99 | No | <= 11.9.0 | <= 1.4.5 | **Venduta con ntrboot preinstallato** ([Presenta un interruttore per alternare le modalità ntrboot e NDS]({{ "/images/screenshots/r4i-gold-3ds-plus.png" | absolute_url }})); da non flashare manualmente con ntrboot. | -| [**Acekard 2i**](http://www.nds-card.net/ProShow.asp?ProID=160) | €20.99 | No | <= 4.3.0 | <= 1.4.4 | | -| [**DSTT**](http://www.nds-card.net/ProShow.asp?ProID=157) | €9.99 | No | Nessuna | Nessuna | Solo i modelli con [determinati flash chip](https://gist.github.com/yuukieve/6b48f1bb8dd15136403c15c39fafdb42) sono compatibili con ntrboot. | -| [**R4i Gold 3DS**](http://www.nds-card.net/ProShow.asp?ProID=149) | €19.99 | No | <= 11.9.0 | <= 1.4.5 | Tutte le versioni di RTS sono compatibili. | -| [**R4i-SDHC 3DS RTS**](http://www.nds-card.net/ProShow.asp?ProID=146) | €13.99 | 1.87: +| [**R4i-SDHC B9S**](http://www.nds-card.com/ProShow.asp?ProID=574) | €15.99 | 3 Settembre 2019 | <= 11.9.0 | <= 1.4.5 | **Venduta con ntrboot preinstallato**; è possibile riflasharla per ripristinarla a flashcart NDS. | +| [**R4i Gold 3DS Plus**](http://www.nds-card.com/ProShow.asp?ProID=575) | €19.99 | No | <= 11.9.0 | <= 1.4.5 | **Venduta con ntrboot preinstallato** ([Presenta un interruttore per alternare le modalità ntrboot e NDS]({{ "/images/screenshots/r4i-gold-3ds-plus.png" | absolute_url }})); da non flashare manualmente con ntrboot. | +| [**Acekard 2i**](http://www.nds-card.com/ProShow.asp?ProID=160) | €20.99 | No | <= 4.3.0 | <= 1.4.4 | | +| [**DSTT**](http://www.nds-card.com/ProShow.asp?ProID=157) | €9.99 | No | Nessuna | Nessuna | Solo i modelli con [determinati flash chip](https://gist.github.com/yuukieve/6b48f1bb8dd15136403c15c39fafdb42) sono compatibili con ntrboot. | +| [**R4i Gold 3DS**](http://www.nds-card.com/ProShow.asp?ProID=149) | €19.99 | No | <= 11.9.0 | <= 1.4.5 | Tutte le versioni di RTS sono compatibili. | +| [**R4i-SDHC 3DS RTS**](http://www.nds-card.com/ProShow.asp?ProID=146) | €13.99 | 1.87: 3 Settembre 2019 | <= 11.9.0 | <= 1.4.5 | | -| [**R4iSDHC GOLD Pro 20XX**](http://www.nds-card.net/ProShow.asp?ProID=490) | €9.99 | 3.9b: 3 Settembre 2019 | <= 11.9.0 | <= 1.4.5 | Tutte le flashcart R4iSDHC 20XX sono identiche. I modelli del 2013 non sono compatibili. | -| [**R4iSDHC RTS LITE 20XX**](http://www.nds-card.net/ProShow.asp?ProID=450) | €13.99 | 3.9b: 3 Settembre 2019 | <= 11.9.0 | <= 1.4.5 | Tutte le flashcart R4iSDHC 20XX sono identiche. I modelli del 2013 non sono compatibili. | +| [**R4iSDHC GOLD Pro 20XX**](http://www.nds-card.com/ProShow.asp?ProID=490) | €9.99 | 3.9b: 3 Settembre 2019 | <= 11.9.0 | <= 1.4.5 | Tutte le flashcart R4iSDHC 20XX sono identiche. I modelli del 2013 non sono compatibili. | +| [**R4iSDHC RTS LITE 20XX**](http://www.nds-card.com/ProShow.asp?ProID=450) | €13.99 | 3.9b: 3 Settembre 2019 | <= 11.9.0 | <= 1.4.5 | Tutte le flashcart R4iSDHC 20XX sono identiche. I modelli del 2013 non sono compatibili. | | **Ace3DS X** | | No | <= 11.9.0 | <= 1.4.5 | **Venduta con ntrboot preinstallato** (presenta un interruttore per alternare le modalità ntrboot ("3DS") e NDS); da non flashare manualmente con ntrboot. | | **Ace3DS Plus** | | No | <= 11.9.0 | <= 1.4.5 | | | **Gateway Blue** | | No | 4.1.0 - 4.5.0 | <= 1.4.5 | | @@ -50,7 +50,7 @@ Per testare il funzionamento del magnete, appoggialo vicino ai pulsanti (A)(B)(X Tieni presente che la flashcart non potrà più essere utilizzata per le sue funzioni normali finché l'exploit ntrboot sarà installato su di essa (fatta eccezione per la Acekard 2i che funzionerà comunque solo su *console NDS e 3DS con un custom firmware installato*). Questo vuol dire che, con la maggior parte delle flashcart, non verrà visualizzato nemmeno il menu principale. Per rimuoverlo dalla flashcart al termine dell'installazione, sono presenti al termine della guida delle istruzioni opzionali. -Tieni presente che in rare circostanze è possibile **brickare** una flashcart contraffatta durante il flashing, e renderla permanentemente inutilizzabile. È improbabile, tuttavia sono supportate soltanto le flashcart originali qui indicate. Per ridurre il rischio di ottenere una flashcart contraffatta, si raccomanda di comprarne una solo da siti affidabili (come [NDS Card](http://www.nds-card.net/)) +Tieni presente che in rare circostanze è possibile **brickare** una flashcart contraffatta durante il flashing, e renderla permanentemente inutilizzabile. È improbabile, tuttavia sono supportate soltanto le flashcart originali qui indicate. Per ridurre il rischio di ottenere una flashcart contraffatta, si raccomanda di comprarne una solo da siti affidabili (come [NDS Card](http://www.nds-card.com/)) {: .notice--danger} ___ diff --git a/_pages/it_IT/seedminer.txt b/_pages/it_IT/seedminer.txt index 7d7582c887..a82a53cb2d 100644 --- a/_pages/it_IT/seedminer.txt +++ b/_pages/it_IT/seedminer.txt @@ -6,81 +6,79 @@ title: "Seedminer" ### Lettura necessaria -To install boot9strap on your device, we exploit an oversight in the security restrictions applied to "DSiWare" applications. +Per installare boot9strap sulla tua console, dovremo approfittare di un errore nelle restrizioni di sicurezza relative alle applicazioni "DSiWare". -To accomplish this, we use a tool called Seedminer to calculate the DSiWare encryption key (`movable.sed`) for your device. We then use this DSiWare encryption key to decrypt a compatible DSiWare application and inject an exploit into it to run our own code (the exact exploit used will depend on your device's region). +Utilizzeremo perciò un'applicazione chiamata Seedminer per calcolare la chiave di criptazione (`movable.sed`) dei DSiWare della tua console. Useremo quindi questa chiave per decriptare un'applicazione DSiWare compatibile, per poi iniettarci un exploit che eseguirà il nostro codice (il tipo di exploit dipenderà dalla regione della tua console). -If this key were completely random, the encryption key would be impossible to break on current computing hardware. Fortunately, the first half of the key (`movable_part1.sed`) is actually mathematically related to your device's Friend Code, allowing us to break the encryption. For information on how Seedminer works, please see [this presentation](https://zoogie.github.io/web/34⅕c3). +Se questa chiave fosse completamente casuale, la chiave di criptazione sarebbe impossibile da calcolare con l'hardware correntemente disponibile. Per fortuna, la prima metà (`movable_part1.sed`) è matematicamente correlata al Codice Amico della tua console, e questo ci permette di infrangere la sua sicurezza. Per ulteriori informazioni sul funzionamento di Seedminer, è possibile consultare [questa presentazione](https://zoogie.github.io/web/34⅕c3). -Note that this tool requires a PC with a powerful graphics card to break your device's DSiWare encryption. If you do not have access to one of these, there also exists several online helper services where a volunteer running automated software will do this for you. +Tieni presente che questo programma richiede un PC con una scheda grafica potente per infrangere la criptazione DSiWare della tua console. Se non ne possiedi uno, esistono diversi servizi online basati su volontari che forniscono il proprio PC per lo scopo. ### Istruzioni -#### Section I - Compatibility Tests +#### Sezione I - Test di Compatibilità -While these tests are not strictly necessary to perform the Seedminer exploit, the follow-up exploits to this do require this test to be performed and it would be a waste of time and effort to perform Seedminer without the ability to use the other exploits. +Anche se questi test non sono strettamente necessari per l'esecuzione dell'exploit Seedminer, gli exploit successivi li richiederanno e sarebbe uno spreco di tempo eseguire il primo senza poter poi eseguire i secondi. -There are two different methods for building on the Seedminer exploit (described in more detail at the bottom of this page), so even if one of these test fails you can still use another method as long as the other does not fail. +Dopo l'esecuzione dell'exploit Seedminer possono essere eseguiti due diversi exploit (descritti in fondo alla pagina), quindi anche se uno dei test dovesse fallire puoi sempre tentare il secondo. -#### DS Internet Settings Test (used for Fredtool) +#### Test Impostazioni Internet DS (usato per Fredtool) -1. Go to System Settings, then "Internet Settings", then "Nintendo DS Connections" -1. Press "OK" -1. If your device loads into a "Nintendo Wi-Fi Connection Setup" menu, the test was successful - + If the screen stays black or appears to freeze, the test has failed and you will not be able to use the Fredtool method which requires a functioning DS Internet Settings -1. Exit this menu +1. Vai su "Impostazioni della console", "Impostazioni Internet", quindi "Connessioni Nintendo DS" +1. Premi "OK" +1. Se la tua console carica il menu "Configurazione Nintendo Wi-Fi Connection", il test ha avuto successo + + Se lo schermo rimane nero o sembra bloccarsi, il test è fallito e non potrai utilizzare il metodo Fredtool, dato che richiede un menu "Connessioni Nintendo DS" funzionale +1. Esci da questo menu -#### DS Download Play Test (used for Frogtool) +#### Test Modalità Download DS (usato per Frogtool) 1. Avvia l'applicazione "Modalità download" (![]({{ "/images/download-play-icon.png" | absolute_url }}){: height="24px" width="24px"}) -1. Select "Nintendo DS" -1. If your device loads into a "Download software via DS Download Play" menu, the test was successful - + If the screen stays black or appears to freeze, the test has failed and you will not be able to use the Frogtool method which requires a functioning DS Download Play -1. Exit this menu +1. Seleziona "Nintendo DS" +1. Se la console ora mostra la scritta "Scarica software tramite il download DS.", il test ha avuto successo + + Se lo schermo rimane nero o sembra bloccarsi, il test è fallito e non potrai utilizzare il metodo Frogtool, dato che richiede una Modalità download DS funzionale +1. Esci da questo menu -#### Section II - Prep Work +#### Sezione II - Preparazione 1. Inserisci la scheda SD nel tuo computer -1. Navigate to the `Nintendo 3DS` folder on your SD card -1. Copy the 32 character long name of the folder you see - + If you see multiple folders like this, perform the following: - + Rename the `Nintendo 3DS` folder to `BACKUP_Nintendo 3DS` - + Reinsert your SD card into your device and power on your device - + Wait for the device to generate the SD card data - + Power off your device and reinsert your SD card into your computer - + Navigate to the `Nintendo 3DS` folder on your SD card - + Copy the 32 character long name of the folder you see - + Delete the `Nintendo 3DS` folder - + Rename the `BACKUP_Nintendo 3DS` folder to `Nintendo 3DS` -1. Paste your 32 character long folder name into a document you can reference later - + This folder name is also known as your "ID0" +1. Entra nella cartella `Nintendo 3DS` della tua scheda SD +1. Copia la stringa di 32 caratteri del nome della cartella qui presente + + Se vedi più cartelle dal nome lungo, segui i seguenti passaggi: + + Rinomina la cartella `Nintendo 3DS` in `BACKUP_Nintendo 3DS` + + Reinserisci la tua scheda SD nella console, e accendila + + Attendi che la console generi i dati nella scheda SD + + Spegni la console e reinserisci la scheda SD nel tuo computer + + Entra nella cartella `Nintendo 3DS` della tua scheda SD + + Copia la stringa di 32 caratteri del nome della cartella qui presente + + Elimina la cartella `Nintendo 3DS` + + Rinomina la cartella `BACKUP_Nintendo 3DS` in `Nintendo 3DS` +1. Incolla la stringa di 32 caratteri in un documento che potrai consultare più avanti + + Il nome di questa cartella è il tuo "ID0" 1. Accendi la console 1. Accedi alla lista di amici (l'[icona con un viso arancione]({{ "/images/friend-list-icon.png" | absolute_url }}) nella riga superiore del menu HOME) - + If you receive an error and are kicked out of the menu, you either must create a new Mii or your console cannot connect to Nintendo's servers (due to a ban or connection issues) -1. Find your Mii profile, then find the "Friend Code" field on the top screen + + Se riscontri un errore e vieni rimandato al menu principale, o devi creare un nuovo Mii o la console non può connettersi ai server Nintendo (a causa di un ban o per problemi di connettività) +1. Sul tuo profilo Mii cerca il "Codice Amico" sullo schermo superiore -#### Section III - Seedminer +#### Sezione III - Seedminer -1. Open [Bruteforce Movable](https://bruteforcemovable.com/) on your computer - + This site can automate the retrieval of `movable_part1.sed` (using a bot 3DS console) and the breaking of your device's DSiWare encryption (using a volunteer's computer to run Seedminer) - + If you already have access to a 3DS capable of launching the Homebrew Launcher, you can manually retrieve your `movable_part1.sed` using that device by following [these](https://jisagi.github.io/SeedminerGuide/seedminerSelf/#section1) instructions - + If you already have access to a PC with a powerful graphics card, you can manually calculate your `movable.sed` using it by following [these](https://jisagi.github.io/SeedminerGuide/seedminerSelf/#section2) instructions - + If the automated service is nonfunctional and you cannot do one or both of those manually, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you -1. Enter your device's Friend Code (with no spaces or dashes) into the "Your friend code" field -1. Paste your device's 32 character long folder name into the "Your ID0" field +1. Avvia [Bruteforce Movable](https://bruteforcemovable.com/) sul tuo computer + + Questo sito permette il recupero automatico del file `movable_part1.sed` (utilizzando una console 3DS fittizia) e la decriptazione della chiave DSiWare della tua console (utilizzando Seedminer tramite il computer di un volontario) + + If the automated service is nonfunctional, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you +1. Inserisci il Codice Amico della tua console (senza spazi o trattini) nel campo "Your friend code" +1. Incolla i 32 caratteri della cartella nel campo "Your ID0" 1. Supera il captcha "I'm not a robot" -1. Select "Go" - + If the site immediately goes to step 4, download your `movable.sed` file and continue with the next section. -1. When prompted, use the "Register Friend" button on your device to add the friend code of the bot 3DS console -1. Wait for the site to update - + If it does not, wait a few minutes before refreshing the page once -1. Select "Continue" +1. Seleziona "Go" + + Se il sito passa direttamente al punto 4, scarica il tuo file `movable.sed` e prosegui con la sezione successiva. +1. Quando richiesto, usa il pulsante "Registra Amico" sulla tua console per aggiungere il codice amico della console 3DS fittizia +1. Attendi l'aggiornamento del sito + + Se la pagina non si aggiorna da sola, attendi qualche minuto prima di ricaricarla manualmente una singola volta +1. Quando il sito avrà finito di elaborare le informazioni, potrai continuare premendo "Continue" o effettuare le operazioni su un altra console con "Do another device". Premi il pulsante verde "Continue" 1. Attendi il termine del processo - + This can take a while (up to an hour in some cases) - + During this process, the bot may not show up on your 3ds. As long as the website updates, this is not an issue. - + If you are still waiting after an hour, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you -1. When the process has completed, download your `movable.sed` file from the site - + Keep this file as you will need it in the upcoming pages + + Potrebbe terminare in poco tempo (anche meno di cinque minuti) o impiegarci anche mezz'ora. + + Durante questo processo, il bot potrebbe non visualizzarsi sul tuo 3DS. Fintantoché il sito si aggiorna, non sarà un problema. + + Se dopo mezz'ora non è successo, nulla, entra nel [canale Discord di Nintendo Homebrew](https://discord.gg/MWxPgEp) (in Inglese) per richiedere assistenza +1. Al termine del processo, scarica il tuo file `movable.sed` dal sito + + Conserva questo file in quanto ti servirà nelle pagine successive ___ ### Metodi @@ -91,11 +89,11 @@ ___ Seedminer utilizza il tuo file `movable.sed` per decriptare un qualunque titolo DSiWare dell'eShop per iniettare una particolare applicazione DSiWare nell'applicazione Impostazioni Internet DS. Questo metodo richiede che tu possegga (o scarichi / compri) un gioco DSiWare dall'eShop. -This method is compatible with all regions, though only the JPN and USA regions have free DSiWare titles in the eShop. +Il metodo è compatibile con tutte le regioni, anche se soltanto le regioni JPN e USA hanno titoli DSiWare gratuiti scaricabili dall'eShop. -This method requires that the DS Internet Settings be functioning properly (see the test at the top of this page). +Questo metodo richiede che le Impostazioni Internet DS funzionino regolarmente (vedi il test in cima a questa pagina). -Continue to [Installing boot9strap (Fredtool)](installing-boot9strap-(fredtool)) ++ Prosegui con l'[Installazione di boot9strap (Fredtool)](installing-boot9strap-(fredtool)) {: .notice--primary} ___ @@ -104,10 +102,10 @@ ___ Seedminer utilizza il tuo file `movable.sed` per ottenere accesso all'Homebrew Launcher tramite l'exploit Steelhax per iniettare una particolare applicazione DSiWare nell'applicazione DS "Modalità download". Questo metodo richiede il possesso (o lo scaricamento) del gioco gratuito "Steel Diver: Sub Wars" dall'eShop. -This method is only compatible with the EUR, JPN, and USA regions, and is somewhat more complicated than the above method. It is only recommended to use this method if you have a EUR region device and do not wish to pay for a DSiWare game, or if the above method does not work for you for some reason. +Questo metodo è compatibile con le regioni EUR, JPN e USA, ed è leggermente più complicato del precedente. Si raccomanda di usare questo metodo se hai una console EUR e non vuoi comprare un gioco DSiWare, o se il metodo precedente non è eseguibile per qualche motivo. -This method requires that the DS Download Play be functioning properly (see the test at the top of this page). +Questo metodo richiede che la Modalità download DS funzioni correttamente (vedi il test in cima a questa pagina). -Continue to [Homebrew Launcher (Steelhax)](homebrew-launcher-(steelhax)) +Prosegui con l'[Homebrew Launcher (Steelhax)](homebrew-launcher-(steelhax)) {: .notice--primary} diff --git a/_pages/it_IT/uninstall-cfw.txt b/_pages/it_IT/uninstall-cfw.txt index 8522b2f6fe..f90e5fb54c 100644 --- a/_pages/it_IT/uninstall-cfw.txt +++ b/_pages/it_IT/uninstall-cfw.txt @@ -11,7 +11,7 @@ In questa sezione verrà spiegato come rimuovere completamente il CFW dalla tua Se dovessi incontrare problemi con la tua installazione del CFW, seguire le istruzioni indicate in questa sezione probabilmente non servirà a risolverli. Un'idea migliore sarebbe leggere la pagina per la [risoluzione dei problemi](troubleshooting) o chiedere aiuto al [canale Discord di Nintendo Homebrew](https://discord.gg/MWxPgEp) (in Inglese). {: .notice--danger} -Non sarà più possibile utilizzare i giochi non firmati (in quanto illegittimi), ma potranno essere eliminati manualmente tramite la sezione Gestione dati nelle Impostazioni della console. Puoi usare un [save manager](https://github.com/FlagBrew/Checkpoint/releases/latest) per fare un backup dei salvataggi di questi giochi. +Any unsigned (illegitimate) games will be rendered unusable and should be manually removed before starting this process by using the Data Management section of the System Settings. Puoi usare un [save manager](https://github.com/FlagBrew/Checkpoint/releases/latest) per fare un backup dei salvataggi di questi giochi. Il tuo NNID, i giochi regolarmente acquistati o i salvataggi di questi ultimi non verranno toccati. @@ -26,21 +26,43 @@ Tieni presente che se hai altri file payload oltre a `GodMode9.firm` nella carte ### Istruzioni -#### Sezione I - Preparazione +#### Section I - Safety Test 1. Spegni il tuo 3DS 1. Inserisci la scheda SD nel tuo computer 1. Copia il file `GodMode9.firm` dall'archivio `.zip` di GodMode9 dentro la cartella `/luma/payloads/` della tua scheda SD 1. Copia la cartella `gm9` presente nell'archivio `.zip` di GodMode9 nella directory principale della tua scheda SD 1. Reinserisci la scheda SD nella tua console -1. Accendi la console - -#### Sezione II - Lanciare lo script di disinstallazione - 1. Avvia GodMode9 tenendo premuto (Start) durante l'accensione della console 1. Se ti viene richiesto di creare un backup dei file essenziali, premi (A) per accettare, e al termine di nuovo (A) per proseguire 1. Se ti viene chiesto di reimpostare la data e l'ora dell'RTC, premi (A) per farlo, poi imposta la data e l'ora, infine premi (A) per continuare + Tieni presente che in tal caso dovrai anche reimpostare data ed ora anche nelle Impostazioni della Console al termine della guida +1. Navigate to `[1:] SYSNAND CTRNAND > title > 00040138 > (X)0000002 > content` + + On a "New" edition console, the (X) will instead be 2 + + On an "Old" edition console, the (X) will instead be 0 +1. Select the `.app` file +1. Select `NCCH Image Options` +1. Select `Mount image to drive` +1. In the window that appears, open the `exefs` folder +1. In this folder, select the `.firm` file +1. Select "Firm Options" +1. Select "Boot Firm" +1. When prompted, choose to decrypt and make a copy +1. You should boot into the regular 3DS Home Menu. If you do, power your device off and continue to the next section + + If you do NOT boot into the regular 3DS Home Menu, continuing with these instructions **WILL** brick your device. You should join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you + +#### Sezione II - Preparazione + +1. Accendi la console +1. Navigate to System Settings > Data Management > Nintendo 3DS > Software +1. In this list of software, delete any non-Nintendo content you installed while using CFW + + This includes common system software such as FBI, Anemone3DS, Luma Updater, Homebrew Launcher, Checkpoint, and others, along with any non-eShop games + + Failure to remove CFW software before uninstalling CFW may break access to the Data Management menu after uninstalling CFW +1. Spegni il tuo 3DS + +#### Section III - Running Uninstall Script + +1. Avvia GodMode9 tenendo premuto (Start) durante l'accensione della console 1. Premi il pulsante HOME per far apparire il menu delle azioni 1. Seleziona "Scripts..." 1. Seleziona "GM9Megascript" diff --git a/_pages/ja_JP/finalizing-setup.txt b/_pages/ja_JP/finalizing-setup.txt index f713e74173..6f972a78b9 100644 --- a/_pages/ja_JP/finalizing-setup.txt +++ b/_pages/ja_JP/finalizing-setup.txt @@ -18,6 +18,8 @@ The file `boot.firm` is what is launched by boot9strap itself after it finishes + **Luma3DS Updater** *(CFWインストールを簡単に更新します)* + **GodMode9** *(multipurpose tool which can do NAND and cartridge functions)* + **Homebrew Launcher Loader** *(launches the Homebrew Launcher)* ++ **DSP1** *(allows homebrew applications to have sound)* ++ **ctr-no-timeoffset** *(removes the rtc offset so that the home menu and rtc timestamps match)* ### What You Need @@ -143,7 +145,7 @@ If, before following this guide, you already had an EmuNAND setup and would like 1. Press (B) to return to the main menu 1. Hold (R) and press (B) at the same time to eject your SD card 1. パソコンにSDカードを入れます -1. Copy `__sysnand_###.bin`, `essential.exefs`, and `boot9.bin` from the `/gm9/out/` folder on your SD card to a safe location on your computer +1. Copy `__sysnand_###.bin`, `__sysnand_###.bin.sha`, `essential.exefs`, and `boot9.bin` from the `/gm9/out/` folder on your SD card to a safe location on your computer + Make backups in multiple locations (such as online file storage) + These backups will save you from a brick and/or help you recover files from the NAND image if anything goes wrong in the future 1. Delete `__sysnand_###.bin` and `__sysnand_###.bin.sha` from the `/gm9/out/` folder on your SD card after copying it diff --git a/_pages/ja_JP/homebrew-launcher-(steelhax).txt b/_pages/ja_JP/homebrew-launcher-(steelhax).txt index 8163d7b59b..234a3f025a 100644 --- a/_pages/ja_JP/homebrew-launcher-(steelhax).txt +++ b/_pages/ja_JP/homebrew-launcher-(steelhax).txt @@ -8,7 +8,7 @@ title: "Homebrew Launcher (Steelhax)" This method of using Seedminer for further exploitation uses your `movable.sed` file to gain access to the Homebrew Launcher using the Steelhax exploit for the purposes of injecting an exploitable DSiWare title into the DS Download Play application. This method requires you to already own (or download) the free "Steel Divers: Sub Wars" game from the eShop. -If your device already has access to the Homebrew Launcher (whether through Steelhax or another exploit), you can skip to [Installing Boot9strap (Frogminer)](installing-boot9strap-(frogminer)). +If your device already has access to the Homebrew Launcher (whether through Steelhax or another exploit), you can skip to [Installing Boot9strap (Frogtool)](installing-boot9strap-(frogtool)). {: .notice--success} If you already have Steel Diver: Sub Wars, this process will overwrite your game's save file! @@ -17,6 +17,7 @@ If you already have Steel Diver: Sub Wars, this process will overwrite your game ### What You Need * The free eShop game "Steel Diver: Sub Wars" +* Your `movable.sed` file from completing [Seedminer](seedminer) * The latest release of [the Homebrew Launcher](https://github.com/fincs/new-hbmenu/releases/latest) * The latest release of [Steelhax](https://github.com/VegaRoXas/vegaroxas.github.io/raw/master/files/steelhax-installer.rar) * The [otherapp payload](https://smealum.github.io/3ds/#otherapp) *(for your region and version)* @@ -39,7 +40,7 @@ If you already have Steel Diver: Sub Wars, this process will overwrite your game 1. Exit "Steel Diver: Sub Wars" 1. Power off your device 1. パソコンにSDカードを入れます -1. Open [the Steelminer Injector website](http://steelminer.jisagi.net/injector) on your computer +1. Open [the Steelminer Injector website](https://bruteforcemovable.com/steelhax/) on your computer 1. Select your `movable.sed` file 1. Select "Start!" 1. Wait for the process to complete diff --git a/_pages/ja_JP/installing-boot9strap-(fredtool).txt b/_pages/ja_JP/installing-boot9strap-(fredtool).txt index 761c859c32..0c44506513 100644 --- a/_pages/ja_JP/installing-boot9strap-(fredtool).txt +++ b/_pages/ja_JP/installing-boot9strap-(fredtool).txt @@ -10,8 +10,6 @@ This method of using Seedminer for further exploitation uses your `movable.sed` This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). -To use the [magnet](https://wikipedia.org/wiki/Magnet_URI_scheme) links on this page, you will need a torrent client like [Deluge](http://dev.deluge-torrent.org/wiki/Download). - To extract the `.7z` and `.rar` files linked on this page, you will need a file archiver like [7-Zip](http://www.7-zip.org/) or [The Unarchiver](https://theunarchiver.com/). ### What You Need diff --git a/_pages/ja_JP/ntrboot.txt b/_pages/ja_JP/ntrboot.txt index a5c9bc16cd..35ffad7d57 100644 --- a/_pages/ja_JP/ntrboot.txt +++ b/_pages/ja_JP/ntrboot.txt @@ -17,14 +17,14 @@ Note that carts with a "Time Bomb" will no longer be able to launch `.nds` files | Flashcart Name | Current Price | "Time Bomb"? | 3DS Versions? | DSi Versions? | Other Notes | |-|-:|:-:|:-:|:-:|-| -| [**R4i-SDHC B9S**](http://www.nds-card.net/ProShow.asp?ProID=574) | $15.99 | September 3, 2019 | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot**; can be flashed back to an NDS flashcart. | -| [**R4i Gold 3DS Plus**](http://www.nds-card.net/ProShow.asp?ProID=575) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot** ([internal switch to switch between ntrboot and NDS modes]({{ "/images/screenshots/r4i-gold-3ds-plus.png" | absolute_url }})); do not manually flash with ntrboot. | -| [**Acekard 2i**](http://www.nds-card.net/ProShow.asp?ProID=160) | $20.99 | No | <= 4.3.0 | <= 1.4.4 | | -| [**DSTT**](http://www.nds-card.net/ProShow.asp?ProID=157) | $9.99 | No | None | None | Only models with [certain flash chips](https://gist.github.com/yuukieve/6b48f1bb8dd15136403c15c39fafdb42) are compatible with ntrboot. | -| [**R4i Gold 3DS**](http://www.nds-card.net/ProShow.asp?ProID=149) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | All RTS revisions are compatible. | -| [**R4i-SDHC 3DS RTS**](http://www.nds-card.net/ProShow.asp?ProID=146) | $13.99 | 1.87: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | | -| [**R4iSDHC GOLD Pro 20XX**](http://www.nds-card.net/ProShow.asp?ProID=490) | $9.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. 2013 models are incompatible. | -| [**R4iSDHC RTS LITE 20XX**](http://www.nds-card.net/ProShow.asp?ProID=450) | $13.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. 2013 models are incompatible. | +| [**R4i-SDHC B9S**](http://www.nds-card.com/ProShow.asp?ProID=574) | $15.99 | September 3, 2019 | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot**; can be flashed back to an NDS flashcart. | +| [**R4i Gold 3DS Plus**](http://www.nds-card.com/ProShow.asp?ProID=575) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot** ([internal switch to switch between ntrboot and NDS modes]({{ "/images/screenshots/r4i-gold-3ds-plus.png" | absolute_url }})); do not manually flash with ntrboot. | +| [**Acekard 2i**](http://www.nds-card.com/ProShow.asp?ProID=160) | $20.99 | No | <= 4.3.0 | <= 1.4.4 | | +| [**DSTT**](http://www.nds-card.com/ProShow.asp?ProID=157) | $9.99 | No | None | None | Only models with [certain flash chips](https://gist.github.com/yuukieve/6b48f1bb8dd15136403c15c39fafdb42) are compatible with ntrboot. | +| [**R4i Gold 3DS**](http://www.nds-card.com/ProShow.asp?ProID=149) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | All RTS revisions are compatible. | +| [**R4i-SDHC 3DS RTS**](http://www.nds-card.com/ProShow.asp?ProID=146) | $13.99 | 1.87: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | | +| [**R4iSDHC GOLD Pro 20XX**](http://www.nds-card.com/ProShow.asp?ProID=490) | $9.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. 2013 models are incompatible. | +| [**R4iSDHC RTS LITE 20XX**](http://www.nds-card.com/ProShow.asp?ProID=450) | $13.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. 2013 models are incompatible. | | **Ace3DS X** | | No | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot** (external switch to switch between ntrboot ("3DS") and NDS modes); do not manually flash with ntrboot. | | **Ace3DS Plus** | | No | <= 11.9.0 | <= 1.4.5 | | | **Gateway Blue** | | No | 4.1.0 - 4.5.0 | <= 1.4.5 | | @@ -49,7 +49,7 @@ To test if a magnet will work, hold it on or around the (A)(B)(X)(Y) buttons whi Note that the flashcart will not be able to be used for its standard functions while the ntrboot exploit is installed on it (except for in the case of the Acekard 2i, which remains functional *on NDS and custom firmware 3DS systems only*). This means that, for most flashcarts, it will not even display on the home menu. There are optional steps at the end of the ntrboot flashing instructions to remove it from your flashcart when you are done. -Note that in some rare circumstances, it may be possible for the flashing process to **brick** a counterfeit flashcart and render it permanently unusable. This is unlikely, but nevertheless only original listed flashcarts are supported. To reduce the chance of receiving a counterfeit card, it is recommended that you use a reputable site to buy your flashcart (such as [NDS Card](http://www.nds-card.net/)) +Note that in some rare circumstances, it may be possible for the flashing process to **brick** a counterfeit flashcart and render it permanently unusable. This is unlikely, but nevertheless only original listed flashcarts are supported. To reduce the chance of receiving a counterfeit card, it is recommended that you use a reputable site to buy your flashcart (such as [NDS Card](http://www.nds-card.com/)) {: .notice--danger} ___ diff --git a/_pages/ja_JP/seedminer.txt b/_pages/ja_JP/seedminer.txt index bc6a65b5aa..7d770d6683 100644 --- a/_pages/ja_JP/seedminer.txt +++ b/_pages/ja_JP/seedminer.txt @@ -63,9 +63,7 @@ There are two different methods for building on the Seedminer exploit (described 1. Open [Bruteforce Movable](https://bruteforcemovable.com/) on your computer + This site can automate the retrieval of `movable_part1.sed` (using a bot 3DS console) and the breaking of your device's DSiWare encryption (using a volunteer's computer to run Seedminer) - + If you already have access to a 3DS capable of launching the Homebrew Launcher, you can manually retrieve your `movable_part1.sed` using that device by following [these](https://jisagi.github.io/SeedminerGuide/seedminerSelf/#section1) instructions - + If you already have access to a PC with a powerful graphics card, you can manually calculate your `movable.sed` using it by following [these](https://jisagi.github.io/SeedminerGuide/seedminerSelf/#section2) instructions - + If the automated service is nonfunctional and you cannot do one or both of those manually, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you + + If the automated service is nonfunctional, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you 1. Enter your device's Friend Code (with no spaces or dashes) into the "Your friend code" field 1. Paste your device's 32 character long folder name into the "Your ID0" field 1. Complete the "I'm not a robot" captcha @@ -74,11 +72,11 @@ There are two different methods for building on the Seedminer exploit (described 1. When prompted, use the "Register Friend" button on your device to add the friend code of the bot 3DS console 1. Wait for the site to update + If it does not, wait a few minutes before refreshing the page once -1. Select "Continue" -1. Wait for the process to complete - + This can take a while (up to an hour in some cases) - + During this process, the bot may not show up on your 3ds. As long as the website updates, this is not an issue. - + If you are still waiting after an hour, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you +1. Once the site processes your information, you will be given the option to "Continue" or "Do another device". Click the green "Continue" button +1. Wait for the remainder of the process to complete + + This is usually fast (1-5 minutes) but in some cases, can take up to half an hour. + + During this process, the bot you added may not show up on your 3ds. As long as the website updates, this is not an issue. + + If you are still waiting after half an hour, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you 1. When the process has completed, download your `movable.sed` file from the site + Keep this file as you will need it in the upcoming pages @@ -102,7 +100,7 @@ ___ #### Seedminer + Steelhax + Frogtool -This method of using Seedminer for further exploitation uses your `movable.sed` file to gain access to the Homebrew Launcher using the Steelhax exploit for the purposes of injecting an exploitable DSiWare title into the DS Download Play application. This method requires you to already own (or download) the free "Steel Divers: Sub Wars" game from the eShop. +This method of using Seedminer for further exploitation uses your `movable.sed` file to gain access to the Homebrew Launcher using the Steelhax exploit for the purposes of injecting an exploitable DSiWare title into the DS Download Play application. This method requires you to already own (or download) the free "Steel Diver: Sub Wars" game from the eShop. This method is only compatible with the EUR, JPN, and USA regions, and is somewhat more complicated than the above method. It is only recommended to use this method if you have a EUR region device and do not wish to pay for a DSiWare game, or if the above method does not work for you for some reason. diff --git a/_pages/ja_JP/uninstall-cfw.txt b/_pages/ja_JP/uninstall-cfw.txt index 70b2cffa31..52b5bed10f 100644 --- a/_pages/ja_JP/uninstall-cfw.txt +++ b/_pages/ja_JP/uninstall-cfw.txt @@ -11,7 +11,7 @@ This will completely remove CFW from your device, including Boot9Strap and Luma3 This is almost never the solution to fix any issues you encounter with your CFW installation. A better idea would be to read the [troubleshooting](troubleshooting) page or ask (in English) for help at [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp). {: .notice--danger} -Any unsigned (illegitimate) games will be rendered unusable and can be manually removed using the Data Management section of the System Settings. Use a [save manager](https://github.com/FlagBrew/Checkpoint/releases/latest) to backup any saves for these unsigned (illegitimate) games you care about. +Any unsigned (illegitimate) games will be rendered unusable and should be manually removed before starting this process by using the Data Management section of the System Settings. Use a [save manager](https://github.com/FlagBrew/Checkpoint/releases/latest) to backup any saves for these unsigned (illegitimate) games you care about. This will not affect your NNID, any legitimately purchased games, or any saves for those legitimately purchased games. @@ -26,21 +26,43 @@ Note that if you have any payload files other than `GodMode9.firm` in the `/luma ### Instructions -#### Section I - Prep Work +#### Section I - Safety Test 1. Power off your device 1. パソコンにSDカードを入れます 1. Copy `GodMode9.firm` from the GodMode9 `.zip` to the `/luma/payloads/` folder on your SD card 1. Copy the `gm9` folder from the GodMode9 `.zip` to the root of your SD card 1. Reinsert your SD card into your device -1. Power on your device - -#### Section II - Running Uninstall Script - 1. Launch GodMode9 by holding (Start) during boot 1. If you are prompted to create an essential files backup, press (A) to do so, then press (A) to continue once it has completed 1. If you are prompted to fix the RTC date&time, press (A) to do so, then set the date and time, then press (A) to continue + Note that, if you had to fix the RTC date and time, you will have to fix the time in the System Settings as well after this guide +1. Navigate to `[1:] SYSNAND CTRNAND > title > 00040138 > (X)0000002 > content` + + On a "New" edition console, the (X) will instead be 2 + + On an "Old" edition console, the (X) will instead be 0 +1. Select the `.app` file +1. Select `NCCH Image Options` +1. Select `Mount image to drive` +1. In the window that appears, open the `exefs` folder +1. In this folder, select the `.firm` file +1. Select "Firm Options" +1. Select "Boot Firm" +1. When prompted, choose to decrypt and make a copy +1. You should boot into the regular 3DS Home Menu. If you do, power your device off and continue to the next section + + If you do NOT boot into the regular 3DS Home Menu, continuing with these instructions **WILL** brick your device. You should join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you + +#### Section II - Prep Work + +1. Power on your device +1. Navigate to System Settings > Data Management > Nintendo 3DS > Software +1. In this list of software, delete any non-Nintendo content you installed while using CFW + + This includes common system software such as FBI, Anemone3DS, Luma Updater, Homebrew Launcher, Checkpoint, and others, along with any non-eShop games + + Failure to remove CFW software before uninstalling CFW may break access to the Data Management menu after uninstalling CFW +1. Power off your device + +#### Section III - Running Uninstall Script + +1. Launch GodMode9 by holding (Start) during boot 1. Press (Home) to bring up the action menu 1. Select "Scripts..." 1. Select "GM9Megascript" diff --git a/_pages/ko_KR/finalizing-setup.txt b/_pages/ko_KR/finalizing-setup.txt index c554c15740..9def423b44 100644 --- a/_pages/ko_KR/finalizing-setup.txt +++ b/_pages/ko_KR/finalizing-setup.txt @@ -18,6 +18,8 @@ The file `boot.firm` is what is launched by boot9strap itself after it finishes + **Luma3DS Updater** *(간단한 CFW 설치 업데이트)* + **Godmode9** *(NAND와 게임 카드의 기능을 수행할 수 있는 다목적 툴)* + **Homebrew Launcher Loader** *(launches the Homebrew Launcher)* ++ **DSP1** *(allows homebrew applications to have sound)* ++ **ctr-no-timeoffset** *(removes the rtc offset so that the home menu and rtc timestamps match)* ### What You Need @@ -143,7 +145,7 @@ If, before following this guide, you already had an EmuNAND setup and would like 1. (B)를 눌러 메인 메뉴로 돌아가 주세요. 1. (R) 버튼과 (B)를 동시에 눌러 SD 카드를 뺄 준비를 해 주세요. 1. SD 카드를 컴퓨터에 삽입해 주세요. -1. Copy `__sysnand_###.bin`, `essential.exefs`, and `boot9.bin` from the `/gm9/out/` folder on your SD card to a safe location on your computer +1. Copy `__sysnand_###.bin`, `__sysnand_###.bin.sha`, `essential.exefs`, and `boot9.bin` from the `/gm9/out/` folder on your SD card to a safe location on your computer + 여러 위치에 백업을 해 주세요. (온라인 파일 저장 공간 등) + These backups will save you from a brick and/or help you recover files from the NAND image if anything goes wrong in the future 1. Delete `__sysnand_###.bin` and `__sysnand_###.bin.sha` from the `/gm9/out/` folder on your SD card after copying it diff --git a/_pages/ko_KR/homebrew-launcher-(steelhax).txt b/_pages/ko_KR/homebrew-launcher-(steelhax).txt index 29b8735ddf..e27bf75ee1 100644 --- a/_pages/ko_KR/homebrew-launcher-(steelhax).txt +++ b/_pages/ko_KR/homebrew-launcher-(steelhax).txt @@ -8,7 +8,7 @@ title: "Homebrew Launcher (Steelhax)" This method of using Seedminer for further exploitation uses your `movable.sed` file to gain access to the Homebrew Launcher using the Steelhax exploit for the purposes of injecting an exploitable DSiWare title into the DS Download Play application. This method requires you to already own (or download) the free "Steel Divers: Sub Wars" game from the eShop. -If your device already has access to the Homebrew Launcher (whether through Steelhax or another exploit), you can skip to [Installing Boot9strap (Frogminer)](installing-boot9strap-(frogminer)). +If your device already has access to the Homebrew Launcher (whether through Steelhax or another exploit), you can skip to [Installing Boot9strap (Frogtool)](installing-boot9strap-(frogtool)). {: .notice--success} If you already have Steel Diver: Sub Wars, this process will overwrite your game's save file! @@ -17,6 +17,7 @@ If you already have Steel Diver: Sub Wars, this process will overwrite your game ### What You Need * The free eShop game "Steel Diver: Sub Wars" +* Your `movable.sed` file from completing [Seedminer](seedminer) * The latest release of [the Homebrew Launcher](https://github.com/fincs/new-hbmenu/releases/latest) * The latest release of [Steelhax](https://github.com/VegaRoXas/vegaroxas.github.io/raw/master/files/steelhax-installer.rar) * The [otherapp payload](https://smealum.github.io/3ds/#otherapp) *(for your region and version)* @@ -39,7 +40,7 @@ If you already have Steel Diver: Sub Wars, this process will overwrite your game 1. Exit "Steel Diver: Sub Wars" 1. 기기를 종료해 주세요. 1. SD 카드를 컴퓨터에 삽입해 주세요. -1. Open [the Steelminer Injector website](http://steelminer.jisagi.net/injector) on your computer +1. Open [the Steelminer Injector website](https://bruteforcemovable.com/steelhax/) on your computer 1. Select your `movable.sed` file 1. Select "Start!" 1. Wait for the process to complete diff --git a/_pages/ko_KR/installing-boot9strap-(fredtool).txt b/_pages/ko_KR/installing-boot9strap-(fredtool).txt index e113483728..7bae77373e 100644 --- a/_pages/ko_KR/installing-boot9strap-(fredtool).txt +++ b/_pages/ko_KR/installing-boot9strap-(fredtool).txt @@ -10,8 +10,6 @@ This method of using Seedminer for further exploitation uses your `movable.sed` This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). -To use the [magnet](https://wikipedia.org/wiki/Magnet_URI_scheme) links on this page, you will need a torrent client like [Deluge](http://dev.deluge-torrent.org/wiki/Download). - To extract the `.7z` and `.rar` files linked on this page, you will need a file archiver like [7-Zip](http://www.7-zip.org/) or [The Unarchiver](https://theunarchiver.com/). ### What You Need diff --git a/_pages/ko_KR/ntrboot.txt b/_pages/ko_KR/ntrboot.txt index a5c9bc16cd..35ffad7d57 100644 --- a/_pages/ko_KR/ntrboot.txt +++ b/_pages/ko_KR/ntrboot.txt @@ -17,14 +17,14 @@ Note that carts with a "Time Bomb" will no longer be able to launch `.nds` files | Flashcart Name | Current Price | "Time Bomb"? | 3DS Versions? | DSi Versions? | Other Notes | |-|-:|:-:|:-:|:-:|-| -| [**R4i-SDHC B9S**](http://www.nds-card.net/ProShow.asp?ProID=574) | $15.99 | September 3, 2019 | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot**; can be flashed back to an NDS flashcart. | -| [**R4i Gold 3DS Plus**](http://www.nds-card.net/ProShow.asp?ProID=575) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot** ([internal switch to switch between ntrboot and NDS modes]({{ "/images/screenshots/r4i-gold-3ds-plus.png" | absolute_url }})); do not manually flash with ntrboot. | -| [**Acekard 2i**](http://www.nds-card.net/ProShow.asp?ProID=160) | $20.99 | No | <= 4.3.0 | <= 1.4.4 | | -| [**DSTT**](http://www.nds-card.net/ProShow.asp?ProID=157) | $9.99 | No | None | None | Only models with [certain flash chips](https://gist.github.com/yuukieve/6b48f1bb8dd15136403c15c39fafdb42) are compatible with ntrboot. | -| [**R4i Gold 3DS**](http://www.nds-card.net/ProShow.asp?ProID=149) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | All RTS revisions are compatible. | -| [**R4i-SDHC 3DS RTS**](http://www.nds-card.net/ProShow.asp?ProID=146) | $13.99 | 1.87: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | | -| [**R4iSDHC GOLD Pro 20XX**](http://www.nds-card.net/ProShow.asp?ProID=490) | $9.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. 2013 models are incompatible. | -| [**R4iSDHC RTS LITE 20XX**](http://www.nds-card.net/ProShow.asp?ProID=450) | $13.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. 2013 models are incompatible. | +| [**R4i-SDHC B9S**](http://www.nds-card.com/ProShow.asp?ProID=574) | $15.99 | September 3, 2019 | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot**; can be flashed back to an NDS flashcart. | +| [**R4i Gold 3DS Plus**](http://www.nds-card.com/ProShow.asp?ProID=575) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot** ([internal switch to switch between ntrboot and NDS modes]({{ "/images/screenshots/r4i-gold-3ds-plus.png" | absolute_url }})); do not manually flash with ntrboot. | +| [**Acekard 2i**](http://www.nds-card.com/ProShow.asp?ProID=160) | $20.99 | No | <= 4.3.0 | <= 1.4.4 | | +| [**DSTT**](http://www.nds-card.com/ProShow.asp?ProID=157) | $9.99 | No | None | None | Only models with [certain flash chips](https://gist.github.com/yuukieve/6b48f1bb8dd15136403c15c39fafdb42) are compatible with ntrboot. | +| [**R4i Gold 3DS**](http://www.nds-card.com/ProShow.asp?ProID=149) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | All RTS revisions are compatible. | +| [**R4i-SDHC 3DS RTS**](http://www.nds-card.com/ProShow.asp?ProID=146) | $13.99 | 1.87: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | | +| [**R4iSDHC GOLD Pro 20XX**](http://www.nds-card.com/ProShow.asp?ProID=490) | $9.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. 2013 models are incompatible. | +| [**R4iSDHC RTS LITE 20XX**](http://www.nds-card.com/ProShow.asp?ProID=450) | $13.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. 2013 models are incompatible. | | **Ace3DS X** | | No | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot** (external switch to switch between ntrboot ("3DS") and NDS modes); do not manually flash with ntrboot. | | **Ace3DS Plus** | | No | <= 11.9.0 | <= 1.4.5 | | | **Gateway Blue** | | No | 4.1.0 - 4.5.0 | <= 1.4.5 | | @@ -49,7 +49,7 @@ To test if a magnet will work, hold it on or around the (A)(B)(X)(Y) buttons whi Note that the flashcart will not be able to be used for its standard functions while the ntrboot exploit is installed on it (except for in the case of the Acekard 2i, which remains functional *on NDS and custom firmware 3DS systems only*). This means that, for most flashcarts, it will not even display on the home menu. There are optional steps at the end of the ntrboot flashing instructions to remove it from your flashcart when you are done. -Note that in some rare circumstances, it may be possible for the flashing process to **brick** a counterfeit flashcart and render it permanently unusable. This is unlikely, but nevertheless only original listed flashcarts are supported. To reduce the chance of receiving a counterfeit card, it is recommended that you use a reputable site to buy your flashcart (such as [NDS Card](http://www.nds-card.net/)) +Note that in some rare circumstances, it may be possible for the flashing process to **brick** a counterfeit flashcart and render it permanently unusable. This is unlikely, but nevertheless only original listed flashcarts are supported. To reduce the chance of receiving a counterfeit card, it is recommended that you use a reputable site to buy your flashcart (such as [NDS Card](http://www.nds-card.com/)) {: .notice--danger} ___ diff --git a/_pages/ko_KR/seedminer.txt b/_pages/ko_KR/seedminer.txt index a825b73a66..697a0bb521 100644 --- a/_pages/ko_KR/seedminer.txt +++ b/_pages/ko_KR/seedminer.txt @@ -63,9 +63,7 @@ There are two different methods for building on the Seedminer exploit (described 1. Open [Bruteforce Movable](https://bruteforcemovable.com/) on your computer + This site can automate the retrieval of `movable_part1.sed` (using a bot 3DS console) and the breaking of your device's DSiWare encryption (using a volunteer's computer to run Seedminer) - + If you already have access to a 3DS capable of launching the Homebrew Launcher, you can manually retrieve your `movable_part1.sed` using that device by following [these](https://jisagi.github.io/SeedminerGuide/seedminerSelf/#section1) instructions - + If you already have access to a PC with a powerful graphics card, you can manually calculate your `movable.sed` using it by following [these](https://jisagi.github.io/SeedminerGuide/seedminerSelf/#section2) instructions - + If the automated service is nonfunctional and you cannot do one or both of those manually, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you + + If the automated service is nonfunctional, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you 1. Enter your device's Friend Code (with no spaces or dashes) into the "Your friend code" field 1. Paste your device's 32 character long folder name into the "Your ID0" field 1. Complete the "I'm not a robot" captcha @@ -74,11 +72,11 @@ There are two different methods for building on the Seedminer exploit (described 1. When prompted, use the "Register Friend" button on your device to add the friend code of the bot 3DS console 1. Wait for the site to update + If it does not, wait a few minutes before refreshing the page once -1. Select "Continue" -1. Wait for the process to complete - + This can take a while (up to an hour in some cases) - + During this process, the bot may not show up on your 3ds. As long as the website updates, this is not an issue. - + If you are still waiting after an hour, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you +1. Once the site processes your information, you will be given the option to "Continue" or "Do another device". Click the green "Continue" button +1. Wait for the remainder of the process to complete + + This is usually fast (1-5 minutes) but in some cases, can take up to half an hour. + + During this process, the bot you added may not show up on your 3ds. As long as the website updates, this is not an issue. + + If you are still waiting after half an hour, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you 1. When the process has completed, download your `movable.sed` file from the site + Keep this file as you will need it in the upcoming pages @@ -102,7 +100,7 @@ ___ #### Seedminer + Steelhax + Frogtool -This method of using Seedminer for further exploitation uses your `movable.sed` file to gain access to the Homebrew Launcher using the Steelhax exploit for the purposes of injecting an exploitable DSiWare title into the DS Download Play application. This method requires you to already own (or download) the free "Steel Divers: Sub Wars" game from the eShop. +This method of using Seedminer for further exploitation uses your `movable.sed` file to gain access to the Homebrew Launcher using the Steelhax exploit for the purposes of injecting an exploitable DSiWare title into the DS Download Play application. This method requires you to already own (or download) the free "Steel Diver: Sub Wars" game from the eShop. This method is only compatible with the EUR, JPN, and USA regions, and is somewhat more complicated than the above method. It is only recommended to use this method if you have a EUR region device and do not wish to pay for a DSiWare game, or if the above method does not work for you for some reason. diff --git a/_pages/ko_KR/uninstall-cfw.txt b/_pages/ko_KR/uninstall-cfw.txt index 9a20e3b993..2f7d89149f 100644 --- a/_pages/ko_KR/uninstall-cfw.txt +++ b/_pages/ko_KR/uninstall-cfw.txt @@ -11,7 +11,7 @@ This will completely remove CFW from your device, including Boot9Strap and Luma3 This is almost never the solution to fix any issues you encounter with your CFW installation. A better idea would be to read the [troubleshooting](troubleshooting) page or ask (in English) for help at [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp). {: .notice--danger} -Any unsigned (illegitimate) games will be rendered unusable and can be manually removed using the Data Management section of the System Settings. Use a [save manager](https://github.com/FlagBrew/Checkpoint/releases/latest) to backup any saves for these unsigned (illegitimate) games you care about. +Any unsigned (illegitimate) games will be rendered unusable and should be manually removed before starting this process by using the Data Management section of the System Settings. Use a [save manager](https://github.com/FlagBrew/Checkpoint/releases/latest) to backup any saves for these unsigned (illegitimate) games you care about. This will not affect your NNID, any legitimately purchased games, or any saves for those legitimately purchased games. @@ -26,21 +26,43 @@ Note that if you have any payload files other than `GodMode9.firm` in the `/luma ### Instructions -#### Section I - Prep Work +#### Section I - Safety Test 1. 기기를 종료해 주세요. 1. SD 카드를 컴퓨터에 삽입해 주세요. 1. Copy `GodMode9.firm` from the GodMode9 `.zip` to the `/luma/payloads/` folder on your SD card 1. Copy the `gm9` folder from the GodMode9 `.zip` to the root of your SD card 1. SD 카드를 기기에 다시 삽입해 주세요. -1. 기기를 시작해 주세요. - -#### Section II - Running Uninstall Script - 1. Launch GodMode9 by holding (Start) during boot 1. If you are prompted to create an essential files backup, press (A) to do so, then press (A) to continue once it has completed 1. If you are prompted to fix the RTC date&time, press (A) to do so, then set the date and time, then press (A) to continue + Note that, if you had to fix the RTC date and time, you will have to fix the time in the System Settings as well after this guide +1. Navigate to `[1:] SYSNAND CTRNAND > title > 00040138 > (X)0000002 > content` + + On a "New" edition console, the (X) will instead be 2 + + On an "Old" edition console, the (X) will instead be 0 +1. Select the `.app` file +1. Select `NCCH Image Options` +1. Select `Mount image to drive` +1. In the window that appears, open the `exefs` folder +1. In this folder, select the `.firm` file +1. Select "Firm Options" +1. Select "Boot Firm" +1. When prompted, choose to decrypt and make a copy +1. You should boot into the regular 3DS Home Menu. If you do, power your device off and continue to the next section + + If you do NOT boot into the regular 3DS Home Menu, continuing with these instructions **WILL** brick your device. You should join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you + +#### Section II - Prep Work + +1. 기기를 시작해 주세요. +1. Navigate to System Settings > Data Management > Nintendo 3DS > Software +1. In this list of software, delete any non-Nintendo content you installed while using CFW + + This includes common system software such as FBI, Anemone3DS, Luma Updater, Homebrew Launcher, Checkpoint, and others, along with any non-eShop games + + Failure to remove CFW software before uninstalling CFW may break access to the Data Management menu after uninstalling CFW +1. 기기를 종료해 주세요. + +#### Section III - Running Uninstall Script + +1. Launch GodMode9 by holding (Start) during boot 1. (Home)을 눌러 작업 메뉴를 띄워 주세요. 1. Select "Scripts..." 1. Select "GM9Megascript" diff --git a/_pages/ms_MY/finalizing-setup.txt b/_pages/ms_MY/finalizing-setup.txt index 96e6f7c9cb..0236e120f3 100644 --- a/_pages/ms_MY/finalizing-setup.txt +++ b/_pages/ms_MY/finalizing-setup.txt @@ -18,6 +18,8 @@ Semasa proses ini, kami juga akan memasang program-program berikut: + **Luma3DS Updater** *(kemaskini CFW anda dengan mudah)* + **GodMode9** *(multipurpose tool which can do NAND and cartridge functions)* + **Homebrew Launcher Loader** *(launches the Homebrew Launcher)* ++ **DSP1** *(allows homebrew applications to have sound)* ++ **ctr-no-timeoffset** *(removes the rtc offset so that the home menu and rtc timestamps match)* ### What You Need @@ -143,7 +145,7 @@ If, before following this guide, you already had an EmuNAND setup and would like 1. Press (B) to return to the main menu 1. Tahan (R) dan tekan (B) pada masa yang sama untuk mengeluarkan kad SD 1. Pasang kad SD anda ke dalam komputer -1. Copy `__sysnand_###.bin`, `essential.exefs`, and `boot9.bin` from the `/gm9/out/` folder on your SD card to a safe location on your computer +1. Copy `__sysnand_###.bin`, `__sysnand_###.bin.sha`, `essential.exefs`, and `boot9.bin` from the `/gm9/out/` folder on your SD card to a safe location on your computer + Make backups in multiple locations (such as online file storage) + These backups will save you from a brick and/or help you recover files from the NAND image if anything goes wrong in the future 1. Delete `__sysnand_###.bin` and `__sysnand_###.bin.sha` from the `/gm9/out/` folder on your SD card after copying it diff --git a/_pages/ms_MY/homebrew-launcher-(steelhax).txt b/_pages/ms_MY/homebrew-launcher-(steelhax).txt index 74f7071698..f5bb628b0b 100644 --- a/_pages/ms_MY/homebrew-launcher-(steelhax).txt +++ b/_pages/ms_MY/homebrew-launcher-(steelhax).txt @@ -8,7 +8,7 @@ title: "Homebrew Launcher (Steelhax)" This method of using Seedminer for further exploitation uses your `movable.sed` file to gain access to the Homebrew Launcher using the Steelhax exploit for the purposes of injecting an exploitable DSiWare title into the DS Download Play application. This method requires you to already own (or download) the free "Steel Divers: Sub Wars" game from the eShop. -If your device already has access to the Homebrew Launcher (whether through Steelhax or another exploit), you can skip to [Installing Boot9strap (Frogminer)](installing-boot9strap-(frogminer)). +If your device already has access to the Homebrew Launcher (whether through Steelhax or another exploit), you can skip to [Installing Boot9strap (Frogtool)](installing-boot9strap-(frogtool)). {: .notice--success} If you already have Steel Diver: Sub Wars, this process will overwrite your game's save file! @@ -17,6 +17,7 @@ If you already have Steel Diver: Sub Wars, this process will overwrite your game ### What You Need * The free eShop game "Steel Diver: Sub Wars" +* Your `movable.sed` file from completing [Seedminer](seedminer) * The latest release of [the Homebrew Launcher](https://github.com/fincs/new-hbmenu/releases/latest) * The latest release of [Steelhax](https://github.com/VegaRoXas/vegaroxas.github.io/raw/master/files/steelhax-installer.rar) * The [otherapp payload](https://smealum.github.io/3ds/#otherapp) *(for your region and version)* @@ -39,7 +40,7 @@ If you already have Steel Diver: Sub Wars, this process will overwrite your game 1. Exit "Steel Diver: Sub Wars" 1. Power off your device 1. Pasang kad SD anda ke dalam komputer -1. Open [the Steelminer Injector website](http://steelminer.jisagi.net/injector) on your computer +1. Open [the Steelminer Injector website](https://bruteforcemovable.com/steelhax/) on your computer 1. Select your `movable.sed` file 1. Select "Start!" 1. Wait for the process to complete diff --git a/_pages/ms_MY/installing-boot9strap-(fredtool).txt b/_pages/ms_MY/installing-boot9strap-(fredtool).txt index 709b49ecc5..932d90f6ff 100644 --- a/_pages/ms_MY/installing-boot9strap-(fredtool).txt +++ b/_pages/ms_MY/installing-boot9strap-(fredtool).txt @@ -10,8 +10,6 @@ This method of using Seedminer for further exploitation uses your `movable.sed` This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). -To use the [magnet](https://wikipedia.org/wiki/Magnet_URI_scheme) links on this page, you will need a torrent client like [Deluge](http://dev.deluge-torrent.org/wiki/Download). - To extract the `.7z` and `.rar` files linked on this page, you will need a file archiver like [7-Zip](http://www.7-zip.org/) or [The Unarchiver](https://theunarchiver.com/). ### What You Need diff --git a/_pages/ms_MY/ntrboot.txt b/_pages/ms_MY/ntrboot.txt index a5c9bc16cd..35ffad7d57 100644 --- a/_pages/ms_MY/ntrboot.txt +++ b/_pages/ms_MY/ntrboot.txt @@ -17,14 +17,14 @@ Note that carts with a "Time Bomb" will no longer be able to launch `.nds` files | Flashcart Name | Current Price | "Time Bomb"? | 3DS Versions? | DSi Versions? | Other Notes | |-|-:|:-:|:-:|:-:|-| -| [**R4i-SDHC B9S**](http://www.nds-card.net/ProShow.asp?ProID=574) | $15.99 | September 3, 2019 | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot**; can be flashed back to an NDS flashcart. | -| [**R4i Gold 3DS Plus**](http://www.nds-card.net/ProShow.asp?ProID=575) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot** ([internal switch to switch between ntrboot and NDS modes]({{ "/images/screenshots/r4i-gold-3ds-plus.png" | absolute_url }})); do not manually flash with ntrboot. | -| [**Acekard 2i**](http://www.nds-card.net/ProShow.asp?ProID=160) | $20.99 | No | <= 4.3.0 | <= 1.4.4 | | -| [**DSTT**](http://www.nds-card.net/ProShow.asp?ProID=157) | $9.99 | No | None | None | Only models with [certain flash chips](https://gist.github.com/yuukieve/6b48f1bb8dd15136403c15c39fafdb42) are compatible with ntrboot. | -| [**R4i Gold 3DS**](http://www.nds-card.net/ProShow.asp?ProID=149) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | All RTS revisions are compatible. | -| [**R4i-SDHC 3DS RTS**](http://www.nds-card.net/ProShow.asp?ProID=146) | $13.99 | 1.87: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | | -| [**R4iSDHC GOLD Pro 20XX**](http://www.nds-card.net/ProShow.asp?ProID=490) | $9.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. 2013 models are incompatible. | -| [**R4iSDHC RTS LITE 20XX**](http://www.nds-card.net/ProShow.asp?ProID=450) | $13.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. 2013 models are incompatible. | +| [**R4i-SDHC B9S**](http://www.nds-card.com/ProShow.asp?ProID=574) | $15.99 | September 3, 2019 | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot**; can be flashed back to an NDS flashcart. | +| [**R4i Gold 3DS Plus**](http://www.nds-card.com/ProShow.asp?ProID=575) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot** ([internal switch to switch between ntrboot and NDS modes]({{ "/images/screenshots/r4i-gold-3ds-plus.png" | absolute_url }})); do not manually flash with ntrboot. | +| [**Acekard 2i**](http://www.nds-card.com/ProShow.asp?ProID=160) | $20.99 | No | <= 4.3.0 | <= 1.4.4 | | +| [**DSTT**](http://www.nds-card.com/ProShow.asp?ProID=157) | $9.99 | No | None | None | Only models with [certain flash chips](https://gist.github.com/yuukieve/6b48f1bb8dd15136403c15c39fafdb42) are compatible with ntrboot. | +| [**R4i Gold 3DS**](http://www.nds-card.com/ProShow.asp?ProID=149) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | All RTS revisions are compatible. | +| [**R4i-SDHC 3DS RTS**](http://www.nds-card.com/ProShow.asp?ProID=146) | $13.99 | 1.87: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | | +| [**R4iSDHC GOLD Pro 20XX**](http://www.nds-card.com/ProShow.asp?ProID=490) | $9.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. 2013 models are incompatible. | +| [**R4iSDHC RTS LITE 20XX**](http://www.nds-card.com/ProShow.asp?ProID=450) | $13.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. 2013 models are incompatible. | | **Ace3DS X** | | No | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot** (external switch to switch between ntrboot ("3DS") and NDS modes); do not manually flash with ntrboot. | | **Ace3DS Plus** | | No | <= 11.9.0 | <= 1.4.5 | | | **Gateway Blue** | | No | 4.1.0 - 4.5.0 | <= 1.4.5 | | @@ -49,7 +49,7 @@ To test if a magnet will work, hold it on or around the (A)(B)(X)(Y) buttons whi Note that the flashcart will not be able to be used for its standard functions while the ntrboot exploit is installed on it (except for in the case of the Acekard 2i, which remains functional *on NDS and custom firmware 3DS systems only*). This means that, for most flashcarts, it will not even display on the home menu. There are optional steps at the end of the ntrboot flashing instructions to remove it from your flashcart when you are done. -Note that in some rare circumstances, it may be possible for the flashing process to **brick** a counterfeit flashcart and render it permanently unusable. This is unlikely, but nevertheless only original listed flashcarts are supported. To reduce the chance of receiving a counterfeit card, it is recommended that you use a reputable site to buy your flashcart (such as [NDS Card](http://www.nds-card.net/)) +Note that in some rare circumstances, it may be possible for the flashing process to **brick** a counterfeit flashcart and render it permanently unusable. This is unlikely, but nevertheless only original listed flashcarts are supported. To reduce the chance of receiving a counterfeit card, it is recommended that you use a reputable site to buy your flashcart (such as [NDS Card](http://www.nds-card.com/)) {: .notice--danger} ___ diff --git a/_pages/ms_MY/seedminer.txt b/_pages/ms_MY/seedminer.txt index 5499b5f440..352c4adef1 100644 --- a/_pages/ms_MY/seedminer.txt +++ b/_pages/ms_MY/seedminer.txt @@ -63,9 +63,7 @@ There are two different methods for building on the Seedminer exploit (described 1. Open [Bruteforce Movable](https://bruteforcemovable.com/) on your computer + This site can automate the retrieval of `movable_part1.sed` (using a bot 3DS console) and the breaking of your device's DSiWare encryption (using a volunteer's computer to run Seedminer) - + If you already have access to a 3DS capable of launching the Homebrew Launcher, you can manually retrieve your `movable_part1.sed` using that device by following [these](https://jisagi.github.io/SeedminerGuide/seedminerSelf/#section1) instructions - + If you already have access to a PC with a powerful graphics card, you can manually calculate your `movable.sed` using it by following [these](https://jisagi.github.io/SeedminerGuide/seedminerSelf/#section2) instructions - + If the automated service is nonfunctional and you cannot do one or both of those manually, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you + + If the automated service is nonfunctional, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you 1. Enter your device's Friend Code (with no spaces or dashes) into the "Your friend code" field 1. Paste your device's 32 character long folder name into the "Your ID0" field 1. Complete the "I'm not a robot" captcha @@ -74,11 +72,11 @@ There are two different methods for building on the Seedminer exploit (described 1. When prompted, use the "Register Friend" button on your device to add the friend code of the bot 3DS console 1. Wait for the site to update + If it does not, wait a few minutes before refreshing the page once -1. Select "Continue" -1. Wait for the process to complete - + This can take a while (up to an hour in some cases) - + During this process, the bot may not show up on your 3ds. As long as the website updates, this is not an issue. - + If you are still waiting after an hour, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you +1. Once the site processes your information, you will be given the option to "Continue" or "Do another device". Click the green "Continue" button +1. Wait for the remainder of the process to complete + + This is usually fast (1-5 minutes) but in some cases, can take up to half an hour. + + During this process, the bot you added may not show up on your 3ds. As long as the website updates, this is not an issue. + + If you are still waiting after half an hour, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you 1. When the process has completed, download your `movable.sed` file from the site + Keep this file as you will need it in the upcoming pages @@ -102,7 +100,7 @@ ___ #### Seedminer + Steelhax + Frogtool -This method of using Seedminer for further exploitation uses your `movable.sed` file to gain access to the Homebrew Launcher using the Steelhax exploit for the purposes of injecting an exploitable DSiWare title into the DS Download Play application. This method requires you to already own (or download) the free "Steel Divers: Sub Wars" game from the eShop. +This method of using Seedminer for further exploitation uses your `movable.sed` file to gain access to the Homebrew Launcher using the Steelhax exploit for the purposes of injecting an exploitable DSiWare title into the DS Download Play application. This method requires you to already own (or download) the free "Steel Diver: Sub Wars" game from the eShop. This method is only compatible with the EUR, JPN, and USA regions, and is somewhat more complicated than the above method. It is only recommended to use this method if you have a EUR region device and do not wish to pay for a DSiWare game, or if the above method does not work for you for some reason. diff --git a/_pages/ms_MY/uninstall-cfw.txt b/_pages/ms_MY/uninstall-cfw.txt index 53a5ecd998..9d168c4e26 100644 --- a/_pages/ms_MY/uninstall-cfw.txt +++ b/_pages/ms_MY/uninstall-cfw.txt @@ -11,7 +11,7 @@ This will completely remove CFW from your device, including Boot9Strap and Luma3 This is almost never the solution to fix any issues you encounter with your CFW installation. A better idea would be to read the [troubleshooting](troubleshooting) page or ask (in English) for help at [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp). {: .notice--danger} -Any unsigned (illegitimate) games will be rendered unusable and can be manually removed using the Data Management section of the System Settings. Use a [save manager](https://github.com/FlagBrew/Checkpoint/releases/latest) to backup any saves for these unsigned (illegitimate) games you care about. +Any unsigned (illegitimate) games will be rendered unusable and should be manually removed before starting this process by using the Data Management section of the System Settings. Use a [save manager](https://github.com/FlagBrew/Checkpoint/releases/latest) to backup any saves for these unsigned (illegitimate) games you care about. This will not affect your NNID, any legitimately purchased games, or any saves for those legitimately purchased games. @@ -26,21 +26,43 @@ Note that if you have any payload files other than `GodMode9.firm` in the `/luma ### Instructions -#### Section I - Prep Work +#### Section I - Safety Test 1. Power off your device 1. Pasang kad SD anda ke dalam komputer 1. Copy `GodMode9.firm` from the GodMode9 `.zip` to the `/luma/payloads/` folder on your SD card 1. Copy the `gm9` folder from the GodMode9 `.zip` to the root of your SD card 1. Reinsert your SD card into your device -1. Power on your device - -#### Section II - Running Uninstall Script - 1. Launch GodMode9 by holding (Start) during boot 1. If you are prompted to create an essential files backup, press (A) to do so, then press (A) to continue once it has completed 1. If you are prompted to fix the RTC date&time, press (A) to do so, then set the date and time, then press (A) to continue + Note that, if you had to fix the RTC date and time, you will have to fix the time in the System Settings as well after this guide +1. Navigate to `[1:] SYSNAND CTRNAND > title > 00040138 > (X)0000002 > content` + + On a "New" edition console, the (X) will instead be 2 + + On an "Old" edition console, the (X) will instead be 0 +1. Select the `.app` file +1. Select `NCCH Image Options` +1. Select `Mount image to drive` +1. In the window that appears, open the `exefs` folder +1. In this folder, select the `.firm` file +1. Select "Firm Options" +1. Select "Boot Firm" +1. When prompted, choose to decrypt and make a copy +1. You should boot into the regular 3DS Home Menu. If you do, power your device off and continue to the next section + + If you do NOT boot into the regular 3DS Home Menu, continuing with these instructions **WILL** brick your device. You should join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you + +#### Section II - Prep Work + +1. Power on your device +1. Navigate to System Settings > Data Management > Nintendo 3DS > Software +1. In this list of software, delete any non-Nintendo content you installed while using CFW + + This includes common system software such as FBI, Anemone3DS, Luma Updater, Homebrew Launcher, Checkpoint, and others, along with any non-eShop games + + Failure to remove CFW software before uninstalling CFW may break access to the Data Management menu after uninstalling CFW +1. Power off your device + +#### Section III - Running Uninstall Script + +1. Launch GodMode9 by holding (Start) during boot 1. Press (Home) to bring up the action menu 1. Select "Scripts..." 1. Select "GM9Megascript" diff --git a/_pages/nl_NL/finalizing-setup.txt b/_pages/nl_NL/finalizing-setup.txt index 3bf37c8072..41f3764bf0 100644 --- a/_pages/nl_NL/finalizing-setup.txt +++ b/_pages/nl_NL/finalizing-setup.txt @@ -18,6 +18,8 @@ Tijdens dit proces zullen we ook de volgende programma's installeren: + **Luma3DS Updater** *(Hiermee update je jouw CFW gemakkelijk)* + **GodMode9** *(multifunctionele tool met NAND en cartridge functies)* + **Homebrew Launcher Loader** *(launches the Homebrew Launcher)* ++ **DSP1** *(allows homebrew applications to have sound)* ++ **ctr-no-timeoffset** *(removes the rtc offset so that the home menu and rtc timestamps match)* ### What You Need @@ -143,7 +145,7 @@ If, before following this guide, you already had an EmuNAND setup and would like 1. Druk op (B) om terug te gaan naar het hoofdmenu 1. Houd (R) en (B) gelijkertijd ingedrukt om je SD kaart uit te werpen 1. Plaats je SD kaart in je computer -1. Copy `__sysnand_###.bin`, `essential.exefs`, and `boot9.bin` from the `/gm9/out/` folder on your SD card to a safe location on your computer +1. Copy `__sysnand_###.bin`, `__sysnand_###.bin.sha`, `essential.exefs`, and `boot9.bin` from the `/gm9/out/` folder on your SD card to a safe location on your computer + Maak back-ups in verschillende locaties (zoals een online bestandsopslag) + These backups will save you from a brick and/or help you recover files from the NAND image if anything goes wrong in the future 1. Delete `__sysnand_###.bin` and `__sysnand_###.bin.sha` from the `/gm9/out/` folder on your SD card after copying it diff --git a/_pages/nl_NL/homebrew-launcher-(steelhax).txt b/_pages/nl_NL/homebrew-launcher-(steelhax).txt index a2491ad7d1..155e9a3bd8 100644 --- a/_pages/nl_NL/homebrew-launcher-(steelhax).txt +++ b/_pages/nl_NL/homebrew-launcher-(steelhax).txt @@ -8,7 +8,7 @@ title: "Homebrew Launcher (Steelhax)" This method of using Seedminer for further exploitation uses your `movable.sed` file to gain access to the Homebrew Launcher using the Steelhax exploit for the purposes of injecting an exploitable DSiWare title into the DS Download Play application. This method requires you to already own (or download) the free "Steel Divers: Sub Wars" game from the eShop. -If your device already has access to the Homebrew Launcher (whether through Steelhax or another exploit), you can skip to [Installing Boot9strap (Frogminer)](installing-boot9strap-(frogminer)). +If your device already has access to the Homebrew Launcher (whether through Steelhax or another exploit), you can skip to [Installing Boot9strap (Frogtool)](installing-boot9strap-(frogtool)). {: .notice--success} If you already have Steel Diver: Sub Wars, this process will overwrite your game's save file! @@ -17,6 +17,7 @@ If you already have Steel Diver: Sub Wars, this process will overwrite your game ### What You Need * The free eShop game "Steel Diver: Sub Wars" +* Your `movable.sed` file from completing [Seedminer](seedminer) * The latest release of [the Homebrew Launcher](https://github.com/fincs/new-hbmenu/releases/latest) * The latest release of [Steelhax](https://github.com/VegaRoXas/vegaroxas.github.io/raw/master/files/steelhax-installer.rar) * The [otherapp payload](https://smealum.github.io/3ds/#otherapp) *(for your region and version)* @@ -39,7 +40,7 @@ If you already have Steel Diver: Sub Wars, this process will overwrite your game 1. Exit "Steel Diver: Sub Wars" 1. Schakel je 3ds uit 1. Plaats je SD kaart in je computer -1. Open [the Steelminer Injector website](http://steelminer.jisagi.net/injector) on your computer +1. Open [the Steelminer Injector website](https://bruteforcemovable.com/steelhax/) on your computer 1. Select your `movable.sed` file 1. Select "Start!" 1. Wait for the process to complete diff --git a/_pages/nl_NL/installing-boot9strap-(fredtool).txt b/_pages/nl_NL/installing-boot9strap-(fredtool).txt index bd244dbca7..a7ce49c903 100644 --- a/_pages/nl_NL/installing-boot9strap-(fredtool).txt +++ b/_pages/nl_NL/installing-boot9strap-(fredtool).txt @@ -10,8 +10,6 @@ This method of using Seedminer for further exploitation uses your `movable.sed` This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). -To use the [magnet](https://wikipedia.org/wiki/Magnet_URI_scheme) links on this page, you will need a torrent client like [Deluge](http://dev.deluge-torrent.org/wiki/Download). - To extract the `.7z` and `.rar` files linked on this page, you will need a file archiver like [7-Zip](http://www.7-zip.org/) or [The Unarchiver](https://theunarchiver.com/). ### What You Need diff --git a/_pages/nl_NL/ntrboot.txt b/_pages/nl_NL/ntrboot.txt index a5c9bc16cd..35ffad7d57 100644 --- a/_pages/nl_NL/ntrboot.txt +++ b/_pages/nl_NL/ntrboot.txt @@ -17,14 +17,14 @@ Note that carts with a "Time Bomb" will no longer be able to launch `.nds` files | Flashcart Name | Current Price | "Time Bomb"? | 3DS Versions? | DSi Versions? | Other Notes | |-|-:|:-:|:-:|:-:|-| -| [**R4i-SDHC B9S**](http://www.nds-card.net/ProShow.asp?ProID=574) | $15.99 | September 3, 2019 | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot**; can be flashed back to an NDS flashcart. | -| [**R4i Gold 3DS Plus**](http://www.nds-card.net/ProShow.asp?ProID=575) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot** ([internal switch to switch between ntrboot and NDS modes]({{ "/images/screenshots/r4i-gold-3ds-plus.png" | absolute_url }})); do not manually flash with ntrboot. | -| [**Acekard 2i**](http://www.nds-card.net/ProShow.asp?ProID=160) | $20.99 | No | <= 4.3.0 | <= 1.4.4 | | -| [**DSTT**](http://www.nds-card.net/ProShow.asp?ProID=157) | $9.99 | No | None | None | Only models with [certain flash chips](https://gist.github.com/yuukieve/6b48f1bb8dd15136403c15c39fafdb42) are compatible with ntrboot. | -| [**R4i Gold 3DS**](http://www.nds-card.net/ProShow.asp?ProID=149) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | All RTS revisions are compatible. | -| [**R4i-SDHC 3DS RTS**](http://www.nds-card.net/ProShow.asp?ProID=146) | $13.99 | 1.87: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | | -| [**R4iSDHC GOLD Pro 20XX**](http://www.nds-card.net/ProShow.asp?ProID=490) | $9.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. 2013 models are incompatible. | -| [**R4iSDHC RTS LITE 20XX**](http://www.nds-card.net/ProShow.asp?ProID=450) | $13.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. 2013 models are incompatible. | +| [**R4i-SDHC B9S**](http://www.nds-card.com/ProShow.asp?ProID=574) | $15.99 | September 3, 2019 | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot**; can be flashed back to an NDS flashcart. | +| [**R4i Gold 3DS Plus**](http://www.nds-card.com/ProShow.asp?ProID=575) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot** ([internal switch to switch between ntrboot and NDS modes]({{ "/images/screenshots/r4i-gold-3ds-plus.png" | absolute_url }})); do not manually flash with ntrboot. | +| [**Acekard 2i**](http://www.nds-card.com/ProShow.asp?ProID=160) | $20.99 | No | <= 4.3.0 | <= 1.4.4 | | +| [**DSTT**](http://www.nds-card.com/ProShow.asp?ProID=157) | $9.99 | No | None | None | Only models with [certain flash chips](https://gist.github.com/yuukieve/6b48f1bb8dd15136403c15c39fafdb42) are compatible with ntrboot. | +| [**R4i Gold 3DS**](http://www.nds-card.com/ProShow.asp?ProID=149) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | All RTS revisions are compatible. | +| [**R4i-SDHC 3DS RTS**](http://www.nds-card.com/ProShow.asp?ProID=146) | $13.99 | 1.87: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | | +| [**R4iSDHC GOLD Pro 20XX**](http://www.nds-card.com/ProShow.asp?ProID=490) | $9.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. 2013 models are incompatible. | +| [**R4iSDHC RTS LITE 20XX**](http://www.nds-card.com/ProShow.asp?ProID=450) | $13.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. 2013 models are incompatible. | | **Ace3DS X** | | No | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot** (external switch to switch between ntrboot ("3DS") and NDS modes); do not manually flash with ntrboot. | | **Ace3DS Plus** | | No | <= 11.9.0 | <= 1.4.5 | | | **Gateway Blue** | | No | 4.1.0 - 4.5.0 | <= 1.4.5 | | @@ -49,7 +49,7 @@ To test if a magnet will work, hold it on or around the (A)(B)(X)(Y) buttons whi Note that the flashcart will not be able to be used for its standard functions while the ntrboot exploit is installed on it (except for in the case of the Acekard 2i, which remains functional *on NDS and custom firmware 3DS systems only*). This means that, for most flashcarts, it will not even display on the home menu. There are optional steps at the end of the ntrboot flashing instructions to remove it from your flashcart when you are done. -Note that in some rare circumstances, it may be possible for the flashing process to **brick** a counterfeit flashcart and render it permanently unusable. This is unlikely, but nevertheless only original listed flashcarts are supported. To reduce the chance of receiving a counterfeit card, it is recommended that you use a reputable site to buy your flashcart (such as [NDS Card](http://www.nds-card.net/)) +Note that in some rare circumstances, it may be possible for the flashing process to **brick** a counterfeit flashcart and render it permanently unusable. This is unlikely, but nevertheless only original listed flashcarts are supported. To reduce the chance of receiving a counterfeit card, it is recommended that you use a reputable site to buy your flashcart (such as [NDS Card](http://www.nds-card.com/)) {: .notice--danger} ___ diff --git a/_pages/nl_NL/seedminer.txt b/_pages/nl_NL/seedminer.txt index efdee33f18..a092d3c87e 100644 --- a/_pages/nl_NL/seedminer.txt +++ b/_pages/nl_NL/seedminer.txt @@ -63,9 +63,7 @@ There are two different methods for building on the Seedminer exploit (described 1. Open [Bruteforce Movable](https://bruteforcemovable.com/) on your computer + This site can automate the retrieval of `movable_part1.sed` (using a bot 3DS console) and the breaking of your device's DSiWare encryption (using a volunteer's computer to run Seedminer) - + If you already have access to a 3DS capable of launching the Homebrew Launcher, you can manually retrieve your `movable_part1.sed` using that device by following [these](https://jisagi.github.io/SeedminerGuide/seedminerSelf/#section1) instructions - + If you already have access to a PC with a powerful graphics card, you can manually calculate your `movable.sed` using it by following [these](https://jisagi.github.io/SeedminerGuide/seedminerSelf/#section2) instructions - + If the automated service is nonfunctional and you cannot do one or both of those manually, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you + + If the automated service is nonfunctional, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you 1. Enter your device's Friend Code (with no spaces or dashes) into the "Your friend code" field 1. Paste your device's 32 character long folder name into the "Your ID0" field 1. Complete the "I'm not a robot" captcha @@ -74,11 +72,11 @@ There are two different methods for building on the Seedminer exploit (described 1. When prompted, use the "Register Friend" button on your device to add the friend code of the bot 3DS console 1. Wait for the site to update + If it does not, wait a few minutes before refreshing the page once -1. Select "Continue" -1. Wait for the process to complete - + This can take a while (up to an hour in some cases) - + During this process, the bot may not show up on your 3ds. As long as the website updates, this is not an issue. - + If you are still waiting after an hour, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you +1. Once the site processes your information, you will be given the option to "Continue" or "Do another device". Click the green "Continue" button +1. Wait for the remainder of the process to complete + + This is usually fast (1-5 minutes) but in some cases, can take up to half an hour. + + During this process, the bot you added may not show up on your 3ds. As long as the website updates, this is not an issue. + + If you are still waiting after half an hour, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you 1. When the process has completed, download your `movable.sed` file from the site + Keep this file as you will need it in the upcoming pages @@ -102,7 +100,7 @@ ___ #### Seedminer + Steelhax + Frogtool -This method of using Seedminer for further exploitation uses your `movable.sed` file to gain access to the Homebrew Launcher using the Steelhax exploit for the purposes of injecting an exploitable DSiWare title into the DS Download Play application. This method requires you to already own (or download) the free "Steel Divers: Sub Wars" game from the eShop. +This method of using Seedminer for further exploitation uses your `movable.sed` file to gain access to the Homebrew Launcher using the Steelhax exploit for the purposes of injecting an exploitable DSiWare title into the DS Download Play application. This method requires you to already own (or download) the free "Steel Diver: Sub Wars" game from the eShop. This method is only compatible with the EUR, JPN, and USA regions, and is somewhat more complicated than the above method. It is only recommended to use this method if you have a EUR region device and do not wish to pay for a DSiWare game, or if the above method does not work for you for some reason. diff --git a/_pages/nl_NL/uninstall-cfw.txt b/_pages/nl_NL/uninstall-cfw.txt index 2260b6f215..ce3c4da25d 100644 --- a/_pages/nl_NL/uninstall-cfw.txt +++ b/_pages/nl_NL/uninstall-cfw.txt @@ -11,7 +11,7 @@ This will completely remove CFW from your device, including Boot9Strap and Luma3 This is almost never the solution to fix any issues you encounter with your CFW installation. A better idea would be to read the [troubleshooting](troubleshooting) page or ask (in English) for help at [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp). {: .notice--danger} -Any unsigned (illegitimate) games will be rendered unusable and can be manually removed using the Data Management section of the System Settings. Use a [save manager](https://github.com/FlagBrew/Checkpoint/releases/latest) to backup any saves for these unsigned (illegitimate) games you care about. +Any unsigned (illegitimate) games will be rendered unusable and should be manually removed before starting this process by using the Data Management section of the System Settings. Use a [save manager](https://github.com/FlagBrew/Checkpoint/releases/latest) to backup any saves for these unsigned (illegitimate) games you care about. This will not affect your NNID, any legitimately purchased games, or any saves for those legitimately purchased games. @@ -26,21 +26,43 @@ Note that if you have any payload files other than `GodMode9.firm` in the `/luma ### Instructions -#### Section I - Prep Work +#### Section I - Safety Test 1. Schakel je 3ds uit 1. Plaats je SD kaart in je computer 1. Copy `GodMode9.firm` from the GodMode9 `.zip` to the `/luma/payloads/` folder on your SD card 1. Copy the `gm9` folder from the GodMode9 `.zip` to the root of your SD card 1. Stop je SD kaart terug in je 3DS -1. Zet je 3DS aan - -#### Section II - Running Uninstall Script - 1. Launch GodMode9 by holding (Start) during boot 1. If you are prompted to create an essential files backup, press (A) to do so, then press (A) to continue once it has completed 1. If you are prompted to fix the RTC date&time, press (A) to do so, then set the date and time, then press (A) to continue + Note that, if you had to fix the RTC date and time, you will have to fix the time in the System Settings as well after this guide +1. Navigate to `[1:] SYSNAND CTRNAND > title > 00040138 > (X)0000002 > content` + + On a "New" edition console, the (X) will instead be 2 + + On an "Old" edition console, the (X) will instead be 0 +1. Select the `.app` file +1. Select `NCCH Image Options` +1. Select `Mount image to drive` +1. In the window that appears, open the `exefs` folder +1. In this folder, select the `.firm` file +1. Select "Firm Options" +1. Select "Boot Firm" +1. When prompted, choose to decrypt and make a copy +1. You should boot into the regular 3DS Home Menu. If you do, power your device off and continue to the next section + + If you do NOT boot into the regular 3DS Home Menu, continuing with these instructions **WILL** brick your device. You should join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you + +#### Section II - Prep Work + +1. Zet je 3DS aan +1. Navigate to System Settings > Data Management > Nintendo 3DS > Software +1. In this list of software, delete any non-Nintendo content you installed while using CFW + + This includes common system software such as FBI, Anemone3DS, Luma Updater, Homebrew Launcher, Checkpoint, and others, along with any non-eShop games + + Failure to remove CFW software before uninstalling CFW may break access to the Data Management menu after uninstalling CFW +1. Schakel je 3ds uit + +#### Section III - Running Uninstall Script + +1. Launch GodMode9 by holding (Start) during boot 1. Druk op de (Home) knop om het actiemenu te openen 1. Select "Scripts..." 1. Select "GM9Megascript" diff --git a/_pages/no_NO/finalizing-setup.txt b/_pages/no_NO/finalizing-setup.txt index a6cef76c00..e963628b40 100644 --- a/_pages/no_NO/finalizing-setup.txt +++ b/_pages/no_NO/finalizing-setup.txt @@ -18,6 +18,8 @@ Under denne prossesen, vil vi også sette opp program som følgende: + **Luma3DS Updater** *(oppdaterer CFWinstallasjonen vår)* + **GodMode9** *(multipurpose tool which can do NAND and cartridge functions)* + **Homebrew Launcher Loader** *(launches the Homebrew Launcher)* ++ **DSP1** *(allows homebrew applications to have sound)* ++ **ctr-no-timeoffset** *(removes the rtc offset so that the home menu and rtc timestamps match)* ### What You Need @@ -143,7 +145,7 @@ If, before following this guide, you already had an EmuNAND setup and would like 1. Press (B) to return to the main menu 1. Hold (R) og trykk (B) for å løse ut SD-kortet 1. Sett inn SD-kortet i datamaskinen din -1. Copy `__sysnand_###.bin`, `essential.exefs`, and `boot9.bin` from the `/gm9/out/` folder on your SD card to a safe location on your computer +1. Copy `__sysnand_###.bin`, `__sysnand_###.bin.sha`, `essential.exefs`, and `boot9.bin` from the `/gm9/out/` folder on your SD card to a safe location on your computer + Make backups in multiple locations (such as online file storage) + These backups will save you from a brick and/or help you recover files from the NAND image if anything goes wrong in the future 1. Delete `__sysnand_###.bin` and `__sysnand_###.bin.sha` from the `/gm9/out/` folder on your SD card after copying it diff --git a/_pages/no_NO/homebrew-launcher-(steelhax).txt b/_pages/no_NO/homebrew-launcher-(steelhax).txt index 4ac3635956..eb53a03f24 100644 --- a/_pages/no_NO/homebrew-launcher-(steelhax).txt +++ b/_pages/no_NO/homebrew-launcher-(steelhax).txt @@ -8,7 +8,7 @@ title: "Homebrew Launcher (Steelhax)" This method of using Seedminer for further exploitation uses your `movable.sed` file to gain access to the Homebrew Launcher using the Steelhax exploit for the purposes of injecting an exploitable DSiWare title into the DS Download Play application. This method requires you to already own (or download) the free "Steel Divers: Sub Wars" game from the eShop. -If your device already has access to the Homebrew Launcher (whether through Steelhax or another exploit), you can skip to [Installing Boot9strap (Frogminer)](installing-boot9strap-(frogminer)). +If your device already has access to the Homebrew Launcher (whether through Steelhax or another exploit), you can skip to [Installing Boot9strap (Frogtool)](installing-boot9strap-(frogtool)). {: .notice--success} If you already have Steel Diver: Sub Wars, this process will overwrite your game's save file! @@ -17,6 +17,7 @@ If you already have Steel Diver: Sub Wars, this process will overwrite your game ### What You Need * The free eShop game "Steel Diver: Sub Wars" +* Your `movable.sed` file from completing [Seedminer](seedminer) * The latest release of [the Homebrew Launcher](https://github.com/fincs/new-hbmenu/releases/latest) * The latest release of [Steelhax](https://github.com/VegaRoXas/vegaroxas.github.io/raw/master/files/steelhax-installer.rar) * The [otherapp payload](https://smealum.github.io/3ds/#otherapp) *(for your region and version)* @@ -39,7 +40,7 @@ If you already have Steel Diver: Sub Wars, this process will overwrite your game 1. Exit "Steel Diver: Sub Wars" 1. Slå av enheten 1. Sett inn SD-kortet i datamaskinen din -1. Open [the Steelminer Injector website](http://steelminer.jisagi.net/injector) on your computer +1. Open [the Steelminer Injector website](https://bruteforcemovable.com/steelhax/) on your computer 1. Select your `movable.sed` file 1. Select "Start!" 1. Wait for the process to complete diff --git a/_pages/no_NO/installing-boot9strap-(fredtool).txt b/_pages/no_NO/installing-boot9strap-(fredtool).txt index 10c5f17c54..a0efd30866 100644 --- a/_pages/no_NO/installing-boot9strap-(fredtool).txt +++ b/_pages/no_NO/installing-boot9strap-(fredtool).txt @@ -10,8 +10,6 @@ This method of using Seedminer for further exploitation uses your `movable.sed` This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). -To use the [magnet](https://wikipedia.org/wiki/Magnet_URI_scheme) links on this page, you will need a torrent client like [Deluge](http://dev.deluge-torrent.org/wiki/Download). - To extract the `.7z` and `.rar` files linked on this page, you will need a file archiver like [7-Zip](http://www.7-zip.org/) or [The Unarchiver](https://theunarchiver.com/). ### What You Need diff --git a/_pages/no_NO/ntrboot.txt b/_pages/no_NO/ntrboot.txt index a5c9bc16cd..35ffad7d57 100644 --- a/_pages/no_NO/ntrboot.txt +++ b/_pages/no_NO/ntrboot.txt @@ -17,14 +17,14 @@ Note that carts with a "Time Bomb" will no longer be able to launch `.nds` files | Flashcart Name | Current Price | "Time Bomb"? | 3DS Versions? | DSi Versions? | Other Notes | |-|-:|:-:|:-:|:-:|-| -| [**R4i-SDHC B9S**](http://www.nds-card.net/ProShow.asp?ProID=574) | $15.99 | September 3, 2019 | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot**; can be flashed back to an NDS flashcart. | -| [**R4i Gold 3DS Plus**](http://www.nds-card.net/ProShow.asp?ProID=575) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot** ([internal switch to switch between ntrboot and NDS modes]({{ "/images/screenshots/r4i-gold-3ds-plus.png" | absolute_url }})); do not manually flash with ntrboot. | -| [**Acekard 2i**](http://www.nds-card.net/ProShow.asp?ProID=160) | $20.99 | No | <= 4.3.0 | <= 1.4.4 | | -| [**DSTT**](http://www.nds-card.net/ProShow.asp?ProID=157) | $9.99 | No | None | None | Only models with [certain flash chips](https://gist.github.com/yuukieve/6b48f1bb8dd15136403c15c39fafdb42) are compatible with ntrboot. | -| [**R4i Gold 3DS**](http://www.nds-card.net/ProShow.asp?ProID=149) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | All RTS revisions are compatible. | -| [**R4i-SDHC 3DS RTS**](http://www.nds-card.net/ProShow.asp?ProID=146) | $13.99 | 1.87: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | | -| [**R4iSDHC GOLD Pro 20XX**](http://www.nds-card.net/ProShow.asp?ProID=490) | $9.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. 2013 models are incompatible. | -| [**R4iSDHC RTS LITE 20XX**](http://www.nds-card.net/ProShow.asp?ProID=450) | $13.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. 2013 models are incompatible. | +| [**R4i-SDHC B9S**](http://www.nds-card.com/ProShow.asp?ProID=574) | $15.99 | September 3, 2019 | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot**; can be flashed back to an NDS flashcart. | +| [**R4i Gold 3DS Plus**](http://www.nds-card.com/ProShow.asp?ProID=575) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot** ([internal switch to switch between ntrboot and NDS modes]({{ "/images/screenshots/r4i-gold-3ds-plus.png" | absolute_url }})); do not manually flash with ntrboot. | +| [**Acekard 2i**](http://www.nds-card.com/ProShow.asp?ProID=160) | $20.99 | No | <= 4.3.0 | <= 1.4.4 | | +| [**DSTT**](http://www.nds-card.com/ProShow.asp?ProID=157) | $9.99 | No | None | None | Only models with [certain flash chips](https://gist.github.com/yuukieve/6b48f1bb8dd15136403c15c39fafdb42) are compatible with ntrboot. | +| [**R4i Gold 3DS**](http://www.nds-card.com/ProShow.asp?ProID=149) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | All RTS revisions are compatible. | +| [**R4i-SDHC 3DS RTS**](http://www.nds-card.com/ProShow.asp?ProID=146) | $13.99 | 1.87: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | | +| [**R4iSDHC GOLD Pro 20XX**](http://www.nds-card.com/ProShow.asp?ProID=490) | $9.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. 2013 models are incompatible. | +| [**R4iSDHC RTS LITE 20XX**](http://www.nds-card.com/ProShow.asp?ProID=450) | $13.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. 2013 models are incompatible. | | **Ace3DS X** | | No | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot** (external switch to switch between ntrboot ("3DS") and NDS modes); do not manually flash with ntrboot. | | **Ace3DS Plus** | | No | <= 11.9.0 | <= 1.4.5 | | | **Gateway Blue** | | No | 4.1.0 - 4.5.0 | <= 1.4.5 | | @@ -49,7 +49,7 @@ To test if a magnet will work, hold it on or around the (A)(B)(X)(Y) buttons whi Note that the flashcart will not be able to be used for its standard functions while the ntrboot exploit is installed on it (except for in the case of the Acekard 2i, which remains functional *on NDS and custom firmware 3DS systems only*). This means that, for most flashcarts, it will not even display on the home menu. There are optional steps at the end of the ntrboot flashing instructions to remove it from your flashcart when you are done. -Note that in some rare circumstances, it may be possible for the flashing process to **brick** a counterfeit flashcart and render it permanently unusable. This is unlikely, but nevertheless only original listed flashcarts are supported. To reduce the chance of receiving a counterfeit card, it is recommended that you use a reputable site to buy your flashcart (such as [NDS Card](http://www.nds-card.net/)) +Note that in some rare circumstances, it may be possible for the flashing process to **brick** a counterfeit flashcart and render it permanently unusable. This is unlikely, but nevertheless only original listed flashcarts are supported. To reduce the chance of receiving a counterfeit card, it is recommended that you use a reputable site to buy your flashcart (such as [NDS Card](http://www.nds-card.com/)) {: .notice--danger} ___ diff --git a/_pages/no_NO/seedminer.txt b/_pages/no_NO/seedminer.txt index ba06add7d7..e1fbd7b2d0 100644 --- a/_pages/no_NO/seedminer.txt +++ b/_pages/no_NO/seedminer.txt @@ -63,9 +63,7 @@ There are two different methods for building on the Seedminer exploit (described 1. Open [Bruteforce Movable](https://bruteforcemovable.com/) on your computer + This site can automate the retrieval of `movable_part1.sed` (using a bot 3DS console) and the breaking of your device's DSiWare encryption (using a volunteer's computer to run Seedminer) - + If you already have access to a 3DS capable of launching the Homebrew Launcher, you can manually retrieve your `movable_part1.sed` using that device by following [these](https://jisagi.github.io/SeedminerGuide/seedminerSelf/#section1) instructions - + If you already have access to a PC with a powerful graphics card, you can manually calculate your `movable.sed` using it by following [these](https://jisagi.github.io/SeedminerGuide/seedminerSelf/#section2) instructions - + If the automated service is nonfunctional and you cannot do one or both of those manually, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you + + If the automated service is nonfunctional, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you 1. Enter your device's Friend Code (with no spaces or dashes) into the "Your friend code" field 1. Paste your device's 32 character long folder name into the "Your ID0" field 1. Complete the "I'm not a robot" captcha @@ -74,11 +72,11 @@ There are two different methods for building on the Seedminer exploit (described 1. When prompted, use the "Register Friend" button on your device to add the friend code of the bot 3DS console 1. Wait for the site to update + If it does not, wait a few minutes before refreshing the page once -1. Select "Continue" -1. Wait for the process to complete - + This can take a while (up to an hour in some cases) - + During this process, the bot may not show up on your 3ds. As long as the website updates, this is not an issue. - + If you are still waiting after an hour, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you +1. Once the site processes your information, you will be given the option to "Continue" or "Do another device". Click the green "Continue" button +1. Wait for the remainder of the process to complete + + This is usually fast (1-5 minutes) but in some cases, can take up to half an hour. + + During this process, the bot you added may not show up on your 3ds. As long as the website updates, this is not an issue. + + If you are still waiting after half an hour, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you 1. When the process has completed, download your `movable.sed` file from the site + Keep this file as you will need it in the upcoming pages @@ -102,7 +100,7 @@ ___ #### Seedminer + Steelhax + Frogtool -This method of using Seedminer for further exploitation uses your `movable.sed` file to gain access to the Homebrew Launcher using the Steelhax exploit for the purposes of injecting an exploitable DSiWare title into the DS Download Play application. This method requires you to already own (or download) the free "Steel Divers: Sub Wars" game from the eShop. +This method of using Seedminer for further exploitation uses your `movable.sed` file to gain access to the Homebrew Launcher using the Steelhax exploit for the purposes of injecting an exploitable DSiWare title into the DS Download Play application. This method requires you to already own (or download) the free "Steel Diver: Sub Wars" game from the eShop. This method is only compatible with the EUR, JPN, and USA regions, and is somewhat more complicated than the above method. It is only recommended to use this method if you have a EUR region device and do not wish to pay for a DSiWare game, or if the above method does not work for you for some reason. diff --git a/_pages/no_NO/uninstall-cfw.txt b/_pages/no_NO/uninstall-cfw.txt index ccff144424..bdb779a9de 100644 --- a/_pages/no_NO/uninstall-cfw.txt +++ b/_pages/no_NO/uninstall-cfw.txt @@ -11,7 +11,7 @@ This will completely remove CFW from your device, including Boot9Strap and Luma3 This is almost never the solution to fix any issues you encounter with your CFW installation. A better idea would be to read the [troubleshooting](troubleshooting) page or ask (in English) for help at [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp). {: .notice--danger} -Any unsigned (illegitimate) games will be rendered unusable and can be manually removed using the Data Management section of the System Settings. Use a [save manager](https://github.com/FlagBrew/Checkpoint/releases/latest) to backup any saves for these unsigned (illegitimate) games you care about. +Any unsigned (illegitimate) games will be rendered unusable and should be manually removed before starting this process by using the Data Management section of the System Settings. Use a [save manager](https://github.com/FlagBrew/Checkpoint/releases/latest) to backup any saves for these unsigned (illegitimate) games you care about. This will not affect your NNID, any legitimately purchased games, or any saves for those legitimately purchased games. @@ -26,21 +26,43 @@ Note that if you have any payload files other than `GodMode9.firm` in the `/luma ### Instructions -#### Section I - Prep Work +#### Section I - Safety Test 1. Slå av enheten 1. Sett inn SD-kortet i datamaskinen din 1. Kopier `GodMode9.firm` fra GodMode9 `.zip` til `/luma/payloads/` på SD-kortet ditt 1. Copy the `gm9` folder from the GodMode9 `.zip` to the root of your SD card 1. Sett inn SD-kortet i konsollen igjen -1. Power on your device - -#### Section II - Running Uninstall Script - 1. Launch GodMode9 by holding (Start) during boot 1. If you are prompted to create an essential files backup, press (A) to do so, then press (A) to continue once it has completed 1. If you are prompted to fix the RTC date&time, press (A) to do so, then set the date and time, then press (A) to continue + Note that, if you had to fix the RTC date and time, you will have to fix the time in the System Settings as well after this guide +1. Navigate to `[1:] SYSNAND CTRNAND > title > 00040138 > (X)0000002 > content` + + On a "New" edition console, the (X) will instead be 2 + + On an "Old" edition console, the (X) will instead be 0 +1. Select the `.app` file +1. Select `NCCH Image Options` +1. Select `Mount image to drive` +1. In the window that appears, open the `exefs` folder +1. In this folder, select the `.firm` file +1. Select "Firm Options" +1. Select "Boot Firm" +1. When prompted, choose to decrypt and make a copy +1. You should boot into the regular 3DS Home Menu. If you do, power your device off and continue to the next section + + If you do NOT boot into the regular 3DS Home Menu, continuing with these instructions **WILL** brick your device. You should join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you + +#### Section II - Prep Work + +1. Power on your device +1. Navigate to System Settings > Data Management > Nintendo 3DS > Software +1. In this list of software, delete any non-Nintendo content you installed while using CFW + + This includes common system software such as FBI, Anemone3DS, Luma Updater, Homebrew Launcher, Checkpoint, and others, along with any non-eShop games + + Failure to remove CFW software before uninstalling CFW may break access to the Data Management menu after uninstalling CFW +1. Slå av enheten + +#### Section III - Running Uninstall Script + +1. Launch GodMode9 by holding (Start) during boot 1. Press (Home) to bring up the action menu 1. Select "Scripts..." 1. Select "GM9Megascript" diff --git a/_pages/pl_PL/finalizing-setup.txt b/_pages/pl_PL/finalizing-setup.txt index 4ea999dc54..7489d87791 100644 --- a/_pages/pl_PL/finalizing-setup.txt +++ b/_pages/pl_PL/finalizing-setup.txt @@ -18,6 +18,8 @@ Podczas tego procesu zainstalujemy również takie programy jak: + **Luma3DS Updater** *(narzędzie do łatwej aktualizacji twojego CFW)* + **GodMode9** *(wielozadaniowe narzędzie do NAND i kartridżów)* + **Homebrew Launcher Loader** *(uruchamia Homebrew Launcher)* ++ **DSP1** *(allows homebrew applications to have sound)* ++ **ctr-no-timeoffset** *(removes the rtc offset so that the home menu and rtc timestamps match)* ### Czego Potrzebujesz @@ -143,7 +145,7 @@ Jeśli przed rozpoczęciem tego poradnika już miałeś skonfigurowane EmuNAND i 1. Wciśnij (B) aby wrócić do menu głównego 1. Przytrzymaj przycisk (R) i jednocześnie naciśnij przycisk (B), aby bezpiecznie wyjąć kartę SD 1. Włóż kartę SD do komputera -1. Skopiuj `__sysnand_###.bin`, `essential.exefs`, i `boot9.bin` z folderu `/gm9/out/` z twojej karty SD do bezpiecznego miejsca na twoim komputerze +1. Copy `__sysnand_###.bin`, `__sysnand_###.bin.sha`, `essential.exefs`, and `boot9.bin` from the `/gm9/out/` folder on your SD card to a safe location on your computer + Zrób kopie zapasowe w wielu lokacjach (np. dysku w chmurze) + Te kopie zapasowe uratują cię przed "brickiem" i/lub pomogą ci odzyskać pliki z NAND jeśli coś pójdzie nie tak w przyszłości 1. Usuń `__sysnand_###.bin` i `__sysnand_###.bin.sha` z folderu `/gm9/out/` na twojej karcie SD po skopiowaniu ich do komputera diff --git a/_pages/pl_PL/homebrew-launcher-(steelhax).txt b/_pages/pl_PL/homebrew-launcher-(steelhax).txt index 2f1a9778c2..891b47e4b1 100644 --- a/_pages/pl_PL/homebrew-launcher-(steelhax).txt +++ b/_pages/pl_PL/homebrew-launcher-(steelhax).txt @@ -8,7 +8,7 @@ title: "Homebrew Launcher (Steelhax)" This method of using Seedminer for further exploitation uses your `movable.sed` file to gain access to the Homebrew Launcher using the Steelhax exploit for the purposes of injecting an exploitable DSiWare title into the DS Download Play application. This method requires you to already own (or download) the free "Steel Divers: Sub Wars" game from the eShop. -If your device already has access to the Homebrew Launcher (whether through Steelhax or another exploit), you can skip to [Installing Boot9strap (Frogminer)](installing-boot9strap-(frogminer)). +If your device already has access to the Homebrew Launcher (whether through Steelhax or another exploit), you can skip to [Installing Boot9strap (Frogtool)](installing-boot9strap-(frogtool)). {: .notice--success} If you already have Steel Diver: Sub Wars, this process will overwrite your game's save file! @@ -17,6 +17,7 @@ If you already have Steel Diver: Sub Wars, this process will overwrite your game ### Czego Potrzebujesz * The free eShop game "Steel Diver: Sub Wars" +* Your `movable.sed` file from completing [Seedminer](seedminer) * Najnowszej wersji [Homebrew Launcher](https://github.com/fincs/new-hbmenu/releases/latest) * Najnowszej wersji [Steelhax](https://github.com/VegaRoXas/vegaroxas.github.io/raw/master/files/steelhax-installer.rar) * [payloadu otherapp](https://smealum.github.io/3ds/#otherapp) *(dla twojej konsoli i regionu)* @@ -39,7 +40,7 @@ If you already have Steel Diver: Sub Wars, this process will overwrite your game 1. Wyjdź z gry "Steel Diver: Sub Wars" 1. Wyłącz konsolę 1. Włóż kartę SD do komputera -1. Uruchom [stronę Steelminer](http://steelminer.jisagi.net/injector) na swoim komputerze +1. Open [the Steelminer Injector website](https://bruteforcemovable.com/steelhax/) on your computer 1. Wybierz swój plik `movable.sed` 1. Wybierz "Start!" 1. Poczekaj na zakończenie procesu diff --git a/_pages/pl_PL/installing-boot9strap-(fredtool).txt b/_pages/pl_PL/installing-boot9strap-(fredtool).txt index b653df524d..dd1e58245f 100644 --- a/_pages/pl_PL/installing-boot9strap-(fredtool).txt +++ b/_pages/pl_PL/installing-boot9strap-(fredtool).txt @@ -10,8 +10,6 @@ This method of using Seedminer for further exploitation uses your `movable.sed` To obecnie działająca implementacja luki: "FIRM partitions known-plaintext" szczegółowo opisanej [tutaj] (https://www.3dbrew.org/wiki/3DS_System_Flaws). -Aby użyć linków [magnet](https://wikipedia.org/wiki/Magnet_URI_scheme) zamieszczonych na tej stronie, będziesz potrzebował klienta torrent takiego jak np. [Deluge](http://dev.deluge-torrent.org/wiki/Download). - Aby wyodrębnić pliki `.7z` załączone na tej stronie, będziesz potrzebować archiwizatora plików, na przykład [7-Zip](http://www.7-zip.org/) lub [The Unarchiver](https://theunarchiver.com/). ### Czego Potrzebujesz diff --git a/_pages/pl_PL/ntrboot.txt b/_pages/pl_PL/ntrboot.txt index e9fdd7c2a1..7768bce36f 100644 --- a/_pages/pl_PL/ntrboot.txt +++ b/_pages/pl_PL/ntrboot.txt @@ -17,14 +17,14 @@ Zauważ, że flashcarty z "Time Bomb" nie będą w stanie uruchamiać plików `. | Nazwa Flashcarta | Aktualna Cena | "Time Bomb"? | Wersje 3DS'a? | Wersje DSi? | Inne Uwagi | |-|-:|:-:|:-:|:-:|-| -| [**R4i-SDHC B9S**](http://www.nds-card.net/ProShow.asp?ProID=574) | $15.99 | 3 września 2019 | <= 11.9.0 | <= 1.4.5 | **Ma fabrycznie wgrany ntrboot**; można przywrócić możliwość uruchamiania gier. | -| [**R4i Gold 3DS Plus**](http://www.nds-card.net/ProShow.asp?ProID=575) | $19.99 | Nie | <= 11.9.0 | <= 1.4.5 | **Ma fabrycznie wgrany ntrboot** ([wewnętrzny przełącznik do przełączania trybów ntrboot i NDS]({{ "/images/screenshots/r4i-gold-3ds-plus.png" | absolute_url }})); nie wgrywaj manualnie ntrboot. | -| [**Acekard 2i**](http://www.nds-card.net/ProShow.asp?ProID=160) | $20.99 | Nie | <= 4.3.0 | <= 1.4.4 | | -| [**DSTT**](http://www.nds-card.net/ProShow.asp?ProID=157) | $9.99 | Nie | Brak | Brak | Tylko modele z [konkretnymi chipami](https://gist.github.com/yuukieve/6b48f1bb8dd15136403c15c39fafdb42) są kompatybilne z ntrboot. | -| [**R4i Gold 3DS**](http://www.nds-card.net/ProShow.asp?ProID=149) | $19.99 | Nie | <= 11.9.0 | <= 1.4.5 | Wszystkie wersje RTS są kompatybilne. | -| [**R4i-SDHC 3DS RTS**](http://www.nds-card.net/ProShow.asp?ProID=146) | $13.99 | 1.87: 3 września 2019 | <= 11.9.0 | <= 1.4.5 | | -| [**R4iSDHC GOLD Pro 20XX**](http://www.nds-card.net/ProShow.asp?ProID=490) | $9.99 | 3.9b: 3 września 2019 | <= 11.9.0 | <= 1.4.5 | Wszystkie flashcarty R4iSDHC 20XX są identyczne. Modele 2013 nie są kompatybilne. | -| [**R4iSDHC RTS LITE 20XX**](http://www.nds-card.net/ProShow.asp?ProID=450) | $13.99 | 3.9b: 3 września 2019 | <= 11.9.0 | <= 1.4.5 | Wszystkie flashcarty R4iSDHC 20XX są identyczne. Modele 2013 nie są kompatybilne. | +| [**R4i-SDHC B9S**](http://www.nds-card.com/ProShow.asp?ProID=574) | $15.99 | September 3, 2019 | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot**; can be flashed back to an NDS flashcart. | +| [**R4i Gold 3DS Plus**](http://www.nds-card.com/ProShow.asp?ProID=575) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot** ([internal switch to switch between ntrboot and NDS modes]({{ "/images/screenshots/r4i-gold-3ds-plus.png" | absolute_url }})); do not manually flash with ntrboot. | +| [**Acekard 2i**](http://www.nds-card.com/ProShow.asp?ProID=160) | $20.99 | No | <= 4.3.0 | <= 1.4.4 | | +| [**DSTT**](http://www.nds-card.com/ProShow.asp?ProID=157) | $9.99 | No | None | None | Only models with [certain flash chips](https://gist.github.com/yuukieve/6b48f1bb8dd15136403c15c39fafdb42) are compatible with ntrboot. | +| [**R4i Gold 3DS**](http://www.nds-card.com/ProShow.asp?ProID=149) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | All RTS revisions are compatible. | +| [**R4i-SDHC 3DS RTS**](http://www.nds-card.com/ProShow.asp?ProID=146) | $13.99 | 1.87: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | | +| [**R4iSDHC GOLD Pro 20XX**](http://www.nds-card.com/ProShow.asp?ProID=490) | $9.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. Modele 2013 nie są kompatybilne. | +| [**R4iSDHC RTS LITE 20XX**](http://www.nds-card.com/ProShow.asp?ProID=450) | $13.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. Modele 2013 nie są kompatybilne. | | **Ace3DS X** | | No | <= 11.9.0 | <= 1.4.5 | **Ma fabrycznie wgrany ntrboot** (zewnętrzny przełącznik do przełączania trybów ntrboot i NDS); nie wgrywaj manualnie ntrboot. | | **Ace3DS Plus** | | Nie | <= 11.9.0 | <= 1.4.5 | | | **Gateway Blue** | | Nie | 4.1.0 - 4.5.0 | <= 1.4.5 | | @@ -49,7 +49,7 @@ Aby sprawdzić czy magnes działa, przytrzymaj go w okolicy przycisków (A)(B)(X Zauważ, że flashcart nie będzie mógł być użyty do standardowych funkcji, gdy zainstalowany jest na nim exploit ntrboot (z wyjątkiem przypadku Acekard 2i, który pozostaje funkcjonalny *tylko w systemach 3DS z zainstalowanym niestandardowym oprogramowaniem układowym*). Oznacza to, że większość flashcartów przestanie się wyświetlać nawet w menu Home. Na końcu instrukcji instalacji ntrboot znajdują się opcjonalne kroki, aby usunąć go z flashcarta po zakończeniu. -Zauważ, że w niektórych rzadkich przypadkach proces wgrywania ntrboot na podrobiony flashcart może go **"zbrickować"** i permanentnie uszkodzić. Jest to mało prawdopodobne, ale jednak tylko wymienione oryginalne flashcart'y są obsługiwane. Aby zmniejszyć prawdopodobieństwo otrzymania podrobionego flashcarta, zaleca się korzystanie z renomowanej strony do ich kupowania (takiej jak [NDS Card](http://www.nds-card.net/)) +Zauważ, że w niektórych rzadkich przypadkach proces wgrywania ntrboot na podrobiony flashcart może go **"zbrickować"** i permanentnie uszkodzić. Jest to mało prawdopodobne, ale jednak tylko wymienione oryginalne flashcart'y są obsługiwane. To reduce the chance of receiving a counterfeit card, it is recommended that you use a reputable site to buy your flashcart (such as [NDS Card](http://www.nds-card.com/)) {: .notice--danger} ___ diff --git a/_pages/pl_PL/seedminer.txt b/_pages/pl_PL/seedminer.txt index f994e94f4b..c354cfa7dd 100644 --- a/_pages/pl_PL/seedminer.txt +++ b/_pages/pl_PL/seedminer.txt @@ -14,7 +14,7 @@ If this key were completely random, the encryption key would be impossible to br Note that this tool requires a PC with a powerful graphics card to break your device's DSiWare encryption. If you do not have access to one of these, there also exists several online helper services where a volunteer running automated software will do this for you. -### Instrukcje +### Instructions #### Section I - Compatibility Tests @@ -63,9 +63,7 @@ There are two different methods for building on the Seedminer exploit (described 1. Open [Bruteforce Movable](https://bruteforcemovable.com/) on your computer + This site can automate the retrieval of `movable_part1.sed` (using a bot 3DS console) and the breaking of your device's DSiWare encryption (using a volunteer's computer to run Seedminer) - + If you already have access to a 3DS capable of launching the Homebrew Launcher, you can manually retrieve your `movable_part1.sed` using that device by following [these](https://jisagi.github.io/SeedminerGuide/seedminerSelf/#section1) instructions - + If you already have access to a PC with a powerful graphics card, you can manually calculate your `movable.sed` using it by following [these](https://jisagi.github.io/SeedminerGuide/seedminerSelf/#section2) instructions - + If the automated service is nonfunctional and you cannot do one or both of those manually, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you + + If the automated service is nonfunctional, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you 1. Enter your device's Friend Code (with no spaces or dashes) into the "Your friend code" field 1. Paste your device's 32 character long folder name into the "Your ID0" field 1. Wypełnij captcha "I'm not a robot" (nie jestem robotem) @@ -74,11 +72,11 @@ There are two different methods for building on the Seedminer exploit (described 1. When prompted, use the "Register Friend" button on your device to add the friend code of the bot 3DS console 1. Wait for the site to update + If it does not, wait a few minutes before refreshing the page once -1. Select "Continue" -1. Poczekaj na zakończenie procesu - + This can take a while (up to an hour in some cases) - + During this process, the bot may not show up on your 3ds. As long as the website updates, this is not an issue. - + If you are still waiting after an hour, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you +1. Once the site processes your information, you will be given the option to "Continue" or "Do another device". Click the green "Continue" button +1. Wait for the remainder of the process to complete + + This is usually fast (1-5 minutes) but in some cases, can take up to half an hour. + + During this process, the bot you added may not show up on your 3ds. As long as the website updates, this is not an issue. + + If you are still waiting after half an hour, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you 1. When the process has completed, download your `movable.sed` file from the site + Keep this file as you will need it in the upcoming pages @@ -102,7 +100,7 @@ ___ #### Seedminer + Steelhax + Frogtool -This method of using Seedminer for further exploitation uses your `movable.sed` file to gain access to the Homebrew Launcher using the Steelhax exploit for the purposes of injecting an exploitable DSiWare title into the DS Download Play application. This method requires you to already own (or download) the free "Steel Divers: Sub Wars" game from the eShop. +This method of using Seedminer for further exploitation uses your `movable.sed` file to gain access to the Homebrew Launcher using the Steelhax exploit for the purposes of injecting an exploitable DSiWare title into the DS Download Play application. This method requires you to already own (or download) the free "Steel Diver: Sub Wars" game from the eShop. This method is only compatible with the EUR, JPN, and USA regions, and is somewhat more complicated than the above method. It is only recommended to use this method if you have a EUR region device and do not wish to pay for a DSiWare game, or if the above method does not work for you for some reason. diff --git a/_pages/pl_PL/uninstall-cfw.txt b/_pages/pl_PL/uninstall-cfw.txt index 32c0d21ab5..8d4295e455 100644 --- a/_pages/pl_PL/uninstall-cfw.txt +++ b/_pages/pl_PL/uninstall-cfw.txt @@ -11,7 +11,7 @@ To całkowicie usunie CFW z twojego urządzenia, łącznie z boot9strap oraz Lum Prawie nigdy nie jest to właściwe rozwiązanie problemów związanych z twoją instalacją CFW. Lepszym pomysłem byłoby przeczytanie strony [Rozwiązywanie Problemów](troubleshooting) lub poproszenie o pomoc (po angielsku) na [Serwerze Discord Nintendo Homebrew](https://discord.gg/MWxPgEp). {: .notice--danger} -Wszystkie niepodpisane (nielegalne) gry przestaną się uruchamiać i można je ręcznie usunąć za pomocą sekcji Data Management w System Settings. Użyj [menadżera zapisów](https://github.com/FlagBrew/Checkpoint/releases/latest), aby zrobić kopię zapasową dowolnych zapisów (nielegalnych) gier na których ci zależy. +Any unsigned (illegitimate) games will be rendered unusable and should be manually removed before starting this process by using the Data Management section of the System Settings. Użyj [menadżera zapisów](https://github.com/FlagBrew/Checkpoint/releases/latest), aby zrobić kopię zapasową dowolnych zapisów (nielegalnych) gier na których ci zależy. Nie wpłynie to na Twoje NNID oraz na żadną z legalnie zakupionych gier włącznie z zapisami z tych gier. @@ -26,21 +26,43 @@ Zauważ, że jeżeli będziesz miał pliki inne niż `GodMode9.firm` w folderze ### Instrukcje -#### Sekcja I - Przygotowanie +#### Section I - Safety Test 1. Wyłącz konsolę 1. Włóż kartę SD do komputera 1. Skopiuj `GodMode9.firm` z GodMode9 `.zip` do folderu `/luma/payloads/` na karcie SD 1. Skopiuj folder `gm9` z GodMode9 `.zip` do katalogu głównego twojej karty SD 1. Włóż ponownie kartę SD do konsoli -1. Włącz konsolę - -#### Sekcja II - Uruchamianie skryptu odinstalowującego - 1. Uruchom GodMode9 poprzez trzymanie przycisku (Start) podczas uruchamiania konsoli 1. Jeśli zostaniesz poproszony o utworzenie kopii zapasowej niezbędnych plików, naciśnij (A) aby to zrobić, po czym naciśnij (A) aby kontynuować po zakończeniu 1. Jeśli zostaniesz poproszony o ustawienie czasu RTC, naciśnij (A) aby to zrobić, następnie ustaw datę i czas, oraz naciśnij (A) aby kontynuować + Pamiętaj, że, jeśli musiałeś ustawić datę i czas RTC, będziesz musiał ustawić je w Ustawieniach Systemu po skończeniu tego poradniku +1. Navigate to `[1:] SYSNAND CTRNAND > title > 00040138 > (X)0000002 > content` + + On a "New" edition console, the (X) will instead be 2 + + On an "Old" edition console, the (X) will instead be 0 +1. Select the `.app` file +1. Select `NCCH Image Options` +1. Select `Mount image to drive` +1. In the window that appears, open the `exefs` folder +1. In this folder, select the `.firm` file +1. Select "Firm Options" +1. Select "Boot Firm" +1. When prompted, choose to decrypt and make a copy +1. You should boot into the regular 3DS Home Menu. If you do, power your device off and continue to the next section + + If you do NOT boot into the regular 3DS Home Menu, continuing with these instructions **WILL** brick your device. You should join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you + +#### Section II - Prep Work + +1. Włącz konsolę +1. Navigate to System Settings > Data Management > Nintendo 3DS > Software +1. In this list of software, delete any non-Nintendo content you installed while using CFW + + This includes common system software such as FBI, Anemone3DS, Luma Updater, Homebrew Launcher, Checkpoint, and others, along with any non-eShop games + + Failure to remove CFW software before uninstalling CFW may break access to the Data Management menu after uninstalling CFW +1. Wyłącz konsolę + +#### Section III - Running Uninstall Script + +1. Uruchom GodMode9 poprzez trzymanie przycisku (Start) podczas uruchamiania konsoli 1. Wciśnij (Home), aby przywołać menu akcji 1. Wybierz "Scripts..." 1. Wybierz "GM9Megascript" diff --git a/_pages/pt_BR/finalizing-setup.txt b/_pages/pt_BR/finalizing-setup.txt index 0e718701e1..c3d44be245 100644 --- a/_pages/pt_BR/finalizing-setup.txt +++ b/_pages/pt_BR/finalizing-setup.txt @@ -18,6 +18,8 @@ Durante este processo, também configuramos alguns programas como os seguintes: + **Luma3DS Updater** *(Atualiza sua instalação CFW facilmente)* + **GodMode9** *(Ferramenta multiuso com funções de NAND e cartucho)* + **Homebrew Launcher Loader** *(launches the Homebrew Launcher)* ++ **DSP1** *(allows homebrew applications to have sound)* ++ **ctr-no-timeoffset** *(removes the rtc offset so that the home menu and rtc timestamps match)* ### What You Need @@ -143,7 +145,7 @@ Se, antes de seguir este guia, você já possuia uma instalação EmuNAND e gost 1. Aperte (B) para retornar para o menu principal 1. Segure (R) e aperte (B) ao mesmo tempo para ejetar o cartão SD 1. Insira o cartão SD no seu computador -1. Copy `__sysnand_###.bin`, `essential.exefs`, and `boot9.bin` from the `/gm9/out/` folder on your SD card to a safe location on your computer +1. Copy `__sysnand_###.bin`, `__sysnand_###.bin.sha`, `essential.exefs`, and `boot9.bin` from the `/gm9/out/` folder on your SD card to a safe location on your computer + Faça backups em diversos lugares (tais como armazenamento de arquivos online) + These backups will save you from a brick and/or help you recover files from the NAND image if anything goes wrong in the future 1. Delete `__sysnand_###.bin` and `__sysnand_###.bin.sha` from the `/gm9/out/` folder on your SD card after copying it diff --git a/_pages/pt_BR/homebrew-launcher-(steelhax).txt b/_pages/pt_BR/homebrew-launcher-(steelhax).txt index ed8c274bf1..69da574153 100644 --- a/_pages/pt_BR/homebrew-launcher-(steelhax).txt +++ b/_pages/pt_BR/homebrew-launcher-(steelhax).txt @@ -8,7 +8,7 @@ title: "Homebrew Launcher (Steelhax)" This method of using Seedminer for further exploitation uses your `movable.sed` file to gain access to the Homebrew Launcher using the Steelhax exploit for the purposes of injecting an exploitable DSiWare title into the DS Download Play application. This method requires you to already own (or download) the free "Steel Divers: Sub Wars" game from the eShop. -If your device already has access to the Homebrew Launcher (whether through Steelhax or another exploit), you can skip to [Installing Boot9strap (Frogminer)](installing-boot9strap-(frogminer)). +If your device already has access to the Homebrew Launcher (whether through Steelhax or another exploit), you can skip to [Installing Boot9strap (Frogtool)](installing-boot9strap-(frogtool)). {: .notice--success} If you already have Steel Diver: Sub Wars, this process will overwrite your game's save file! @@ -17,6 +17,7 @@ If you already have Steel Diver: Sub Wars, this process will overwrite your game ### What You Need * The free eShop game "Steel Diver: Sub Wars" +* Your `movable.sed` file from completing [Seedminer](seedminer) * The latest release of [the Homebrew Launcher](https://github.com/fincs/new-hbmenu/releases/latest) * The latest release of [Steelhax](https://github.com/VegaRoXas/vegaroxas.github.io/raw/master/files/steelhax-installer.rar) * The [otherapp payload](https://smealum.github.io/3ds/#otherapp) *(for your region and version)* @@ -39,7 +40,7 @@ If you already have Steel Diver: Sub Wars, this process will overwrite your game 1. Exit "Steel Diver: Sub Wars" 1. Desligue seu dispositivo 1. Insira o cartão SD no seu computador -1. Open [the Steelminer Injector website](http://steelminer.jisagi.net/injector) on your computer +1. Open [the Steelminer Injector website](https://bruteforcemovable.com/steelhax/) on your computer 1. Select your `movable.sed` file 1. Select "Start!" 1. Wait for the process to complete diff --git a/_pages/pt_BR/installing-boot9strap-(fredtool).txt b/_pages/pt_BR/installing-boot9strap-(fredtool).txt index 715cd05c0c..904732d1b1 100644 --- a/_pages/pt_BR/installing-boot9strap-(fredtool).txt +++ b/_pages/pt_BR/installing-boot9strap-(fredtool).txt @@ -10,8 +10,6 @@ This method of using Seedminer for further exploitation uses your `movable.sed` Esta é uma implementação funcional do exploit "FIRM partitions known-plaintext" detalhado [aqui](https://www.3dbrew.org/wiki/3DS_System_Flaws). -To use the [magnet](https://wikipedia.org/wiki/Magnet_URI_scheme) links on this page, you will need a torrent client like [Deluge](http://dev.deluge-torrent.org/wiki/Download). - To extract the `.7z` and `.rar` files linked on this page, you will need a file archiver like [7-Zip](http://www.7-zip.org/) or [The Unarchiver](https://theunarchiver.com/). ### What You Need diff --git a/_pages/pt_BR/ntrboot.txt b/_pages/pt_BR/ntrboot.txt index 3de17f4199..3c705f54e3 100644 --- a/_pages/pt_BR/ntrboot.txt +++ b/_pages/pt_BR/ntrboot.txt @@ -17,14 +17,14 @@ Note that carts with a "Time Bomb" will no longer be able to launch `.nds` files | Flashcart Name | Current Price | "Time Bomb"? | 3DS Versions? | DSi Versions? | Other Notes | |-|-:|:-:|:-:|:-:|-| -| [**R4i-SDHC B9S**](http://www.nds-card.net/ProShow.asp?ProID=574) | $15.99 | September 3, 2019 | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot**; can be flashed back to an NDS flashcart. | -| [**R4i Gold 3DS Plus**](http://www.nds-card.net/ProShow.asp?ProID=575) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot** ([internal switch to switch between ntrboot and NDS modes]({{ "/images/screenshots/r4i-gold-3ds-plus.png" | absolute_url }})); do not manually flash with ntrboot. | -| [**Acekard 2i**](http://www.nds-card.net/ProShow.asp?ProID=160) | $20.99 | No | <= 4.3.0 | <= 1.4.4 | | -| [**DSTT**](http://www.nds-card.net/ProShow.asp?ProID=157) | $9.99 | No | None | None | Only models with [certain flash chips](https://gist.github.com/yuukieve/6b48f1bb8dd15136403c15c39fafdb42) are compatible with ntrboot. | -| [**R4i Gold 3DS**](http://www.nds-card.net/ProShow.asp?ProID=149) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | All RTS revisions are compatible. | -| [**R4i-SDHC 3DS RTS**](http://www.nds-card.net/ProShow.asp?ProID=146) | $13.99 | 1.87: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | | -| [**R4iSDHC GOLD Pro 20XX**](http://www.nds-card.net/ProShow.asp?ProID=490) | $9.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. 2013 models are incompatible. | -| [**R4iSDHC RTS LITE 20XX**](http://www.nds-card.net/ProShow.asp?ProID=450) | $13.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. 2013 models are incompatible. | +| [**R4i-SDHC B9S**](http://www.nds-card.com/ProShow.asp?ProID=574) | $15.99 | September 3, 2019 | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot**; can be flashed back to an NDS flashcart. | +| [**R4i Gold 3DS Plus**](http://www.nds-card.com/ProShow.asp?ProID=575) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot** ([internal switch to switch between ntrboot and NDS modes]({{ "/images/screenshots/r4i-gold-3ds-plus.png" | absolute_url }})); do not manually flash with ntrboot. | +| [**Acekard 2i**](http://www.nds-card.com/ProShow.asp?ProID=160) | $20.99 | No | <= 4.3.0 | <= 1.4.4 | | +| [**DSTT**](http://www.nds-card.com/ProShow.asp?ProID=157) | $9.99 | No | None | None | Only models with [certain flash chips](https://gist.github.com/yuukieve/6b48f1bb8dd15136403c15c39fafdb42) are compatible with ntrboot. | +| [**R4i Gold 3DS**](http://www.nds-card.com/ProShow.asp?ProID=149) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | All RTS revisions are compatible. | +| [**R4i-SDHC 3DS RTS**](http://www.nds-card.com/ProShow.asp?ProID=146) | $13.99 | 1.87: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | | +| [**R4iSDHC GOLD Pro 20XX**](http://www.nds-card.com/ProShow.asp?ProID=490) | $9.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. 2013 models are incompatible. | +| [**R4iSDHC RTS LITE 20XX**](http://www.nds-card.com/ProShow.asp?ProID=450) | $13.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. 2013 models are incompatible. | | **Ace3DS X** | | No | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot** (external switch to switch between ntrboot ("3DS") and NDS modes); do not manually flash with ntrboot. | | **Ace3DS Plus** | | No | <= 11.9.0 | <= 1.4.5 | | | **Gateway Blue** | | No | 4.1.0 - 4.5.0 | <= 1.4.5 | | @@ -49,7 +49,7 @@ To test if a magnet will work, hold it on or around the (A)(B)(X)(Y) buttons whi Note that the flashcart will not be able to be used for its standard functions while the ntrboot exploit is installed on it (except for in the case of the Acekard 2i, which remains functional *on NDS and custom firmware 3DS systems only*). This means that, for most flashcarts, it will not even display on the home menu. Existem etapas opcionais no final das instruções da instalação do ntrboot para removê-lo do seu flashcart após terminar o guia. -Note que em algumas raras circunstâncias, pode ser possível que o processo de instalação cause um **brick** em um flashcart falso e torne-o permanentemente inutilizável. É pouco provável que isso ocorra, mas mesmo assim somente os flashcarts originais listados são suportados. To reduce the chance of receiving a counterfeit card, it is recommended that you use a reputable site to buy your flashcart (such as [NDS Card](http://www.nds-card.net/)) +Note que em algumas raras circunstâncias, pode ser possível que o processo de instalação cause um **brick** em um flashcart falso e torne-o permanentemente inutilizável. É pouco provável que isso ocorra, mas mesmo assim somente os flashcarts originais listados são suportados. To reduce the chance of receiving a counterfeit card, it is recommended that you use a reputable site to buy your flashcart (such as [NDS Card](http://www.nds-card.com/)) {: .notice--danger} ___ diff --git a/_pages/pt_BR/seedminer.txt b/_pages/pt_BR/seedminer.txt index 38c207363d..bec6141855 100644 --- a/_pages/pt_BR/seedminer.txt +++ b/_pages/pt_BR/seedminer.txt @@ -63,9 +63,7 @@ There are two different methods for building on the Seedminer exploit (described 1. Open [Bruteforce Movable](https://bruteforcemovable.com/) on your computer + This site can automate the retrieval of `movable_part1.sed` (using a bot 3DS console) and the breaking of your device's DSiWare encryption (using a volunteer's computer to run Seedminer) - + If you already have access to a 3DS capable of launching the Homebrew Launcher, you can manually retrieve your `movable_part1.sed` using that device by following [these](https://jisagi.github.io/SeedminerGuide/seedminerSelf/#section1) instructions - + If you already have access to a PC with a powerful graphics card, you can manually calculate your `movable.sed` using it by following [these](https://jisagi.github.io/SeedminerGuide/seedminerSelf/#section2) instructions - + If the automated service is nonfunctional and you cannot do one or both of those manually, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you + + If the automated service is nonfunctional, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you 1. Enter your device's Friend Code (with no spaces or dashes) into the "Your friend code" field 1. Paste your device's 32 character long folder name into the "Your ID0" field 1. Complete the "I'm not a robot" captcha @@ -74,11 +72,11 @@ There are two different methods for building on the Seedminer exploit (described 1. When prompted, use the "Register Friend" button on your device to add the friend code of the bot 3DS console 1. Wait for the site to update + If it does not, wait a few minutes before refreshing the page once -1. Select "Continue" -1. Wait for the process to complete - + This can take a while (up to an hour in some cases) - + During this process, the bot may not show up on your 3ds. As long as the website updates, this is not an issue. - + If you are still waiting after an hour, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you +1. Once the site processes your information, you will be given the option to "Continue" or "Do another device". Click the green "Continue" button +1. Wait for the remainder of the process to complete + + This is usually fast (1-5 minutes) but in some cases, can take up to half an hour. + + During this process, the bot you added may not show up on your 3ds. As long as the website updates, this is not an issue. + + If you are still waiting after half an hour, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you 1. When the process has completed, download your `movable.sed` file from the site + Keep this file as you will need it in the upcoming pages @@ -102,7 +100,7 @@ ___ #### Seedminer + Steelhax + Frogtool -This method of using Seedminer for further exploitation uses your `movable.sed` file to gain access to the Homebrew Launcher using the Steelhax exploit for the purposes of injecting an exploitable DSiWare title into the DS Download Play application. This method requires you to already own (or download) the free "Steel Divers: Sub Wars" game from the eShop. +This method of using Seedminer for further exploitation uses your `movable.sed` file to gain access to the Homebrew Launcher using the Steelhax exploit for the purposes of injecting an exploitable DSiWare title into the DS Download Play application. This method requires you to already own (or download) the free "Steel Diver: Sub Wars" game from the eShop. This method is only compatible with the EUR, JPN, and USA regions, and is somewhat more complicated than the above method. It is only recommended to use this method if you have a EUR region device and do not wish to pay for a DSiWare game, or if the above method does not work for you for some reason. diff --git a/_pages/pt_BR/uninstall-cfw.txt b/_pages/pt_BR/uninstall-cfw.txt index 49d09fb257..247a57c645 100644 --- a/_pages/pt_BR/uninstall-cfw.txt +++ b/_pages/pt_BR/uninstall-cfw.txt @@ -11,7 +11,7 @@ Isso irá remover completamente o CFW do seu dispositivo, incluindo o Boot9Strap This is almost never the solution to fix any issues you encounter with your CFW installation. A better idea would be to read the [troubleshooting](troubleshooting) page or ask (in English) for help at [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp). {: .notice--danger} -Todos os jogos não assinados (ilegítimos) se tornarão inutilizáveis e podem ser removidos manualmente usando o Gerenciador de Dados na Configuração do Console. Use a [save manager](https://github.com/FlagBrew/Checkpoint/releases/latest) to backup any saves for these unsigned (illegitimate) games you care about. +Any unsigned (illegitimate) games will be rendered unusable and should be manually removed before starting this process by using the Data Management section of the System Settings. Use a [save manager](https://github.com/FlagBrew/Checkpoint/releases/latest) to backup any saves for these unsigned (illegitimate) games you care about. Isso não afetará seu NNID, qualquer jogo legítimo comprado, ou qualquer save dos jogos comprados. @@ -26,21 +26,43 @@ Note que se você tem outros arquivos de payload diferentes do `GodMode9.firm` n ### Instructions -#### Section I - Prep Work +#### Section I - Safety Test 1. Desligue seu dispositivo 1. Insira o cartão SD no seu computador 1. Copie o `GodMode9.firm` do `.zip` do GodMode9 para a pasta `/luma/payloads/` no seu cartão SD 1. Copie a pasta `gm9` do `.zip` do GodMode9 para a raiz do seu cartão SD 1. Reinsira seu cartão SD no seu dispositivo -1. Ligue o seu dispositivo - -#### Section II - Running Uninstall Script - 1. Inicie o GodMode9 segurando (Start) durante a inicialização 1. Se você for solicitado para criar um backup de arquivos essenciais, aperte (A) pra fazê-lo, e depois aperte (A) para continuar quando ele for concluído 1. If you are prompted to fix the RTC date&time, press (A) to do so, then set the date and time, then press (A) to continue + Note that, if you had to fix the RTC date and time, you will have to fix the time in the System Settings as well after this guide +1. Navigate to `[1:] SYSNAND CTRNAND > title > 00040138 > (X)0000002 > content` + + On a "New" edition console, the (X) will instead be 2 + + On an "Old" edition console, the (X) will instead be 0 +1. Select the `.app` file +1. Select `NCCH Image Options` +1. Select `Mount image to drive` +1. In the window that appears, open the `exefs` folder +1. In this folder, select the `.firm` file +1. Select "Firm Options" +1. Select "Boot Firm" +1. When prompted, choose to decrypt and make a copy +1. You should boot into the regular 3DS Home Menu. If you do, power your device off and continue to the next section + + If you do NOT boot into the regular 3DS Home Menu, continuing with these instructions **WILL** brick your device. You should join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you + +#### Section II - Prep Work + +1. Ligue o seu dispositivo +1. Navigate to System Settings > Data Management > Nintendo 3DS > Software +1. In this list of software, delete any non-Nintendo content you installed while using CFW + + This includes common system software such as FBI, Anemone3DS, Luma Updater, Homebrew Launcher, Checkpoint, and others, along with any non-eShop games + + Failure to remove CFW software before uninstalling CFW may break access to the Data Management menu after uninstalling CFW +1. Desligue seu dispositivo + +#### Section III - Running Uninstall Script + +1. Inicie o GodMode9 segurando (Start) durante a inicialização 1. Aperte (Home) para abrir o menu de ações 1. Selecione "Scripts..." 1. Select "GM9Megascript" diff --git a/_pages/pt_PT/finalizing-setup.txt b/_pages/pt_PT/finalizing-setup.txt index 07e433a838..7de30c9abb 100644 --- a/_pages/pt_PT/finalizing-setup.txt +++ b/_pages/pt_PT/finalizing-setup.txt @@ -18,6 +18,8 @@ During this process, we also setup programs such as the following: + **Luma3DS Updater** *(updates your CFW installation easily)* + **GodMode9** *(multipurpose tool which can do NAND and cartridge functions)* + **Homebrew Launcher Loader** *(launches the Homebrew Launcher)* ++ **DSP1** *(allows homebrew applications to have sound)* ++ **ctr-no-timeoffset** *(removes the rtc offset so that the home menu and rtc timestamps match)* ### What You Need @@ -143,7 +145,7 @@ If, before following this guide, you already had an EmuNAND setup and would like 1. Press (B) to return to the main menu 1. Hold (R) and press (B) at the same time to eject your SD card 1. Insert your SD card into your computer -1. Copy `__sysnand_###.bin`, `essential.exefs`, and `boot9.bin` from the `/gm9/out/` folder on your SD card to a safe location on your computer +1. Copy `__sysnand_###.bin`, `__sysnand_###.bin.sha`, `essential.exefs`, and `boot9.bin` from the `/gm9/out/` folder on your SD card to a safe location on your computer + Make backups in multiple locations (such as online file storage) + These backups will save you from a brick and/or help you recover files from the NAND image if anything goes wrong in the future 1. Delete `__sysnand_###.bin` and `__sysnand_###.bin.sha` from the `/gm9/out/` folder on your SD card after copying it diff --git a/_pages/pt_PT/homebrew-launcher-(steelhax).txt b/_pages/pt_PT/homebrew-launcher-(steelhax).txt index e3c7f4047c..2f705a861d 100644 --- a/_pages/pt_PT/homebrew-launcher-(steelhax).txt +++ b/_pages/pt_PT/homebrew-launcher-(steelhax).txt @@ -8,7 +8,7 @@ title: "Homebrew Launcher (Steelhax)" This method of using Seedminer for further exploitation uses your `movable.sed` file to gain access to the Homebrew Launcher using the Steelhax exploit for the purposes of injecting an exploitable DSiWare title into the DS Download Play application. This method requires you to already own (or download) the free "Steel Divers: Sub Wars" game from the eShop. -If your device already has access to the Homebrew Launcher (whether through Steelhax or another exploit), you can skip to [Installing Boot9strap (Frogminer)](installing-boot9strap-(frogminer)). +If your device already has access to the Homebrew Launcher (whether through Steelhax or another exploit), you can skip to [Installing Boot9strap (Frogtool)](installing-boot9strap-(frogtool)). {: .notice--success} If you already have Steel Diver: Sub Wars, this process will overwrite your game's save file! @@ -17,6 +17,7 @@ If you already have Steel Diver: Sub Wars, this process will overwrite your game ### What You Need * The free eShop game "Steel Diver: Sub Wars" +* Your `movable.sed` file from completing [Seedminer](seedminer) * The latest release of [the Homebrew Launcher](https://github.com/fincs/new-hbmenu/releases/latest) * The latest release of [Steelhax](https://github.com/VegaRoXas/vegaroxas.github.io/raw/master/files/steelhax-installer.rar) * The [otherapp payload](https://smealum.github.io/3ds/#otherapp) *(for your region and version)* @@ -39,7 +40,7 @@ If you already have Steel Diver: Sub Wars, this process will overwrite your game 1. Exit "Steel Diver: Sub Wars" 1. Power off your device 1. Insert your SD card into your computer -1. Open [the Steelminer Injector website](http://steelminer.jisagi.net/injector) on your computer +1. Open [the Steelminer Injector website](https://bruteforcemovable.com/steelhax/) on your computer 1. Select your `movable.sed` file 1. Select "Start!" 1. Wait for the process to complete diff --git a/_pages/pt_PT/installing-boot9strap-(fredtool).txt b/_pages/pt_PT/installing-boot9strap-(fredtool).txt index a03b4d8035..3f5111390e 100644 --- a/_pages/pt_PT/installing-boot9strap-(fredtool).txt +++ b/_pages/pt_PT/installing-boot9strap-(fredtool).txt @@ -10,8 +10,6 @@ This method of using Seedminer for further exploitation uses your `movable.sed` This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). -To use the [magnet](https://wikipedia.org/wiki/Magnet_URI_scheme) links on this page, you will need a torrent client like [Deluge](http://dev.deluge-torrent.org/wiki/Download). - To extract the `.7z` and `.rar` files linked on this page, you will need a file archiver like [7-Zip](http://www.7-zip.org/) or [The Unarchiver](https://theunarchiver.com/). ### What You Need diff --git a/_pages/pt_PT/ntrboot.txt b/_pages/pt_PT/ntrboot.txt index eec820eb0f..023d70d63d 100644 --- a/_pages/pt_PT/ntrboot.txt +++ b/_pages/pt_PT/ntrboot.txt @@ -17,14 +17,14 @@ Note that carts with a "Time Bomb" will no longer be able to launch `.nds` files | Flashcart Name | Current Price | "Time Bomb"? | 3DS Versions? | DSi Versions? | Other Notes | |-|-:|:-:|:-:|:-:|-| -| [**R4i-SDHC B9S**](http://www.nds-card.net/ProShow.asp?ProID=574) | $15.99 | September 3, 2019 | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot**; can be flashed back to an NDS flashcart. | -| [**R4i Gold 3DS Plus**](http://www.nds-card.net/ProShow.asp?ProID=575) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot** ([internal switch to switch between ntrboot and NDS modes]({{ "/images/screenshots/r4i-gold-3ds-plus.png" | absolute_url }})); do not manually flash with ntrboot. | -| [**Acekard 2i**](http://www.nds-card.net/ProShow.asp?ProID=160) | $20.99 | No | <= 4.3.0 | <= 1.4.4 | | -| [**DSTT**](http://www.nds-card.net/ProShow.asp?ProID=157) | $9.99 | No | None | None | Only models with [certain flash chips](https://gist.github.com/yuukieve/6b48f1bb8dd15136403c15c39fafdb42) are compatible with ntrboot. | -| [**R4i Gold 3DS**](http://www.nds-card.net/ProShow.asp?ProID=149) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | All RTS revisions are compatible. | -| [**R4i-SDHC 3DS RTS**](http://www.nds-card.net/ProShow.asp?ProID=146) | $13.99 | 1.87: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | | -| [**R4iSDHC GOLD Pro 20XX**](http://www.nds-card.net/ProShow.asp?ProID=490) | $9.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. 2013 models are incompatible. | -| [**R4iSDHC RTS LITE 20XX**](http://www.nds-card.net/ProShow.asp?ProID=450) | $13.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. 2013 models are incompatible. | +| [**R4i-SDHC B9S**](http://www.nds-card.com/ProShow.asp?ProID=574) | $15.99 | September 3, 2019 | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot**; can be flashed back to an NDS flashcart. | +| [**R4i Gold 3DS Plus**](http://www.nds-card.com/ProShow.asp?ProID=575) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot** ([internal switch to switch between ntrboot and NDS modes]({{ "/images/screenshots/r4i-gold-3ds-plus.png" | absolute_url }})); do not manually flash with ntrboot. | +| [**Acekard 2i**](http://www.nds-card.com/ProShow.asp?ProID=160) | $20.99 | No | <= 4.3.0 | <= 1.4.4 | | +| [**DSTT**](http://www.nds-card.com/ProShow.asp?ProID=157) | $9.99 | No | None | None | Only models with [certain flash chips](https://gist.github.com/yuukieve/6b48f1bb8dd15136403c15c39fafdb42) are compatible with ntrboot. | +| [**R4i Gold 3DS**](http://www.nds-card.com/ProShow.asp?ProID=149) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | All RTS revisions are compatible. | +| [**R4i-SDHC 3DS RTS**](http://www.nds-card.com/ProShow.asp?ProID=146) | $13.99 | 1.87: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | | +| [**R4iSDHC GOLD Pro 20XX**](http://www.nds-card.com/ProShow.asp?ProID=490) | $9.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. 2013 models are incompatible. | +| [**R4iSDHC RTS LITE 20XX**](http://www.nds-card.com/ProShow.asp?ProID=450) | $13.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. 2013 models are incompatible. | | **Ace3DS X** | | No | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot** (external switch to switch between ntrboot ("3DS") and NDS modes); do not manually flash with ntrboot. | | **Ace3DS Plus** | | No | <= 11.9.0 | <= 1.4.5 | | | **Gateway Blue** | | No | 4.1.0 - 4.5.0 | <= 1.4.5 | | @@ -49,7 +49,7 @@ To test if a magnet will work, hold it on or around the (A)(B)(X)(Y) buttons whi Note that the flashcart will not be able to be used for its standard functions while the ntrboot exploit is installed on it (except for in the case of the Acekard 2i, which remains functional *on NDS and custom firmware 3DS systems only*). This means that, for most flashcarts, it will not even display on the home menu. There are optional steps at the end of the ntrboot flashing instructions to remove it from your flashcart when you are done. -Note that in some rare circumstances, it may be possible for the flashing process to **brick** a counterfeit flashcart and render it permanently unusable. This is unlikely, but nevertheless only original listed flashcarts are supported. To reduce the chance of receiving a counterfeit card, it is recommended that you use a reputable site to buy your flashcart (such as [NDS Card](http://www.nds-card.net/)) +Note that in some rare circumstances, it may be possible for the flashing process to **brick** a counterfeit flashcart and render it permanently unusable. This is unlikely, but nevertheless only original listed flashcarts are supported. To reduce the chance of receiving a counterfeit card, it is recommended that you use a reputable site to buy your flashcart (such as [NDS Card](http://www.nds-card.com/)) {: .notice--danger} ___ diff --git a/_pages/pt_PT/seedminer.txt b/_pages/pt_PT/seedminer.txt index faa4a1e9c1..d5553775a6 100644 --- a/_pages/pt_PT/seedminer.txt +++ b/_pages/pt_PT/seedminer.txt @@ -63,9 +63,7 @@ There are two different methods for building on the Seedminer exploit (described 1. Open [Bruteforce Movable](https://bruteforcemovable.com/) on your computer + This site can automate the retrieval of `movable_part1.sed` (using a bot 3DS console) and the breaking of your device's DSiWare encryption (using a volunteer's computer to run Seedminer) - + If you already have access to a 3DS capable of launching the Homebrew Launcher, you can manually retrieve your `movable_part1.sed` using that device by following [these](https://jisagi.github.io/SeedminerGuide/seedminerSelf/#section1) instructions - + If you already have access to a PC with a powerful graphics card, you can manually calculate your `movable.sed` using it by following [these](https://jisagi.github.io/SeedminerGuide/seedminerSelf/#section2) instructions - + If the automated service is nonfunctional and you cannot do one or both of those manually, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you + + If the automated service is nonfunctional, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you 1. Enter your device's Friend Code (with no spaces or dashes) into the "Your friend code" field 1. Paste your device's 32 character long folder name into the "Your ID0" field 1. Complete the "I'm not a robot" captcha @@ -74,11 +72,11 @@ There are two different methods for building on the Seedminer exploit (described 1. When prompted, use the "Register Friend" button on your device to add the friend code of the bot 3DS console 1. Wait for the site to update + If it does not, wait a few minutes before refreshing the page once -1. Select "Continue" -1. Wait for the process to complete - + This can take a while (up to an hour in some cases) - + During this process, the bot may not show up on your 3ds. As long as the website updates, this is not an issue. - + If you are still waiting after an hour, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you +1. Once the site processes your information, you will be given the option to "Continue" or "Do another device". Click the green "Continue" button +1. Wait for the remainder of the process to complete + + This is usually fast (1-5 minutes) but in some cases, can take up to half an hour. + + During this process, the bot you added may not show up on your 3ds. As long as the website updates, this is not an issue. + + If you are still waiting after half an hour, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you 1. When the process has completed, download your `movable.sed` file from the site + Keep this file as you will need it in the upcoming pages @@ -102,7 +100,7 @@ ___ #### Seedminer + Steelhax + Frogtool -This method of using Seedminer for further exploitation uses your `movable.sed` file to gain access to the Homebrew Launcher using the Steelhax exploit for the purposes of injecting an exploitable DSiWare title into the DS Download Play application. This method requires you to already own (or download) the free "Steel Divers: Sub Wars" game from the eShop. +This method of using Seedminer for further exploitation uses your `movable.sed` file to gain access to the Homebrew Launcher using the Steelhax exploit for the purposes of injecting an exploitable DSiWare title into the DS Download Play application. This method requires you to already own (or download) the free "Steel Diver: Sub Wars" game from the eShop. This method is only compatible with the EUR, JPN, and USA regions, and is somewhat more complicated than the above method. It is only recommended to use this method if you have a EUR region device and do not wish to pay for a DSiWare game, or if the above method does not work for you for some reason. diff --git a/_pages/pt_PT/uninstall-cfw.txt b/_pages/pt_PT/uninstall-cfw.txt index b33c7e9e3f..252dc7b124 100644 --- a/_pages/pt_PT/uninstall-cfw.txt +++ b/_pages/pt_PT/uninstall-cfw.txt @@ -11,7 +11,7 @@ This will completely remove CFW from your device, including Boot9Strap and Luma3 This is almost never the solution to fix any issues you encounter with your CFW installation. A better idea would be to read the [troubleshooting](troubleshooting) page or ask (in English) for help at [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp). {: .notice--danger} -Any unsigned (illegitimate) games will be rendered unusable and can be manually removed using the Data Management section of the System Settings. Use a [save manager](https://github.com/FlagBrew/Checkpoint/releases/latest) to backup any saves for these unsigned (illegitimate) games you care about. +Any unsigned (illegitimate) games will be rendered unusable and should be manually removed before starting this process by using the Data Management section of the System Settings. Use a [save manager](https://github.com/FlagBrew/Checkpoint/releases/latest) to backup any saves for these unsigned (illegitimate) games you care about. This will not affect your NNID, any legitimately purchased games, or any saves for those legitimately purchased games. @@ -26,21 +26,43 @@ Note that if you have any payload files other than `GodMode9.firm` in the `/luma ### Instructions -#### Section I - Prep Work +#### Section I - Safety Test 1. Power off your device 1. Insert your SD card into your computer 1. Copy `GodMode9.firm` from the GodMode9 `.zip` to the `/luma/payloads/` folder on your SD card 1. Copy the `gm9` folder from the GodMode9 `.zip` to the root of your SD card 1. Reinsert your SD card into your device -1. Power on your device - -#### Section II - Running Uninstall Script - 1. Launch GodMode9 by holding (Start) during boot 1. If you are prompted to create an essential files backup, press (A) to do so, then press (A) to continue once it has completed 1. If you are prompted to fix the RTC date&time, press (A) to do so, then set the date and time, then press (A) to continue + Note that, if you had to fix the RTC date and time, you will have to fix the time in the System Settings as well after this guide +1. Navigate to `[1:] SYSNAND CTRNAND > title > 00040138 > (X)0000002 > content` + + On a "New" edition console, the (X) will instead be 2 + + On an "Old" edition console, the (X) will instead be 0 +1. Select the `.app` file +1. Select `NCCH Image Options` +1. Select `Mount image to drive` +1. In the window that appears, open the `exefs` folder +1. In this folder, select the `.firm` file +1. Select "Firm Options" +1. Select "Boot Firm" +1. When prompted, choose to decrypt and make a copy +1. You should boot into the regular 3DS Home Menu. If you do, power your device off and continue to the next section + + If you do NOT boot into the regular 3DS Home Menu, continuing with these instructions **WILL** brick your device. You should join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you + +#### Section II - Prep Work + +1. Power on your device +1. Navigate to System Settings > Data Management > Nintendo 3DS > Software +1. In this list of software, delete any non-Nintendo content you installed while using CFW + + This includes common system software such as FBI, Anemone3DS, Luma Updater, Homebrew Launcher, Checkpoint, and others, along with any non-eShop games + + Failure to remove CFW software before uninstalling CFW may break access to the Data Management menu after uninstalling CFW +1. Power off your device + +#### Section III - Running Uninstall Script + +1. Launch GodMode9 by holding (Start) during boot 1. Press (Home) to bring up the action menu 1. Select "Scripts..." 1. Select "GM9Megascript" diff --git a/_pages/ro_RO/finalizing-setup.txt b/_pages/ro_RO/finalizing-setup.txt index bc1de26328..5333e92acf 100644 --- a/_pages/ro_RO/finalizing-setup.txt +++ b/_pages/ro_RO/finalizing-setup.txt @@ -18,6 +18,8 @@ Pe parcursul acestui proces, vom instala și programe ca următoarele: + **Luma3DS Updater** *(actualizează CFW-ul instalat cu ușurință)* + **GodMode9** *(unealtă multifuncțională care poate face funcții de NAND și card)* + **Launcher Homebrew Loader** *(pornește Homebrew Launcher) * ++ **DSP1** *(allows homebrew applications to have sound)* ++ **ctr-no-timeoffset** *(removes the rtc offset so that the home menu and rtc timestamps match)* ### Ce aveți nevoie @@ -143,7 +145,7 @@ Dacă, înainte să urmăriți acest ghid, aveați deja o configurare cu EmuNAND 1. Apăsați (B) ca să vă întoarceți în meniul principal 1. Țineți apăsat (R) și apăsați (B) în același timp pentru a scoate cardul SD 1. Introduceți cardul SD în calculator -1. Copiați `__sysnand_###.bin`, `essential.exefs`, și `boot9.bin` din folderul `/gm9/out/` de pe cardul SD într-o locaţie sigură pe calculator +1. Copy `__sysnand_###.bin`, `__sysnand_###.bin.sha`, `essential.exefs`, and `boot9.bin` from the `/gm9/out/` folder on your SD card to a safe location on your computer + Faceți copii de rezervă în mai multe locații (cum ar fi stocări online ale fișierelor) + Aceste copii de rezervă vă va salva de un brick și/sau vă va ajuta să recuperați fișierele dintr-o imagine NAND dacă ceva merge în neregulă pe viitor 1. Ştergeţi `_ _sysnand_ ###.bin` şi `_ _sysnand_ ###.bin.sha` din folderul `/ gm9/out /` de pe cardul SD după copiere diff --git a/_pages/ro_RO/homebrew-launcher-(steelhax).txt b/_pages/ro_RO/homebrew-launcher-(steelhax).txt index 5a2d2ee8ff..737f84faa2 100644 --- a/_pages/ro_RO/homebrew-launcher-(steelhax).txt +++ b/_pages/ro_RO/homebrew-launcher-(steelhax).txt @@ -8,7 +8,7 @@ title: "Homebrew Launcher (Steelhax)" This method of using Seedminer for further exploitation uses your `movable.sed` file to gain access to the Homebrew Launcher using the Steelhax exploit for the purposes of injecting an exploitable DSiWare title into the DS Download Play application. This method requires you to already own (or download) the free "Steel Divers: Sub Wars" game from the eShop. -If your device already has access to the Homebrew Launcher (whether through Steelhax or another exploit), you can skip to [Installing Boot9strap (Frogminer)](installing-boot9strap-(frogminer)). +If your device already has access to the Homebrew Launcher (whether through Steelhax or another exploit), you can skip to [Installing Boot9strap (Frogtool)](installing-boot9strap-(frogtool)). {: .notice--success} If you already have Steel Diver: Sub Wars, this process will overwrite your game's save file! @@ -17,6 +17,7 @@ If you already have Steel Diver: Sub Wars, this process will overwrite your game ### Ce aveți nevoie * The free eShop game "Steel Diver: Sub Wars" +* Your `movable.sed` file from completing [Seedminer](seedminer) * Cea mai nouă versiune de [Homebrew Launcher](https://github.com/fincs/new-hbmenu/releases/latest) * Ultima versiune de [Steelhax](https://github.com/VegaRoXas/vegaroxas.github.io/raw/master/files/steelhax-installer.rar) * [Payload-ul otherapp](https://smealum.github.io/3ds/#otherapp) *(pentru versiunea și regiunea dumneavoastră)* @@ -39,7 +40,7 @@ If you already have Steel Diver: Sub Wars, this process will overwrite your game 1. Ieșiți din "Steel Diver: Sub Wars" 1. Închideți dispozitivul 1. Introduceți cardul SD în calculator -1. Deschideţi [website-ul Steelminer Injector](http://steelminer.jisagi.net/injector) pe calculator +1. Open [the Steelminer Injector website](https://bruteforcemovable.com/steelhax/) on your computer 1. Selectaţi fişierul `movable.sed` 1. Selectați "Start!" 1. Așteptați până când procesul este terminat diff --git a/_pages/ro_RO/installing-boot9strap-(fredtool).txt b/_pages/ro_RO/installing-boot9strap-(fredtool).txt index 622d4d5626..a9fb79488f 100644 --- a/_pages/ro_RO/installing-boot9strap-(fredtool).txt +++ b/_pages/ro_RO/installing-boot9strap-(fredtool).txt @@ -10,8 +10,6 @@ This method of using Seedminer for further exploitation uses your `movable.sed` Acest lucru este în prezent o implementare a exploit-ului "Partiții FIRM de text simplu" detaliat [aici](https://www.3dbrew.org/wiki/3DS_System_Flaws). -Pentru a folosi linkurile [magnetice](https://wikipedia.org/wiki/Magnet_URI_scheme) de pe această pagină, veți avea nevoie de un client de torrente ca [Deluge](http://dev.deluge-torrent.org/wiki/Download). - Pentru a extrage fişierele `.7z` și `.rar` de pe această pagină, veţi avea nevoie de un arhivator de fişiere ca [7-Zip](http://www.7-zip.org/) sau [The Unarchiver](https://theunarchiver.com/). ### Ce aveți nevoie diff --git a/_pages/ro_RO/installing-boot9strap-(frogtool).txt b/_pages/ro_RO/installing-boot9strap-(frogtool).txt index 1f17dc56d9..1e8fdf3d02 100644 --- a/_pages/ro_RO/installing-boot9strap-(frogtool).txt +++ b/_pages/ro_RO/installing-boot9strap-(frogtool).txt @@ -64,7 +64,7 @@ If you would prefer a visual guide to this section, one is available [here](http + Este posibil să aveţi nevoie să forțați oprirea dispozitivului apăsând butonul de pornire + If you see the Luma configuration menu, continue without powering off -#### Secțiunea IV - Configurând Luma3DS +#### Section IV - Configuring Luma3DS 1. Porniți dispozitivul în timp ce țineți apăsat (Select) pentru a lansa meniul de configurare Luma + În cazul în care găsiți probleme pornind meniul de configurare Luma, [urmați acest ghid de depanare](https://github.com/zoogie/b9sTool/blob/master/TROUBLESHOOTING.md) diff --git a/_pages/ro_RO/ntrboot.txt b/_pages/ro_RO/ntrboot.txt index c022ba9817..a78ee0d6bd 100644 --- a/_pages/ro_RO/ntrboot.txt +++ b/_pages/ro_RO/ntrboot.txt @@ -17,14 +17,14 @@ Deși exploit-ul ntrboot merge indiferent de versiunea de sistem, ntrboot flashe | Nume de Flashcart | Preţul Curent | Are "Bombă cu Ceas"? | Versiuni de 3DS? | Versiuni de DSi? | Alte note | |-|-:|:-:|:-:|:-:|-| -| [**R4i-SDHC B9S**](http://www.nds-card.net/ProShow.asp?ProID=574) | $15.99 | 3 septembrie 2019 | <= 11.9.0 | <= 1.4.5 | **Vine cu ntrboot preinstalat**; se poate schimba înapoi spre un flashcart de NDS obișnuit. | -| [**R4i Gold 3DS Plus**](http://www.nds-card.net/ProShow.asp?ProID=575) | $19.99 | Nu | <= 11.9.0 | <= 1.4.5 | **Vine cu ntrboot preinstalat** ([are un întrerupător intern pentru a comuta între modurile ntrboot și NDS]({{ "/images/screenshots/r4i-gold-3ds-plus.png" | absolute_url }})); nu instalați ntrboot manual. | -| [**Acekard 2i**](http://www.nds-card.net/ProShow.asp?ProID=160) | $20.99 | Nu | <= 4.3.0 | <= 1.4.4 | | -| [**DSTT**](http://www.nds-card.net/ProShow.asp?ProID=157) | $9.99 | Nu | Niciuna | Niciuna | Numai modelele cu [anumite chipuri flash](https://gist.github.com/yuukieve/6b48f1bb8dd15136403c15c39fafdb42) sunt compatibile cu ntrboot. | -| [**R4i Gold 3DS**](http://www.nds-card.net/ProShow.asp?ProID=149) | $19.99 | Nu | <= 11.9.0 | <= 1.4.5 | Toate reviziile de RTS sunt compatibile. | -| [**R4i-SDHC 3DS RTS**](http://www.nds-card.net/ProShow.asp?ProID=146) | $13.99 | 1.87: 3 septembrie 2019 | <= 11.9.0 | <= 1.4.5 | | -| [**R4iSDHC GOLD Pro 20XX**](http://www.nds-card.net/ProShow.asp?ProID=490) | $9.99 | 3.9b: 3 septembrie 2019 | <= 11.9.0 | <= 1.4.5 | Toate flashcart-urile R4iSDHC 20XX sunt identice. modelele 2013 sunt incompatibile. | -| [**R4iSDHC RTS LITE 20XX**](http://www.nds-card.net/ProShow.asp?ProID=450) | $13.99 | 3.9b: 3 septembrie 2019 | <= 11.9.0 | <= 1.4.5 | Toate flashcart-urile R4iSDHC 20XX sunt identice. modelele 2013 sunt incompatibile. | +| [**R4i-SDHC B9S**](http://www.nds-card.com/ProShow.asp?ProID=574) | $15.99 | September 3, 2019 | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot**; can be flashed back to an NDS flashcart. | +| [**R4i Gold 3DS Plus**](http://www.nds-card.com/ProShow.asp?ProID=575) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot** ([internal switch to switch between ntrboot and NDS modes]({{ "/images/screenshots/r4i-gold-3ds-plus.png" | absolute_url }})); do not manually flash with ntrboot. | +| [**Acekard 2i**](http://www.nds-card.com/ProShow.asp?ProID=160) | $20.99 | No | <= 4.3.0 | <= 1.4.4 | | +| [**DSTT**](http://www.nds-card.com/ProShow.asp?ProID=157) | $9.99 | No | None | None | Only models with [certain flash chips](https://gist.github.com/yuukieve/6b48f1bb8dd15136403c15c39fafdb42) are compatible with ntrboot. | +| [**R4i Gold 3DS**](http://www.nds-card.com/ProShow.asp?ProID=149) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | All RTS revisions are compatible. | +| [**R4i-SDHC 3DS RTS**](http://www.nds-card.com/ProShow.asp?ProID=146) | $13.99 | 1.87: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | | +| [**R4iSDHC GOLD Pro 20XX**](http://www.nds-card.com/ProShow.asp?ProID=490) | $9.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. modelele 2013 sunt incompatibile. | +| [**R4iSDHC RTS LITE 20XX**](http://www.nds-card.com/ProShow.asp?ProID=450) | $13.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. modelele 2013 sunt incompatibile. | | **Ace3DS X** | | Nu | <= 11.9.0 | <= 1.4.5 | **Vine cu ntrboot preinstalat** (are un întrerupător extern pentru a comuta între modurile ntrboot ("3DS") și NDS); nu instalați ntrboot manual. | | **Ace3DS Plus** || Nu | <= 11.9.0 | <= 1.4.5 || | **Gateway Blue** | | Nu | 4.1.0 - 4.5.0 | <= 1.4.5 | | @@ -49,7 +49,7 @@ Pentru a testa dacă magnetul funcționează, țineți-l pe sau în jurul butoan Țineți cont că flashcart-ul nu va putea fi folosit pentru funcțiile lui obişnuite cât timp exploit-ul este instalat pe el (excepție în cazul unui Acekard 2i, care rămâne funcțional *numai pe dispozitivele NDS și 3DS care au custom firmware instalat*). Asta înseamnă că, pentru majoritatea flashcart-urilor, nici nu se vor afișa în meniul HOME. Există paşi opționali la sfârșitul instrucțiunilor pentru instalarea ntrboot-ului cu scopul de a-l şterge de pe flashcart după ce ați terminat. -Țineți cont că în anumite cazuri rare, poate fi posibil ca procesul de instalare să facă **brick** unui flashcard contrafăcut și să devină complet nefolositor. Acest lucru este puţin probabil, totuși, numai flashcart-urile originale menționate sunt compatibile. Pentru a reduce şansa de a primi un card contrafăcut, este recomandat să folosiți un site de încredere pentru a cumpăra flashcart-ul (cum ar fi [NDS Card](http://www.nds-card.net/)) +Țineți cont că în anumite cazuri rare, poate fi posibil ca procesul de instalare să facă **brick** unui flashcard contrafăcut și să devină complet nefolositor. Acest lucru este puţin probabil, totuși, numai flashcart-urile originale menționate sunt compatibile. To reduce the chance of receiving a counterfeit card, it is recommended that you use a reputable site to buy your flashcart (such as [NDS Card](http://www.nds-card.com/)) {: .notice--danger} ___ diff --git a/_pages/ro_RO/seedminer.txt b/_pages/ro_RO/seedminer.txt index 6babf2127a..ace15e9aff 100644 --- a/_pages/ro_RO/seedminer.txt +++ b/_pages/ro_RO/seedminer.txt @@ -14,7 +14,7 @@ If this key were completely random, the encryption key would be impossible to br Note that this tool requires a PC with a powerful graphics card to break your device's DSiWare encryption. If you do not have access to one of these, there also exists several online helper services where a volunteer running automated software will do this for you. -### Instrucțiuni +### Instructions #### Section I - Compatibility Tests @@ -63,9 +63,7 @@ There are two different methods for building on the Seedminer exploit (described 1. Open [Bruteforce Movable](https://bruteforcemovable.com/) on your computer + This site can automate the retrieval of `movable_part1.sed` (using a bot 3DS console) and the breaking of your device's DSiWare encryption (using a volunteer's computer to run Seedminer) - + If you already have access to a 3DS capable of launching the Homebrew Launcher, you can manually retrieve your `movable_part1.sed` using that device by following [these](https://jisagi.github.io/SeedminerGuide/seedminerSelf/#section1) instructions - + If you already have access to a PC with a powerful graphics card, you can manually calculate your `movable.sed` using it by following [these](https://jisagi.github.io/SeedminerGuide/seedminerSelf/#section2) instructions - + If the automated service is nonfunctional and you cannot do one or both of those manually, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you + + If the automated service is nonfunctional, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you 1. Enter your device's Friend Code (with no spaces or dashes) into the "Your friend code" field 1. Paste your device's 32 character long folder name into the "Your ID0" field 1. Finalizați captcha-ul "I'm not a robot" @@ -74,11 +72,11 @@ There are two different methods for building on the Seedminer exploit (described 1. When prompted, use the "Register Friend" button on your device to add the friend code of the bot 3DS console 1. Wait for the site to update + If it does not, wait a few minutes before refreshing the page once -1. Select "Continue" -1. Așteptați până când procesul este terminat - + This can take a while (up to an hour in some cases) - + During this process, the bot may not show up on your 3ds. As long as the website updates, this is not an issue. - + If you are still waiting after an hour, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you +1. Once the site processes your information, you will be given the option to "Continue" or "Do another device". Click the green "Continue" button +1. Wait for the remainder of the process to complete + + This is usually fast (1-5 minutes) but in some cases, can take up to half an hour. + + During this process, the bot you added may not show up on your 3ds. As long as the website updates, this is not an issue. + + If you are still waiting after half an hour, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you 1. When the process has completed, download your `movable.sed` file from the site + Keep this file as you will need it in the upcoming pages @@ -102,7 +100,7 @@ ___ #### Seedminer + Steelhax + Frogtool -This method of using Seedminer for further exploitation uses your `movable.sed` file to gain access to the Homebrew Launcher using the Steelhax exploit for the purposes of injecting an exploitable DSiWare title into the DS Download Play application. This method requires you to already own (or download) the free "Steel Divers: Sub Wars" game from the eShop. +This method of using Seedminer for further exploitation uses your `movable.sed` file to gain access to the Homebrew Launcher using the Steelhax exploit for the purposes of injecting an exploitable DSiWare title into the DS Download Play application. This method requires you to already own (or download) the free "Steel Diver: Sub Wars" game from the eShop. This method is only compatible with the EUR, JPN, and USA regions, and is somewhat more complicated than the above method. It is only recommended to use this method if you have a EUR region device and do not wish to pay for a DSiWare game, or if the above method does not work for you for some reason. diff --git a/_pages/ro_RO/uninstall-cfw.txt b/_pages/ro_RO/uninstall-cfw.txt index 6cc264d056..a39cf161a1 100644 --- a/_pages/ro_RO/uninstall-cfw.txt +++ b/_pages/ro_RO/uninstall-cfw.txt @@ -11,7 +11,7 @@ Acest procedeu va elimina complet CFW-ul de pe dispozitiv, inclusiv Boot9Strap Asta aproape niciodată nu este soluția pentru a repara orice eroare ați putea găsi cu instalarea voastră de CFW. O idee mai bună ar fi să citiţi pagina de [depanare](troubleshooting) sau să cereți ajutor (în engleză) la [Nintendo Homebrew pe Discord] (https://discord.gg/MWxPgEp). {: .notice--danger} -Orice joc nesemnat (nelegitim) va deveni inutilizabil și poate fi eliminaat manual folosind secțiunea Data Management de pe System Settings. Folosiți un [manager de date de salvare](https://github.com/FlagBrew/Checkpoint/releases/latest) pentru a face copii de rezervă la orice joc nesemnat (nelegitim) de care vă pasă. +Any unsigned (illegitimate) games will be rendered unusable and should be manually removed before starting this process by using the Data Management section of the System Settings. Folosiți un [manager de date de salvare](https://github.com/FlagBrew/Checkpoint/releases/latest) pentru a face copii de rezervă la orice joc nesemnat (nelegitim) de care vă pasă. Acest lucru nu va afecta NNID-ul, orice joc cumpărat în mod legitim, sau orice date de salvare pentru acele jocuri cumpărate legitim. @@ -26,21 +26,43 @@ Dacă ați modificat software critic sistemului (precum editarea meniului HOME, ### Instrucțiuni -#### Secțiunea I - Preparații +#### Section I - Safety Test 1. Închideți dispozitivul 1. Introduceți cardul SD în calculator 1. Copiați `GodMode9.firm` de pe fișierul `.zip` GodMode9 către folderul `/luma/payloads/` de pe cardul SD 1. Copiați folderul `gm9` din fișierul `.zip` GodMode9 în rădăcina cardului SD 1. Reintroduceți cardul SD în dispozitivul dumneavoastră -1. Porniți dispozitivul - -#### Secţiunea II - Rulând script-ul de dezinstalare - 1. Lansați GodMode9 ținând apăsat (Start) în timpul pornirii 1. Când vi se cere să faceți o copie de rezervă a fișierelor esențiale, apăsați (A) pentru a o realiza, apoi apăsați (A) ca să continuați după ce s-a terminat 1. Dacă vi se cere să reparați dara și ora RTC, apăsați (A) pentru a efectua, apoi setați data și ora, apoi apăsați (A) pentru a continua + Țineți cont că, dacă trebuiați să reparați data și ora, va trebui să reparați ora în System Settings de asemenea după completarea acestui ghid +1. Navigate to `[1:] SYSNAND CTRNAND > title > 00040138 > (X)0000002 > content` + + On a "New" edition console, the (X) will instead be 2 + + On an "Old" edition console, the (X) will instead be 0 +1. Select the `.app` file +1. Select `NCCH Image Options` +1. Select `Mount image to drive` +1. In the window that appears, open the `exefs` folder +1. In this folder, select the `.firm` file +1. Select "Firm Options" +1. Select "Boot Firm" +1. When prompted, choose to decrypt and make a copy +1. You should boot into the regular 3DS Home Menu. If you do, power your device off and continue to the next section + + If you do NOT boot into the regular 3DS Home Menu, continuing with these instructions **WILL** brick your device. You should join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you + +#### Section II - Prep Work + +1. Porniți dispozitivul +1. Navigate to System Settings > Data Management > Nintendo 3DS > Software +1. In this list of software, delete any non-Nintendo content you installed while using CFW + + This includes common system software such as FBI, Anemone3DS, Luma Updater, Homebrew Launcher, Checkpoint, and others, along with any non-eShop games + + Failure to remove CFW software before uninstalling CFW may break access to the Data Management menu after uninstalling CFW +1. Închideți dispozitivul + +#### Section III - Running Uninstall Script + +1. Lansați GodMode9 ținând apăsat (Start) în timpul pornirii 1. Apăsați (Home) pentru a arăta meniul de acțiuni 1. Selectați "Scripts..." 1. Selectaţi "GM9Megascript" diff --git a/_pages/ru_RU/finalizing-setup.txt b/_pages/ru_RU/finalizing-setup.txt index bd739c3446..e966727aa2 100644 --- a/_pages/ru_RU/finalizing-setup.txt +++ b/_pages/ru_RU/finalizing-setup.txt @@ -18,6 +18,8 @@ title: "Завершение установки" + **Luma3DS Updater** *(Удобное обновление CFW)* + **GodMode9** *(многофункциональная утилита для работы с NAND и картриджами)* + **Homebrew Launcher Loader** *(запуск Homebrew Launcher)* ++ **DSP1** *(позволяет хоумбрю приложениям воспроизводить звук)* ++ **ctr-no-timeoffset** *(убирает смещение rtc, чтобы время в меню HOME совпадало со временем rtc)* ### Что понадобится @@ -143,7 +145,7 @@ title: "Завершение установки" 1. Нажмите (B) для возврата в главное меню 1. Удерживая (R) нажмите (B) для того, чтобы извлечь SD-карту 1. Вставьте SD-карту в компьютер -1. Скопируйте `__sysnand_###.bin`, `essential.exefs` и `boot9.bin` из папки `/gm9/out/` на SD-карте в безопасное место на вашем компьютере +1. Скопируйте `__sysnand_###.bin`, `__sysnand_###.bin.sha`, `essential.exefs` и `boot9.bin` из папки `/gm9/out/` на SD-карте в безопасное место на вашем компьютере + Сделайте несколько резервных копий в нескольких местах (например в облачном хранилище) + Эти бэкапы позволят восстановить консоль и/или извлечь файлы из образа NAND, если что-то пойдёт не так 1. После копирования удалите `__sysnand_###.bin` и `__sysnand_###.bin.sha` из папки `/gm9/out/` на SD-карте diff --git a/_pages/ru_RU/homebrew-launcher-(steelhax).txt b/_pages/ru_RU/homebrew-launcher-(steelhax).txt index 9358eeb21d..0a8eae1bee 100644 --- a/_pages/ru_RU/homebrew-launcher-(steelhax).txt +++ b/_pages/ru_RU/homebrew-launcher-(steelhax).txt @@ -8,7 +8,7 @@ title: "Homebrew Launcher (Steelhax)" Этот метод дальнейшей эксплуатации Seedminer использует ваш файл `movable.sed` для получения доступа к Homebrew Launcher при помощи эксплойта Steelhax в целях инъекции уязвимого тайтла DSiWare в приложение DS Download Play. Этот метод требует, чтобы у вас уже была в наличии (или загружена) бесплатная игра "Steel Divers: Sub Wars" из eShop. -Если ваша консоль уже имеет доступ к Homebrew Launcher (при помощи Steelhax или другого эксплойта), вы можете перейти к странице [Установка Boot9strap (Frogminer)](installing-boot9strap-(frogminer)). +Если ваша консоль уже имеет доступ к Homebrew Launcher (при помощи Steelhax или другого эксплойта), вы можете перейти к странице [Установка Boot9strap (Frogtool)](installing-boot9strap-(frogtool)). {: .notice--success} Если у вас уже есть Steel Diver: Sub Wars, то этот процесс перезапишет сохранение вашей игры! @@ -17,6 +17,7 @@ title: "Homebrew Launcher (Steelhax)" ### Что понадобится * Бесплатная игра "Steel Diver: Sub Wars" из eShop +* Ваш файл `movable.sed`, полученный на странице [Seedminer](seedminer) * Свежая версия [Homebrew Launcher](https://github.com/fincs/new-hbmenu/releases/latest) * Свежая версия [Steelhax](https://github.com/VegaRoXas/vegaroxas.github.io/raw/master/files/steelhax-installer.rar) * [Otherapp payload](https://smealum.github.io/3ds/#otherapp) *(для вашего региона и версии прошивки)* @@ -39,7 +40,7 @@ title: "Homebrew Launcher (Steelhax)" 1. Выйдите из "Steel Diver: Sub Wars" 1. Выключите консоль 1. Вставьте SD-карту в компьютер -1. Перейдите по ссылке [Steelminer Injector](http://steelminer.jisagi.net/injector) на компьютере +1. Перейдите по ссылке [Steelminer Injector](https://bruteforcemovable.com/steelhax/) на компьютере 1. Выберите свой файл `movable.sed` 1. Выберите "Start!" 1. Дождитесь окончания процесса diff --git a/_pages/ru_RU/installing-boot9strap-(fredtool).txt b/_pages/ru_RU/installing-boot9strap-(fredtool).txt index 4adc4bad3d..7a0dd0aa74 100644 --- a/_pages/ru_RU/installing-boot9strap-(fredtool).txt +++ b/_pages/ru_RU/installing-boot9strap-(fredtool).txt @@ -10,8 +10,6 @@ title: "Установка Boot9strap (Fredtool)" Это рабочая реализация эксплойта "FIRM partitions known-plaintext". Подробнее о нем [здесь](https://www.3dbrew.org/wiki/3DS_System_Flaws) (англ.). -Для использования [magnet](https://wikipedia.org/wiki/Magnet_URI_scheme)-ссылок в этом руководстве необходим torrent-клиент, например [Deluge](http://dev.deluge-torrent.org/wiki/Download). - Чтобы распаковать архивы `.7z` и `.rar`, присутствующие на этой странице, вам понадобится архиватор [7-Zip](http://www.7-zip.org/) или [The Unarchiver](https://theunarchiver.com/). ### Что понадобится @@ -29,7 +27,7 @@ title: "Установка Boot9strap (Fredtool)" 1. Откройте Системные настройки на вашей консоли 1. Перейдите в `Управление данными` -> `DSiWare` -1. Under the "System Memory" section, select your DSiWare game +1. На вкладке "Память системы" выберите вашу DSiWare игру 1. Выберите "Копировать", затем "OK" + Если появится запрос, согласитесь на перезапись 1. Выключите консоль @@ -39,10 +37,10 @@ title: "Установка Boot9strap (Fredtool)" 1. Скопируйте `boot.nds` (B9STool) в корень SD-карты 1. Скопируйте `boot.3dsx` в корень SD-карты 1. Скопируйте папку `private` из `.zip-архива` Frogminer_save в корень SD-карты -1. Navigate to `Nintendo 3DS` -> `` -> `<32-character-id>` -> `Nintendo DSiWare` on your SD card +1. Перейдите в папку `Nintendo 3DS` -> `` -> `<32-значный-id>` -> `Nintendo DSiWare` на SD-карте + Этот `` будет таким же, как и на странице [Seedminer](seedminer) 1. Скопируйте файл `<8-значный-id>.bin` в папку на вашем компьютере - + If there are multiple `<8-character-id>.bin` files, just pick one. It doesn't matter which you use. + + Если у вас несколько файлов `<8-значный-id>.bin`, просто выберите любой. Не имеет значения какой из них вы используете. #### Часть II - Fredtool @@ -53,9 +51,9 @@ title: "Установка Boot9strap (Fredtool)" 1. Нажмите "Start" 1. Дождитесь окончания процесса 1. После окончания процесса скачайте с сайта свой модифицированный архив DSiWare -1. Copy the `42383841.bin` file from the `output/hax/` folder of the downloaded DSiWare archive to the `Nintendo 3DS//<32-character-id>/Nintendo DSiWare/` folder on your SD card - + This should be different than your initial `<8-character-id>.bin` file - + Do not remove any existing `<8-character-id>.bin` files +1. Скопируйте файл `42383841.bin` из папки `output/hax/` внутри скачанного архива DSiWare в папку `Nintendo 3DS//<32-значный-id>/Nintendo DSiWare/` на SD-карте + + Этот файл должен отличаться от исходного `<8-значный-id>.bin` + + Не удаляйте существующие файлы `<8-значный-id>.bin` 1. Вставьте SD-карту обратно в консоль 1. Включите консоль 1. Откройте Системные настройки на вашей консоли @@ -97,17 +95,17 @@ title: "Установка Boot9strap (Fredtool)" 1. Нажмите (Start), чтобы сохранить настройки и перезагрузиться + Если экран остаётся чёрным, обратитесь к разделу [Проблемы и их решения](troubleshooting#черный-экран-при-загрузке-sysnand-после-установки-boot9strap) -#### Section V - Restoring DS Connection Settings +#### Часть V - Восстановление DS Connection Settings 1. Выключите консоль 1. Вставьте SD-карту в компьютер -1. Copy the `42383841.bin` file from the `output/clean/` folder of the downloaded DSiWare archive to the `Nintendo 3DS//<32-character-id>/Nintendo DSiWare/` folder on your SD card - + Replace the existing `42383841.bin` file +1. Скопируйте файл `42383841.bin` из папки `output/clean/` внутри скачанного архива DSiWare в папку `Nintendo 3DS//<32-значный-id>/Nintendo DSiWare/` на SD-карте + + Замените существующий файл `42383841.bin` 1. Вставьте SD-карту обратно в консоль 1. Включите консоль 1. Откройте Системные настройки на вашей консоли 1. Перейдите в `Управление данными` -> `DSiWare` -1. Under the "SD Card" section, select the "Nintendo DSi™" title +1. На вкладке "Карта SD" выберите тайтл "Nintendo DSi™" 1. Выберите "Копировать", затем "OK" ___ diff --git a/_pages/ru_RU/ntrboot.txt b/_pages/ru_RU/ntrboot.txt index 1845c5c589..b147dd985f 100644 --- a/_pages/ru_RU/ntrboot.txt +++ b/_pages/ru_RU/ntrboot.txt @@ -17,14 +17,14 @@ title: "ntrboot" | Флешкартридж | Текущая стоимость | "Time Bomb"? | Версия 3DS? | Версия DSi? | Примечания | |-|-:|:-:|:-:|:-:|-| -| [**R4i-SDHC B9S**](http://www.nds-card.net/ProShow.asp?ProID=574) | $15.99 | 3 сентября, 2019 | <= 11.9.0 | <= 1.4.5 | **Поставляется с предустановленным ntrboot**; может быть прошит обратно в режим NDS флешкартриджа. | -| [**R4i Gold 3DS Plus**](http://www.nds-card.net/ProShow.asp?ProID=575) | $19.99 | Нет | <= 11.9.0 | <= 1.4.5 | **Поставляется с предустановленным ntrboot** ([внутренний переключатель для переключения между режимами ntrboot и NDS]({{ "/images/screenshots/r4i-gold-3ds-plus.png" | absolute_url }})); не прошивайте ntrboot вручную. | -| [**Acekard 2i**](http://www.nds-card.net/ProShow.asp?ProID=160) | $20.99 | Нет | <= 4.3.0 | <= 1.4.4 | | -| [**DSTT**](http://www.nds-card.net/ProShow.asp?ProID=157) | $9.99 | Нет | Ни одна | Ни одна | Только определенные [ревизии](https://gist.github.com/yuukieve/6b48f1bb8dd15136403c15c39fafdb42) совместимы с ntrboot. | -| [**R4i Gold 3DS**](http://www.nds-card.net/ProShow.asp?ProID=149) | $19.99 | Нет | <= 11.9.0 | <= 1.4.5 | Все RTS ревизии совместимы. | -| [**R4i-SDHC 3DS RTS**](http://www.nds-card.net/ProShow.asp?ProID=146) | $13.99 | 1.87: 3 сентября, 2019 | <= 11.9.0 | <= 1.4.5 | | -| [**R4iSDHC GOLD Pro 20XX**](http://www.nds-card.net/ProShow.asp?ProID=490) | $9.99 | 3.9b: 3 сентября, 2019 | <= 11.9.0 | <= 1.4.5 | Все R4iSDHC 20XX одинаковы. Модели 2013 несовместимы. | -| [**R4iSDHC RTS LITE 20XX**](http://www.nds-card.net/ProShow.asp?ProID=450) | $13.99 | 3.9b: 3 сентября, 2019 | <= 11.9.0 | <= 1.4.5 | Все R4iSDHC 20XX одинаковы. Модели 2013 несовместимы. | +| [**R4i-SDHC B9S**](http://www.nds-card.com/ProShow.asp?ProID=574) | $15.99 | 3 сентября, 2019 | <= 11.9.0 | <= 1.4.5 | **Поставляется с предустановленным ntrboot**; может быть прошит обратно в режим NDS флешкартриджа. | +| [**R4i Gold 3DS Plus**](http://www.nds-card.com/ProShow.asp?ProID=575) | $19.99 | Нет | <= 11.9.0 | <= 1.4.5 | **Поставляется с предустановленным ntrboot** ([внутренний переключатель для переключения между режимами ntrboot и NDS]({{ "/images/screenshots/r4i-gold-3ds-plus.png" | absolute_url }})); не прошивайте ntrboot вручную. | +| [**Acekard 2i**](http://www.nds-card.com/ProShow.asp?ProID=160) | $20.99 | Нет | <= 4.3.0 | <= 1.4.4 | | +| [**DSTT**](http://www.nds-card.com/ProShow.asp?ProID=157) | $9.99 | Нет | Ни одна | Ни одна | Только определенные [ревизии](https://gist.github.com/yuukieve/6b48f1bb8dd15136403c15c39fafdb42) совместимы с ntrboot. | +| [**R4i Gold 3DS**](http://www.nds-card.com/ProShow.asp?ProID=149) | $19.99 | Нет | <= 11.9.0 | <= 1.4.5 | Все RTS ревизии совместимы. | +| [**R4i-SDHC 3DS RTS**](http://www.nds-card.com/ProShow.asp?ProID=146) | $13.99 | 1.87: 3 сентября, 2019 | <= 11.9.0 | <= 1.4.5 | | +| [**R4iSDHC GOLD Pro 20XX**](http://www.nds-card.com/ProShow.asp?ProID=490) | $9.99 | 3.9b: 3 сентября, 2019 | <= 11.9.0 | <= 1.4.5 | Все R4iSDHC 20XX одинаковы. Модели 2013 несовместимы. | +| [**R4iSDHC RTS LITE 20XX**](http://www.nds-card.com/ProShow.asp?ProID=450) | $13.99 | 3.9b: 3 сентября, 2019 | <= 11.9.0 | <= 1.4.5 | Все R4iSDHC 20XX одинаковы. Модели 2013 несовместимы. | | **Ace3DS X** | | Нет | <= 11.9.0 | <= 1.4.5 | **Поставляется с предустановленным ntrboot** (внешний переключатель для переключения между режимами ntrboot ("3DS") и NDS); не прошивайте ntrboot вручную. | | **Ace3DS Plus** | | Нет | <= 11.9.0 | <= 1.4.5 | | | **Gateway Blue** | | Нет | 4.1.0 - 4.5.0 | <= 1.4.5 | | @@ -49,7 +49,7 @@ title: "ntrboot" Обратите внимание, что флешкартридж не сможет использоваться для своих стандартных функций, пока на нем установлен эксплойт ntrboot (кроме Acekard 2i, который сохраняет функционал, *но только на NDS или на прошитых консолях 3DS*). Это означает, что большинство флешкартриджей не будет даже отображаться в меню HOME. В конце инструкций по прошивке ntrboot есть дополнительные шаги, чтобы по окончанию удалить его с флешкартриджа. -Обратите внимание, что в некоторых редких случаях процесс прошивки может **брикнуть** поддельный флешкартридж и навсегда сделать его нерабочим. Это маловероятно, но тем не менее поддерживаются только оригинальные флешкартриджи из списка. Чтобы уменьшить вероятность получения поддельного картриджа, рекомендуется использовать проверенный сайт для покупки флешкартриджа (например [NDS Card](http://www.nds-card.net/)) +Обратите внимание, что в некоторых редких случаях процесс прошивки может **брикнуть** поддельный флешкартридж и навсегда сделать его нерабочим. Это маловероятно, но тем не менее поддерживаются только оригинальные флешкартриджи из списка. Чтобы уменьшить вероятность получения поддельного картриджа, рекомендуется использовать проверенный сайт для покупки флешкартриджа (например [NDS Card](http://www.nds-card.com/)) {: .notice--danger} ___ diff --git a/_pages/ru_RU/seedminer.txt b/_pages/ru_RU/seedminer.txt index 35482edbef..b869c3afcb 100644 --- a/_pages/ru_RU/seedminer.txt +++ b/_pages/ru_RU/seedminer.txt @@ -6,81 +6,79 @@ title: "Seedminer" ### Обязательно к прочтению -To install boot9strap on your device, we exploit an oversight in the security restrictions applied to "DSiWare" applications. +Чтобы установить boot9strap на консоль, мы используем уязвимость в ограничениях безопасности для приложений "DSiWare". -To accomplish this, we use a tool called Seedminer to calculate the DSiWare encryption key (`movable.sed`) for your device. We then use this DSiWare encryption key to decrypt a compatible DSiWare application and inject an exploit into it to run our own code (the exact exploit used will depend on your device's region). +Для достижения этой цели, мы используем инструмент под названием Seedminer, чтобы вычислить ключ шифрования DSiWare (`movable.sed`) вашей консоли. Затем мы используем этот ключ шифрования DSiWare, чтобы расшифровать совместимое DSiWare приложение и внедрить в него эксплойт для запуска нашего собственного кода (используемый эксплойт зависит от региона консоли). -If this key were completely random, the encryption key would be impossible to break on current computing hardware. Fortunately, the first half of the key (`movable_part1.sed`) is actually mathematically related to your device's Friend Code, allowing us to break the encryption. For information on how Seedminer works, please see [this presentation](https://zoogie.github.io/web/34⅕c3). +Если бы этот ключ был полностью случайным, то его было бы невозможно взломать при помощи современных компьютеров. К счастью, первая половина ключа (`movable_part1.sed`) на самом деле математически связана с Кодом друга консоли, что позволяет нам взломать шифрование. Для получения информации о том, как работает Seedminer, пожалуйста, посмотрите [эту презентацию](https://zoogie.github.io/web/34⅕c3). -Note that this tool requires a PC with a powerful graphics card to break your device's DSiWare encryption. If you do not have access to one of these, there also exists several online helper services where a volunteer running automated software will do this for you. +Обратите внимание, что этот инструмент требует наличия ПК с мощной видеокартой для взлома шифрования DSiWare вашей консоли. Если у вас нет доступа к такому компьютеру, существует несколько онлайн сервисов взаимопомощи, где волонтеры и автоматическое ПО могут сделать это за вас. ### Инструкция -#### Section I - Compatibility Tests +#### Часть I - Проверка совместимости -While these tests are not strictly necessary to perform the Seedminer exploit, the follow-up exploits to this do require this test to be performed and it would be a waste of time and effort to perform Seedminer without the ability to use the other exploits. +Несмотря на то, что эти проверки не являются строго необходимыми для эксплойта Seedminer, последующие эксплойты требуют выполнения этих проверок, и было бы пустой тратой времени и сил применять эксплойт Seedminer, не имея возможности использовать другие эксплойты. -There are two different methods for building on the Seedminer exploit (described in more detail at the bottom of this page), so even if one of these test fails you can still use another method as long as the other does not fail. +Есть два различных метода дальнейшей эксплуатации Seedminer (подробности внизу этой страницы), так что даже если один из этих тестов завершится неудачей, вы сможете использовать другой метод при условии, что другой тест будет пройден успешно. -#### DS Internet Settings Test (used for Fredtool) +#### Тест DS Internet Settings (используется для Fredtool) -1. Go to System Settings, then "Internet Settings", then "Nintendo DS Connections" -1. Press "OK" -1. If your device loads into a "Nintendo Wi-Fi Connection Setup" menu, the test was successful - + If the screen stays black or appears to freeze, the test has failed and you will not be able to use the Fredtool method which requires a functioning DS Internet Settings -1. Exit this menu +1. Откройте Системные настройки, затем "Интернет-настройки", затем "Подключения Nintendo DS" +1. Нажмите "OK" +1. Если консоль загружает меню "Nintendo Wi-Fi Connection Setup", значит тест пройден успешно + + Если экран остается черным, или консоль зависает, значит тест не удался, и вы не сможете использовать метод Fredtool, для которого требуется работоспособное приложение DS Internet Settings +1. Выйдите из меню -#### DS Download Play Test (used for Frogtool) +#### Тест DS Download Play (используется для Frogtool) 1. Запустите приложение Загружаемая игра (![]({{ "/images/download-play-icon.png" | absolute_url }}){: height="24px" width="24px"}) -1. Select "Nintendo DS" -1. If your device loads into a "Download software via DS Download Play" menu, the test was successful - + If the screen stays black or appears to freeze, the test has failed and you will not be able to use the Frogtool method which requires a functioning DS Download Play -1. Exit this menu +1. Выберите "Nintendo DS" +1. Если консоль загружает меню "Download software via DS Download Play", значит тест пройден успешно + + Если экран остается черным, или консоль зависает, значит тест не удался, и вы не сможете использовать метод Frogtool, для которого требуется работоспособное приложение DS Download Play +1. Выйдите из меню -#### Section II - Prep Work +#### Часть II - Подготовка 1. Вставьте SD-карту в компьютер -1. Navigate to the `Nintendo 3DS` folder on your SD card -1. Copy the 32 character long name of the folder you see - + If you see multiple folders like this, perform the following: - + Rename the `Nintendo 3DS` folder to `BACKUP_Nintendo 3DS` - + Reinsert your SD card into your device and power on your device - + Wait for the device to generate the SD card data - + Power off your device and reinsert your SD card into your computer - + Navigate to the `Nintendo 3DS` folder on your SD card - + Copy the 32 character long name of the folder you see - + Delete the `Nintendo 3DS` folder - + Rename the `BACKUP_Nintendo 3DS` folder to `Nintendo 3DS` -1. Paste your 32 character long folder name into a document you can reference later - + This folder name is also known as your "ID0" +1. Перейдите в папку `Nintendo 3DS` на SD-карте +1. Скопируйте имя папки из 32 символов, которую вы видите + + Если вы видите несколько таких папок, выполните следующие действия: + + Переименуйте папку `Nintendo 3DS` в `BACKUP_Nintendo 3DS` + + Вставьте SD-карту обратно в консоль и включите консоль + + Подождите пока консоль не создаст данные на SD-карте + + Выключите консоль и вставьте SD-карту обратно в компьютер + + Перейдите в папку `Nintendo 3DS` на SD-карте + + Скопируйте имя папки из 32 символов, которую вы видите + + Удалите папку `Nintendo 3DS` + + Переименуйте папку `BACKUP_Nintendo 3DS` в `Nintendo 3DS` +1. Вставьте имя папки из 32 символов в документ, к которому вы сможете обратиться позже + + Имя этой папки также известно как ваш "ID0" 1. Включите консоль 1. Откройте Список друзей ([оранжевый значок в виде лица]({{ "/images/friend-list-icon.png" | absolute_url }}) на верхней строчке меню HOME) - + If you receive an error and are kicked out of the menu, you either must create a new Mii or your console cannot connect to Nintendo's servers (due to a ban or connection issues) -1. Find your Mii profile, then find the "Friend Code" field on the top screen + + Если появляется ошибка и вас не пускают в меню, значит вам нужно либо создать новый Mii, либо консоль не может подключиться к серверам Nintendo (по причине бана или проблем с соединением) +1. Найдите свой профиль Mii, затем найдите поле "Код друга" на верхнем экране -#### Section III - Seedminer +#### Часть III - Seedminer -1. Open [Bruteforce Movable](https://bruteforcemovable.com/) on your computer - + This site can automate the retrieval of `movable_part1.sed` (using a bot 3DS console) and the breaking of your device's DSiWare encryption (using a volunteer's computer to run Seedminer) - + If you already have access to a 3DS capable of launching the Homebrew Launcher, you can manually retrieve your `movable_part1.sed` using that device by following [these](https://jisagi.github.io/SeedminerGuide/seedminerSelf/#section1) instructions - + If you already have access to a PC with a powerful graphics card, you can manually calculate your `movable.sed` using it by following [these](https://jisagi.github.io/SeedminerGuide/seedminerSelf/#section2) instructions - + If the automated service is nonfunctional and you cannot do one or both of those manually, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you -1. Enter your device's Friend Code (with no spaces or dashes) into the "Your friend code" field -1. Paste your device's 32 character long folder name into the "Your ID0" field +1. Перейдите по ссылке [Bruteforce Movable](https://bruteforcemovable.com/) на компьютере + + Этот сайт может автоматизировать процесс получения `movable_part1.sed` (при помощи консоли-бота 3DS) и процесс взлома шифрования DSiWare вашей консоли (используя компьютер волонтера для запуска Seedminer) + + Если автоматизированный сервис не функционирует, обратитесь на сервер [Nintendo Homebrew в Discord](https://discord.gg/MWxPgEp) и попросите (на английском языке) кого-нибудь вам помочь +1. Введите Код друга вашей консоли (без пробелов или тире) в поле "Your friend code" +1. Вставьте имя папки из 32 символов в поле "Your ID0" 1. Заполните captcha "Я не робот" -1. Select "Go" - + If the site immediately goes to step 4, download your `movable.sed` file and continue with the next section. -1. When prompted, use the "Register Friend" button on your device to add the friend code of the bot 3DS console -1. Wait for the site to update - + If it does not, wait a few minutes before refreshing the page once -1. Select "Continue" -1. Дождитесь окончания процесса - + This can take a while (up to an hour in some cases) - + During this process, the bot may not show up on your 3ds. As long as the website updates, this is not an issue. - + If you are still waiting after an hour, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you -1. When the process has completed, download your `movable.sed` file from the site - + Keep this file as you will need it in the upcoming pages +1. Выберите "Go" + + Если сайт сразу переходит к шагу номер 4, скачайте свой файл `movable.sed` и переходите к следующей части. +1. При появлении запроса, используйте кнопку "Регистрация друга" на консоли, чтобы добавить код друга консоли-бота 3DS +1. Дождитесь обновления страницы + + Если этого не происходит, подождите несколько минут и обновите страницу один раз самостоятельно +1. Как только сайт обработает вашу информацию, вам будет предоставлен выбор "Continue" или "Do another device". Нажмите на зеленую кнопку "Continue" +1. Дождитесь окончания оставшейся части процесса + + Это обычно занимает 1-5 минут, но в некоторых случаях может занять до получаса. + + Во время этого процесса бот, которого вы добавили, может не отображаться на вашей 3DS. Если страница продолжает обновляться, то это не проблема. + + Если вы все еще в ожидании по прошествии получаса, обратитесь на сервер [Nintendo Homebrew в Discord](https://discord.gg/MWxPgEp) и попросите (на английском языке) кого-нибудь вам помочь +1. После окончания процесса скачайте с сайта свой файл `movable.sed` + + Сохраните этот файл, так как он понадобится вам на следующих страницах ___ ### Методы @@ -91,23 +89,23 @@ ___ Этот метод дальнейшей эксплуатации Seedminer использует ваш файл `movable.sed` для расшифровки любого тайтла DSiWare из eShop в целях инъекции уязвимого тайтла DSiWare в приложение DS Download Play. Этот метод требует, чтобы у вас уже была в наличии (или загружена / куплена) DSiWare игра из eShop. -This method is compatible with all regions, though only the JPN and USA regions have free DSiWare titles in the eShop. +Этот метод совместим со всеми регионами, но только регионы JPN и USA имеют бесплатные тайтлы DSiWare в eShop. -This method requires that the DS Internet Settings be functioning properly (see the test at the top of this page). +Этот метод требует работоспособности приложения DS Internet Settings (см. тест в верхней части этой страницы). -Continue to [Installing boot9strap (Fredtool)](installing-boot9strap-(fredtool)) +Следующий шаг: [Установка boot9strap (Fredtool)](installing-boot9strap-(fredtool)) {: .notice--primary} ___ #### Seedminer + Steelhax + Frogtool -Этот метод дальнейшей эксплуатации Seedminer использует ваш файл `movable.sed` для получения доступа к Homebrew Launcher при помощи эксплойта Steelhax в целях инъекции уязвимого тайтла DSiWare в приложение DS Download Play. Этот метод требует, чтобы у вас уже была в наличии (или загружена) бесплатная игра "Steel Divers: Sub Wars" из eShop. +Этот метод дальнейшей эксплуатации Seedminer использует ваш файл `movable.sed` для получения доступа к Homebrew Launcher при помощи эксплойта Steelhax в целях инъекции уязвимого тайтла DSiWare в приложение DS Download Play. Этот метод требует, чтобы у вас уже была в наличии (или загружена) бесплатная игра "Steel Diver: Sub Wars" из eShop. -This method is only compatible with the EUR, JPN, and USA regions, and is somewhat more complicated than the above method. It is only recommended to use this method if you have a EUR region device and do not wish to pay for a DSiWare game, or if the above method does not work for you for some reason. +Этот метод совместим только с регионами EUR, JPN и USA, а также несколько сложнее, чем метод выше. Рекомендуется использовать этот метод только в том случае, если у вас консоль региона EUR, и вы не хотите платить за игру DSiWare, или если метод выше не работает для вас по какой-либо причине. -This method requires that the DS Download Play be functioning properly (see the test at the top of this page). +Этот метод требует работоспособности приложения DS Download Play (см. тест в верхней части этой страницы). -Continue to [Homebrew Launcher (Steelhax)](homebrew-launcher-(steelhax)) +Следующий шаг: [Homebrew Launcher (Steelhax)](homebrew-launcher-(steelhax)) {: .notice--primary} diff --git a/_pages/ru_RU/uninstall-cfw.txt b/_pages/ru_RU/uninstall-cfw.txt index a04c549a30..a8550bad1d 100644 --- a/_pages/ru_RU/uninstall-cfw.txt +++ b/_pages/ru_RU/uninstall-cfw.txt @@ -11,7 +11,7 @@ title: "Удаление кастомной прошивки" Эта инструкция практически никогда не является решением любых проблем с кастомной прошивкой. Вместо этого прочтите информацию на странице [Проблемы и их решения](troubleshooting) или обратитесь (на английском языке) за помощью на сервер [Nintendo Homebrew в Discord](https://discord.gg/MWxPgEp). {: .notice--danger} -Любые неподписанные (нелегальные) игры перестанут работать и могут быть удалены вручную с помощью раздела Управление данными (Data Management) в Системных настройках (System Settings). Используйте [менеджер сохранений](https://github.com/FlagBrew/Checkpoint/releases/latest) чтобы создать резервные копии любых важных для вас сохранений этих неподписанных (нелегальных) игр. +Любые неподписанные (нелегальные) игры перестанут работать и должны быть удалены вручную перед началом этого процесса с помощью раздела Управление данными (Data Management) в Системных настройках (System Settings). Используйте [менеджер сохранений](https://github.com/FlagBrew/Checkpoint/releases/latest) чтобы создать резервные копии любых важных для вас сохранений этих неподписанных (нелегальных) игр. Это не повлияет на ваш NNID, любые законно приобретенные игры или сохранения этих законно приобретенных игр. @@ -26,21 +26,43 @@ title: "Удаление кастомной прошивки" ### Инструкция -#### Часть I - Подготовительные работы +#### Часть I - Тест безопасности 1. Выключите консоль 1. Вставьте SD-карту в компьютер 1. Скопируйте `GodMode9.firm` из `.zip-архива` GodMode9 в папку `/luma/payloads/` на SD-карте 1. Скопируйте папку `gm9` из `.zip-архива` GodMode9 в корень SD-карты 1. Вставьте SD-карту обратно в консоль -1. Включите консоль - -#### Часть II - Запуск скрипта для удаления кастомной прошивки - 1. Запустите GodMode9, держа нажатой кнопку (Start) во время загрузки 1. Если вам предложат создать бэкап важных файлов, нажмите кнопку (A) чтобы сделать это, затем нажмите (A) чтобы продолжить после завершения 1. Если вам предложат выставить RTC дату и время, нажмите кнопку (A) чтобы сделать это, настройте дату и время, затем нажмите (A) чтобы продолжить + Обратите внимание, что если вы выставили RTC дату и время, вам также придется исправить время в Системных настройках после завершения руководства +1. Перейдите в `[1:] SYSNAND CTRNAND > title > 00040138 > (X)0000002 > content` + + На консолях версии "New" вместо (X) будет цифра 2 + + На консолях версии "Old" вместо (X) будет цифра 0 +1. Выберите файл `.app` +1. Выберите `NCCH Image Options` +1. Выберите `Mount image to drive` +1. В открывшемся окне перейдите в папку `exefs` +1. В этой папке выберите файл `.firm` +1. Выберите "Firm Options" +1. Выберите "Boot Firm" +1. При появлении запроса "Decrypt before boot?" согласитесь, затем выберите "Make a copy" +1. Ваша консоль должна загрузиться в обычное меню HOME. Если это так, выключите консоль и переходите к следующей части + + Если консоль НЕ загрузилась в обычное меню HOME, то выполнение дальнейших инструкций приведет к **БРИКУ**. Вам следует обратиться на сервер [Nintendo Homebrew в Discord](https://discord.gg/MWxPgEp) и попросите (на английском языке) кого-нибудь вам помочь + +#### Часть II - Подготовка + +1. Включите консоль +1. Перейдите в Системные настройки > Управление данными > Nintendo 3DS > Программы +1. В этом списке программ удалите всё, что не связано с Nintendo и было установлено во время использования кастомной прошивки + + Сюда относятся системные программы, такие как FBI, Anemone3DS, Luma Updater, Homebrew Launcher, Checkpoint и другие, а также любые игры не из eShop + + Если не удалить CFW программы перед удалением самой CFW, то это может сломать доступ к меню Управление данными после удаления кастомной прошивки +1. Выключите консоль + +#### Часть III - Запуск скрипта для удаления кастомной прошивки + +1. Запустите GodMode9, держа нажатой кнопку (Start) во время загрузки 1. Нажмите кнопку (Home) для вызова меню 1. Выберите "Scripts..." 1. Выберите "GM9Megascript" diff --git a/_pages/sr_SP/finalizing-setup.txt b/_pages/sr_SP/finalizing-setup.txt index 8ccda2a04f..f7c9c087d4 100644 --- a/_pages/sr_SP/finalizing-setup.txt +++ b/_pages/sr_SP/finalizing-setup.txt @@ -18,6 +18,8 @@ During this process, we also setup programs such as the following: + **Luma3DS Updater** *(updates your CFW installation easily)* + **GodMode9** *(multipurpose tool which can do NAND and cartridge functions)* + **Homebrew Launcher Loader** *(launches the Homebrew Launcher)* ++ **DSP1** *(allows homebrew applications to have sound)* ++ **ctr-no-timeoffset** *(removes the rtc offset so that the home menu and rtc timestamps match)* ### What You Need @@ -143,7 +145,7 @@ If, before following this guide, you already had an EmuNAND setup and would like 1. Press (B) to return to the main menu 1. Hold (R) and press (B) at the same time to eject your SD card 1. Insert your SD card into your computer -1. Copy `__sysnand_###.bin`, `essential.exefs`, and `boot9.bin` from the `/gm9/out/` folder on your SD card to a safe location on your computer +1. Copy `__sysnand_###.bin`, `__sysnand_###.bin.sha`, `essential.exefs`, and `boot9.bin` from the `/gm9/out/` folder on your SD card to a safe location on your computer + Make backups in multiple locations (such as online file storage) + These backups will save you from a brick and/or help you recover files from the NAND image if anything goes wrong in the future 1. Delete `__sysnand_###.bin` and `__sysnand_###.bin.sha` from the `/gm9/out/` folder on your SD card after copying it diff --git a/_pages/sr_SP/homebrew-launcher-(steelhax).txt b/_pages/sr_SP/homebrew-launcher-(steelhax).txt index 571fd1982d..568e53b124 100644 --- a/_pages/sr_SP/homebrew-launcher-(steelhax).txt +++ b/_pages/sr_SP/homebrew-launcher-(steelhax).txt @@ -8,7 +8,7 @@ title: "Homebrew Launcher (Steelhax)" This method of using Seedminer for further exploitation uses your `movable.sed` file to gain access to the Homebrew Launcher using the Steelhax exploit for the purposes of injecting an exploitable DSiWare title into the DS Download Play application. This method requires you to already own (or download) the free "Steel Divers: Sub Wars" game from the eShop. -If your device already has access to the Homebrew Launcher (whether through Steelhax or another exploit), you can skip to [Installing Boot9strap (Frogminer)](installing-boot9strap-(frogminer)). +If your device already has access to the Homebrew Launcher (whether through Steelhax or another exploit), you can skip to [Installing Boot9strap (Frogtool)](installing-boot9strap-(frogtool)). {: .notice--success} If you already have Steel Diver: Sub Wars, this process will overwrite your game's save file! @@ -17,6 +17,7 @@ If you already have Steel Diver: Sub Wars, this process will overwrite your game ### What You Need * The free eShop game "Steel Diver: Sub Wars" +* Your `movable.sed` file from completing [Seedminer](seedminer) * The latest release of [the Homebrew Launcher](https://github.com/fincs/new-hbmenu/releases/latest) * The latest release of [Steelhax](https://github.com/VegaRoXas/vegaroxas.github.io/raw/master/files/steelhax-installer.rar) * The [otherapp payload](https://smealum.github.io/3ds/#otherapp) *(for your region and version)* @@ -39,7 +40,7 @@ If you already have Steel Diver: Sub Wars, this process will overwrite your game 1. Exit "Steel Diver: Sub Wars" 1. Power off your device 1. Insert your SD card into your computer -1. Open [the Steelminer Injector website](http://steelminer.jisagi.net/injector) on your computer +1. Open [the Steelminer Injector website](https://bruteforcemovable.com/steelhax/) on your computer 1. Select your `movable.sed` file 1. Select "Start!" 1. Wait for the process to complete diff --git a/_pages/sr_SP/installing-boot9strap-(fredtool).txt b/_pages/sr_SP/installing-boot9strap-(fredtool).txt index ca3da37631..22a79f26c5 100644 --- a/_pages/sr_SP/installing-boot9strap-(fredtool).txt +++ b/_pages/sr_SP/installing-boot9strap-(fredtool).txt @@ -10,8 +10,6 @@ This method of using Seedminer for further exploitation uses your `movable.sed` This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). -To use the [magnet](https://wikipedia.org/wiki/Magnet_URI_scheme) links on this page, you will need a torrent client like [Deluge](http://dev.deluge-torrent.org/wiki/Download). - To extract the `.7z` and `.rar` files linked on this page, you will need a file archiver like [7-Zip](http://www.7-zip.org/) or [The Unarchiver](https://theunarchiver.com/). ### What You Need diff --git a/_pages/sr_SP/ntrboot.txt b/_pages/sr_SP/ntrboot.txt index a5c9bc16cd..35ffad7d57 100644 --- a/_pages/sr_SP/ntrboot.txt +++ b/_pages/sr_SP/ntrboot.txt @@ -17,14 +17,14 @@ Note that carts with a "Time Bomb" will no longer be able to launch `.nds` files | Flashcart Name | Current Price | "Time Bomb"? | 3DS Versions? | DSi Versions? | Other Notes | |-|-:|:-:|:-:|:-:|-| -| [**R4i-SDHC B9S**](http://www.nds-card.net/ProShow.asp?ProID=574) | $15.99 | September 3, 2019 | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot**; can be flashed back to an NDS flashcart. | -| [**R4i Gold 3DS Plus**](http://www.nds-card.net/ProShow.asp?ProID=575) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot** ([internal switch to switch between ntrboot and NDS modes]({{ "/images/screenshots/r4i-gold-3ds-plus.png" | absolute_url }})); do not manually flash with ntrboot. | -| [**Acekard 2i**](http://www.nds-card.net/ProShow.asp?ProID=160) | $20.99 | No | <= 4.3.0 | <= 1.4.4 | | -| [**DSTT**](http://www.nds-card.net/ProShow.asp?ProID=157) | $9.99 | No | None | None | Only models with [certain flash chips](https://gist.github.com/yuukieve/6b48f1bb8dd15136403c15c39fafdb42) are compatible with ntrboot. | -| [**R4i Gold 3DS**](http://www.nds-card.net/ProShow.asp?ProID=149) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | All RTS revisions are compatible. | -| [**R4i-SDHC 3DS RTS**](http://www.nds-card.net/ProShow.asp?ProID=146) | $13.99 | 1.87: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | | -| [**R4iSDHC GOLD Pro 20XX**](http://www.nds-card.net/ProShow.asp?ProID=490) | $9.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. 2013 models are incompatible. | -| [**R4iSDHC RTS LITE 20XX**](http://www.nds-card.net/ProShow.asp?ProID=450) | $13.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. 2013 models are incompatible. | +| [**R4i-SDHC B9S**](http://www.nds-card.com/ProShow.asp?ProID=574) | $15.99 | September 3, 2019 | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot**; can be flashed back to an NDS flashcart. | +| [**R4i Gold 3DS Plus**](http://www.nds-card.com/ProShow.asp?ProID=575) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot** ([internal switch to switch between ntrboot and NDS modes]({{ "/images/screenshots/r4i-gold-3ds-plus.png" | absolute_url }})); do not manually flash with ntrboot. | +| [**Acekard 2i**](http://www.nds-card.com/ProShow.asp?ProID=160) | $20.99 | No | <= 4.3.0 | <= 1.4.4 | | +| [**DSTT**](http://www.nds-card.com/ProShow.asp?ProID=157) | $9.99 | No | None | None | Only models with [certain flash chips](https://gist.github.com/yuukieve/6b48f1bb8dd15136403c15c39fafdb42) are compatible with ntrboot. | +| [**R4i Gold 3DS**](http://www.nds-card.com/ProShow.asp?ProID=149) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | All RTS revisions are compatible. | +| [**R4i-SDHC 3DS RTS**](http://www.nds-card.com/ProShow.asp?ProID=146) | $13.99 | 1.87: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | | +| [**R4iSDHC GOLD Pro 20XX**](http://www.nds-card.com/ProShow.asp?ProID=490) | $9.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. 2013 models are incompatible. | +| [**R4iSDHC RTS LITE 20XX**](http://www.nds-card.com/ProShow.asp?ProID=450) | $13.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. 2013 models are incompatible. | | **Ace3DS X** | | No | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot** (external switch to switch between ntrboot ("3DS") and NDS modes); do not manually flash with ntrboot. | | **Ace3DS Plus** | | No | <= 11.9.0 | <= 1.4.5 | | | **Gateway Blue** | | No | 4.1.0 - 4.5.0 | <= 1.4.5 | | @@ -49,7 +49,7 @@ To test if a magnet will work, hold it on or around the (A)(B)(X)(Y) buttons whi Note that the flashcart will not be able to be used for its standard functions while the ntrboot exploit is installed on it (except for in the case of the Acekard 2i, which remains functional *on NDS and custom firmware 3DS systems only*). This means that, for most flashcarts, it will not even display on the home menu. There are optional steps at the end of the ntrboot flashing instructions to remove it from your flashcart when you are done. -Note that in some rare circumstances, it may be possible for the flashing process to **brick** a counterfeit flashcart and render it permanently unusable. This is unlikely, but nevertheless only original listed flashcarts are supported. To reduce the chance of receiving a counterfeit card, it is recommended that you use a reputable site to buy your flashcart (such as [NDS Card](http://www.nds-card.net/)) +Note that in some rare circumstances, it may be possible for the flashing process to **brick** a counterfeit flashcart and render it permanently unusable. This is unlikely, but nevertheless only original listed flashcarts are supported. To reduce the chance of receiving a counterfeit card, it is recommended that you use a reputable site to buy your flashcart (such as [NDS Card](http://www.nds-card.com/)) {: .notice--danger} ___ diff --git a/_pages/sr_SP/seedminer.txt b/_pages/sr_SP/seedminer.txt index 4e8bfbaa60..0e0a6ee1b4 100644 --- a/_pages/sr_SP/seedminer.txt +++ b/_pages/sr_SP/seedminer.txt @@ -63,9 +63,7 @@ There are two different methods for building on the Seedminer exploit (described 1. Open [Bruteforce Movable](https://bruteforcemovable.com/) on your computer + This site can automate the retrieval of `movable_part1.sed` (using a bot 3DS console) and the breaking of your device's DSiWare encryption (using a volunteer's computer to run Seedminer) - + If you already have access to a 3DS capable of launching the Homebrew Launcher, you can manually retrieve your `movable_part1.sed` using that device by following [these](https://jisagi.github.io/SeedminerGuide/seedminerSelf/#section1) instructions - + If you already have access to a PC with a powerful graphics card, you can manually calculate your `movable.sed` using it by following [these](https://jisagi.github.io/SeedminerGuide/seedminerSelf/#section2) instructions - + If the automated service is nonfunctional and you cannot do one or both of those manually, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you + + If the automated service is nonfunctional, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you 1. Enter your device's Friend Code (with no spaces or dashes) into the "Your friend code" field 1. Paste your device's 32 character long folder name into the "Your ID0" field 1. Complete the "I'm not a robot" captcha @@ -74,11 +72,11 @@ There are two different methods for building on the Seedminer exploit (described 1. When prompted, use the "Register Friend" button on your device to add the friend code of the bot 3DS console 1. Wait for the site to update + If it does not, wait a few minutes before refreshing the page once -1. Select "Continue" -1. Wait for the process to complete - + This can take a while (up to an hour in some cases) - + During this process, the bot may not show up on your 3ds. As long as the website updates, this is not an issue. - + If you are still waiting after an hour, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you +1. Once the site processes your information, you will be given the option to "Continue" or "Do another device". Click the green "Continue" button +1. Wait for the remainder of the process to complete + + This is usually fast (1-5 minutes) but in some cases, can take up to half an hour. + + During this process, the bot you added may not show up on your 3ds. As long as the website updates, this is not an issue. + + If you are still waiting after half an hour, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you 1. When the process has completed, download your `movable.sed` file from the site + Keep this file as you will need it in the upcoming pages @@ -102,7 +100,7 @@ ___ #### Seedminer + Steelhax + Frogtool -This method of using Seedminer for further exploitation uses your `movable.sed` file to gain access to the Homebrew Launcher using the Steelhax exploit for the purposes of injecting an exploitable DSiWare title into the DS Download Play application. This method requires you to already own (or download) the free "Steel Divers: Sub Wars" game from the eShop. +This method of using Seedminer for further exploitation uses your `movable.sed` file to gain access to the Homebrew Launcher using the Steelhax exploit for the purposes of injecting an exploitable DSiWare title into the DS Download Play application. This method requires you to already own (or download) the free "Steel Diver: Sub Wars" game from the eShop. This method is only compatible with the EUR, JPN, and USA regions, and is somewhat more complicated than the above method. It is only recommended to use this method if you have a EUR region device and do not wish to pay for a DSiWare game, or if the above method does not work for you for some reason. diff --git a/_pages/sr_SP/uninstall-cfw.txt b/_pages/sr_SP/uninstall-cfw.txt index 4745050aab..584998ac19 100644 --- a/_pages/sr_SP/uninstall-cfw.txt +++ b/_pages/sr_SP/uninstall-cfw.txt @@ -11,7 +11,7 @@ This will completely remove CFW from your device, including Boot9Strap and Luma3 This is almost never the solution to fix any issues you encounter with your CFW installation. A better idea would be to read the [troubleshooting](troubleshooting) page or ask (in English) for help at [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp). {: .notice--danger} -Any unsigned (illegitimate) games will be rendered unusable and can be manually removed using the Data Management section of the System Settings. Use a [save manager](https://github.com/FlagBrew/Checkpoint/releases/latest) to backup any saves for these unsigned (illegitimate) games you care about. +Any unsigned (illegitimate) games will be rendered unusable and should be manually removed before starting this process by using the Data Management section of the System Settings. Use a [save manager](https://github.com/FlagBrew/Checkpoint/releases/latest) to backup any saves for these unsigned (illegitimate) games you care about. This will not affect your NNID, any legitimately purchased games, or any saves for those legitimately purchased games. @@ -26,21 +26,43 @@ Note that if you have any payload files other than `GodMode9.firm` in the `/luma ### Instructions -#### Section I - Prep Work +#### Section I - Safety Test 1. Power off your device 1. Insert your SD card into your computer 1. Copy `GodMode9.firm` from the GodMode9 `.zip` to the `/luma/payloads/` folder on your SD card 1. Copy the `gm9` folder from the GodMode9 `.zip` to the root of your SD card 1. Reinsert your SD card into your device -1. Power on your device - -#### Section II - Running Uninstall Script - 1. Launch GodMode9 by holding (Start) during boot 1. If you are prompted to create an essential files backup, press (A) to do so, then press (A) to continue once it has completed 1. If you are prompted to fix the RTC date&time, press (A) to do so, then set the date and time, then press (A) to continue + Note that, if you had to fix the RTC date and time, you will have to fix the time in the System Settings as well after this guide +1. Navigate to `[1:] SYSNAND CTRNAND > title > 00040138 > (X)0000002 > content` + + On a "New" edition console, the (X) will instead be 2 + + On an "Old" edition console, the (X) will instead be 0 +1. Select the `.app` file +1. Select `NCCH Image Options` +1. Select `Mount image to drive` +1. In the window that appears, open the `exefs` folder +1. In this folder, select the `.firm` file +1. Select "Firm Options" +1. Select "Boot Firm" +1. When prompted, choose to decrypt and make a copy +1. You should boot into the regular 3DS Home Menu. If you do, power your device off and continue to the next section + + If you do NOT boot into the regular 3DS Home Menu, continuing with these instructions **WILL** brick your device. You should join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you + +#### Section II - Prep Work + +1. Power on your device +1. Navigate to System Settings > Data Management > Nintendo 3DS > Software +1. In this list of software, delete any non-Nintendo content you installed while using CFW + + This includes common system software such as FBI, Anemone3DS, Luma Updater, Homebrew Launcher, Checkpoint, and others, along with any non-eShop games + + Failure to remove CFW software before uninstalling CFW may break access to the Data Management menu after uninstalling CFW +1. Power off your device + +#### Section III - Running Uninstall Script + +1. Launch GodMode9 by holding (Start) during boot 1. Press (Home) to bring up the action menu 1. Select "Scripts..." 1. Select "GM9Megascript" diff --git a/_pages/sv_SE/finalizing-setup.txt b/_pages/sv_SE/finalizing-setup.txt index 58e46a9a59..e9e103e922 100644 --- a/_pages/sv_SE/finalizing-setup.txt +++ b/_pages/sv_SE/finalizing-setup.txt @@ -18,6 +18,8 @@ During this process, we also setup programs such as the following: + **Luma3DS Updater** *(updates your CFW installation easily)* + **GodMode9** *(multipurpose tool which can do NAND and cartridge functions)* + **Homebrew Launcher Loader** *(launches the Homebrew Launcher)* ++ **DSP1** *(allows homebrew applications to have sound)* ++ **ctr-no-timeoffset** *(removes the rtc offset so that the home menu and rtc timestamps match)* ### What You Need @@ -143,7 +145,7 @@ If, before following this guide, you already had an EmuNAND setup and would like 1. Press (B) to return to the main menu 1. Hold (R) and press (B) at the same time to eject your SD card 1. Insert your SD card into your computer -1. Copy `__sysnand_###.bin`, `essential.exefs`, and `boot9.bin` from the `/gm9/out/` folder on your SD card to a safe location on your computer +1. Copy `__sysnand_###.bin`, `__sysnand_###.bin.sha`, `essential.exefs`, and `boot9.bin` from the `/gm9/out/` folder on your SD card to a safe location on your computer + Make backups in multiple locations (such as online file storage) + These backups will save you from a brick and/or help you recover files from the NAND image if anything goes wrong in the future 1. Delete `__sysnand_###.bin` and `__sysnand_###.bin.sha` from the `/gm9/out/` folder on your SD card after copying it diff --git a/_pages/sv_SE/homebrew-launcher-(steelhax).txt b/_pages/sv_SE/homebrew-launcher-(steelhax).txt index ab00ebe45a..1c907250e2 100644 --- a/_pages/sv_SE/homebrew-launcher-(steelhax).txt +++ b/_pages/sv_SE/homebrew-launcher-(steelhax).txt @@ -8,7 +8,7 @@ title: "Homebrew Launcher (Steelhax)" This method of using Seedminer for further exploitation uses your `movable.sed` file to gain access to the Homebrew Launcher using the Steelhax exploit for the purposes of injecting an exploitable DSiWare title into the DS Download Play application. This method requires you to already own (or download) the free "Steel Divers: Sub Wars" game from the eShop. -If your device already has access to the Homebrew Launcher (whether through Steelhax or another exploit), you can skip to [Installing Boot9strap (Frogminer)](installing-boot9strap-(frogminer)). +If your device already has access to the Homebrew Launcher (whether through Steelhax or another exploit), you can skip to [Installing Boot9strap (Frogtool)](installing-boot9strap-(frogtool)). {: .notice--success} If you already have Steel Diver: Sub Wars, this process will overwrite your game's save file! @@ -17,6 +17,7 @@ If you already have Steel Diver: Sub Wars, this process will overwrite your game ### What You Need * The free eShop game "Steel Diver: Sub Wars" +* Your `movable.sed` file from completing [Seedminer](seedminer) * The latest release of [the Homebrew Launcher](https://github.com/fincs/new-hbmenu/releases/latest) * The latest release of [Steelhax](https://github.com/VegaRoXas/vegaroxas.github.io/raw/master/files/steelhax-installer.rar) * The [otherapp payload](https://smealum.github.io/3ds/#otherapp) *(for your region and version)* @@ -39,7 +40,7 @@ If you already have Steel Diver: Sub Wars, this process will overwrite your game 1. Exit "Steel Diver: Sub Wars" 1. Stäng av din enhet 1. Insert your SD card into your computer -1. Open [the Steelminer Injector website](http://steelminer.jisagi.net/injector) on your computer +1. Open [the Steelminer Injector website](https://bruteforcemovable.com/steelhax/) on your computer 1. Select your `movable.sed` file 1. Select "Start!" 1. Wait for the process to complete diff --git a/_pages/sv_SE/installing-boot9strap-(fredtool).txt b/_pages/sv_SE/installing-boot9strap-(fredtool).txt index 9e800e33e3..ba8c3c067b 100644 --- a/_pages/sv_SE/installing-boot9strap-(fredtool).txt +++ b/_pages/sv_SE/installing-boot9strap-(fredtool).txt @@ -10,8 +10,6 @@ This method of using Seedminer for further exploitation uses your `movable.sed` This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). -To use the [magnet](https://wikipedia.org/wiki/Magnet_URI_scheme) links on this page, you will need a torrent client like [Deluge](http://dev.deluge-torrent.org/wiki/Download). - To extract the `.7z` and `.rar` files linked on this page, you will need a file archiver like [7-Zip](http://www.7-zip.org/) or [The Unarchiver](https://theunarchiver.com/). ### What You Need diff --git a/_pages/sv_SE/ntrboot.txt b/_pages/sv_SE/ntrboot.txt index a5c9bc16cd..35ffad7d57 100644 --- a/_pages/sv_SE/ntrboot.txt +++ b/_pages/sv_SE/ntrboot.txt @@ -17,14 +17,14 @@ Note that carts with a "Time Bomb" will no longer be able to launch `.nds` files | Flashcart Name | Current Price | "Time Bomb"? | 3DS Versions? | DSi Versions? | Other Notes | |-|-:|:-:|:-:|:-:|-| -| [**R4i-SDHC B9S**](http://www.nds-card.net/ProShow.asp?ProID=574) | $15.99 | September 3, 2019 | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot**; can be flashed back to an NDS flashcart. | -| [**R4i Gold 3DS Plus**](http://www.nds-card.net/ProShow.asp?ProID=575) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot** ([internal switch to switch between ntrboot and NDS modes]({{ "/images/screenshots/r4i-gold-3ds-plus.png" | absolute_url }})); do not manually flash with ntrboot. | -| [**Acekard 2i**](http://www.nds-card.net/ProShow.asp?ProID=160) | $20.99 | No | <= 4.3.0 | <= 1.4.4 | | -| [**DSTT**](http://www.nds-card.net/ProShow.asp?ProID=157) | $9.99 | No | None | None | Only models with [certain flash chips](https://gist.github.com/yuukieve/6b48f1bb8dd15136403c15c39fafdb42) are compatible with ntrboot. | -| [**R4i Gold 3DS**](http://www.nds-card.net/ProShow.asp?ProID=149) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | All RTS revisions are compatible. | -| [**R4i-SDHC 3DS RTS**](http://www.nds-card.net/ProShow.asp?ProID=146) | $13.99 | 1.87: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | | -| [**R4iSDHC GOLD Pro 20XX**](http://www.nds-card.net/ProShow.asp?ProID=490) | $9.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. 2013 models are incompatible. | -| [**R4iSDHC RTS LITE 20XX**](http://www.nds-card.net/ProShow.asp?ProID=450) | $13.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. 2013 models are incompatible. | +| [**R4i-SDHC B9S**](http://www.nds-card.com/ProShow.asp?ProID=574) | $15.99 | September 3, 2019 | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot**; can be flashed back to an NDS flashcart. | +| [**R4i Gold 3DS Plus**](http://www.nds-card.com/ProShow.asp?ProID=575) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot** ([internal switch to switch between ntrboot and NDS modes]({{ "/images/screenshots/r4i-gold-3ds-plus.png" | absolute_url }})); do not manually flash with ntrboot. | +| [**Acekard 2i**](http://www.nds-card.com/ProShow.asp?ProID=160) | $20.99 | No | <= 4.3.0 | <= 1.4.4 | | +| [**DSTT**](http://www.nds-card.com/ProShow.asp?ProID=157) | $9.99 | No | None | None | Only models with [certain flash chips](https://gist.github.com/yuukieve/6b48f1bb8dd15136403c15c39fafdb42) are compatible with ntrboot. | +| [**R4i Gold 3DS**](http://www.nds-card.com/ProShow.asp?ProID=149) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | All RTS revisions are compatible. | +| [**R4i-SDHC 3DS RTS**](http://www.nds-card.com/ProShow.asp?ProID=146) | $13.99 | 1.87: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | | +| [**R4iSDHC GOLD Pro 20XX**](http://www.nds-card.com/ProShow.asp?ProID=490) | $9.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. 2013 models are incompatible. | +| [**R4iSDHC RTS LITE 20XX**](http://www.nds-card.com/ProShow.asp?ProID=450) | $13.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. 2013 models are incompatible. | | **Ace3DS X** | | No | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot** (external switch to switch between ntrboot ("3DS") and NDS modes); do not manually flash with ntrboot. | | **Ace3DS Plus** | | No | <= 11.9.0 | <= 1.4.5 | | | **Gateway Blue** | | No | 4.1.0 - 4.5.0 | <= 1.4.5 | | @@ -49,7 +49,7 @@ To test if a magnet will work, hold it on or around the (A)(B)(X)(Y) buttons whi Note that the flashcart will not be able to be used for its standard functions while the ntrboot exploit is installed on it (except for in the case of the Acekard 2i, which remains functional *on NDS and custom firmware 3DS systems only*). This means that, for most flashcarts, it will not even display on the home menu. There are optional steps at the end of the ntrboot flashing instructions to remove it from your flashcart when you are done. -Note that in some rare circumstances, it may be possible for the flashing process to **brick** a counterfeit flashcart and render it permanently unusable. This is unlikely, but nevertheless only original listed flashcarts are supported. To reduce the chance of receiving a counterfeit card, it is recommended that you use a reputable site to buy your flashcart (such as [NDS Card](http://www.nds-card.net/)) +Note that in some rare circumstances, it may be possible for the flashing process to **brick** a counterfeit flashcart and render it permanently unusable. This is unlikely, but nevertheless only original listed flashcarts are supported. To reduce the chance of receiving a counterfeit card, it is recommended that you use a reputable site to buy your flashcart (such as [NDS Card](http://www.nds-card.com/)) {: .notice--danger} ___ diff --git a/_pages/sv_SE/seedminer.txt b/_pages/sv_SE/seedminer.txt index d42a675717..ea1dc786ab 100644 --- a/_pages/sv_SE/seedminer.txt +++ b/_pages/sv_SE/seedminer.txt @@ -63,9 +63,7 @@ There are two different methods for building on the Seedminer exploit (described 1. Open [Bruteforce Movable](https://bruteforcemovable.com/) on your computer + This site can automate the retrieval of `movable_part1.sed` (using a bot 3DS console) and the breaking of your device's DSiWare encryption (using a volunteer's computer to run Seedminer) - + If you already have access to a 3DS capable of launching the Homebrew Launcher, you can manually retrieve your `movable_part1.sed` using that device by following [these](https://jisagi.github.io/SeedminerGuide/seedminerSelf/#section1) instructions - + If you already have access to a PC with a powerful graphics card, you can manually calculate your `movable.sed` using it by following [these](https://jisagi.github.io/SeedminerGuide/seedminerSelf/#section2) instructions - + If the automated service is nonfunctional and you cannot do one or both of those manually, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you + + If the automated service is nonfunctional, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you 1. Enter your device's Friend Code (with no spaces or dashes) into the "Your friend code" field 1. Paste your device's 32 character long folder name into the "Your ID0" field 1. Complete the "I'm not a robot" captcha @@ -74,11 +72,11 @@ There are two different methods for building on the Seedminer exploit (described 1. When prompted, use the "Register Friend" button on your device to add the friend code of the bot 3DS console 1. Wait for the site to update + If it does not, wait a few minutes before refreshing the page once -1. Select "Continue" -1. Wait for the process to complete - + This can take a while (up to an hour in some cases) - + During this process, the bot may not show up on your 3ds. As long as the website updates, this is not an issue. - + If you are still waiting after an hour, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you +1. Once the site processes your information, you will be given the option to "Continue" or "Do another device". Click the green "Continue" button +1. Wait for the remainder of the process to complete + + This is usually fast (1-5 minutes) but in some cases, can take up to half an hour. + + During this process, the bot you added may not show up on your 3ds. As long as the website updates, this is not an issue. + + If you are still waiting after half an hour, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you 1. When the process has completed, download your `movable.sed` file from the site + Keep this file as you will need it in the upcoming pages @@ -102,7 +100,7 @@ ___ #### Seedminer + Steelhax + Frogtool -This method of using Seedminer for further exploitation uses your `movable.sed` file to gain access to the Homebrew Launcher using the Steelhax exploit for the purposes of injecting an exploitable DSiWare title into the DS Download Play application. This method requires you to already own (or download) the free "Steel Divers: Sub Wars" game from the eShop. +This method of using Seedminer for further exploitation uses your `movable.sed` file to gain access to the Homebrew Launcher using the Steelhax exploit for the purposes of injecting an exploitable DSiWare title into the DS Download Play application. This method requires you to already own (or download) the free "Steel Diver: Sub Wars" game from the eShop. This method is only compatible with the EUR, JPN, and USA regions, and is somewhat more complicated than the above method. It is only recommended to use this method if you have a EUR region device and do not wish to pay for a DSiWare game, or if the above method does not work for you for some reason. diff --git a/_pages/sv_SE/uninstall-cfw.txt b/_pages/sv_SE/uninstall-cfw.txt index fdc5c47100..9fc07d3498 100644 --- a/_pages/sv_SE/uninstall-cfw.txt +++ b/_pages/sv_SE/uninstall-cfw.txt @@ -11,7 +11,7 @@ This will completely remove CFW from your device, including Boot9Strap and Luma3 This is almost never the solution to fix any issues you encounter with your CFW installation. A better idea would be to read the [troubleshooting](troubleshooting) page or ask (in English) for help at [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp). {: .notice--danger} -Any unsigned (illegitimate) games will be rendered unusable and can be manually removed using the Data Management section of the System Settings. Use a [save manager](https://github.com/FlagBrew/Checkpoint/releases/latest) to backup any saves for these unsigned (illegitimate) games you care about. +Any unsigned (illegitimate) games will be rendered unusable and should be manually removed before starting this process by using the Data Management section of the System Settings. Use a [save manager](https://github.com/FlagBrew/Checkpoint/releases/latest) to backup any saves for these unsigned (illegitimate) games you care about. This will not affect your NNID, any legitimately purchased games, or any saves for those legitimately purchased games. @@ -26,21 +26,43 @@ Observera att om du har någon annan payload än `GodMode9.firm` i mappen `/luma ### Instructions -#### Section I - Prep Work +#### Section I - Safety Test 1. Stäng av din enhet 1. Insert your SD card into your computer 1. Copy `GodMode9.firm` from the GodMode9 `.zip` to the `/luma/payloads/` folder on your SD card 1. Copy the `gm9` folder from the GodMode9 `.zip` to the root of your SD card 1. Sätt tillbaka ditt SD-kort i din enhet -1. Power on your device - -#### Section II - Running Uninstall Script - 1. Launch GodMode9 by holding (Start) during boot 1. If you are prompted to create an essential files backup, press (A) to do so, then press (A) to continue once it has completed 1. If you are prompted to fix the RTC date&time, press (A) to do so, then set the date and time, then press (A) to continue + Note that, if you had to fix the RTC date and time, you will have to fix the time in the System Settings as well after this guide +1. Navigate to `[1:] SYSNAND CTRNAND > title > 00040138 > (X)0000002 > content` + + On a "New" edition console, the (X) will instead be 2 + + On an "Old" edition console, the (X) will instead be 0 +1. Select the `.app` file +1. Select `NCCH Image Options` +1. Select `Mount image to drive` +1. In the window that appears, open the `exefs` folder +1. In this folder, select the `.firm` file +1. Select "Firm Options" +1. Select "Boot Firm" +1. When prompted, choose to decrypt and make a copy +1. You should boot into the regular 3DS Home Menu. If you do, power your device off and continue to the next section + + If you do NOT boot into the regular 3DS Home Menu, continuing with these instructions **WILL** brick your device. You should join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you + +#### Section II - Prep Work + +1. Power on your device +1. Navigate to System Settings > Data Management > Nintendo 3DS > Software +1. In this list of software, delete any non-Nintendo content you installed while using CFW + + This includes common system software such as FBI, Anemone3DS, Luma Updater, Homebrew Launcher, Checkpoint, and others, along with any non-eShop games + + Failure to remove CFW software before uninstalling CFW may break access to the Data Management menu after uninstalling CFW +1. Stäng av din enhet + +#### Section III - Running Uninstall Script + +1. Starta GodMode9 genom att hålla (Start) under uppstart 1. Press (Home) to bring up the action menu 1. Select "Scripts..." 1. Select "GM9Megascript" diff --git a/_pages/th_TH/finalizing-setup.txt b/_pages/th_TH/finalizing-setup.txt index 8ccda2a04f..f7c9c087d4 100644 --- a/_pages/th_TH/finalizing-setup.txt +++ b/_pages/th_TH/finalizing-setup.txt @@ -18,6 +18,8 @@ During this process, we also setup programs such as the following: + **Luma3DS Updater** *(updates your CFW installation easily)* + **GodMode9** *(multipurpose tool which can do NAND and cartridge functions)* + **Homebrew Launcher Loader** *(launches the Homebrew Launcher)* ++ **DSP1** *(allows homebrew applications to have sound)* ++ **ctr-no-timeoffset** *(removes the rtc offset so that the home menu and rtc timestamps match)* ### What You Need @@ -143,7 +145,7 @@ If, before following this guide, you already had an EmuNAND setup and would like 1. Press (B) to return to the main menu 1. Hold (R) and press (B) at the same time to eject your SD card 1. Insert your SD card into your computer -1. Copy `__sysnand_###.bin`, `essential.exefs`, and `boot9.bin` from the `/gm9/out/` folder on your SD card to a safe location on your computer +1. Copy `__sysnand_###.bin`, `__sysnand_###.bin.sha`, `essential.exefs`, and `boot9.bin` from the `/gm9/out/` folder on your SD card to a safe location on your computer + Make backups in multiple locations (such as online file storage) + These backups will save you from a brick and/or help you recover files from the NAND image if anything goes wrong in the future 1. Delete `__sysnand_###.bin` and `__sysnand_###.bin.sha` from the `/gm9/out/` folder on your SD card after copying it diff --git a/_pages/th_TH/homebrew-launcher-(steelhax).txt b/_pages/th_TH/homebrew-launcher-(steelhax).txt index 571fd1982d..568e53b124 100644 --- a/_pages/th_TH/homebrew-launcher-(steelhax).txt +++ b/_pages/th_TH/homebrew-launcher-(steelhax).txt @@ -8,7 +8,7 @@ title: "Homebrew Launcher (Steelhax)" This method of using Seedminer for further exploitation uses your `movable.sed` file to gain access to the Homebrew Launcher using the Steelhax exploit for the purposes of injecting an exploitable DSiWare title into the DS Download Play application. This method requires you to already own (or download) the free "Steel Divers: Sub Wars" game from the eShop. -If your device already has access to the Homebrew Launcher (whether through Steelhax or another exploit), you can skip to [Installing Boot9strap (Frogminer)](installing-boot9strap-(frogminer)). +If your device already has access to the Homebrew Launcher (whether through Steelhax or another exploit), you can skip to [Installing Boot9strap (Frogtool)](installing-boot9strap-(frogtool)). {: .notice--success} If you already have Steel Diver: Sub Wars, this process will overwrite your game's save file! @@ -17,6 +17,7 @@ If you already have Steel Diver: Sub Wars, this process will overwrite your game ### What You Need * The free eShop game "Steel Diver: Sub Wars" +* Your `movable.sed` file from completing [Seedminer](seedminer) * The latest release of [the Homebrew Launcher](https://github.com/fincs/new-hbmenu/releases/latest) * The latest release of [Steelhax](https://github.com/VegaRoXas/vegaroxas.github.io/raw/master/files/steelhax-installer.rar) * The [otherapp payload](https://smealum.github.io/3ds/#otherapp) *(for your region and version)* @@ -39,7 +40,7 @@ If you already have Steel Diver: Sub Wars, this process will overwrite your game 1. Exit "Steel Diver: Sub Wars" 1. Power off your device 1. Insert your SD card into your computer -1. Open [the Steelminer Injector website](http://steelminer.jisagi.net/injector) on your computer +1. Open [the Steelminer Injector website](https://bruteforcemovable.com/steelhax/) on your computer 1. Select your `movable.sed` file 1. Select "Start!" 1. Wait for the process to complete diff --git a/_pages/th_TH/installing-boot9strap-(fredtool).txt b/_pages/th_TH/installing-boot9strap-(fredtool).txt index ca3da37631..22a79f26c5 100644 --- a/_pages/th_TH/installing-boot9strap-(fredtool).txt +++ b/_pages/th_TH/installing-boot9strap-(fredtool).txt @@ -10,8 +10,6 @@ This method of using Seedminer for further exploitation uses your `movable.sed` This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). -To use the [magnet](https://wikipedia.org/wiki/Magnet_URI_scheme) links on this page, you will need a torrent client like [Deluge](http://dev.deluge-torrent.org/wiki/Download). - To extract the `.7z` and `.rar` files linked on this page, you will need a file archiver like [7-Zip](http://www.7-zip.org/) or [The Unarchiver](https://theunarchiver.com/). ### What You Need diff --git a/_pages/th_TH/ntrboot.txt b/_pages/th_TH/ntrboot.txt index a5c9bc16cd..35ffad7d57 100644 --- a/_pages/th_TH/ntrboot.txt +++ b/_pages/th_TH/ntrboot.txt @@ -17,14 +17,14 @@ Note that carts with a "Time Bomb" will no longer be able to launch `.nds` files | Flashcart Name | Current Price | "Time Bomb"? | 3DS Versions? | DSi Versions? | Other Notes | |-|-:|:-:|:-:|:-:|-| -| [**R4i-SDHC B9S**](http://www.nds-card.net/ProShow.asp?ProID=574) | $15.99 | September 3, 2019 | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot**; can be flashed back to an NDS flashcart. | -| [**R4i Gold 3DS Plus**](http://www.nds-card.net/ProShow.asp?ProID=575) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot** ([internal switch to switch between ntrboot and NDS modes]({{ "/images/screenshots/r4i-gold-3ds-plus.png" | absolute_url }})); do not manually flash with ntrboot. | -| [**Acekard 2i**](http://www.nds-card.net/ProShow.asp?ProID=160) | $20.99 | No | <= 4.3.0 | <= 1.4.4 | | -| [**DSTT**](http://www.nds-card.net/ProShow.asp?ProID=157) | $9.99 | No | None | None | Only models with [certain flash chips](https://gist.github.com/yuukieve/6b48f1bb8dd15136403c15c39fafdb42) are compatible with ntrboot. | -| [**R4i Gold 3DS**](http://www.nds-card.net/ProShow.asp?ProID=149) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | All RTS revisions are compatible. | -| [**R4i-SDHC 3DS RTS**](http://www.nds-card.net/ProShow.asp?ProID=146) | $13.99 | 1.87: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | | -| [**R4iSDHC GOLD Pro 20XX**](http://www.nds-card.net/ProShow.asp?ProID=490) | $9.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. 2013 models are incompatible. | -| [**R4iSDHC RTS LITE 20XX**](http://www.nds-card.net/ProShow.asp?ProID=450) | $13.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. 2013 models are incompatible. | +| [**R4i-SDHC B9S**](http://www.nds-card.com/ProShow.asp?ProID=574) | $15.99 | September 3, 2019 | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot**; can be flashed back to an NDS flashcart. | +| [**R4i Gold 3DS Plus**](http://www.nds-card.com/ProShow.asp?ProID=575) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot** ([internal switch to switch between ntrboot and NDS modes]({{ "/images/screenshots/r4i-gold-3ds-plus.png" | absolute_url }})); do not manually flash with ntrboot. | +| [**Acekard 2i**](http://www.nds-card.com/ProShow.asp?ProID=160) | $20.99 | No | <= 4.3.0 | <= 1.4.4 | | +| [**DSTT**](http://www.nds-card.com/ProShow.asp?ProID=157) | $9.99 | No | None | None | Only models with [certain flash chips](https://gist.github.com/yuukieve/6b48f1bb8dd15136403c15c39fafdb42) are compatible with ntrboot. | +| [**R4i Gold 3DS**](http://www.nds-card.com/ProShow.asp?ProID=149) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | All RTS revisions are compatible. | +| [**R4i-SDHC 3DS RTS**](http://www.nds-card.com/ProShow.asp?ProID=146) | $13.99 | 1.87: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | | +| [**R4iSDHC GOLD Pro 20XX**](http://www.nds-card.com/ProShow.asp?ProID=490) | $9.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. 2013 models are incompatible. | +| [**R4iSDHC RTS LITE 20XX**](http://www.nds-card.com/ProShow.asp?ProID=450) | $13.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. 2013 models are incompatible. | | **Ace3DS X** | | No | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot** (external switch to switch between ntrboot ("3DS") and NDS modes); do not manually flash with ntrboot. | | **Ace3DS Plus** | | No | <= 11.9.0 | <= 1.4.5 | | | **Gateway Blue** | | No | 4.1.0 - 4.5.0 | <= 1.4.5 | | @@ -49,7 +49,7 @@ To test if a magnet will work, hold it on or around the (A)(B)(X)(Y) buttons whi Note that the flashcart will not be able to be used for its standard functions while the ntrboot exploit is installed on it (except for in the case of the Acekard 2i, which remains functional *on NDS and custom firmware 3DS systems only*). This means that, for most flashcarts, it will not even display on the home menu. There are optional steps at the end of the ntrboot flashing instructions to remove it from your flashcart when you are done. -Note that in some rare circumstances, it may be possible for the flashing process to **brick** a counterfeit flashcart and render it permanently unusable. This is unlikely, but nevertheless only original listed flashcarts are supported. To reduce the chance of receiving a counterfeit card, it is recommended that you use a reputable site to buy your flashcart (such as [NDS Card](http://www.nds-card.net/)) +Note that in some rare circumstances, it may be possible for the flashing process to **brick** a counterfeit flashcart and render it permanently unusable. This is unlikely, but nevertheless only original listed flashcarts are supported. To reduce the chance of receiving a counterfeit card, it is recommended that you use a reputable site to buy your flashcart (such as [NDS Card](http://www.nds-card.com/)) {: .notice--danger} ___ diff --git a/_pages/th_TH/seedminer.txt b/_pages/th_TH/seedminer.txt index 4e8bfbaa60..0e0a6ee1b4 100644 --- a/_pages/th_TH/seedminer.txt +++ b/_pages/th_TH/seedminer.txt @@ -63,9 +63,7 @@ There are two different methods for building on the Seedminer exploit (described 1. Open [Bruteforce Movable](https://bruteforcemovable.com/) on your computer + This site can automate the retrieval of `movable_part1.sed` (using a bot 3DS console) and the breaking of your device's DSiWare encryption (using a volunteer's computer to run Seedminer) - + If you already have access to a 3DS capable of launching the Homebrew Launcher, you can manually retrieve your `movable_part1.sed` using that device by following [these](https://jisagi.github.io/SeedminerGuide/seedminerSelf/#section1) instructions - + If you already have access to a PC with a powerful graphics card, you can manually calculate your `movable.sed` using it by following [these](https://jisagi.github.io/SeedminerGuide/seedminerSelf/#section2) instructions - + If the automated service is nonfunctional and you cannot do one or both of those manually, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you + + If the automated service is nonfunctional, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you 1. Enter your device's Friend Code (with no spaces or dashes) into the "Your friend code" field 1. Paste your device's 32 character long folder name into the "Your ID0" field 1. Complete the "I'm not a robot" captcha @@ -74,11 +72,11 @@ There are two different methods for building on the Seedminer exploit (described 1. When prompted, use the "Register Friend" button on your device to add the friend code of the bot 3DS console 1. Wait for the site to update + If it does not, wait a few minutes before refreshing the page once -1. Select "Continue" -1. Wait for the process to complete - + This can take a while (up to an hour in some cases) - + During this process, the bot may not show up on your 3ds. As long as the website updates, this is not an issue. - + If you are still waiting after an hour, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you +1. Once the site processes your information, you will be given the option to "Continue" or "Do another device". Click the green "Continue" button +1. Wait for the remainder of the process to complete + + This is usually fast (1-5 minutes) but in some cases, can take up to half an hour. + + During this process, the bot you added may not show up on your 3ds. As long as the website updates, this is not an issue. + + If you are still waiting after half an hour, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you 1. When the process has completed, download your `movable.sed` file from the site + Keep this file as you will need it in the upcoming pages @@ -102,7 +100,7 @@ ___ #### Seedminer + Steelhax + Frogtool -This method of using Seedminer for further exploitation uses your `movable.sed` file to gain access to the Homebrew Launcher using the Steelhax exploit for the purposes of injecting an exploitable DSiWare title into the DS Download Play application. This method requires you to already own (or download) the free "Steel Divers: Sub Wars" game from the eShop. +This method of using Seedminer for further exploitation uses your `movable.sed` file to gain access to the Homebrew Launcher using the Steelhax exploit for the purposes of injecting an exploitable DSiWare title into the DS Download Play application. This method requires you to already own (or download) the free "Steel Diver: Sub Wars" game from the eShop. This method is only compatible with the EUR, JPN, and USA regions, and is somewhat more complicated than the above method. It is only recommended to use this method if you have a EUR region device and do not wish to pay for a DSiWare game, or if the above method does not work for you for some reason. diff --git a/_pages/th_TH/uninstall-cfw.txt b/_pages/th_TH/uninstall-cfw.txt index 4745050aab..584998ac19 100644 --- a/_pages/th_TH/uninstall-cfw.txt +++ b/_pages/th_TH/uninstall-cfw.txt @@ -11,7 +11,7 @@ This will completely remove CFW from your device, including Boot9Strap and Luma3 This is almost never the solution to fix any issues you encounter with your CFW installation. A better idea would be to read the [troubleshooting](troubleshooting) page or ask (in English) for help at [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp). {: .notice--danger} -Any unsigned (illegitimate) games will be rendered unusable and can be manually removed using the Data Management section of the System Settings. Use a [save manager](https://github.com/FlagBrew/Checkpoint/releases/latest) to backup any saves for these unsigned (illegitimate) games you care about. +Any unsigned (illegitimate) games will be rendered unusable and should be manually removed before starting this process by using the Data Management section of the System Settings. Use a [save manager](https://github.com/FlagBrew/Checkpoint/releases/latest) to backup any saves for these unsigned (illegitimate) games you care about. This will not affect your NNID, any legitimately purchased games, or any saves for those legitimately purchased games. @@ -26,21 +26,43 @@ Note that if you have any payload files other than `GodMode9.firm` in the `/luma ### Instructions -#### Section I - Prep Work +#### Section I - Safety Test 1. Power off your device 1. Insert your SD card into your computer 1. Copy `GodMode9.firm` from the GodMode9 `.zip` to the `/luma/payloads/` folder on your SD card 1. Copy the `gm9` folder from the GodMode9 `.zip` to the root of your SD card 1. Reinsert your SD card into your device -1. Power on your device - -#### Section II - Running Uninstall Script - 1. Launch GodMode9 by holding (Start) during boot 1. If you are prompted to create an essential files backup, press (A) to do so, then press (A) to continue once it has completed 1. If you are prompted to fix the RTC date&time, press (A) to do so, then set the date and time, then press (A) to continue + Note that, if you had to fix the RTC date and time, you will have to fix the time in the System Settings as well after this guide +1. Navigate to `[1:] SYSNAND CTRNAND > title > 00040138 > (X)0000002 > content` + + On a "New" edition console, the (X) will instead be 2 + + On an "Old" edition console, the (X) will instead be 0 +1. Select the `.app` file +1. Select `NCCH Image Options` +1. Select `Mount image to drive` +1. In the window that appears, open the `exefs` folder +1. In this folder, select the `.firm` file +1. Select "Firm Options" +1. Select "Boot Firm" +1. When prompted, choose to decrypt and make a copy +1. You should boot into the regular 3DS Home Menu. If you do, power your device off and continue to the next section + + If you do NOT boot into the regular 3DS Home Menu, continuing with these instructions **WILL** brick your device. You should join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you + +#### Section II - Prep Work + +1. Power on your device +1. Navigate to System Settings > Data Management > Nintendo 3DS > Software +1. In this list of software, delete any non-Nintendo content you installed while using CFW + + This includes common system software such as FBI, Anemone3DS, Luma Updater, Homebrew Launcher, Checkpoint, and others, along with any non-eShop games + + Failure to remove CFW software before uninstalling CFW may break access to the Data Management menu after uninstalling CFW +1. Power off your device + +#### Section III - Running Uninstall Script + +1. Launch GodMode9 by holding (Start) during boot 1. Press (Home) to bring up the action menu 1. Select "Scripts..." 1. Select "GM9Megascript" diff --git a/_pages/tr_TR/finalizing-setup.txt b/_pages/tr_TR/finalizing-setup.txt index 622ef06db7..6e88d2efca 100644 --- a/_pages/tr_TR/finalizing-setup.txt +++ b/_pages/tr_TR/finalizing-setup.txt @@ -18,6 +18,8 @@ Bu süreç boyunca, aşağıdaki gibi programları kuruyoruz: + **Luma3DS Updater** *(Custom Firmware yüklemenizi kolayca günceller)* + **GodMode9** *(multipurpose tool which can do NAND and cartridge functions)* + **Homebrew Launcher Loader** *(launches the Homebrew Launcher)* ++ **DSP1** *(allows homebrew applications to have sound)* ++ **ctr-no-timeoffset** *(removes the rtc offset so that the home menu and rtc timestamps match)* ### What You Need @@ -143,7 +145,7 @@ If, before following this guide, you already had an EmuNAND setup and would like 1. Press (B) to return to the main menu 1. SD kartınızı çıkarmak için aynı anda (R) ve (B) ye basın ve basılı tutun 1. SD kartınızı bilgisayarınıza takın -1. Copy `__sysnand_###.bin`, `essential.exefs`, and `boot9.bin` from the `/gm9/out/` folder on your SD card to a safe location on your computer +1. Copy `__sysnand_###.bin`, `__sysnand_###.bin.sha`, `essential.exefs`, and `boot9.bin` from the `/gm9/out/` folder on your SD card to a safe location on your computer + Make backups in multiple locations (such as online file storage) + These backups will save you from a brick and/or help you recover files from the NAND image if anything goes wrong in the future 1. Delete `__sysnand_###.bin` and `__sysnand_###.bin.sha` from the `/gm9/out/` folder on your SD card after copying it diff --git a/_pages/tr_TR/homebrew-launcher-(steelhax).txt b/_pages/tr_TR/homebrew-launcher-(steelhax).txt index a13aa51358..59b1629806 100644 --- a/_pages/tr_TR/homebrew-launcher-(steelhax).txt +++ b/_pages/tr_TR/homebrew-launcher-(steelhax).txt @@ -8,7 +8,7 @@ title: "Homebrew Launcher (Steelhax)" This method of using Seedminer for further exploitation uses your `movable.sed` file to gain access to the Homebrew Launcher using the Steelhax exploit for the purposes of injecting an exploitable DSiWare title into the DS Download Play application. This method requires you to already own (or download) the free "Steel Divers: Sub Wars" game from the eShop. -If your device already has access to the Homebrew Launcher (whether through Steelhax or another exploit), you can skip to [Installing Boot9strap (Frogminer)](installing-boot9strap-(frogminer)). +If your device already has access to the Homebrew Launcher (whether through Steelhax or another exploit), you can skip to [Installing Boot9strap (Frogtool)](installing-boot9strap-(frogtool)). {: .notice--success} If you already have Steel Diver: Sub Wars, this process will overwrite your game's save file! @@ -17,6 +17,7 @@ If you already have Steel Diver: Sub Wars, this process will overwrite your game ### What You Need * The free eShop game "Steel Diver: Sub Wars" +* Your `movable.sed` file from completing [Seedminer](seedminer) * The latest release of [the Homebrew Launcher](https://github.com/fincs/new-hbmenu/releases/latest) * The latest release of [Steelhax](https://github.com/VegaRoXas/vegaroxas.github.io/raw/master/files/steelhax-installer.rar) * The [otherapp payload](https://smealum.github.io/3ds/#otherapp) *(for your region and version)* @@ -39,7 +40,7 @@ If you already have Steel Diver: Sub Wars, this process will overwrite your game 1. Exit "Steel Diver: Sub Wars" 1. Cihazınızı kapatın 1. SD kartınızı bilgisayarınıza takın -1. Open [the Steelminer Injector website](http://steelminer.jisagi.net/injector) on your computer +1. Open [the Steelminer Injector website](https://bruteforcemovable.com/steelhax/) on your computer 1. Select your `movable.sed` file 1. Select "Start!" 1. Wait for the process to complete diff --git a/_pages/tr_TR/installing-boot9strap-(fredtool).txt b/_pages/tr_TR/installing-boot9strap-(fredtool).txt index 38cec652b9..ba7fe8a32c 100644 --- a/_pages/tr_TR/installing-boot9strap-(fredtool).txt +++ b/_pages/tr_TR/installing-boot9strap-(fredtool).txt @@ -10,8 +10,6 @@ This method of using Seedminer for further exploitation uses your `movable.sed` This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). -To use the [magnet](https://wikipedia.org/wiki/Magnet_URI_scheme) links on this page, you will need a torrent client like [Deluge](http://dev.deluge-torrent.org/wiki/Download). - To extract the `.7z` and `.rar` files linked on this page, you will need a file archiver like [7-Zip](http://www.7-zip.org/) or [The Unarchiver](https://theunarchiver.com/). ### What You Need diff --git a/_pages/tr_TR/ntrboot.txt b/_pages/tr_TR/ntrboot.txt index ecd53c7512..60aa5cc9e1 100644 --- a/_pages/tr_TR/ntrboot.txt +++ b/_pages/tr_TR/ntrboot.txt @@ -17,14 +17,14 @@ Note that carts with a "Time Bomb" will no longer be able to launch `.nds` files | Flashcart Name | Current Price | "Time Bomb"? | 3DS Versions? | DSi Versions? | Other Notes | |-|-:|:-:|:-:|:-:|-| -| [**R4i-SDHC B9S**](http://www.nds-card.net/ProShow.asp?ProID=574) | $15.99 | September 3, 2019 | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot**; can be flashed back to an NDS flashcart. | -| [**R4i Gold 3DS Plus**](http://www.nds-card.net/ProShow.asp?ProID=575) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot** ([internal switch to switch between ntrboot and NDS modes]({{ "/images/screenshots/r4i-gold-3ds-plus.png" | absolute_url }})); do not manually flash with ntrboot. | -| [**Acekard 2i**](http://www.nds-card.net/ProShow.asp?ProID=160) | $20.99 | No | <= 4.3.0 | <= 1.4.4 | | -| [**DSTT**](http://www.nds-card.net/ProShow.asp?ProID=157) | $9.99 | No | None | None | Only models with [certain flash chips](https://gist.github.com/yuukieve/6b48f1bb8dd15136403c15c39fafdb42) are compatible with ntrboot. | -| [**R4i Gold 3DS**](http://www.nds-card.net/ProShow.asp?ProID=149) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | All RTS revisions are compatible. | -| [**R4i-SDHC 3DS RTS**](http://www.nds-card.net/ProShow.asp?ProID=146) | $13.99 | 1.87: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | | -| [**R4iSDHC GOLD Pro 20XX**](http://www.nds-card.net/ProShow.asp?ProID=490) | $9.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. 2013 models are incompatible. | -| [**R4iSDHC RTS LITE 20XX**](http://www.nds-card.net/ProShow.asp?ProID=450) | $13.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. 2013 models are incompatible. | +| [**R4i-SDHC B9S**](http://www.nds-card.com/ProShow.asp?ProID=574) | $15.99 | September 3, 2019 | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot**; can be flashed back to an NDS flashcart. | +| [**R4i Gold 3DS Plus**](http://www.nds-card.com/ProShow.asp?ProID=575) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot** ([internal switch to switch between ntrboot and NDS modes]({{ "/images/screenshots/r4i-gold-3ds-plus.png" | absolute_url }})); do not manually flash with ntrboot. | +| [**Acekard 2i**](http://www.nds-card.com/ProShow.asp?ProID=160) | $20.99 | No | <= 4.3.0 | <= 1.4.4 | | +| [**DSTT**](http://www.nds-card.com/ProShow.asp?ProID=157) | $9.99 | No | None | None | Only models with [certain flash chips](https://gist.github.com/yuukieve/6b48f1bb8dd15136403c15c39fafdb42) are compatible with ntrboot. | +| [**R4i Gold 3DS**](http://www.nds-card.com/ProShow.asp?ProID=149) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | All RTS revisions are compatible. | +| [**R4i-SDHC 3DS RTS**](http://www.nds-card.com/ProShow.asp?ProID=146) | $13.99 | 1.87: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | | +| [**R4iSDHC GOLD Pro 20XX**](http://www.nds-card.com/ProShow.asp?ProID=490) | $9.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. 2013 models are incompatible. | +| [**R4iSDHC RTS LITE 20XX**](http://www.nds-card.com/ProShow.asp?ProID=450) | $13.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. 2013 models are incompatible. | | **Ace3DS X** | | No | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot** (external switch to switch between ntrboot ("3DS") and NDS modes); do not manually flash with ntrboot. | | **Ace3DS Plus** | | No | <= 11.9.0 | <= 1.4.5 | | | **Gateway Blue** | | No | 4.1.0 - 4.5.0 | <= 1.4.5 | | @@ -49,7 +49,7 @@ To test if a magnet will work, hold it on or around the (A)(B)(X)(Y) buttons whi Note that the flashcart will not be able to be used for its standard functions while the ntrboot exploit is installed on it (except for in the case of the Acekard 2i, which remains functional *on NDS and custom firmware 3DS systems only*). This means that, for most flashcarts, it will not even display on the home menu. There are optional steps at the end of the ntrboot flashing instructions to remove it from your flashcart when you are done. -Note that in some rare circumstances, it may be possible for the flashing process to **brick** a counterfeit flashcart and render it permanently unusable. This is unlikely, but nevertheless only original listed flashcarts are supported. To reduce the chance of receiving a counterfeit card, it is recommended that you use a reputable site to buy your flashcart (such as [NDS Card](http://www.nds-card.net/)) +Note that in some rare circumstances, it may be possible for the flashing process to **brick** a counterfeit flashcart and render it permanently unusable. This is unlikely, but nevertheless only original listed flashcarts are supported. To reduce the chance of receiving a counterfeit card, it is recommended that you use a reputable site to buy your flashcart (such as [NDS Card](http://www.nds-card.com/)) {: .notice--danger} ___ diff --git a/_pages/tr_TR/seedminer.txt b/_pages/tr_TR/seedminer.txt index 54463c9251..bb918d4111 100644 --- a/_pages/tr_TR/seedminer.txt +++ b/_pages/tr_TR/seedminer.txt @@ -63,9 +63,7 @@ There are two different methods for building on the Seedminer exploit (described 1. Open [Bruteforce Movable](https://bruteforcemovable.com/) on your computer + This site can automate the retrieval of `movable_part1.sed` (using a bot 3DS console) and the breaking of your device's DSiWare encryption (using a volunteer's computer to run Seedminer) - + If you already have access to a 3DS capable of launching the Homebrew Launcher, you can manually retrieve your `movable_part1.sed` using that device by following [these](https://jisagi.github.io/SeedminerGuide/seedminerSelf/#section1) instructions - + If you already have access to a PC with a powerful graphics card, you can manually calculate your `movable.sed` using it by following [these](https://jisagi.github.io/SeedminerGuide/seedminerSelf/#section2) instructions - + If the automated service is nonfunctional and you cannot do one or both of those manually, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you + + If the automated service is nonfunctional, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you 1. Enter your device's Friend Code (with no spaces or dashes) into the "Your friend code" field 1. Paste your device's 32 character long folder name into the "Your ID0" field 1. Complete the "I'm not a robot" captcha @@ -74,11 +72,11 @@ There are two different methods for building on the Seedminer exploit (described 1. When prompted, use the "Register Friend" button on your device to add the friend code of the bot 3DS console 1. Wait for the site to update + If it does not, wait a few minutes before refreshing the page once -1. Select "Continue" -1. Wait for the process to complete - + This can take a while (up to an hour in some cases) - + During this process, the bot may not show up on your 3ds. As long as the website updates, this is not an issue. - + If you are still waiting after an hour, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you +1. Once the site processes your information, you will be given the option to "Continue" or "Do another device". Click the green "Continue" button +1. Wait for the remainder of the process to complete + + This is usually fast (1-5 minutes) but in some cases, can take up to half an hour. + + During this process, the bot you added may not show up on your 3ds. As long as the website updates, this is not an issue. + + If you are still waiting after half an hour, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you 1. When the process has completed, download your `movable.sed` file from the site + Keep this file as you will need it in the upcoming pages @@ -102,7 +100,7 @@ ___ #### Seedminer + Steelhax + Frogtool -This method of using Seedminer for further exploitation uses your `movable.sed` file to gain access to the Homebrew Launcher using the Steelhax exploit for the purposes of injecting an exploitable DSiWare title into the DS Download Play application. This method requires you to already own (or download) the free "Steel Divers: Sub Wars" game from the eShop. +This method of using Seedminer for further exploitation uses your `movable.sed` file to gain access to the Homebrew Launcher using the Steelhax exploit for the purposes of injecting an exploitable DSiWare title into the DS Download Play application. This method requires you to already own (or download) the free "Steel Diver: Sub Wars" game from the eShop. This method is only compatible with the EUR, JPN, and USA regions, and is somewhat more complicated than the above method. It is only recommended to use this method if you have a EUR region device and do not wish to pay for a DSiWare game, or if the above method does not work for you for some reason. diff --git a/_pages/tr_TR/uninstall-cfw.txt b/_pages/tr_TR/uninstall-cfw.txt index 6ec50a7a45..ca783c534d 100644 --- a/_pages/tr_TR/uninstall-cfw.txt +++ b/_pages/tr_TR/uninstall-cfw.txt @@ -11,7 +11,7 @@ This will completely remove CFW from your device, including Boot9Strap and Luma3 This is almost never the solution to fix any issues you encounter with your CFW installation. A better idea would be to read the [troubleshooting](troubleshooting) page or ask (in English) for help at [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp). {: .notice--danger} -Any unsigned (illegitimate) games will be rendered unusable and can be manually removed using the Data Management section of the System Settings. Use a [save manager](https://github.com/FlagBrew/Checkpoint/releases/latest) to backup any saves for these unsigned (illegitimate) games you care about. +Any unsigned (illegitimate) games will be rendered unusable and should be manually removed before starting this process by using the Data Management section of the System Settings. Use a [save manager](https://github.com/FlagBrew/Checkpoint/releases/latest) to backup any saves for these unsigned (illegitimate) games you care about. This will not affect your NNID, any legitimately purchased games, or any saves for those legitimately purchased games. @@ -26,21 +26,43 @@ Note that if you have any payload files other than `GodMode9.firm` in the `/luma ### Instructions -#### Section I - Prep Work +#### Section I - Safety Test 1. Cihazınızı kapatın 1. SD kartınızı bilgisayarınıza takın 1. Copy `GodMode9.firm` from the GodMode9 `.zip` to the `/luma/payloads/` folder on your SD card 1. Copy the `gm9` folder from the GodMode9 `.zip` to the root of your SD card 1. SD kartınızı cihazınıza tekrar takın -1. Power on your device - -#### Section II - Running Uninstall Script - 1. Launch GodMode9 by holding (Start) during boot 1. If you are prompted to create an essential files backup, press (A) to do so, then press (A) to continue once it has completed 1. If you are prompted to fix the RTC date&time, press (A) to do so, then set the date and time, then press (A) to continue + Note that, if you had to fix the RTC date and time, you will have to fix the time in the System Settings as well after this guide +1. Navigate to `[1:] SYSNAND CTRNAND > title > 00040138 > (X)0000002 > content` + + On a "New" edition console, the (X) will instead be 2 + + On an "Old" edition console, the (X) will instead be 0 +1. Select the `.app` file +1. Select `NCCH Image Options` +1. Select `Mount image to drive` +1. In the window that appears, open the `exefs` folder +1. In this folder, select the `.firm` file +1. Select "Firm Options" +1. Select "Boot Firm" +1. When prompted, choose to decrypt and make a copy +1. You should boot into the regular 3DS Home Menu. If you do, power your device off and continue to the next section + + If you do NOT boot into the regular 3DS Home Menu, continuing with these instructions **WILL** brick your device. You should join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you + +#### Section II - Prep Work + +1. Power on your device +1. Navigate to System Settings > Data Management > Nintendo 3DS > Software +1. In this list of software, delete any non-Nintendo content you installed while using CFW + + This includes common system software such as FBI, Anemone3DS, Luma Updater, Homebrew Launcher, Checkpoint, and others, along with any non-eShop games + + Failure to remove CFW software before uninstalling CFW may break access to the Data Management menu after uninstalling CFW +1. Cihazınızı kapatın + +#### Section III - Running Uninstall Script + +1. Launch GodMode9 by holding (Start) during boot 1. Press (Home) to bring up the action menu 1. Select "Scripts..." 1. Select "GM9Megascript" diff --git a/_pages/uk_UA/finalizing-setup.txt b/_pages/uk_UA/finalizing-setup.txt index 8ccda2a04f..f7c9c087d4 100644 --- a/_pages/uk_UA/finalizing-setup.txt +++ b/_pages/uk_UA/finalizing-setup.txt @@ -18,6 +18,8 @@ During this process, we also setup programs such as the following: + **Luma3DS Updater** *(updates your CFW installation easily)* + **GodMode9** *(multipurpose tool which can do NAND and cartridge functions)* + **Homebrew Launcher Loader** *(launches the Homebrew Launcher)* ++ **DSP1** *(allows homebrew applications to have sound)* ++ **ctr-no-timeoffset** *(removes the rtc offset so that the home menu and rtc timestamps match)* ### What You Need @@ -143,7 +145,7 @@ If, before following this guide, you already had an EmuNAND setup and would like 1. Press (B) to return to the main menu 1. Hold (R) and press (B) at the same time to eject your SD card 1. Insert your SD card into your computer -1. Copy `__sysnand_###.bin`, `essential.exefs`, and `boot9.bin` from the `/gm9/out/` folder on your SD card to a safe location on your computer +1. Copy `__sysnand_###.bin`, `__sysnand_###.bin.sha`, `essential.exefs`, and `boot9.bin` from the `/gm9/out/` folder on your SD card to a safe location on your computer + Make backups in multiple locations (such as online file storage) + These backups will save you from a brick and/or help you recover files from the NAND image if anything goes wrong in the future 1. Delete `__sysnand_###.bin` and `__sysnand_###.bin.sha` from the `/gm9/out/` folder on your SD card after copying it diff --git a/_pages/uk_UA/homebrew-launcher-(steelhax).txt b/_pages/uk_UA/homebrew-launcher-(steelhax).txt index 571fd1982d..568e53b124 100644 --- a/_pages/uk_UA/homebrew-launcher-(steelhax).txt +++ b/_pages/uk_UA/homebrew-launcher-(steelhax).txt @@ -8,7 +8,7 @@ title: "Homebrew Launcher (Steelhax)" This method of using Seedminer for further exploitation uses your `movable.sed` file to gain access to the Homebrew Launcher using the Steelhax exploit for the purposes of injecting an exploitable DSiWare title into the DS Download Play application. This method requires you to already own (or download) the free "Steel Divers: Sub Wars" game from the eShop. -If your device already has access to the Homebrew Launcher (whether through Steelhax or another exploit), you can skip to [Installing Boot9strap (Frogminer)](installing-boot9strap-(frogminer)). +If your device already has access to the Homebrew Launcher (whether through Steelhax or another exploit), you can skip to [Installing Boot9strap (Frogtool)](installing-boot9strap-(frogtool)). {: .notice--success} If you already have Steel Diver: Sub Wars, this process will overwrite your game's save file! @@ -17,6 +17,7 @@ If you already have Steel Diver: Sub Wars, this process will overwrite your game ### What You Need * The free eShop game "Steel Diver: Sub Wars" +* Your `movable.sed` file from completing [Seedminer](seedminer) * The latest release of [the Homebrew Launcher](https://github.com/fincs/new-hbmenu/releases/latest) * The latest release of [Steelhax](https://github.com/VegaRoXas/vegaroxas.github.io/raw/master/files/steelhax-installer.rar) * The [otherapp payload](https://smealum.github.io/3ds/#otherapp) *(for your region and version)* @@ -39,7 +40,7 @@ If you already have Steel Diver: Sub Wars, this process will overwrite your game 1. Exit "Steel Diver: Sub Wars" 1. Power off your device 1. Insert your SD card into your computer -1. Open [the Steelminer Injector website](http://steelminer.jisagi.net/injector) on your computer +1. Open [the Steelminer Injector website](https://bruteforcemovable.com/steelhax/) on your computer 1. Select your `movable.sed` file 1. Select "Start!" 1. Wait for the process to complete diff --git a/_pages/uk_UA/installing-boot9strap-(fredtool).txt b/_pages/uk_UA/installing-boot9strap-(fredtool).txt index ca3da37631..22a79f26c5 100644 --- a/_pages/uk_UA/installing-boot9strap-(fredtool).txt +++ b/_pages/uk_UA/installing-boot9strap-(fredtool).txt @@ -10,8 +10,6 @@ This method of using Seedminer for further exploitation uses your `movable.sed` This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). -To use the [magnet](https://wikipedia.org/wiki/Magnet_URI_scheme) links on this page, you will need a torrent client like [Deluge](http://dev.deluge-torrent.org/wiki/Download). - To extract the `.7z` and `.rar` files linked on this page, you will need a file archiver like [7-Zip](http://www.7-zip.org/) or [The Unarchiver](https://theunarchiver.com/). ### What You Need diff --git a/_pages/uk_UA/ntrboot.txt b/_pages/uk_UA/ntrboot.txt index a5c9bc16cd..35ffad7d57 100644 --- a/_pages/uk_UA/ntrboot.txt +++ b/_pages/uk_UA/ntrboot.txt @@ -17,14 +17,14 @@ Note that carts with a "Time Bomb" will no longer be able to launch `.nds` files | Flashcart Name | Current Price | "Time Bomb"? | 3DS Versions? | DSi Versions? | Other Notes | |-|-:|:-:|:-:|:-:|-| -| [**R4i-SDHC B9S**](http://www.nds-card.net/ProShow.asp?ProID=574) | $15.99 | September 3, 2019 | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot**; can be flashed back to an NDS flashcart. | -| [**R4i Gold 3DS Plus**](http://www.nds-card.net/ProShow.asp?ProID=575) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot** ([internal switch to switch between ntrboot and NDS modes]({{ "/images/screenshots/r4i-gold-3ds-plus.png" | absolute_url }})); do not manually flash with ntrboot. | -| [**Acekard 2i**](http://www.nds-card.net/ProShow.asp?ProID=160) | $20.99 | No | <= 4.3.0 | <= 1.4.4 | | -| [**DSTT**](http://www.nds-card.net/ProShow.asp?ProID=157) | $9.99 | No | None | None | Only models with [certain flash chips](https://gist.github.com/yuukieve/6b48f1bb8dd15136403c15c39fafdb42) are compatible with ntrboot. | -| [**R4i Gold 3DS**](http://www.nds-card.net/ProShow.asp?ProID=149) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | All RTS revisions are compatible. | -| [**R4i-SDHC 3DS RTS**](http://www.nds-card.net/ProShow.asp?ProID=146) | $13.99 | 1.87: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | | -| [**R4iSDHC GOLD Pro 20XX**](http://www.nds-card.net/ProShow.asp?ProID=490) | $9.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. 2013 models are incompatible. | -| [**R4iSDHC RTS LITE 20XX**](http://www.nds-card.net/ProShow.asp?ProID=450) | $13.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. 2013 models are incompatible. | +| [**R4i-SDHC B9S**](http://www.nds-card.com/ProShow.asp?ProID=574) | $15.99 | September 3, 2019 | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot**; can be flashed back to an NDS flashcart. | +| [**R4i Gold 3DS Plus**](http://www.nds-card.com/ProShow.asp?ProID=575) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot** ([internal switch to switch between ntrboot and NDS modes]({{ "/images/screenshots/r4i-gold-3ds-plus.png" | absolute_url }})); do not manually flash with ntrboot. | +| [**Acekard 2i**](http://www.nds-card.com/ProShow.asp?ProID=160) | $20.99 | No | <= 4.3.0 | <= 1.4.4 | | +| [**DSTT**](http://www.nds-card.com/ProShow.asp?ProID=157) | $9.99 | No | None | None | Only models with [certain flash chips](https://gist.github.com/yuukieve/6b48f1bb8dd15136403c15c39fafdb42) are compatible with ntrboot. | +| [**R4i Gold 3DS**](http://www.nds-card.com/ProShow.asp?ProID=149) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | All RTS revisions are compatible. | +| [**R4i-SDHC 3DS RTS**](http://www.nds-card.com/ProShow.asp?ProID=146) | $13.99 | 1.87: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | | +| [**R4iSDHC GOLD Pro 20XX**](http://www.nds-card.com/ProShow.asp?ProID=490) | $9.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. 2013 models are incompatible. | +| [**R4iSDHC RTS LITE 20XX**](http://www.nds-card.com/ProShow.asp?ProID=450) | $13.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. 2013 models are incompatible. | | **Ace3DS X** | | No | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot** (external switch to switch between ntrboot ("3DS") and NDS modes); do not manually flash with ntrboot. | | **Ace3DS Plus** | | No | <= 11.9.0 | <= 1.4.5 | | | **Gateway Blue** | | No | 4.1.0 - 4.5.0 | <= 1.4.5 | | @@ -49,7 +49,7 @@ To test if a magnet will work, hold it on or around the (A)(B)(X)(Y) buttons whi Note that the flashcart will not be able to be used for its standard functions while the ntrboot exploit is installed on it (except for in the case of the Acekard 2i, which remains functional *on NDS and custom firmware 3DS systems only*). This means that, for most flashcarts, it will not even display on the home menu. There are optional steps at the end of the ntrboot flashing instructions to remove it from your flashcart when you are done. -Note that in some rare circumstances, it may be possible for the flashing process to **brick** a counterfeit flashcart and render it permanently unusable. This is unlikely, but nevertheless only original listed flashcarts are supported. To reduce the chance of receiving a counterfeit card, it is recommended that you use a reputable site to buy your flashcart (such as [NDS Card](http://www.nds-card.net/)) +Note that in some rare circumstances, it may be possible for the flashing process to **brick** a counterfeit flashcart and render it permanently unusable. This is unlikely, but nevertheless only original listed flashcarts are supported. To reduce the chance of receiving a counterfeit card, it is recommended that you use a reputable site to buy your flashcart (such as [NDS Card](http://www.nds-card.com/)) {: .notice--danger} ___ diff --git a/_pages/uk_UA/seedminer.txt b/_pages/uk_UA/seedminer.txt index 4e8bfbaa60..0e0a6ee1b4 100644 --- a/_pages/uk_UA/seedminer.txt +++ b/_pages/uk_UA/seedminer.txt @@ -63,9 +63,7 @@ There are two different methods for building on the Seedminer exploit (described 1. Open [Bruteforce Movable](https://bruteforcemovable.com/) on your computer + This site can automate the retrieval of `movable_part1.sed` (using a bot 3DS console) and the breaking of your device's DSiWare encryption (using a volunteer's computer to run Seedminer) - + If you already have access to a 3DS capable of launching the Homebrew Launcher, you can manually retrieve your `movable_part1.sed` using that device by following [these](https://jisagi.github.io/SeedminerGuide/seedminerSelf/#section1) instructions - + If you already have access to a PC with a powerful graphics card, you can manually calculate your `movable.sed` using it by following [these](https://jisagi.github.io/SeedminerGuide/seedminerSelf/#section2) instructions - + If the automated service is nonfunctional and you cannot do one or both of those manually, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you + + If the automated service is nonfunctional, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you 1. Enter your device's Friend Code (with no spaces or dashes) into the "Your friend code" field 1. Paste your device's 32 character long folder name into the "Your ID0" field 1. Complete the "I'm not a robot" captcha @@ -74,11 +72,11 @@ There are two different methods for building on the Seedminer exploit (described 1. When prompted, use the "Register Friend" button on your device to add the friend code of the bot 3DS console 1. Wait for the site to update + If it does not, wait a few minutes before refreshing the page once -1. Select "Continue" -1. Wait for the process to complete - + This can take a while (up to an hour in some cases) - + During this process, the bot may not show up on your 3ds. As long as the website updates, this is not an issue. - + If you are still waiting after an hour, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you +1. Once the site processes your information, you will be given the option to "Continue" or "Do another device". Click the green "Continue" button +1. Wait for the remainder of the process to complete + + This is usually fast (1-5 minutes) but in some cases, can take up to half an hour. + + During this process, the bot you added may not show up on your 3ds. As long as the website updates, this is not an issue. + + If you are still waiting after half an hour, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you 1. When the process has completed, download your `movable.sed` file from the site + Keep this file as you will need it in the upcoming pages @@ -102,7 +100,7 @@ ___ #### Seedminer + Steelhax + Frogtool -This method of using Seedminer for further exploitation uses your `movable.sed` file to gain access to the Homebrew Launcher using the Steelhax exploit for the purposes of injecting an exploitable DSiWare title into the DS Download Play application. This method requires you to already own (or download) the free "Steel Divers: Sub Wars" game from the eShop. +This method of using Seedminer for further exploitation uses your `movable.sed` file to gain access to the Homebrew Launcher using the Steelhax exploit for the purposes of injecting an exploitable DSiWare title into the DS Download Play application. This method requires you to already own (or download) the free "Steel Diver: Sub Wars" game from the eShop. This method is only compatible with the EUR, JPN, and USA regions, and is somewhat more complicated than the above method. It is only recommended to use this method if you have a EUR region device and do not wish to pay for a DSiWare game, or if the above method does not work for you for some reason. diff --git a/_pages/uk_UA/uninstall-cfw.txt b/_pages/uk_UA/uninstall-cfw.txt index 4745050aab..584998ac19 100644 --- a/_pages/uk_UA/uninstall-cfw.txt +++ b/_pages/uk_UA/uninstall-cfw.txt @@ -11,7 +11,7 @@ This will completely remove CFW from your device, including Boot9Strap and Luma3 This is almost never the solution to fix any issues you encounter with your CFW installation. A better idea would be to read the [troubleshooting](troubleshooting) page or ask (in English) for help at [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp). {: .notice--danger} -Any unsigned (illegitimate) games will be rendered unusable and can be manually removed using the Data Management section of the System Settings. Use a [save manager](https://github.com/FlagBrew/Checkpoint/releases/latest) to backup any saves for these unsigned (illegitimate) games you care about. +Any unsigned (illegitimate) games will be rendered unusable and should be manually removed before starting this process by using the Data Management section of the System Settings. Use a [save manager](https://github.com/FlagBrew/Checkpoint/releases/latest) to backup any saves for these unsigned (illegitimate) games you care about. This will not affect your NNID, any legitimately purchased games, or any saves for those legitimately purchased games. @@ -26,21 +26,43 @@ Note that if you have any payload files other than `GodMode9.firm` in the `/luma ### Instructions -#### Section I - Prep Work +#### Section I - Safety Test 1. Power off your device 1. Insert your SD card into your computer 1. Copy `GodMode9.firm` from the GodMode9 `.zip` to the `/luma/payloads/` folder on your SD card 1. Copy the `gm9` folder from the GodMode9 `.zip` to the root of your SD card 1. Reinsert your SD card into your device -1. Power on your device - -#### Section II - Running Uninstall Script - 1. Launch GodMode9 by holding (Start) during boot 1. If you are prompted to create an essential files backup, press (A) to do so, then press (A) to continue once it has completed 1. If you are prompted to fix the RTC date&time, press (A) to do so, then set the date and time, then press (A) to continue + Note that, if you had to fix the RTC date and time, you will have to fix the time in the System Settings as well after this guide +1. Navigate to `[1:] SYSNAND CTRNAND > title > 00040138 > (X)0000002 > content` + + On a "New" edition console, the (X) will instead be 2 + + On an "Old" edition console, the (X) will instead be 0 +1. Select the `.app` file +1. Select `NCCH Image Options` +1. Select `Mount image to drive` +1. In the window that appears, open the `exefs` folder +1. In this folder, select the `.firm` file +1. Select "Firm Options" +1. Select "Boot Firm" +1. When prompted, choose to decrypt and make a copy +1. You should boot into the regular 3DS Home Menu. If you do, power your device off and continue to the next section + + If you do NOT boot into the regular 3DS Home Menu, continuing with these instructions **WILL** brick your device. You should join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you + +#### Section II - Prep Work + +1. Power on your device +1. Navigate to System Settings > Data Management > Nintendo 3DS > Software +1. In this list of software, delete any non-Nintendo content you installed while using CFW + + This includes common system software such as FBI, Anemone3DS, Luma Updater, Homebrew Launcher, Checkpoint, and others, along with any non-eShop games + + Failure to remove CFW software before uninstalling CFW may break access to the Data Management menu after uninstalling CFW +1. Power off your device + +#### Section III - Running Uninstall Script + +1. Launch GodMode9 by holding (Start) during boot 1. Press (Home) to bring up the action menu 1. Select "Scripts..." 1. Select "GM9Megascript" diff --git a/_pages/vi_VN/finalizing-setup.txt b/_pages/vi_VN/finalizing-setup.txt index 8ccda2a04f..f7c9c087d4 100644 --- a/_pages/vi_VN/finalizing-setup.txt +++ b/_pages/vi_VN/finalizing-setup.txt @@ -18,6 +18,8 @@ During this process, we also setup programs such as the following: + **Luma3DS Updater** *(updates your CFW installation easily)* + **GodMode9** *(multipurpose tool which can do NAND and cartridge functions)* + **Homebrew Launcher Loader** *(launches the Homebrew Launcher)* ++ **DSP1** *(allows homebrew applications to have sound)* ++ **ctr-no-timeoffset** *(removes the rtc offset so that the home menu and rtc timestamps match)* ### What You Need @@ -143,7 +145,7 @@ If, before following this guide, you already had an EmuNAND setup and would like 1. Press (B) to return to the main menu 1. Hold (R) and press (B) at the same time to eject your SD card 1. Insert your SD card into your computer -1. Copy `__sysnand_###.bin`, `essential.exefs`, and `boot9.bin` from the `/gm9/out/` folder on your SD card to a safe location on your computer +1. Copy `__sysnand_###.bin`, `__sysnand_###.bin.sha`, `essential.exefs`, and `boot9.bin` from the `/gm9/out/` folder on your SD card to a safe location on your computer + Make backups in multiple locations (such as online file storage) + These backups will save you from a brick and/or help you recover files from the NAND image if anything goes wrong in the future 1. Delete `__sysnand_###.bin` and `__sysnand_###.bin.sha` from the `/gm9/out/` folder on your SD card after copying it diff --git a/_pages/vi_VN/homebrew-launcher-(steelhax).txt b/_pages/vi_VN/homebrew-launcher-(steelhax).txt index 571fd1982d..568e53b124 100644 --- a/_pages/vi_VN/homebrew-launcher-(steelhax).txt +++ b/_pages/vi_VN/homebrew-launcher-(steelhax).txt @@ -8,7 +8,7 @@ title: "Homebrew Launcher (Steelhax)" This method of using Seedminer for further exploitation uses your `movable.sed` file to gain access to the Homebrew Launcher using the Steelhax exploit for the purposes of injecting an exploitable DSiWare title into the DS Download Play application. This method requires you to already own (or download) the free "Steel Divers: Sub Wars" game from the eShop. -If your device already has access to the Homebrew Launcher (whether through Steelhax or another exploit), you can skip to [Installing Boot9strap (Frogminer)](installing-boot9strap-(frogminer)). +If your device already has access to the Homebrew Launcher (whether through Steelhax or another exploit), you can skip to [Installing Boot9strap (Frogtool)](installing-boot9strap-(frogtool)). {: .notice--success} If you already have Steel Diver: Sub Wars, this process will overwrite your game's save file! @@ -17,6 +17,7 @@ If you already have Steel Diver: Sub Wars, this process will overwrite your game ### What You Need * The free eShop game "Steel Diver: Sub Wars" +* Your `movable.sed` file from completing [Seedminer](seedminer) * The latest release of [the Homebrew Launcher](https://github.com/fincs/new-hbmenu/releases/latest) * The latest release of [Steelhax](https://github.com/VegaRoXas/vegaroxas.github.io/raw/master/files/steelhax-installer.rar) * The [otherapp payload](https://smealum.github.io/3ds/#otherapp) *(for your region and version)* @@ -39,7 +40,7 @@ If you already have Steel Diver: Sub Wars, this process will overwrite your game 1. Exit "Steel Diver: Sub Wars" 1. Power off your device 1. Insert your SD card into your computer -1. Open [the Steelminer Injector website](http://steelminer.jisagi.net/injector) on your computer +1. Open [the Steelminer Injector website](https://bruteforcemovable.com/steelhax/) on your computer 1. Select your `movable.sed` file 1. Select "Start!" 1. Wait for the process to complete diff --git a/_pages/vi_VN/installing-boot9strap-(fredtool).txt b/_pages/vi_VN/installing-boot9strap-(fredtool).txt index ca3da37631..22a79f26c5 100644 --- a/_pages/vi_VN/installing-boot9strap-(fredtool).txt +++ b/_pages/vi_VN/installing-boot9strap-(fredtool).txt @@ -10,8 +10,6 @@ This method of using Seedminer for further exploitation uses your `movable.sed` This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). -To use the [magnet](https://wikipedia.org/wiki/Magnet_URI_scheme) links on this page, you will need a torrent client like [Deluge](http://dev.deluge-torrent.org/wiki/Download). - To extract the `.7z` and `.rar` files linked on this page, you will need a file archiver like [7-Zip](http://www.7-zip.org/) or [The Unarchiver](https://theunarchiver.com/). ### What You Need diff --git a/_pages/vi_VN/ntrboot.txt b/_pages/vi_VN/ntrboot.txt index a5c9bc16cd..35ffad7d57 100644 --- a/_pages/vi_VN/ntrboot.txt +++ b/_pages/vi_VN/ntrboot.txt @@ -17,14 +17,14 @@ Note that carts with a "Time Bomb" will no longer be able to launch `.nds` files | Flashcart Name | Current Price | "Time Bomb"? | 3DS Versions? | DSi Versions? | Other Notes | |-|-:|:-:|:-:|:-:|-| -| [**R4i-SDHC B9S**](http://www.nds-card.net/ProShow.asp?ProID=574) | $15.99 | September 3, 2019 | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot**; can be flashed back to an NDS flashcart. | -| [**R4i Gold 3DS Plus**](http://www.nds-card.net/ProShow.asp?ProID=575) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot** ([internal switch to switch between ntrboot and NDS modes]({{ "/images/screenshots/r4i-gold-3ds-plus.png" | absolute_url }})); do not manually flash with ntrboot. | -| [**Acekard 2i**](http://www.nds-card.net/ProShow.asp?ProID=160) | $20.99 | No | <= 4.3.0 | <= 1.4.4 | | -| [**DSTT**](http://www.nds-card.net/ProShow.asp?ProID=157) | $9.99 | No | None | None | Only models with [certain flash chips](https://gist.github.com/yuukieve/6b48f1bb8dd15136403c15c39fafdb42) are compatible with ntrboot. | -| [**R4i Gold 3DS**](http://www.nds-card.net/ProShow.asp?ProID=149) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | All RTS revisions are compatible. | -| [**R4i-SDHC 3DS RTS**](http://www.nds-card.net/ProShow.asp?ProID=146) | $13.99 | 1.87: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | | -| [**R4iSDHC GOLD Pro 20XX**](http://www.nds-card.net/ProShow.asp?ProID=490) | $9.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. 2013 models are incompatible. | -| [**R4iSDHC RTS LITE 20XX**](http://www.nds-card.net/ProShow.asp?ProID=450) | $13.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. 2013 models are incompatible. | +| [**R4i-SDHC B9S**](http://www.nds-card.com/ProShow.asp?ProID=574) | $15.99 | September 3, 2019 | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot**; can be flashed back to an NDS flashcart. | +| [**R4i Gold 3DS Plus**](http://www.nds-card.com/ProShow.asp?ProID=575) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot** ([internal switch to switch between ntrboot and NDS modes]({{ "/images/screenshots/r4i-gold-3ds-plus.png" | absolute_url }})); do not manually flash with ntrboot. | +| [**Acekard 2i**](http://www.nds-card.com/ProShow.asp?ProID=160) | $20.99 | No | <= 4.3.0 | <= 1.4.4 | | +| [**DSTT**](http://www.nds-card.com/ProShow.asp?ProID=157) | $9.99 | No | None | None | Only models with [certain flash chips](https://gist.github.com/yuukieve/6b48f1bb8dd15136403c15c39fafdb42) are compatible with ntrboot. | +| [**R4i Gold 3DS**](http://www.nds-card.com/ProShow.asp?ProID=149) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | All RTS revisions are compatible. | +| [**R4i-SDHC 3DS RTS**](http://www.nds-card.com/ProShow.asp?ProID=146) | $13.99 | 1.87: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | | +| [**R4iSDHC GOLD Pro 20XX**](http://www.nds-card.com/ProShow.asp?ProID=490) | $9.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. 2013 models are incompatible. | +| [**R4iSDHC RTS LITE 20XX**](http://www.nds-card.com/ProShow.asp?ProID=450) | $13.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. 2013 models are incompatible. | | **Ace3DS X** | | No | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot** (external switch to switch between ntrboot ("3DS") and NDS modes); do not manually flash with ntrboot. | | **Ace3DS Plus** | | No | <= 11.9.0 | <= 1.4.5 | | | **Gateway Blue** | | No | 4.1.0 - 4.5.0 | <= 1.4.5 | | @@ -49,7 +49,7 @@ To test if a magnet will work, hold it on or around the (A)(B)(X)(Y) buttons whi Note that the flashcart will not be able to be used for its standard functions while the ntrboot exploit is installed on it (except for in the case of the Acekard 2i, which remains functional *on NDS and custom firmware 3DS systems only*). This means that, for most flashcarts, it will not even display on the home menu. There are optional steps at the end of the ntrboot flashing instructions to remove it from your flashcart when you are done. -Note that in some rare circumstances, it may be possible for the flashing process to **brick** a counterfeit flashcart and render it permanently unusable. This is unlikely, but nevertheless only original listed flashcarts are supported. To reduce the chance of receiving a counterfeit card, it is recommended that you use a reputable site to buy your flashcart (such as [NDS Card](http://www.nds-card.net/)) +Note that in some rare circumstances, it may be possible for the flashing process to **brick** a counterfeit flashcart and render it permanently unusable. This is unlikely, but nevertheless only original listed flashcarts are supported. To reduce the chance of receiving a counterfeit card, it is recommended that you use a reputable site to buy your flashcart (such as [NDS Card](http://www.nds-card.com/)) {: .notice--danger} ___ diff --git a/_pages/vi_VN/seedminer.txt b/_pages/vi_VN/seedminer.txt index 4e8bfbaa60..0e0a6ee1b4 100644 --- a/_pages/vi_VN/seedminer.txt +++ b/_pages/vi_VN/seedminer.txt @@ -63,9 +63,7 @@ There are two different methods for building on the Seedminer exploit (described 1. Open [Bruteforce Movable](https://bruteforcemovable.com/) on your computer + This site can automate the retrieval of `movable_part1.sed` (using a bot 3DS console) and the breaking of your device's DSiWare encryption (using a volunteer's computer to run Seedminer) - + If you already have access to a 3DS capable of launching the Homebrew Launcher, you can manually retrieve your `movable_part1.sed` using that device by following [these](https://jisagi.github.io/SeedminerGuide/seedminerSelf/#section1) instructions - + If you already have access to a PC with a powerful graphics card, you can manually calculate your `movable.sed` using it by following [these](https://jisagi.github.io/SeedminerGuide/seedminerSelf/#section2) instructions - + If the automated service is nonfunctional and you cannot do one or both of those manually, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you + + If the automated service is nonfunctional, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you 1. Enter your device's Friend Code (with no spaces or dashes) into the "Your friend code" field 1. Paste your device's 32 character long folder name into the "Your ID0" field 1. Complete the "I'm not a robot" captcha @@ -74,11 +72,11 @@ There are two different methods for building on the Seedminer exploit (described 1. When prompted, use the "Register Friend" button on your device to add the friend code of the bot 3DS console 1. Wait for the site to update + If it does not, wait a few minutes before refreshing the page once -1. Select "Continue" -1. Wait for the process to complete - + This can take a while (up to an hour in some cases) - + During this process, the bot may not show up on your 3ds. As long as the website updates, this is not an issue. - + If you are still waiting after an hour, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you +1. Once the site processes your information, you will be given the option to "Continue" or "Do another device". Click the green "Continue" button +1. Wait for the remainder of the process to complete + + This is usually fast (1-5 minutes) but in some cases, can take up to half an hour. + + During this process, the bot you added may not show up on your 3ds. As long as the website updates, this is not an issue. + + If you are still waiting after half an hour, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you 1. When the process has completed, download your `movable.sed` file from the site + Keep this file as you will need it in the upcoming pages @@ -102,7 +100,7 @@ ___ #### Seedminer + Steelhax + Frogtool -This method of using Seedminer for further exploitation uses your `movable.sed` file to gain access to the Homebrew Launcher using the Steelhax exploit for the purposes of injecting an exploitable DSiWare title into the DS Download Play application. This method requires you to already own (or download) the free "Steel Divers: Sub Wars" game from the eShop. +This method of using Seedminer for further exploitation uses your `movable.sed` file to gain access to the Homebrew Launcher using the Steelhax exploit for the purposes of injecting an exploitable DSiWare title into the DS Download Play application. This method requires you to already own (or download) the free "Steel Diver: Sub Wars" game from the eShop. This method is only compatible with the EUR, JPN, and USA regions, and is somewhat more complicated than the above method. It is only recommended to use this method if you have a EUR region device and do not wish to pay for a DSiWare game, or if the above method does not work for you for some reason. diff --git a/_pages/vi_VN/uninstall-cfw.txt b/_pages/vi_VN/uninstall-cfw.txt index 4745050aab..584998ac19 100644 --- a/_pages/vi_VN/uninstall-cfw.txt +++ b/_pages/vi_VN/uninstall-cfw.txt @@ -11,7 +11,7 @@ This will completely remove CFW from your device, including Boot9Strap and Luma3 This is almost never the solution to fix any issues you encounter with your CFW installation. A better idea would be to read the [troubleshooting](troubleshooting) page or ask (in English) for help at [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp). {: .notice--danger} -Any unsigned (illegitimate) games will be rendered unusable and can be manually removed using the Data Management section of the System Settings. Use a [save manager](https://github.com/FlagBrew/Checkpoint/releases/latest) to backup any saves for these unsigned (illegitimate) games you care about. +Any unsigned (illegitimate) games will be rendered unusable and should be manually removed before starting this process by using the Data Management section of the System Settings. Use a [save manager](https://github.com/FlagBrew/Checkpoint/releases/latest) to backup any saves for these unsigned (illegitimate) games you care about. This will not affect your NNID, any legitimately purchased games, or any saves for those legitimately purchased games. @@ -26,21 +26,43 @@ Note that if you have any payload files other than `GodMode9.firm` in the `/luma ### Instructions -#### Section I - Prep Work +#### Section I - Safety Test 1. Power off your device 1. Insert your SD card into your computer 1. Copy `GodMode9.firm` from the GodMode9 `.zip` to the `/luma/payloads/` folder on your SD card 1. Copy the `gm9` folder from the GodMode9 `.zip` to the root of your SD card 1. Reinsert your SD card into your device -1. Power on your device - -#### Section II - Running Uninstall Script - 1. Launch GodMode9 by holding (Start) during boot 1. If you are prompted to create an essential files backup, press (A) to do so, then press (A) to continue once it has completed 1. If you are prompted to fix the RTC date&time, press (A) to do so, then set the date and time, then press (A) to continue + Note that, if you had to fix the RTC date and time, you will have to fix the time in the System Settings as well after this guide +1. Navigate to `[1:] SYSNAND CTRNAND > title > 00040138 > (X)0000002 > content` + + On a "New" edition console, the (X) will instead be 2 + + On an "Old" edition console, the (X) will instead be 0 +1. Select the `.app` file +1. Select `NCCH Image Options` +1. Select `Mount image to drive` +1. In the window that appears, open the `exefs` folder +1. In this folder, select the `.firm` file +1. Select "Firm Options" +1. Select "Boot Firm" +1. When prompted, choose to decrypt and make a copy +1. You should boot into the regular 3DS Home Menu. If you do, power your device off and continue to the next section + + If you do NOT boot into the regular 3DS Home Menu, continuing with these instructions **WILL** brick your device. You should join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you + +#### Section II - Prep Work + +1. Power on your device +1. Navigate to System Settings > Data Management > Nintendo 3DS > Software +1. In this list of software, delete any non-Nintendo content you installed while using CFW + + This includes common system software such as FBI, Anemone3DS, Luma Updater, Homebrew Launcher, Checkpoint, and others, along with any non-eShop games + + Failure to remove CFW software before uninstalling CFW may break access to the Data Management menu after uninstalling CFW +1. Power off your device + +#### Section III - Running Uninstall Script + +1. Launch GodMode9 by holding (Start) during boot 1. Press (Home) to bring up the action menu 1. Select "Scripts..." 1. Select "GM9Megascript" diff --git a/_pages/zh_CN/finalizing-setup.txt b/_pages/zh_CN/finalizing-setup.txt index 5cc088e25a..2b4fb50285 100644 --- a/_pages/zh_CN/finalizing-setup.txt +++ b/_pages/zh_CN/finalizing-setup.txt @@ -18,6 +18,8 @@ In this case, we use Luma3DS by [AuroraWright](https://github.com/AuroraWright/) + **Luma3DS Updater** *(updates your CFW installation easily)* + **GodMode9** *(multipurpose tool which can do NAND and cartridge functions)* + **Homebrew Launcher Loader** *(launches the Homebrew Launcher)* ++ **DSP1** *(allows homebrew applications to have sound)* ++ **ctr-no-timeoffset** *(removes the rtc offset so that the home menu and rtc timestamps match)* ### What You Need @@ -143,7 +145,7 @@ If, before following this guide, you already had an EmuNAND setup and would like 1. Press (B) to return to the main menu 1. Hold (R) and press (B) at the same time to eject your SD card 1. 将你的 SD 卡插入到您的计算机 -1. Copy `__sysnand_###.bin`, `essential.exefs`, and `boot9.bin` from the `/gm9/out/` folder on your SD card to a safe location on your computer +1. Copy `__sysnand_###.bin`, `__sysnand_###.bin.sha`, `essential.exefs`, and `boot9.bin` from the `/gm9/out/` folder on your SD card to a safe location on your computer + Make backups in multiple locations (such as online file storage) + These backups will save you from a brick and/or help you recover files from the NAND image if anything goes wrong in the future 1. Delete `__sysnand_###.bin` and `__sysnand_###.bin.sha` from the `/gm9/out/` folder on your SD card after copying it diff --git a/_pages/zh_CN/homebrew-launcher-(steelhax).txt b/_pages/zh_CN/homebrew-launcher-(steelhax).txt index b8b1e8513d..6fd8648403 100644 --- a/_pages/zh_CN/homebrew-launcher-(steelhax).txt +++ b/_pages/zh_CN/homebrew-launcher-(steelhax).txt @@ -8,7 +8,7 @@ title: "Homebrew Launcher (Steelhax)" This method of using Seedminer for further exploitation uses your `movable.sed` file to gain access to the Homebrew Launcher using the Steelhax exploit for the purposes of injecting an exploitable DSiWare title into the DS Download Play application. This method requires you to already own (or download) the free "Steel Divers: Sub Wars" game from the eShop. -If your device already has access to the Homebrew Launcher (whether through Steelhax or another exploit), you can skip to [Installing Boot9strap (Frogminer)](installing-boot9strap-(frogminer)). +If your device already has access to the Homebrew Launcher (whether through Steelhax or another exploit), you can skip to [Installing Boot9strap (Frogtool)](installing-boot9strap-(frogtool)). {: .notice--success} If you already have Steel Diver: Sub Wars, this process will overwrite your game's save file! @@ -17,6 +17,7 @@ If you already have Steel Diver: Sub Wars, this process will overwrite your game ### What You Need * The free eShop game "Steel Diver: Sub Wars" +* Your `movable.sed` file from completing [Seedminer](seedminer) * The latest release of [the Homebrew Launcher](https://github.com/fincs/new-hbmenu/releases/latest) * The latest release of [Steelhax](https://github.com/VegaRoXas/vegaroxas.github.io/raw/master/files/steelhax-installer.rar) * The [otherapp payload](https://smealum.github.io/3ds/#otherapp) *(for your region and version)* @@ -39,7 +40,7 @@ If you already have Steel Diver: Sub Wars, this process will overwrite your game 1. Exit "Steel Diver: Sub Wars" 1. 给设备关机 1. 将你的 SD 卡插入到您的计算机 -1. Open [the Steelminer Injector website](http://steelminer.jisagi.net/injector) on your computer +1. Open [the Steelminer Injector website](https://bruteforcemovable.com/steelhax/) on your computer 1. Select your `movable.sed` file 1. Select "Start!" 1. Wait for the process to complete diff --git a/_pages/zh_CN/installing-boot9strap-(fredtool).txt b/_pages/zh_CN/installing-boot9strap-(fredtool).txt index 5d71568062..17f65e30b7 100644 --- a/_pages/zh_CN/installing-boot9strap-(fredtool).txt +++ b/_pages/zh_CN/installing-boot9strap-(fredtool).txt @@ -10,8 +10,6 @@ This method of using Seedminer for further exploitation uses your `movable.sed` This is a currently working implementation of the "FIRM partitions known-plaintext" exploit detailed [here](https://www.3dbrew.org/wiki/3DS_System_Flaws). -To use the [magnet](https://wikipedia.org/wiki/Magnet_URI_scheme) links on this page, you will need a torrent client like [Deluge](http://dev.deluge-torrent.org/wiki/Download). - To extract the `.7z` and `.rar` files linked on this page, you will need a file archiver like [7-Zip](http://www.7-zip.org/) or [The Unarchiver](https://theunarchiver.com/). ### What You Need diff --git a/_pages/zh_CN/ntrboot.txt b/_pages/zh_CN/ntrboot.txt index a5c9bc16cd..35ffad7d57 100644 --- a/_pages/zh_CN/ntrboot.txt +++ b/_pages/zh_CN/ntrboot.txt @@ -17,14 +17,14 @@ Note that carts with a "Time Bomb" will no longer be able to launch `.nds` files | Flashcart Name | Current Price | "Time Bomb"? | 3DS Versions? | DSi Versions? | Other Notes | |-|-:|:-:|:-:|:-:|-| -| [**R4i-SDHC B9S**](http://www.nds-card.net/ProShow.asp?ProID=574) | $15.99 | September 3, 2019 | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot**; can be flashed back to an NDS flashcart. | -| [**R4i Gold 3DS Plus**](http://www.nds-card.net/ProShow.asp?ProID=575) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot** ([internal switch to switch between ntrboot and NDS modes]({{ "/images/screenshots/r4i-gold-3ds-plus.png" | absolute_url }})); do not manually flash with ntrboot. | -| [**Acekard 2i**](http://www.nds-card.net/ProShow.asp?ProID=160) | $20.99 | No | <= 4.3.0 | <= 1.4.4 | | -| [**DSTT**](http://www.nds-card.net/ProShow.asp?ProID=157) | $9.99 | No | None | None | Only models with [certain flash chips](https://gist.github.com/yuukieve/6b48f1bb8dd15136403c15c39fafdb42) are compatible with ntrboot. | -| [**R4i Gold 3DS**](http://www.nds-card.net/ProShow.asp?ProID=149) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | All RTS revisions are compatible. | -| [**R4i-SDHC 3DS RTS**](http://www.nds-card.net/ProShow.asp?ProID=146) | $13.99 | 1.87: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | | -| [**R4iSDHC GOLD Pro 20XX**](http://www.nds-card.net/ProShow.asp?ProID=490) | $9.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. 2013 models are incompatible. | -| [**R4iSDHC RTS LITE 20XX**](http://www.nds-card.net/ProShow.asp?ProID=450) | $13.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. 2013 models are incompatible. | +| [**R4i-SDHC B9S**](http://www.nds-card.com/ProShow.asp?ProID=574) | $15.99 | September 3, 2019 | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot**; can be flashed back to an NDS flashcart. | +| [**R4i Gold 3DS Plus**](http://www.nds-card.com/ProShow.asp?ProID=575) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot** ([internal switch to switch between ntrboot and NDS modes]({{ "/images/screenshots/r4i-gold-3ds-plus.png" | absolute_url }})); do not manually flash with ntrboot. | +| [**Acekard 2i**](http://www.nds-card.com/ProShow.asp?ProID=160) | $20.99 | No | <= 4.3.0 | <= 1.4.4 | | +| [**DSTT**](http://www.nds-card.com/ProShow.asp?ProID=157) | $9.99 | No | None | None | Only models with [certain flash chips](https://gist.github.com/yuukieve/6b48f1bb8dd15136403c15c39fafdb42) are compatible with ntrboot. | +| [**R4i Gold 3DS**](http://www.nds-card.com/ProShow.asp?ProID=149) | $19.99 | No | <= 11.9.0 | <= 1.4.5 | All RTS revisions are compatible. | +| [**R4i-SDHC 3DS RTS**](http://www.nds-card.com/ProShow.asp?ProID=146) | $13.99 | 1.87: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | | +| [**R4iSDHC GOLD Pro 20XX**](http://www.nds-card.com/ProShow.asp?ProID=490) | $9.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. 2013 models are incompatible. | +| [**R4iSDHC RTS LITE 20XX**](http://www.nds-card.com/ProShow.asp?ProID=450) | $13.99 | 3.9b: September 3, 2019 | <= 11.9.0 | <= 1.4.5 | All R4iSDHC 20XX flashcarts are identical. 2013 models are incompatible. | | **Ace3DS X** | | No | <= 11.9.0 | <= 1.4.5 | **Comes pre-flashed with ntrboot** (external switch to switch between ntrboot ("3DS") and NDS modes); do not manually flash with ntrboot. | | **Ace3DS Plus** | | No | <= 11.9.0 | <= 1.4.5 | | | **Gateway Blue** | | No | 4.1.0 - 4.5.0 | <= 1.4.5 | | @@ -49,7 +49,7 @@ To test if a magnet will work, hold it on or around the (A)(B)(X)(Y) buttons whi Note that the flashcart will not be able to be used for its standard functions while the ntrboot exploit is installed on it (except for in the case of the Acekard 2i, which remains functional *on NDS and custom firmware 3DS systems only*). This means that, for most flashcarts, it will not even display on the home menu. There are optional steps at the end of the ntrboot flashing instructions to remove it from your flashcart when you are done. -Note that in some rare circumstances, it may be possible for the flashing process to **brick** a counterfeit flashcart and render it permanently unusable. This is unlikely, but nevertheless only original listed flashcarts are supported. To reduce the chance of receiving a counterfeit card, it is recommended that you use a reputable site to buy your flashcart (such as [NDS Card](http://www.nds-card.net/)) +Note that in some rare circumstances, it may be possible for the flashing process to **brick** a counterfeit flashcart and render it permanently unusable. This is unlikely, but nevertheless only original listed flashcarts are supported. To reduce the chance of receiving a counterfeit card, it is recommended that you use a reputable site to buy your flashcart (such as [NDS Card](http://www.nds-card.com/)) {: .notice--danger} ___ diff --git a/_pages/zh_CN/seedminer.txt b/_pages/zh_CN/seedminer.txt index 39518a5149..1b15dedce6 100644 --- a/_pages/zh_CN/seedminer.txt +++ b/_pages/zh_CN/seedminer.txt @@ -63,9 +63,7 @@ There are two different methods for building on the Seedminer exploit (described 1. Open [Bruteforce Movable](https://bruteforcemovable.com/) on your computer + This site can automate the retrieval of `movable_part1.sed` (using a bot 3DS console) and the breaking of your device's DSiWare encryption (using a volunteer's computer to run Seedminer) - + If you already have access to a 3DS capable of launching the Homebrew Launcher, you can manually retrieve your `movable_part1.sed` using that device by following [these](https://jisagi.github.io/SeedminerGuide/seedminerSelf/#section1) instructions - + If you already have access to a PC with a powerful graphics card, you can manually calculate your `movable.sed` using it by following [these](https://jisagi.github.io/SeedminerGuide/seedminerSelf/#section2) instructions - + If the automated service is nonfunctional and you cannot do one or both of those manually, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you + + If the automated service is nonfunctional, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you 1. Enter your device's Friend Code (with no spaces or dashes) into the "Your friend code" field 1. Paste your device's 32 character long folder name into the "Your ID0" field 1. Complete the "I'm not a robot" captcha @@ -74,11 +72,11 @@ There are two different methods for building on the Seedminer exploit (described 1. When prompted, use the "Register Friend" button on your device to add the friend code of the bot 3DS console 1. Wait for the site to update + If it does not, wait a few minutes before refreshing the page once -1. Select "Continue" -1. Wait for the process to complete - + This can take a while (up to an hour in some cases) - + During this process, the bot may not show up on your 3ds. As long as the website updates, this is not an issue. - + If you are still waiting after an hour, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you +1. Once the site processes your information, you will be given the option to "Continue" or "Do another device". Click the green "Continue" button +1. Wait for the remainder of the process to complete + + This is usually fast (1-5 minutes) but in some cases, can take up to half an hour. + + During this process, the bot you added may not show up on your 3ds. As long as the website updates, this is not an issue. + + If you are still waiting after half an hour, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you 1. When the process has completed, download your `movable.sed` file from the site + Keep this file as you will need it in the upcoming pages @@ -102,7 +100,7 @@ ___ #### Seedminer + Steelhax + Frogtool -This method of using Seedminer for further exploitation uses your `movable.sed` file to gain access to the Homebrew Launcher using the Steelhax exploit for the purposes of injecting an exploitable DSiWare title into the DS Download Play application. This method requires you to already own (or download) the free "Steel Divers: Sub Wars" game from the eShop. +This method of using Seedminer for further exploitation uses your `movable.sed` file to gain access to the Homebrew Launcher using the Steelhax exploit for the purposes of injecting an exploitable DSiWare title into the DS Download Play application. This method requires you to already own (or download) the free "Steel Diver: Sub Wars" game from the eShop. This method is only compatible with the EUR, JPN, and USA regions, and is somewhat more complicated than the above method. It is only recommended to use this method if you have a EUR region device and do not wish to pay for a DSiWare game, or if the above method does not work for you for some reason. diff --git a/_pages/zh_CN/uninstall-cfw.txt b/_pages/zh_CN/uninstall-cfw.txt index 0900ec8a2c..493e7e085d 100644 --- a/_pages/zh_CN/uninstall-cfw.txt +++ b/_pages/zh_CN/uninstall-cfw.txt @@ -11,7 +11,7 @@ This will completely remove CFW from your device, including Boot9Strap and Luma3 This is almost never the solution to fix any issues you encounter with your CFW installation. A better idea would be to read the [troubleshooting](troubleshooting) page or ask (in English) for help at [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp). {: .notice--danger} -Any unsigned (illegitimate) games will be rendered unusable and can be manually removed using the Data Management section of the System Settings. Use a [save manager](https://github.com/FlagBrew/Checkpoint/releases/latest) to backup any saves for these unsigned (illegitimate) games you care about. +Any unsigned (illegitimate) games will be rendered unusable and should be manually removed before starting this process by using the Data Management section of the System Settings. Use a [save manager](https://github.com/FlagBrew/Checkpoint/releases/latest) to backup any saves for these unsigned (illegitimate) games you care about. This will not affect your NNID, any legitimately purchased games, or any saves for those legitimately purchased games. @@ -26,21 +26,43 @@ Note that if you have any payload files other than `GodMode9.firm` in the `/luma ### 操作步骤 -#### Section I - Prep Work +#### Section I - Safety Test 1. Power off your device 1. 将你的 SD 卡插入到您的计算机 1. Copy `GodMode9.firm` from the GodMode9 `.zip` to the `/luma/payloads/` folder on your SD card 1. Copy the `gm9` folder from the GodMode9 `.zip` to the root of your SD card 1. Reinsert your SD card into your device -1. Power on your device - -#### Section II - Running Uninstall Script - 1. Launch GodMode9 by holding (Start) during boot 1. If you are prompted to create an essential files backup, press (A) to do so, then press (A) to continue once it has completed 1. If you are prompted to fix the RTC date&time, press (A) to do so, then set the date and time, then press (A) to continue + Note that, if you had to fix the RTC date and time, you will have to fix the time in the System Settings as well after this guide +1. Navigate to `[1:] SYSNAND CTRNAND > title > 00040138 > (X)0000002 > content` + + On a "New" edition console, the (X) will instead be 2 + + On an "Old" edition console, the (X) will instead be 0 +1. Select the `.app` file +1. Select `NCCH Image Options` +1. Select `Mount image to drive` +1. In the window that appears, open the `exefs` folder +1. In this folder, select the `.firm` file +1. Select "Firm Options" +1. Select "Boot Firm" +1. When prompted, choose to decrypt and make a copy +1. You should boot into the regular 3DS Home Menu. If you do, power your device off and continue to the next section + + If you do NOT boot into the regular 3DS Home Menu, continuing with these instructions **WILL** brick your device. You should join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you + +#### Section II - Prep Work + +1. Power on your device +1. Navigate to System Settings > Data Management > Nintendo 3DS > Software +1. In this list of software, delete any non-Nintendo content you installed while using CFW + + This includes common system software such as FBI, Anemone3DS, Luma Updater, Homebrew Launcher, Checkpoint, and others, along with any non-eShop games + + Failure to remove CFW software before uninstalling CFW may break access to the Data Management menu after uninstalling CFW +1. 给设备关机 + +#### Section III - Running Uninstall Script + +1. Launch GodMode9 by holding (Start) during boot 1. Press (Home) to bring up the action menu 1. Select "Scripts..." 1. Select "GM9Megascript" diff --git a/_pages/zh_TW/a9lh-to-b9s.txt b/_pages/zh_TW/a9lh-to-b9s.txt index 11ab3c6d65..bb254844fd 100644 --- a/_pages/zh_TW/a9lh-to-b9s.txt +++ b/_pages/zh_TW/a9lh-to-b9s.txt @@ -120,7 +120,7 @@ title: "升級 A9LH 至 B9S" #### 第五節 — Homebrew Launcher -1. 啟動「下載通信(Download Play)」程式 (如此圖[icon]({{ "/images/download-play-icon.png" | absolute_url }}) +1. 啟動『下載通信(Download Play)』程式 (如此圖[icon]({{ "/images/download-play-icon.png" | absolute_url }}) 1. 同時按下『L』+『下』+『Select』鍵以啟動 Rosalina 選單 1. 選擇『Miscellaneous options』 1. 選擇『Switch the hb. title to the current app.』 @@ -183,7 +183,7 @@ title: "升級 A9LH 至 B9S" 1. 如提示時,按下『A』取消檔案寫入鎖定 1. 移動至 `[M:] MEMORY VIRTUAL` 1. 選擇 `boot9.bin`,並按『A』選擇 -1. 選擇「Copy to 0:/gm9/out」 +1. 選擇『Copy to 0:/gm9/out』 1. 按『A』 繼續 1. 按『B』回到主選單 1. 同時按住『R』及『B』以卸除 SD 卡 diff --git a/_pages/zh_TW/ctrtransfer.txt b/_pages/zh_TW/ctrtransfer.txt index a2cd704696..3923be481f 100644 --- a/_pages/zh_TW/ctrtransfer.txt +++ b/_pages/zh_TW/ctrtransfer.txt @@ -78,7 +78,7 @@ title: "CTRTransfer" #### 第三節 — 啟動 FBI 管理器 -1. 啟動「下載通信(Download Play)」程式 (如此圖[icon]({{ "/images/download-play-icon.png" | absolute_url }}) +1. 啟動『下載通信(Download Play)』程式 (如此圖[icon]({{ "/images/download-play-icon.png" | absolute_url }}) 1. 同時按下『L』+『下』+『Select』鍵以啟動 Rosalina 選單 1. 選擇『Miscellaneous options』 1. 選擇『Switch the hb. title to the current app.』 diff --git a/_pages/zh_TW/finalizing-setup.txt b/_pages/zh_TW/finalizing-setup.txt index 79f1154b96..0181282f49 100644 --- a/_pages/zh_TW/finalizing-setup.txt +++ b/_pages/zh_TW/finalizing-setup.txt @@ -18,6 +18,8 @@ title: "完成安裝" + **Luma3DS Updater** *(以便更新 Luma3DS)* + **GodMode9** *(多功能工具包,用來處理 NAND 及卡帶的相關功能)* + **Homebrew Launcher Loader** *(用於啟動 Homebrew Launcher)* ++ **DSP1** *(allows homebrew applications to have sound)* ++ **ctr-no-timeoffset** *(removes the rtc offset so that the home menu and rtc timestamps match)* ### 必備項目 @@ -74,7 +76,7 @@ title: "完成安裝" #### 第三節 — Homebrew Launcher -1. 啟動「下載通信(Download Play)」程式 (![]({{ "/images/download-play-icon.png" | absolute_url }}){: height="24px" width="24px"}) +1. 啟動『下載通信(Download Play)』程式 (![]({{ "/images/download-play-icon.png" | absolute_url }}){: height="24px" width="24px"}) 1. 同時按下『L』+『下』+『Select』鍵以啟動 Rosalina 選單 1. 選擇『Miscellaneous options』 1. 選擇『Switch the hb. title to the current app.』 @@ -88,7 +90,7 @@ title: "完成安裝" 1. 按『A』選擇將數值設成 0 + 這將會把系統時間設為與 RTC 相同的數值 1. 按「Start」鍵回到 Homebrew Launcher 中 - + 如果您先前已遵守[安裝 boot9strap (透過 Frogtool)](installing-boot9strap-(frogtool)) 之相關步驟,請您在繼續前透過 Frogtool 中的『RESTORE clean DS Download Play』選項以將「下載通信(Download Play)」程式還原至其初始狀態 + + 如果您先前已遵守[安裝 boot9strap (透過 Frogtool)](installing-boot9strap-(frogtool)) 之相關步驟,請您在繼續前透過 Frogtool 中的『RESTORE clean DS Download Play』選項以將『下載通信(Download Play)』程式還原至其初始狀態 1. 於 Homebrew 清單內啟動 FBI 管理器 #### 第四節 — 安裝 CIA 檔案 @@ -138,12 +140,12 @@ title: "完成安裝" 1. 如提示時,按下『A』取消檔案寫入鎖定 1. 移動至 `[M:] MEMORY VIRTUAL` 1. 選擇 `boot9.bin`,並按『A』選擇 -1. 選擇「Copy to 0:/gm9/out」 +1. 選擇『Copy to 0:/gm9/out』 1. 按『A』 繼續 1. 按『B』回到主選單 1. 同時按住『R』及『B』以卸除 SD 卡 1. 將 SD 卡插入至電腦中 -1. 從 SD 卡中的 `/gm9/out/` 資料夾中複製 `__sysnand_###.bin`、`boot9.bin` 及 `essential.exefs` 至電腦中安全的地方 +1. Copy `__sysnand_###.bin`, `__sysnand_###.bin.sha`, `essential.exefs`, and `boot9.bin` from the `/gm9/out/` folder on your SD card to a safe location on your computer + 建議備份至各個不同的地方(比如雲端硬碟中) + 這些備份檔案可於未來您磚機時用來修復系統檔案 1. 在複製完畢後,從 SD 卡的 `/gm9/out/` 資料夾中刪除 `__sysnand_###.bin` 及 `__sysnand_###.bin.sha` diff --git a/_pages/zh_TW/flashing-ntrboot-(3ds-single-system).txt b/_pages/zh_TW/flashing-ntrboot-(3ds-single-system).txt index 088583e625..68f37709d9 100644 --- a/_pages/zh_TW/flashing-ntrboot-(3ds-single-system).txt +++ b/_pages/zh_TW/flashing-ntrboot-(3ds-single-system).txt @@ -37,12 +37,12 @@ title: "寫入 ntrboot 漏洞 (透過單台 3DS 系統)" 1. 按『A』 繼續 1. 透過『上』『下』鍵選擇您的燒錄卡 1. 按『A』 繼續 -1. 選擇「Dump flash」以備份您燒錄卡的記憶體 +1. 選擇『Dump flash』以備份您燒錄卡的記憶體 1. 輸入提示的按鍵組合 1. 按『A』 繼續 1. 透過『上』『下』鍵選擇您的燒錄卡 1. 按『A』 繼續 -1. 選擇「Inject FIRM」以安裝 boot9strap 至您的燒錄卡中 +1. 選擇『Inject FIRM』以安裝 boot9strap 至您的燒錄卡中 1. 輸入提示的按鍵組合 1. 按『A』 繼續 1. 關閉您的主機 diff --git a/_pages/zh_TW/flashing-ntrboot-(nds).txt b/_pages/zh_TW/flashing-ntrboot-(nds).txt index 75d9a2e0d1..d788a725c6 100644 --- a/_pages/zh_TW/flashing-ntrboot-(nds).txt +++ b/_pages/zh_TW/flashing-ntrboot-(nds).txt @@ -40,12 +40,12 @@ title: "寫入 ntrboot 漏洞 (透過 NDS)" 1. 按『A』 繼續 1. 透過『上』『下』鍵選擇您的燒錄卡 1. 按『A』 繼續 -1. 選擇「Dump flash」以備份您燒錄卡的記憶體 +1. 選擇『Dump flash』以備份您燒錄卡的記憶體 1. 輸入提示的按鍵組合 1. 按『A』 繼續 1. 透過『上』『下』鍵選擇您的燒錄卡 1. 按『A』 繼續 -1. 選擇「Inject FIRM」以安裝 boot9strap 至您的燒錄卡中 +1. 選擇『Inject FIRM』以安裝 boot9strap 至您的燒錄卡中 1. 輸入提示的按鍵組合 1. 按『A』 繼續 1. 將 **NDS / NDSL 始源機** 關機 diff --git a/_pages/zh_TW/homebrew-launcher-(alternatives).txt b/_pages/zh_TW/homebrew-launcher-(alternatives).txt index 8ac55e8b9a..c999ef8ebc 100644 --- a/_pages/zh_TW/homebrew-launcher-(alternatives).txt +++ b/_pages/zh_TW/homebrew-launcher-(alternatives).txt @@ -49,12 +49,12 @@ Homebrew Launcher 有許多不同的進入點或啟動方法。 | [oot3dhax](https://github.com/yellows8/oot3dhax) | [《薩爾達傳說時之笛 3D》](https://amzn.to/2fkaKdp),
至少需要一個 Powersaves 存檔備份器或另一台可使用 Homebrew Launcher 的 3DS | 卡帶 | New, Old, 2DS | 歐, 日, 美 | 任意 | 9.0.0-X 至 11.7.0-X(含) | | [smashbroshax](https://gbatemp.net/threads/397194/) | [《任天堂明星大亂鬥》](https://amzn.to/2ftGA72) | 卡帶、電子商店 | New | 歐、日、美 | 低於 1.1.3;
卡帶上印有『amiibo』字樣的,遊戲版本皆為 v1.1.4 | 9.0.0-X 至 11.3.0-X (含) | | [supermysterychunkhax](https://smd.salthax.org/) | [《寶可夢超級不可思議的迷宮》](https://amzn.to/2ebxZ75),
另一台可使用 Homebrew Launcher 的 3DS | 卡帶 | New、舊型、2DS | 歐、日、美 | 任意 | 9.9.0-X (美/日)/10.2.0-X (歐)至 11.0.0-X (含) | - | [freakyhax](http://plutooo.github.io/freakyhax/) | [《奇特風格:展現你的作品活力!》](https://amzn.to/2f6eHO7) | 卡帶, eShop | New, Old, 2DS | 歐, 日, 美 | 任意 | 9.0.0-X 至 11.7.0-X(含) | + | [freakyhax](http://plutooo.github.io/freakyhax/) | [《奇特風格:展現你的作品活力!》](https://amzn.to/2f6eHO7) | 卡帶, eShop | New, Old, 2DS | 歐, 日, 美 | 任意 | 9.0.0-X 至 11.7.0-X(含) | | [basehaxx](http://mrnbayoh.github.io/basehaxx/) | 《寶可夢 [終極紅寶石](https://amzn.to/2eRILNQ)/[始源藍寶石](https://amzn.to/2ebGrmN)》,
另一台可使用 Homebrew Launcher 的 3DS | 卡帶 | New、舊型、2DS | 歐、日、美 | 1.0、1.4 | 9.0.0-X 至 11.3.0-X (含) | | [BASICSploit](https://mrnbayoh.github.io/basicsploit/) | [《SmileBASIC》](https://www.nintendo.com/games/detail/eYURHNjVdfyrnA3OJGfmlMYIrJUzgOcv) | 電子商店 | New、舊型、2DS | 美 | 3.2.1 | 9.0.0-X 至 11.0.0-X (含)| | [smilehax](https://plutooo.github.io/smilehax/) | [《SmileBASIC》](https://www.nintendo.com/games/detail/eYURHNjVdfyrnA3OJGfmlMYIrJUzgOcv) | 電子商店 | New、舊型、2DS | 日、美 | 3.3.1 | 9.0.0-X 至 11.0.0-X (含)| | [stickerhax](https://github.com/yellows8/stickerhax) | [《紙片瑪利歐:超級貼紙》](https://amzn.to/2f6aDx8),
另一台可使用 Homebrew Launcher 的 3DS | 卡帶、電子商店 | New、舊型、2DS | 歐、日、韓、美 | 任意 | 9.0.0-X 至 11.3.0-X (含)| - | [Ninjhax 2](http://smealum.github.io/ninjhax2/) | [《方塊忍者》](https://amzn.to/2eRI1by) | 卡帶, eShop| New, Old, 2DS | 歐, 日, 美 | 任意 | 9.0.0-X 至 11.7.0-X(含)| + | [Ninjhax 2](http://smealum.github.io/ninjhax2/) | [《方塊忍者》](https://amzn.to/2eRI1by) | 卡帶, eShop| New, Old, 2DS | 歐, 日, 美 | 任意 | 9.0.0-X 至 11.7.0-X(含)| | [Notehax](https://mrnbayoh.github.io/notehax/) | [*《悄悄互動日記》*](https://my.nintendo.com/rewards/0391c34c430369c0) | 電子商店 | New、舊型、2DS | 歐、日、美 | 1.3.1 (日) / 1.0.0 (歐/美) | 9.0.0-X 至 11.5.0-X (含)| | [RPwnG](https://mrnbayoh.github.io/rpwng/) | [*RPG Maker Player*](http://www.nintendo.com/games/detail/rpg-maker-player-3ds) | 電子商店 | New、舊型、2DS | 歐、日、美 | 1.1.4 (歐) / 1.1.2 (日/美) | 9.0.0-X 至 11.5.0-X (含) | | [GenHax](https://github.com/svanheulen/genhax_proxy_installer) | [《魔物獵人 X》](http://amzn.to/2gsk6Tk) | 電子商店 | New | 日 | 任意 | 9.9.0-X 至 11.2.0-X (含)| diff --git a/_pages/zh_TW/homebrew-launcher-(steelhax).txt b/_pages/zh_TW/homebrew-launcher-(steelhax).txt index 820a821b3c..a4ac65e1af 100644 --- a/_pages/zh_TW/homebrew-launcher-(steelhax).txt +++ b/_pages/zh_TW/homebrew-launcher-(steelhax).txt @@ -6,9 +6,9 @@ title: "安裝 Homebrew Launcher (透過 Steelhax)" ### 必讀事項 -This method of using Seedminer for further exploitation uses your `movable.sed` file to gain access to the Homebrew Launcher using the Steelhax exploit for the purposes of injecting an exploitable DSiWare title into the DS Download Play application. 於使用此指南時,您必須先擁有 (或下載) eShop 中免費的『Steel Drivers: Sub Wars』遊戲。 +Seedminer 將使用您的 `movable.sed` 檔案並透過 Steelhax 漏洞開啟 Homebrew Launcher 以便在 DS 網路設定中植入修改後的 DSiWare 程式。 於使用此指南時,您必須先擁有 (或下載) eShop 中免費的『Steel Drivers: Sub Wars』遊戲。 -如果您的裝置已可透過如 Steelhax 或其他漏洞存取 Homebrew Launcher,您可以跳至[安裝 Boot9Strap (透過 Frogminer)](installing-boot9strap-(frogminer))。 +如果您的裝置已可透過如 Steelhax 或其他漏洞存取 Homebrew Launcher,您可以跳至[安裝 Boot9strap (透過 Frogtool)](installing-boot9strap-(frogtool))。 {: .notice--success} 如果您先前已安裝『Steel Diver: Sub Wars』,此過程將會複寫您先前的存檔! @@ -17,6 +17,7 @@ This method of using Seedminer for further exploitation uses your `movable.sed` ### 必備項目 * eShop 中免費的『Steel Diver: Sub Wars』遊戲 +* 您自 [Seedminer](seedminer) 步驟中所取得的 `movable.sed` 檔案 * 最新版的 [Homebrew Launcher](https://github.com/fincs/new-hbmenu/releases/latest) * 最新版的 [Steelhax](https://github.com/VegaRoXas/vegaroxas.github.io/raw/master/files/steelhax-installer.rar) * [otherapp payload 檔案](https://smealum.github.io/3ds/#otherapp) *(選擇對應您主機的區域及型號的檔案)* @@ -39,7 +40,7 @@ This method of using Seedminer for further exploitation uses your `movable.sed` 1. 退出『Steel Diver: Sub Wars』 1. 關閉您的主機 1. 將 SD 卡插入至電腦中 -1. 在您的電腦中開啟 [Steelminer 植入器](http://steelminer.jisagi.net/injector) +1. 在您的電腦中開啟 [Steelminer 植入器](https://bruteforcemovable.com/steelhax/) 1. 上傳您的 `movable.sed` 檔案 1. 選擇『Start!』 1. 等待程序完畢為止 diff --git a/_pages/zh_TW/installing-boot9strap-(fredtool).txt b/_pages/zh_TW/installing-boot9strap-(fredtool).txt index bf9c99f33e..4138d4c60c 100644 --- a/_pages/zh_TW/installing-boot9strap-(fredtool).txt +++ b/_pages/zh_TW/installing-boot9strap-(fredtool).txt @@ -6,12 +6,10 @@ title: "安裝 Boot9strap (透過 Fredtool)" ### 必讀事項 -This method of using Seedminer for further exploitation uses your `movable.sed` file to decrypt any DSiWare eShop title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. 於使用此指南時,您必須先擁有 (或下載/購買) eShop 中的 DSiWare 遊戲。 +Seedminer 將透過您的 `movable.sed` 檔案來解密您主機上任何來自 DSiWare eShop 的程式,以便在 DS 網路設定中注入修改後的 DSiWare 程式。 於使用此指南時,您必須先擁有 (或下載/購買) eShop 中的 DSiWare 遊戲。 此方法是透過『FIRM partitions known-plaintext』漏洞所達成的。詳情請見[此](https://www.3dbrew.org/wiki/3DS_System_Flaws)。 -本頁面會有些許的[磁力](https://wikipedia.org/wiki/Magnet_URI_scheme)連結,您將需要個像 [Deluge](http://dev.deluge-torrent.org/wiki/Download). 的 BT 種子下載器來下載磁力連結的檔案。 - 若要解壓該頁面中的`.7z` 以及 `.rar` 檔案,您將需要一個壓縮檔管理員,如 [7-Zip](http://www.7-zip.org/) 或 [The Unarchiver](https://theunarchiver.com/)。 ### 必備項目 @@ -29,8 +27,8 @@ This method of using Seedminer for further exploitation uses your `movable.sed` 1. 於您主機上啟動系統設定 (System Settings) 1. 移動至 `檔案管理 (Data Management)` -> `DSiWare` -1. Under the "System Memory" section, select your DSiWare game -1. 選擇「複製 (Copy)」並選擇「OK」 +1. 在『系統內存 (System Memory)』中,選擇您的 DSiWare 遊戲 +1. 選擇『複製 (Copy)』並選擇『OK』 + 如提示時,複寫先前檔案 1. 關閉您的主機 1. 將 SD 卡插入至電腦中 @@ -39,31 +37,31 @@ This method of using Seedminer for further exploitation uses your `movable.sed` 1. 將 `boot.nds` (B9STool) 複製到 SD 卡根目錄中 1. 將 `boot.3dsx` 複製到 SD 卡根目錄中 1. 解壓 Frogminer_save `.zip` 中的 `private` 資料夾到 SD 卡的根目錄底下 -1. Navigate to `Nintendo 3DS` -> `` -> `<32-character-id>` -> `Nintendo DSiWare` on your SD card +1. 於您的 SD 卡中,移動至 `Nintendo 3DS` -> `` -> `<32-character-id>` -> `Nintendo DSiWare` + 此 `` 字串將與您在 [Seedminer](seedminer) 中所使用的字串一樣 -1. Copy `<8-character-id>.bin` to a folder on your computer - + If there are multiple `<8-character-id>.bin` files, just pick one. It doesn't matter which you use. +1. 複製 `<8-character-id>.bin` 至您電腦中的資料夾。 + + 如果有多個`<8-character-id>.bin`,只需從中複製任何一個即可。 用哪一個並不重要。 #### Section II - Fredtool 1. 於您的電腦中開啟 [Fredtool](https://fredtool.bruteforcemovable.com/) 1. 在『Your movable.sed』欄位中選擇您的 `movable.sed` 檔案 1. 在『Your dsiware.bin』欄位中選擇您的 `<8位字元ID>.bin` 檔案 -1. 完成『我不是機器人』之驗證 +1. 完成「我不是機器人」之驗證 1. 選擇『Start』 1. 等待程序完畢為止 1. 當該程序結束時,在該網站中下載修改後的 DSiWare 檔案 -1. Copy the `42383841.bin` file from the `output/hax/` folder of the downloaded DSiWare archive to the `Nintendo 3DS//<32-character-id>/Nintendo DSiWare/` folder on your SD card - + This should be different than your initial `<8-character-id>.bin` file - + Do not remove any existing `<8-character-id>.bin` files +1. 從剛下載的 DSiWare 檔案的 `output/hax/` 資料夾解壓 `42383841.bin` 至 SD 卡中的 `Nintendo 3DS//<32-character-id>/Nintendo DSiWare/` 資料夾 + + 這應該和您最初複製的 `<8-character-id>.bin` 是不一致的 + + 請不要移除任何現有的 `<8-character-id>.bin` 檔案 1. 將 SD 卡插回主機中 1. 啟動您的主機 1. 於您主機上啟動系統設定 (System Settings) 1. 移動至 `檔案管理 (Data Management)` -> `DSiWare` 1. 在 SD 卡欄位中選擇『Haxxxxxxxxx!』程式 -1. 選擇「複製 (Copy)」並選擇「OK」 +1. 選擇『複製 (Copy)』並選擇『OK』 1. 回到系統設定主選單 -1. 移動至「網路設定 (Internet Settings)」中的「任天堂 DS 連線 (Nintendo DS Connections)」並選擇「OK」 +1. 移動至『網路設定 (Internet Settings)』中的『任天堂 DS 連線 (Nintendo DS Connections)』並選擇『OK』 1. 如果漏洞成功執行,您的主機將自動啟動『うごくメモ帳 (Flipnote Studio)』 ##### 第三節 — Flipnote 漏洞 @@ -97,18 +95,18 @@ This method of using Seedminer for further exploitation uses your `movable.sed` 1. 按『Start』鍵以存檔並重新啟動系統 + 如果黑屏,[請依循本疑難排解之步驟](troubleshooting#black-screen-on-sysnand-boot-after-installing-boot9strap) -#### Section V - Restoring DS Connection Settings +#### 第五節 — 還原 DS 連線設定 1. 關閉您的主機 1. 將 SD 卡插入至電腦中 -1. Copy the `42383841.bin` file from the `output/clean/` folder of the downloaded DSiWare archive to the `Nintendo 3DS//<32-character-id>/Nintendo DSiWare/` folder on your SD card - + Replace the existing `42383841.bin` file +1. 從剛下載的 DSiWare 檔案的 `output/clean/` 資料夾解壓 `42383841.bin` 至 SD 卡中的 `Nintendo 3DS//<32-character-id>/Nintendo DSiWare/` 資料夾 + + 請替換現有的`42383841.bin`檔案 1. 將 SD 卡插回主機中 1. 啟動您的主機 1. 於您主機上啟動系統設定 (System Settings) 1. 移動至 `檔案管理 (Data Management)` -> `DSiWare` -1. Under the "SD Card" section, select the "Nintendo DSi™" title -1. 選擇「複製 (Copy)」並選擇「OK」 +1. 在 SD 卡欄位中選擇『Nintendo DSi™』程式 +1. 選擇『複製 (Copy)』並選擇『OK』 ___ diff --git a/_pages/zh_TW/installing-boot9strap-(frogtool).txt b/_pages/zh_TW/installing-boot9strap-(frogtool).txt index 6a0bda0cbd..6e8baba1c9 100644 --- a/_pages/zh_TW/installing-boot9strap-(frogtool).txt +++ b/_pages/zh_TW/installing-boot9strap-(frogtool).txt @@ -33,12 +33,12 @@ title: "安裝 Boot9strap (透過 Frogtool)" 1. 將 SD 卡插回主機中 1. 啟動您的主機 -##### 第二節 — 修改「下載通信(Download Play)」程式 +##### 第二節 — 修改『下載通信(Download Play)』程式 1. 透過任意方法執行 Homebrew Launcher 1. 於 Homebrew 清單內啟動 Frogtool 1. 選擇『INJECT patched DS Download Play』 -1. Frogtool 將自動植入並運行日版的『うごくメモ帳 (Flipnote Studio)』至您的「下載通信(Download Play)」程式中 +1. Frogtool 將自動植入並運行日版的『うごくメモ帳 (Flipnote Studio)』至您的『下載通信(Download Play)』程式中 1. 在安裝完成後,透過觸控螢幕選擇『BOOT patched DS Download Play』 1. 如果漏洞成功執行,您的主機將自動啟動『うごくメモ帳 (Flipnote Studio)』 diff --git a/_pages/zh_TW/ntrboot.txt b/_pages/zh_TW/ntrboot.txt index e45abd3481..dfe06c09c7 100644 --- a/_pages/zh_TW/ntrboot.txt +++ b/_pages/zh_TW/ntrboot.txt @@ -17,14 +17,14 @@ title: "ntrboot" | 燒錄卡名稱 | 目前價錢 | 可使用『Time Bomb』嗎? | 3DS 版本? | DSi 版本? | 備註 | |-|-:|:-:|:-:|:-:|-| -| [**R4i-SDHC B9S**](http://www.nds-card.net/ProShow.asp?ProID=574) | $15.99 美元 | 2019年9月3號 | <= 11.9.0 | <= 1.4.5 | **已預載 ntrboot**;可重新刷回至正常的 NDS 燒錄卡功能。 | -| [**R4i Gold 3DS Plus**](http://www.nds-card.net/ProShow.asp?ProID=575) | $19.99 美元 | 否 | <= 11.9.0 | <= 1.4.5 | **已預載 ntrboot** ([透過內建開關以於 ntrboot 及 NDS 模式間切換]({{ "/images/screenshots/r4i-gold-3ds-plus.png" | absolute_url }})); 請勿手動安裝 ntrboot。 | -| [**Acekard 2i**](http://www.nds-card.net/ProShow.asp?ProID=160) | $20.99 美元 | 否 | <= 4.3.0 | <= 1.4.4 | | -| [**DSTT**](http://www.nds-card.net/ProShow.asp?ProID=157) | $9.99 美元 | 否 | 無 | 無 | ntrboot 僅適用於裝有[特殊寫入晶片](https://gist.github.com/yuukieve/6b48f1bb8dd15136403c15c39fafdb42)的型號。 | -| [**R4i Gold 3DS**](http://www.nds-card.net/ProShow.asp?ProID=149) | $19.99 美元 | 否 | <= 11.9.0 | <= 1.4.5 | 所有 RTS 版本皆相容。 | -| [**R4i-SDHC 3DS RTS**](http://www.nds-card.net/ProShow.asp?ProID=146) | $13.99 美元 | 1.87: 2019年9月3號 | <= 11.9.0 | <= 1.4.5 | | -| [**R4iSDHC GOLD Pro 20XX**](http://www.nds-card.net/ProShow.asp?ProID=490) | $9.99 美元 | 3.9b: 2019年9月3號 | <= 11.9.0 | <= 1.4.5 | 所有 R4iSDHC 20XX 燒錄卡都相似。 與 2013 年版不相容。 | -| [**R4iSDHC RTS LITE 20XX**](http://www.nds-card.net/ProShow.asp?ProID=450) | $13.99 美元 | 3.9b: 2019年9月3號 | <= 11.9.0 | <= 1.4.5 | 所有 R4iSDHC 20XX 燒錄卡都相似。 與 2013 年版不相容。 | +| [**R4i-SDHC B9S**](http://www.nds-card.com/ProShow.asp?ProID=574) | $15.99 美元 | 2019年9月3號 | <= 11.9.0 | <= 1.4.5 | **已預載 ntrboot**;可重新刷回至正常的 NDS 燒錄卡功能。 | +| [**R4i Gold 3DS Plus**](http://www.nds-card.com/ProShow.asp?ProID=575) | $19.99 美元 | 否 | <= 11.9.0 | <= 1.4.5 | **已預載 ntrboot** ([透過內建開關以於 ntrboot 及 NDS 模式間切換]({{ "/images/screenshots/r4i-gold-3ds-plus.png" | absolute_url }})); 請勿手動安裝 ntrboot。 | +| [**Acekard 2i**](http://www.nds-card.com/ProShow.asp?ProID=160) | $20.99 美元 | 否 | <= 4.3.0 | <= 1.4.4 | | +| [**DSTT**](http://www.nds-card.com/ProShow.asp?ProID=157) | $9.99 美元 | 否 | 無 | 無 | ntrboot 僅適用於裝有[特殊寫入晶片](https://gist.github.com/yuukieve/6b48f1bb8dd15136403c15c39fafdb42)的型號。 | +| [**R4i Gold 3DS**](http://www.nds-card.com/ProShow.asp?ProID=149) | $19.99 美元 | 否 | <= 11.9.0 | <= 1.4.5 | 所有 RTS 版本皆相容。 | +| [**R4i-SDHC 3DS RTS**](http://www.nds-card.com/ProShow.asp?ProID=146) | $13.99 美元 | 1.87: 2019年9月3號 | <= 11.9.0 | <= 1.4.5 | | +| [**R4iSDHC GOLD Pro 20XX**](http://www.nds-card.com/ProShow.asp?ProID=490) | $9.99 美元 | 3.9b: 2019年9月3號 | <= 11.9.0 | <= 1.4.5 | 所有 R4iSDHC 20XX 燒錄卡都相似。 與 2013 年版不相容。 | +| [**R4iSDHC RTS LITE 20XX**](http://www.nds-card.com/ProShow.asp?ProID=450) | $13.99 美元 | 3.9b: 2019年9月3號 | <= 11.9.0 | <= 1.4.5 | 所有 R4iSDHC 20XX 燒錄卡都相似。 與 2013 年版不相容。 | | **Ace3DS X** | | 否 | <= 11.9.0 | <= 1.4.5 | **已預載 ntrboot** (透過外接開關以於 ntrboot ("3DS") 及 NDS 模式間切換); 請勿手動安裝 ntrboot。 | | **Ace3DS Plus** | | 否 | <= 11.9.0 | <= 1.4.5 | | | **Gateway Blue** | | 否 | 4.1.0 - 4.5.0 | <= 1.4.5 | | @@ -49,7 +49,7 @@ title: "ntrboot" 請注意,只要您的燒錄卡仍裝著 ntrboot 漏洞,它將失去原卡的功用 (除了 Acekard 2i 外,它仍能於*NDS 或已安裝自製韌體的 3DS 上正常運作*) 。 這也就是說大部分的燒錄卡不會在 HOME 選單中出現。 若有需要,本節最後會附帶些解除安裝此漏洞的步驟。 -請注意,在某些特殊情況下,某些冒牌的燒錄卡很有可能會在過程中變磚,使得燒錄卡變得無法使用。 這是不大可能的,但不論如何,我們只支援寫在相容清單中的燒錄卡。 為了避免您採購燒錄卡時買到了冒牌卡帶,建議您應於較知名且放心的網站上購買您的燒錄卡(如 [NDS Card](http://www.nds-card.net/))。 +請注意,在某些特殊情況下,某些冒牌的燒錄卡很有可能會在過程中變磚,使得燒錄卡變得無法使用。 這是不大可能的,但不論如何,我們只支援寫在相容清單中的燒錄卡。 為了避免您採購燒錄卡時買到了冒牌卡帶,建議您應於較知名且放心的網站上購買您的燒錄卡(如 [NDS Card](http://www.nds-card.com/))。 {: .notice--danger} ___ diff --git a/_pages/zh_TW/region-changing.txt b/_pages/zh_TW/region-changing.txt index 174ddc68f9..f407909615 100644 --- a/_pages/zh_TW/region-changing.txt +++ b/_pages/zh_TW/region-changing.txt @@ -89,7 +89,7 @@ title: "區碼變更" #### 第三節 — 啟動 FBI 管理器 -1. 啟動「下載通信(Download Play)」程式 (如此圖[icon]({{ "/images/download-play-icon.png" | absolute_url }}) +1. 啟動『下載通信(Download Play)』程式 (如此圖[icon]({{ "/images/download-play-icon.png" | absolute_url }}) 1. 同時按下『L』+『下』+『Select』鍵以啟動 Rosalina 選單 1. 選擇『Miscellaneous options』 1. 選擇『Switch the hb. title to the current app.』 diff --git a/_pages/zh_TW/seedminer.txt b/_pages/zh_TW/seedminer.txt index 579b12d45b..4cd14289ca 100644 --- a/_pages/zh_TW/seedminer.txt +++ b/_pages/zh_TW/seedminer.txt @@ -6,81 +6,79 @@ title: "Seedminer" ### 必讀事項 -To install boot9strap on your device, we exploit an oversight in the security restrictions applied to "DSiWare" applications. +我們將透過 DSiWare 遊戲應用程式中所存在的一項安全性漏洞自您的裝置中安裝 boot9strap。 -To accomplish this, we use a tool called Seedminer to calculate the DSiWare encryption key (`movable.sed`) for your device. We then use this DSiWare encryption key to decrypt a compatible DSiWare application and inject an exploit into it to run our own code (the exact exploit used will depend on your device's region). +為達成這點,我們將透過一項稱為 Seedminer 的工具來計算您裝置中所持有的 DSiWare 加密金鑰 (`movable.sed`)。 我們將透過此 DSiWare 加密金鑰解密任一相容的 DSiWare 以植入一項安全性漏洞好讓我們執行任何想要的程式 (漏洞種類視您的主機區域而定)。 -If this key were completely random, the encryption key would be impossible to break on current computing hardware. Fortunately, the first half of the key (`movable_part1.sed`) is actually mathematically related to your device's Friend Code, allowing us to break the encryption. For information on how Seedminer works, please see [this presentation](https://zoogie.github.io/web/34⅕c3). +假如該金鑰是亂數產生的,以現在的電腦技術而言將無法破解該加密金鑰。 好消息是該金鑰的前半段 (`movable_part1.sed`) 其實跟您裝置的好友代碼是有相關性的。透過這點,我們將能破解該金鑰。 如果想知道 Seedminer 怎麼運作的,請見該[投影片](https://zoogie.github.io/web/34⅕c3)。 -Note that this tool requires a PC with a powerful graphics card to break your device's DSiWare encryption. If you do not have access to one of these, there also exists several online helper services where a volunteer running automated software will do this for you. +請注意,該工具將需要一台擁有較強顯卡的電腦以破解您裝置所持有的加密金鑰。 如果您並沒有像這樣的設備,網路上將有自願性的服務幫您破解此金鑰。 ### 操作說明 -#### Section I - Compatibility Tests +#### 第一節 — 相容性測試 -While these tests are not strictly necessary to perform the Seedminer exploit, the follow-up exploits to this do require this test to be performed and it would be a waste of time and effort to perform Seedminer without the ability to use the other exploits. +儘管這些測試對於執行 Seedminer 漏洞並非必要,但若不進行此測試的話可能因 Seedminer 漏洞失效而白白浪費時間和精力而無法使用其他依賴於 Seedminer 的漏洞。 -There are two different methods for building on the Seedminer exploit (described in more detail at the bottom of this page), so even if one of these test fails you can still use another method as long as the other does not fail. +以下為兩種不同構建 Seedminer 漏洞的方法 (詳述於該頁面底端),因此即使其中一個測試失敗,只要另一個並沒有失效,您還是可以使用另一種方​​法。 -#### DS Internet Settings Test (used for Fredtool) +#### DS 網路設定測試 (用於 Fredtool) -1. Go to System Settings, then "Internet Settings", then "Nintendo DS Connections" -1. Press "OK" -1. If your device loads into a "Nintendo Wi-Fi Connection Setup" menu, the test was successful - + If the screen stays black or appears to freeze, the test has failed and you will not be able to use the Fredtool method which requires a functioning DS Internet Settings -1. Exit this menu +1. 進入『系統設定 (System Settings)』中的『網路設定 (Internet Settings)』並選取『任天堂 DS 連線 (Nintendo DS Connections)』 +1. 按『OK』 +1. 如果『Nintendo Wi-Fi Connection Setup』選單跳出則代表測試成功 + + 如果您的螢幕黑屏或死當,這代表該測試執行失敗且您將無法使用 Frogminer (此漏洞需要能正常使用 DS 網路設定的主機) +1. 退出此選單 -#### DS Download Play Test (used for Frogtool) +#### DS 下載通信測試 (用於 Frogtool) -1. 啟動「下載通信(Download Play)」程式 (![]({{ "/images/download-play-icon.png" | absolute_url }}){: height="24px" width="24px"}) -1. Select "Nintendo DS" -1. If your device loads into a "Download software via DS Download Play" menu, the test was successful - + If the screen stays black or appears to freeze, the test has failed and you will not be able to use the Frogtool method which requires a functioning DS Download Play -1. Exit this menu +1. 啟動『下載通信(Download Play)』程式 (![]({{ "/images/download-play-icon.png" | absolute_url }}){: height="24px" width="24px"}) +1. 選擇『任天堂 DS (Nintendo DS)』 +1. 如果您的裝置可正常進入 DS『下載通信(Download Play)』程式則代表測試成功 + + 如果您的螢幕黑屏或死當,這代表該測試執行失敗且您將無法使用 Frogtool (此漏洞需要能正常使用『下載通信 (Download Play)』程式的主機) +1. 退出此選單 -#### Section II - Prep Work +#### 第二節 — 準備工作 1. 將 SD 卡插入至電腦中 -1. Navigate to the `Nintendo 3DS` folder on your SD card -1. Copy the 32 character long name of the folder you see - + If you see multiple folders like this, perform the following: - + Rename the `Nintendo 3DS` folder to `BACKUP_Nintendo 3DS` - + Reinsert your SD card into your device and power on your device - + Wait for the device to generate the SD card data - + Power off your device and reinsert your SD card into your computer - + Navigate to the `Nintendo 3DS` folder on your SD card - + Copy the 32 character long name of the folder you see - + Delete the `Nintendo 3DS` folder - + Rename the `BACKUP_Nintendo 3DS` folder to `Nintendo 3DS` -1. Paste your 32 character long folder name into a document you can reference later - + This folder name is also known as your "ID0" +1. 移動至 SD 卡的 `Nintendo 3DS` 資料夾中 +1. 複製含有 32 字元的資料夾的名稱 + + 如果您看到許多類似的資料夾,請遵循下列步驟: + + 將 `Nintendo 3DS` 資料夾重新命名為 `BACKUP_Nintendo 3DS` + + 將您的 SD 卡插回至您的裝置中並開機 + + 等待您的裝置生成 SD 卡中的資料 + + 關機並將 SD 卡插回電腦中 + + 移動至 SD 卡的 `Nintendo 3DS` 資料夾中 + + 複製含有 32 字元的資料夾的名稱 + + 刪除 `Nintendo 3DS` 資料夾 + + 將 `BACKUP_Nintendo 3DS` 資料夾重新命名為 `Nintendo 3DS` +1. 將該 32 字元字串複製至記事本中;等一下會用到它 + + 這個資料夾名稱也就是我們所謂的『ID0』 1. 啟動您的主機 1. 開啟您的好友清單 (HOME 主選單中最上方的[橘色笑臉圖示]({{ "/images/friend-list-icon.png" | absolute_url }})) - + If you receive an error and are kicked out of the menu, you either must create a new Mii or your console cannot connect to Nintendo's servers (due to a ban or connection issues) -1. Find your Mii profile, then find the "Friend Code" field on the top screen + + 如果您遇到錯誤訊息且從清單中被踢回主選單,那麼您必須先創立一個 Mii,或者您的主機無法連線至任天堂伺服器 (您的主機可能已被封殺或有網路連線之問題) +1. 選擇您的 Mii 個人檔案,並找尋您的好友代碼 -#### Section III - Seedminer +#### 第三節 — Seedminer -1. Open [Bruteforce Movable](https://bruteforcemovable.com/) on your computer - + This site can automate the retrieval of `movable_part1.sed` (using a bot 3DS console) and the breaking of your device's DSiWare encryption (using a volunteer's computer to run Seedminer) - + If you already have access to a 3DS capable of launching the Homebrew Launcher, you can manually retrieve your `movable_part1.sed` using that device by following [these](https://jisagi.github.io/SeedminerGuide/seedminerSelf/#section1) instructions - + If you already have access to a PC with a powerful graphics card, you can manually calculate your `movable.sed` using it by following [these](https://jisagi.github.io/SeedminerGuide/seedminerSelf/#section2) instructions - + If the automated service is nonfunctional and you cannot do one or both of those manually, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you -1. Enter your device's Friend Code (with no spaces or dashes) into the "Your friend code" field -1. Paste your device's 32 character long folder name into the "Your ID0" field -1. 完成『我不是機器人』之驗證 -1. Select "Go" - + If the site immediately goes to step 4, download your `movable.sed` file and continue with the next section. -1. When prompted, use the "Register Friend" button on your device to add the friend code of the bot 3DS console -1. Wait for the site to update - + If it does not, wait a few minutes before refreshing the page once -1. Select "Continue" -1. 等待程序完畢為止 - + This can take a while (up to an hour in some cases) - + During this process, the bot may not show up on your 3ds. As long as the website updates, this is not an issue. - + If you are still waiting after an hour, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you -1. When the process has completed, download your `movable.sed` file from the site - + Keep this file as you will need it in the upcoming pages +1. 於您的電腦中開啟 [Bruteforce Movable](https://bruteforcemovable.com/) + + 此網站可自動替您取得 `movable_part1.sed` (透過一台機器操控的 3DS 主機),並破解您裝置的 DSiWare 加密金鑰 (透過某自願者的電腦運行 Seedminer) + + If the automated service is nonfunctional, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you +1. 輸入您裝置的好友代碼 (勿含空白或減號) 至『Your friend code (您的好友代碼)』欄位中 +1. 輸入您主機的 32 字元辨識碼 (剛請您複製至記事本中的號碼) 至『Your ID0』欄位中 +1. 完成「我不是機器人」之驗證 +1. 選擇『Go』 + + 如果此網站自行跳至第四步,請下載您的 `movable.sed` 檔案並移動至下一章節。 +1. 如提示時,在您的主機中的『好友註冊 (Register Friend)』添加機器人 3DS 的好友代碼 +1. 等待網站更新 + + 如果遲遲尚未更新,請在刷新頁面前等待個幾分鐘 +1. 一旦網站開始處理您裝置的相關訊息,您將可以選擇『Continue (繼續)』或『Do another device (破解其他裝置)』。 點擊綠色的『Continue (繼續)』按鈕 +1. 等待執行剩下的程序 + + 這通常是很快的 (1~5分左右),但在某些情況下可能需要長達半小時。 + + 在等待過程中,您剛所添加的機器 3DS 可能不會在您的 3DS 主機上顯示。 不過只要網站還有在刷新,這就不是個問題。 + + 若您等了半小時遲遲沒有結果,那麼請加入[Nintendo Homebrew Discord 伺服器](https://discord.gg/MWxPgEp)使用英文來請求幫助 +1. 當該程序結束時下載您的 `movable.sed` 檔案 + + 您在待會還會用到該檔案,請先將其保留 ___ ### 方法 @@ -89,25 +87,25 @@ ___ #### Seedminer + Fredtool -This method of using Seedminer for further exploitation uses your `movable.sed` file to decrypt any DSiWare eShop title for the purposes of injecting an exploitable DSiWare title into the DS Internet Settings application. 於使用此指南時,您必須先擁有 (或下載/購買) eShop 中的 DSiWare 遊戲。 +Seedminer 將透過您的 `movable.sed` 檔案來解密您主機上任何來自 DSiWare eShop 的程式,以便在 DS 網路設定中注入修改後的 DSiWare 程式。 於使用此指南時,您必須先擁有 (或下載/購買) eShop 中的 DSiWare 遊戲。 -This method is compatible with all regions, though only the JPN and USA regions have free DSiWare titles in the eShop. +此方法適用於任何區域之主機,不過只有日版以及美版才有免費的 eShop 遊戲可下載以運行此漏洞。 -This method requires that the DS Internet Settings be functioning properly (see the test at the top of this page). +此方法需要使用 DS 網路設定。請透過本頁上方的測試確認您的主機可以正常使用此程式再行繼續。 -Continue to [Installing boot9strap (Fredtool)](installing-boot9strap-(fredtool)) +繼續至[安裝 boot9strap (透過 Fredtool)](installing-boot9strap-(fredtool)) {: .notice--primary} ___ #### Seedminer + Steelhax + Frogtool -This method of using Seedminer for further exploitation uses your `movable.sed` file to gain access to the Homebrew Launcher using the Steelhax exploit for the purposes of injecting an exploitable DSiWare title into the DS Download Play application. 於使用此指南時,您必須先擁有 (或下載) eShop 中免費的『Steel Drivers: Sub Wars』遊戲。 +Seedminer 將使用您的 `movable.sed` 檔案並透過 Steelhax 漏洞開啟 Homebrew Launcher 以便在 DS 網路設定中植入修改後的 DSiWare 程式。 於使用此指南時,您必須先擁有 (或下載) eShop 中免費的『Steel Driver: Sub Wars』遊戲。 -This method is only compatible with the EUR, JPN, and USA regions, and is somewhat more complicated than the above method. It is only recommended to use this method if you have a EUR region device and do not wish to pay for a DSiWare game, or if the above method does not work for you for some reason. +此方法僅適用於歐版、日版、及美版主機,且比上方所述方法更加複雜一點。 此方法僅建議給不願花錢購買 DSiWare 遊戲且持有歐版主機或使用以上方法無效的人們。 -This method requires that the DS Download Play be functioning properly (see the test at the top of this page). +此方法需要使用 DS『下載通信 (Download Play)』程式程式。請透過本頁上方的測試確認您的主機可以正常使用此程式再行繼續。 -Continue to [Homebrew Launcher (Steelhax)](homebrew-launcher-(steelhax)) +繼續至[安裝 Homebrew Launcher (透過 Steelhax)](homebrew-launcher-(steelhax)) {: .notice--primary} diff --git a/_pages/zh_TW/uninstall-cfw.txt b/_pages/zh_TW/uninstall-cfw.txt index 5ab80de387..b82374732e 100644 --- a/_pages/zh_TW/uninstall-cfw.txt +++ b/_pages/zh_TW/uninstall-cfw.txt @@ -11,7 +11,7 @@ title: "卸載自製韌體" 請別認為這能解決您在安裝自製韌體時所遇到的任何問題。 建議先行試試[疑難排解頁面](troubleshooting)中的指示,或於[Nintendo Homebrew 的 Discord 伺服器中詢問](https://discord.gg/MWxPgEp)。 {: .notice--danger} -您將無法遊玩任何已安裝且未簽證(盜版)的遊戲;您可至系統設定的資料管理中將它們刪除。 建議您先使用[存檔管理器](https://github.com/FlagBrew/Checkpoint/releases/latest)將您較在乎的遊戲存檔備份起來。 +Any unsigned (illegitimate) games will be rendered unusable and should be manually removed before starting this process by using the Data Management section of the System Settings. 建議您先使用[存檔管理器](https://github.com/FlagBrew/Checkpoint/releases/latest)將您較在乎的遊戲存檔備份起來。 這將不會影響您的 NNID 帳號、正版遊戲、或正版遊戲存檔。 @@ -26,21 +26,43 @@ title: "卸載自製韌體" ### 操作說明 -#### 第一節 — 準備工作 +#### Section I - Safety Test 1. 關閉您的主機 1. 將 SD 卡插入至電腦中 1. 解壓 GodMode9 `.zip` 中的 `GodMode9.firm` 檔案到 SD 卡的 `/luma/payloads/` 資料夾中 1. 解壓 GodMode9 `.zip` 中的 `gm9` 資料夾到 SD 卡的根目錄底下 1. 將 SD 卡插回主機中 -1. 啟動您的主機 - -#### 第二節 — 進行卸載腳本 - 1. 開機時按住『Start』鍵啟動 GodMode9 1. 當提示重要檔案備份時,按下『A』繼續,並在完畢後按下『A』繼續 1. 當提示修正 RTC 日期及時間時,按『A』繼續並設定日期及時間,再按『A』繼續 + 請注意,若您被提示說要修正 RTC 日期及時間,這表示您得在遵循完下列步驟後進入您的系統設定重新設定時間 +1. Navigate to `[1:] SYSNAND CTRNAND > title > 00040138 > (X)0000002 > content` + + On a "New" edition console, the (X) will instead be 2 + + On an "Old" edition console, the (X) will instead be 0 +1. Select the `.app` file +1. Select `NCCH Image Options` +1. Select `Mount image to drive` +1. In the window that appears, open the `exefs` folder +1. In this folder, select the `.firm` file +1. Select "Firm Options" +1. Select "Boot Firm" +1. When prompted, choose to decrypt and make a copy +1. You should boot into the regular 3DS Home Menu. If you do, power your device off and continue to the next section + + If you do NOT boot into the regular 3DS Home Menu, continuing with these instructions **WILL** brick your device. You should join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you + +#### 第二節 — 準備工作 + +1. 啟動您的主機 +1. Navigate to System Settings > Data Management > Nintendo 3DS > Software +1. In this list of software, delete any non-Nintendo content you installed while using CFW + + This includes common system software such as FBI, Anemone3DS, Luma Updater, Homebrew Launcher, Checkpoint, and others, along with any non-eShop games + + Failure to remove CFW software before uninstalling CFW may break access to the Data Management menu after uninstalling CFW +1. 關閉您的主機 + +#### Section III - Running Uninstall Script + +1. 開機時按住『Start』鍵啟動 GodMode9 1. 按『Home』鍵以叫出主選單 1. 選擇『Scripts...』 1. 選擇『GM9Megascript』