mirror of
https://github.com/hacks-guide/Guide_3DS.git
synced 2025-08-30 11:49:52 +02:00
Deploying to gh-pages from @ hacks-guide/Guide_3DS@1f89857ea2 🚀
This commit is contained in:
@@ -524,7 +524,7 @@ window.cookieconsent.initialise({
|
||||
<details class="notice--info">
|
||||
<summary><em>技术细节(选看)</em></summary>
|
||||
|
||||
<p>为了在你的主机上安装 boot9strap,我们需要获得你主机上的唯一加密密钥。 To accomplish this, we use the Homebrew Launcher to launch nimhax and dump the data encryption key (movable.sed) from your device.</p>
|
||||
<p>To install boot9strap on your console, we derive your console’s unique encryption key. To accomplish this, we use the Homebrew Launcher to launch nimhax and dump the data encryption key (movable.sed) from your console.</p>
|
||||
|
||||
<p>For a more technical explanation, see <a href="https://github.com/luigoalma/nimhax/">here</a> for information about the nimhax exploit.</p>
|
||||
|
||||
@@ -541,11 +541,11 @@ window.cookieconsent.initialise({
|
||||
<h4 id="第一步--准备工作">第一步 – 准备工作</h4>
|
||||
|
||||
<ol>
|
||||
<li>将主机关机</li>
|
||||
<li>Power off your console</li>
|
||||
<li>将你的 SD 卡插入到电脑</li>
|
||||
<li>Copy the <code class="language-plaintext highlighter-rouge">nimhax</code> folder from the nimhax <code class="language-plaintext highlighter-rouge">.zip</code> to the <code class="language-plaintext highlighter-rouge">/3ds/</code> folder on your SD card</li>
|
||||
<li>将 SD 卡重新插入你的主机</li>
|
||||
<li>启动你的主机</li>
|
||||
<li>Reinsert your SD card into your console</li>
|
||||
<li>Power on your console</li>
|
||||
</ol>
|
||||
|
||||
<p class="notice--info"><img src="https://3ds.hacks.guide/images/screenshots/nimhax-location.png" alt="" /></p>
|
||||
@@ -560,7 +560,7 @@ window.cookieconsent.initialise({
|
||||
|
||||
<h3 id="next-step-frogtool">Next step: Frogtool</h3>
|
||||
|
||||
<p>Once you have your device’s encryption key (<code class="language-plaintext highlighter-rouge">movable.sed</code>), you can use it in conjunction with Frogtool, which uses your <code class="language-plaintext highlighter-rouge">movable.sed</code> file to inject and take advantage of JPN Flipnote Studio. <br />
|
||||
<p>Once you have your console’s encryption key (<code class="language-plaintext highlighter-rouge">movable.sed</code>), you can use it in conjunction with Frogtool, which uses your <code class="language-plaintext highlighter-rouge">movable.sed</code> file to inject and take advantage of JPN Flipnote Studio. <br />
|
||||
While this method is faster, it requires downloading a file with a torrent client. Do not follow this method if you’re unable to use a torrent client.</p>
|
||||
|
||||
<p class="notice--primary">Continue to <a href="installing-boot9strap-(frogtool)">Installing boot9strap (Frogtool)</a></p>
|
||||
|
Reference in New Issue
Block a user