Nintendo Switch (NVIDIA Tegra X1) - BootROM Vulnerability

Поделиться
HTML-код
  • Опубликовано: 29 июл 2024
  • A video about the discovery of the BootROM bug, based on the talk given by Andy "Glitching The Switch". We talk about how the Switch boots, how the hardware coould be attacked, how a vulnerability in the switch was found and what exactly it does.
    Glitching The Switch Talk: media.ccc.de/v/c4.openchaos.2...
    Andy: / g33katwork
    =[ 💻 Related Products ]=
    → Nintendo Switch:* amzn.to/2SESPO0
    → NVidia Jetson TX1:* amzn.to/2C6uw4m
    =[ 🔴 Stuff I use ]=
    → Microphone:* geni.us/ntg3b
    → Graphics tablet:* geni.us/wacom-intuos
    → Camera#1 for streaming:* geni.us/sony-camera
    → Lens for streaming:* geni.us/sony-lense
    → Connect Camera#1 to PC:* geni.us/cam-link
    → Keyboard:* geni.us/mech-keyboard
    → Old Microphone:* geni.us/mic-at2020usb
    US Store Front:* www.amazon.com/shop/liveoverflow
    =[ ❤️ Support ]=
    → per Video: / liveoverflow
    → per Month: / @liveoverflow
    =[ 🐕 Social ]=
    → Twitter: / liveoverflow
    → Website: liveoverflow.com/
    → Subreddit: / liveoverflow
    → Facebook: / liveoverflow
    =[ 📄 P.S. ]=
    All links with "*" are affiliate links.
    LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm.
    #CVE #ReverseEngineering

Комментарии • 379

  • @thejesuschrist
    @thejesuschrist 5 лет назад +957

    Love what you're doing my dude, keep it up!

  • @electric_espeon
    @electric_espeon 5 лет назад +20

    I was waiting for a video on this! I love learning about the internals of game systems :p

  • @RBCiennelOfficial
    @RBCiennelOfficial 5 лет назад +15

    That last memory manipulation boogaloo was so genius!

  • @ThistleBlue
    @ThistleBlue 5 лет назад +16

    Nice to know that I have limited edition Switch! Might check out that talk too. Really interesting information.

  • @drgr33nUK
    @drgr33nUK 5 лет назад

    233k subscribes !! Congratulations it's been great to watch this channel grow. You're awesome and keep them coming :)

  • @Sky_Shaymin
    @Sky_Shaymin 5 лет назад +4

    It amazes me how buffer overflows are an issue that has been around for ages but still pops up everywhere in all kinds of code

    • @benjulesprice
      @benjulesprice 3 года назад +1

      Buffer overflow issues still pop up occasionally but there are many mitigation’s such as using stack cookies to verify the integrity of the stack and also address space layout randomisation (aslr)

    • @Sky_Shaymin
      @Sky_Shaymin 3 года назад

      @@benjulesprice Yup you are absolutely correct but even with canaries or randomization you can still get corruption of the data leading to unexpected behaviour. Ultimately these problems are born from the low level design. Ideally it would be best to have a more distinct segmentation with very strict memory protection but most common architectures support self modifying code. Some improvements have been made over the years but until segmentation becomes good enough and developers are more cognizant of this risk, this problem will always exist (even if mitigated).

  • @CyberQuickYT
    @CyberQuickYT 4 года назад +2

    Love this
    I don't like to watch long videos, as they have same content as yours but with more in depth (which can be often missed, so it doesn't matter much)

  • @techtech7803
    @techtech7803 5 лет назад +8

    Always love learning about low level bootchain bugs :D

  • @zanidd
    @zanidd 5 лет назад +1

    Excited to watch the glitching video

  • @wehushi_sushi
    @wehushi_sushi 5 лет назад +6

    I don't understand anything of your videos but there still fun too watch

  • @MrTurbo_
    @MrTurbo_ 5 лет назад +215

    so all they forgot is if(length>24288) length = 24288, if they added that it would have been fine

    • @PhoenixClank
      @PhoenixClank 5 лет назад +88

      I bet someone's forehead is sore from facepalming

    • @DanielSimon1995
      @DanielSimon1995 5 лет назад +49

      or, just have all user/io device controlled data put AFTER any internal shit (like stack), its already a common practice in today's x64s'.

    • @billigerfusel
      @billigerfusel 5 лет назад +41

      Sometimes it's so simple, but shit happens. They should have known better, since there is a interest in hacking their device.
      I'm glad nobody wants to hack the devices I program at work.

    • @piotrj333
      @piotrj333 5 лет назад +29

      This is how it is. You put tons of checks to prevent overflows etc. and after you forget about 1 and that 1 is all you ever need.

    • @muellerhans
      @muellerhans 5 лет назад +2

      @@billigerfusel What kind of devices?

  • @linus7529
    @linus7529 5 лет назад +11

    This is the best news channel.

  • @itzhakramm44
    @itzhakramm44 5 лет назад

    Great video explaining the gist of it, thank you.

  • @kitlith
    @kitlith 5 лет назад +20

    Something that would've been neat to add (maybe as another video?) is the stuff that happened recently with 6.2.0. Namely, how Nintendo used the TSEC to bootstrap a kind of secure boot even from compromised boot, and how that's currently bypassed. Although, it may also be good to wait a while longer because we don't know if there's gonna be a huge cat&mouse thing...

    • @Valery0p5
      @Valery0p5 5 лет назад

      Hey, I'm still waiting for an r4igold.cc flasher/unbricker ;) *joke*
      Ps: even this circumvention was figured by multiple people in just a few days... I'm starting to see a trend...poor Nintendo xD

    • @kitlith
      @kitlith 5 лет назад +2

      @@Valery0p5 Hey, if that's the cart I'm thinking of, brick means you need hardware to fix it. :P
      Anyway, what Nintendo accomplished would have seemed quite secure if it weren't for the SMMU, and it's ability to *remap MMIO pages* from the perspective of DMA (and thus the TSEC), breaking the TSEC's ability to actually inspect system state.

    • @Valery0p5
      @Valery0p5 5 лет назад +1

      @@kitlith yeah, sadly I knew it 😅 Dark Samus explained why some time ago... Didn't found anyone with the right hardware 😑
      About the switch, do you think they can lock up the boot chain again trough a system update? Or the TSEC is totally owned?

    • @kitlith
      @kitlith 5 лет назад +2

      @@Valery0p5 So, I think they could do a few more things to try and detect the """emulated""" mmio pages and refuse to run, but ultimately it would end up as a cat & mouse. Unless more stuff gets pulled out of the woodwork.

    • @Valery0p5
      @Valery0p5 5 лет назад

      @@kitlith I hope that devs will be able to find a good compromise, like EmuNand maybe... Thanks for the reply! 😁

  • @270jonp
    @270jonp 5 лет назад

    Nice find, thanks for sharing.

  • @itzhakramm44
    @itzhakramm44 5 лет назад +9

    love your videos LiveOverflow!

  • @hakah
    @hakah 5 лет назад +39

    am i the only one here who understand almost nothing of programming and stuff but watch anyway because i found it interesting?

    • @aiGeis
      @aiGeis 5 лет назад +2

      No, no you are not. I find a lot of the nerds in the comments here enviable as well.

    • @TwskiTV
      @TwskiTV 5 лет назад +3

      Combine this with a couple of quick searches on parts of you didn't understand and before you notice you'll understand a lot.
      That's actually how I learned all I know about hardware (and now that I think about it, even english).

    • @tacticaltroll6853
      @tacticaltroll6853 5 лет назад +1

      you are not alone, but many thing was quite understandable. Especially the concept of glitching was very interesting.

    • @guerra_dos_bichos
      @guerra_dos_bichos 5 лет назад +1

      you can undertand , we believe in you

  • @stratos7755
    @stratos7755 5 лет назад +82

    LiveOverflow, FailOverflow. Coincidence?

  • @Mongoos8
    @Mongoos8 5 лет назад +1

    Wow! I hope you will do more videos of this kind of topic. Maybe PS4 exploit from Spector? He has a nice writeup and an explanation video would be cool!

  • @heycherry100
    @heycherry100 5 лет назад +11

    Make a video of Type confusion for Binary playlist pls!!!

  • @Quetzalcoatl0
    @Quetzalcoatl0 5 лет назад

    Can i install the switch OS on the shield tv , has the same SoC right ? 1 gb less ram but still. controller can be mapped.

  • @PaulMansfield
    @PaulMansfield 5 лет назад +1

    A really great summary of the tegra boot hack.

  • @SergioInToronto
    @SergioInToronto 5 лет назад

    Excellent video!

  • @lmarloe
    @lmarloe 5 лет назад +1

    awesome, more videos like this

  • @sbeveuwu
    @sbeveuwu 5 лет назад +64

    Can you do a video about them patching the hardware bug from software ( not really patching but hardening it by securing the boot proccess )?

    • @atlhanemredursunoglu7893
      @atlhanemredursunoglu7893 5 лет назад +10

      Yeah, Nintendo's 6.2 patch is interesting one as most of the switch hackers' first thought about patch was Nintendo managed to patch rcm bug. Too bad Nvidia failed Nintendo again.

    • @valshaped
      @valshaped 5 лет назад +15

      Bilgisayar delisi Nintendo's mitigation was using the TSEC to halt execution, and then using the TSEC to check out the system state (and panicing if something fishy is happening.) The fix? Using the SMMU to point the TSEC's memory mapped IO at a page in DRAM, and emulating the behavior of a normal system during the *supposedly* halted state

    • @sbeveuwu
      @sbeveuwu 5 лет назад +1

      Val Thanks a lot!

    • @raizo856
      @raizo856 5 лет назад +1

      Atılhan Emre Dursunoğlu it's a Hardware bug how did they fix it with a software update

    • @atlhanemredursunoglu7893
      @atlhanemredursunoglu7893 5 лет назад +3

      @@raizo856 I might have said it too simple. If you updated to 6.2, you couldn't run or install any cfw on your switch. However it was possible to downgrade to another firmware. Also most prominent switch tinkerers like SciresM said this update may take a few months to crack. Alas it is cracked in two days.
      As for how, Val above has a great answer. Nintendo included TSEC, the security chip of TX hardware, to boot process. As TSEC is completely black box, including from rcm mode, it stopped cfw's.

  • @aes2630
    @aes2630 5 лет назад +3

    Is anyone else having a problem with the link to the talk?

  • @konradonbal2020
    @konradonbal2020 5 лет назад

    I barely understand how they done it, so I can only imagine how hard it was to figure that out. Well done!

    • @piecaruso97
      @piecaruso97 4 года назад

      there is a security cpu inside the switch which controls the boot process of it, basically you can manipulate part of the memory of the security cpu to take control of the stack, and so controlling the stack you can control the entire cpu basically and so that's how they get the hack to work

    • @NatetheNintendofan
      @NatetheNintendofan 2 года назад +1

      @@piecaruso97 I understand a little cuz I was able to mod my Wii U with installing cbhc which for the Wii U is cold boot it takes advantage of a paid legitimate DS title from the ESHOP

    • @piecaruso97
      @piecaruso97 2 года назад

      @@NatetheNintendofan i know, it’s brain training and it’s amazing they can do that from what’s basically an emulated title

  • @Retro101EmulationnGames
    @Retro101EmulationnGames 5 лет назад

    Good work keep going ;)

  • @testizoizo7373
    @testizoizo7373 Год назад

    Nice video thanks for sharing ✌️

  • @zanidd
    @zanidd 5 лет назад

    i just saw the entire talk and wanted to ask if this is specific to the switch implementation or is a bug in the usb rcm protocol

    • @piecaruso97
      @piecaruso97 4 года назад

      it's a terga specific bug apparently

  • @MK73DS
    @MK73DS 4 года назад

    Where can I find the talk ? The link in description is dead now

  • @nicolascraftermc7725
    @nicolascraftermc7725 4 года назад

    so you can overwrite the stack and there are no protection against it? at first I thought that even if there potentially was a way to overwrite the stack, as soon as you try it it will error out (maybe with a segmentation fault)

  • @tedfurniss1
    @tedfurniss1 5 лет назад

    Awesome vid... 👍👍

  • @willemschipper7736
    @willemschipper7736 5 лет назад +1

    awesome!

  • @kammyl456
    @kammyl456 5 лет назад

    unable to view the video from the link, help pls.

  • @jaredmeit6127
    @jaredmeit6127 5 лет назад +3

    They missed a golden opportunity to name this exploit "Stack Smash Bros"

    • @NiekNooijens
      @NiekNooijens 4 года назад

      there was a level editor hack for smash brawl called "smash stack" for the wii.
      which was brilliant as well, all the savegame hacks that were copied from the wii menu got busted by special checks in the wii menu, but this level editor exploit ran straight from the sd-card in-game, making it un-patchable (wii games run without os straight from disk)

  • @sjekx
    @sjekx 5 лет назад +4

    i do have a modchip installed in my swuitch that automatically psuhes the payload when booting, its prittey awsome, and only 4 wires

  • @JuraganLED
    @JuraganLED 5 лет назад +4

    it is classic stack overflow attack..

  • @JonJaded
    @JonJaded 5 лет назад

    beautiful!

  • @astodon
    @astodon 5 лет назад +2

    Amazing

  • @sundhaug92
    @sundhaug92 5 лет назад +2

    I'm kinda surprised the recovery-mode doesn't use DEP and more proper bounds-checking, even though it is a recovery-mode

    • @yark618
      @yark618 2 года назад

      Yeah this vuln was pretty trivial and in the most obvious place too

  • @milogray98
    @milogray98 5 лет назад

    Hey LiveOverflow! In your video "Introduction to Linux" you recommend Ubuntu or Arch Linux. I'm wondering which GNU/Linux distribution(s) you'd suggest using these days (now that three years have passed)?
    Oh and I really enjoy watching your videos :) Do keep up the good work.

    • @darin7553
      @darin7553 2 года назад

      Defiantly not arch
      I would recommend Linux mint which is Ubuntu based but is much more stable and user friendly

  • @chrissxMedia
    @chrissxMedia 5 лет назад +2

    you found this just now? wow...great vid btw

  • @PhilippBlum
    @PhilippBlum 5 лет назад

    That is amazing and not that complicated, once you understand it.

  • @pcuser80
    @pcuser80 5 лет назад

    Is the Tegra chip used in the Tesla car?

    • @alexsepelenco9902
      @alexsepelenco9902 5 лет назад

      No, Tesla makes everything except the batteries, s Tegra chip is made by nigiri a btw

    • @pcuser80
      @pcuser80 5 лет назад +3

      @@alexsepelenco9902
      nvidianews.nvidia.com/news/tesla-motors-model-s-to-feature-nvidia-tegra-processors
      www.quora.com/What-processor-does-a-Tesla-use

  • @Hackinside
    @Hackinside 5 лет назад +1

    Top video

  • @allwhatyouwant
    @allwhatyouwant 5 лет назад

    Machst du bei Enoflag mit?

  • @frognik79
    @frognik79 5 лет назад +2

    There's always that 1 guy that has to ask a question right in the middle of a talk.

  • @FennecTECH
    @FennecTECH 5 лет назад

    the switch's nand is on a neat little module that can be removed and replaced. but there is crypto preventing you from altering it and still booting

  • @MechMK1
    @MechMK1 5 лет назад

    The absolute mad lads

  • @bigal7864
    @bigal7864 5 лет назад +1

    I wonder if it will be possible to hack revision 2 of the switch?

    • @YourTVUnplugged
      @YourTVUnplugged 5 лет назад

      You know it! We'll find a way! Maybe not as legendary as a boot rom exploit though :( So you may have to be on a certain firmware or else you're screwed and can't.

  • @dsedchenko
    @dsedchenko 5 лет назад

    Is this talk about Fusée Gelée?

  • @jacksongodsey
    @jacksongodsey 5 лет назад

    I love that intro music mmm

  • @NatetheNintendofan
    @NatetheNintendofan 2 года назад

    What users click the button with the files web exploit that's why I think they they shut down the internet browsers now cuz with that you could use WebEx ports so what exploits might be out of our chances the mod the switch MindWare I'm looking to buy on patch one in a couple months

  • @gabboman92
    @gabboman92 5 лет назад +40

    but does it run crysis?

    • @valshaped
      @valshaped 5 лет назад +11

      gabriel amador garcia Nah but it runs Doom and Half-life

    • @gabboman92
      @gabboman92 5 лет назад

      @@valshaped I knew about doom, but how can you port half life if its closed source?

    • @user-ro1cc8tz6d
      @user-ro1cc8tz6d 5 лет назад +3

      @@gabboman92 xash3d is a opensource implementation of goldsource engine

    • @fuckmyass9371
      @fuckmyass9371 5 лет назад

      gabriel amador garcia thats not funny here

    • @gabboman92
      @gabboman92 5 лет назад

      @@fuckmyass9371 you're right, crysis is an x86 game not ARM

  • @alexatkin
    @alexatkin 5 лет назад

    Actually there IS an internal drive you can replace, the eMMC storage is socketed. Of course the encryption is still an issue.

  • @soul-722
    @soul-722 5 лет назад

    bro is that what i call buffer overflow attack ..??

  • @markusTegelane
    @markusTegelane 5 лет назад +3

    The key combination for Android recovery mode depends on what device you have, but possible combinations are:
    Volume down + Power
    Volume up + Power
    Volume down + volume up + Power
    In some cases you have to go to recovery mode through the bootloader/download mode
    You can also try holding down the physical home button (if your device has one)
    Some devices need to be connected to a PC through USB cable
    In my case it's Volume up + Power

    • @WeaponsGG
      @WeaponsGG 4 года назад +1

      this was very informative. as somebody who has done some fucky shit w all my old android phones i can confirm this is 100% accurate

  • @Sithhy
    @Sithhy 5 лет назад

    So when will there be Android available for it?

  • @Lucavon
    @Lucavon 5 лет назад +280

    Hast du grade Hannover "some random German city" genannt? Tsk tsk tsk.

    • @karlkastor
      @karlkastor 5 лет назад +9

      Hann... was?

    • @pulsegames5495
      @pulsegames5495 5 лет назад +21

      @@karlkastor Some random German city

    • @chrissxMedia
      @chrissxMedia 5 лет назад +2

      hannover? was is das?

    • @TecrasTrash
      @TecrasTrash 5 лет назад

      Ach, Hannover. Hrm, von den CCClern da bekommt man sonst selten was mit.

    • @SteelHorseRider74
      @SteelHorseRider74 5 лет назад +12

      Hannover.... Hannover... da war doch mal was.... achja, die CeBIT :D

  • @soullessleftover8427
    @soullessleftover8427 5 лет назад

    Can you please make a video explaining the PsVita exploit after Sony stops manufacturing them?

    • @LiEnby
      @LiEnby 4 года назад

      *which one?*

  • @weshuiz1325
    @weshuiz1325 5 лет назад

    They have re writen the bootrom may make a update?

    • @YourTVUnplugged
      @YourTVUnplugged 5 лет назад

      No they have not... the bootrom is readonly, how hard is it for you people to understand?

    • @LiEnby
      @LiEnby 4 года назад

      did you miss the part where the BootROM is locked down after boot? and they had to do some glitching shit to even read it??
      or the "ROM" in the name ?

  • @DoDo-dy2fs
    @DoDo-dy2fs 5 лет назад

    What is this good for?

  • @HonieFlakes
    @HonieFlakes 5 лет назад

    I found this no one else everyone said to not worry because it never work or have major issues but this is a great improvemtn and i played 13% of the game no peoblems other then audio n lag sttuter her thier

  • @Anehab100
    @Anehab100 5 лет назад

    wow
    amazing

  • @PrasannaVarshan
    @PrasannaVarshan 5 лет назад +1

    Can you explain, how pirated movie sites can stay anonymous like fmovies , gostream etc without getting banned by hosts? Even if they have their own file server, how can they evade being tracked by cybersecurity experts?

    • @LiEnby
      @LiEnby 4 года назад

      most of the time there just in a country that doesnt really have copyright law
      so even if they find them they cant really do much about it ..
      oh and if you mean torrents- they work because its all p2p and everyone is the host lol

  • @miigon9117
    @miigon9117 5 лет назад

    11:33 Volume down? Volume up?

  • @Dragoon710
    @Dragoon710 5 лет назад

    Hey. Love you.

  • @kubasmolis6009
    @kubasmolis6009 5 лет назад +1

    So i think we could even run android on this swich (off of linux)

    • @dominicg2456
      @dominicg2456 4 года назад +1

      It's been done. There are even tutorials on it now.

  • @ZeroFPV
    @ZeroFPV 5 лет назад +1

    Didn't Nintendo fix this in newer Switches (some months ago)?

    • @jboy27
      @jboy27 5 лет назад +2

      Yes but you can still buy old switchs

    • @haruhisuzumiya6650
      @haruhisuzumiya6650 5 лет назад

      @@jboy27 and 6.2 rebuilt the bootrom process

    • @DaVince21
      @DaVince21 5 лет назад +1

      It's mentioned in the video, yes.

  • @maxmyzer9172
    @maxmyzer9172 Год назад

    The real advantage to hacked switch isn't piracy, its being able to have backups of your games and their saves

  • @nishisan5444
    @nishisan5444 5 лет назад

    Nice

  • @Jonas_Meyer
    @Jonas_Meyer 5 лет назад

    And I have problems booting a image i compiled on my BeagleBone Black :D

  • @zakariajouimaa
    @zakariajouimaa 5 лет назад +7

    please do the ps4 and xbox 360 mod chip hackes

  • @svizelpritula4951
    @svizelpritula4951 5 лет назад +2

    With the hardware change, you could just change the whole chip. Or the whole console.

  • @BluecoreG
    @BluecoreG 5 лет назад

    3:34
    Actually, anyone with a Game Maker Studio license can already develop games for the Switch and sell them on the store. I believe both Unity & Unreal 4 will have something similar soon.
    Unlike Wii/U Nintendo is starting to realize the importance of indie developers and see huge market potential in them.

    • @MaakaSakuranbo
      @MaakaSakuranbo 5 лет назад +1

      Provided you want to sell them and Nintendo gives your game an "okay".

    • @LiEnby
      @LiEnby 4 года назад

      @@MaakaSakuranbo and you can fork out the money for a switch devkit..
      and you sign a 20page NDA ..
      and oyu have like $300/mo for switch export (yes i know there CDN is unsecured but still)

    • @yark618
      @yark618 2 года назад

      What if you don’t want Nintendo taking a cut?

  • @stevenzhao6647
    @stevenzhao6647 5 лет назад

    🙏 good old stack smash

  • @Souls4Roca
    @Souls4Roca 5 лет назад

    didn't nintendo actually patch it over software like a few days ago?

    • @YourTVUnplugged
      @YourTVUnplugged 5 лет назад

      Didn't like your mom drop you on your head when you were a baby, so like you'd never understand what UNPATCHABLE and READONLY bootrom means??

  • @rikihanks
    @rikihanks 5 лет назад

    subbed

  • @ahmedselimuzum3049
    @ahmedselimuzum3049 5 лет назад

    Hi! Can i download your binary hacking lessons for studying offline?

  • @zralok
    @zralok 5 лет назад

    I have totally other problem and couldn't find anything useful on the internet, which I understood, so I am asking you.
    I want to create a virtual art-net/dmx node that will manipulate the incoming stream(art-net is a udp-based data protocol). But the thing is: an Art-net Controller, a program that sends this stream, first needs to connect to a node with a ArtPoll(-Request) and the node responds with a ArtPollReply in which it tells all needed data.
    But I am a relatively newbie and don't know how to program such a thing. Maybe you have heard of art-net before (it is used for transmitting dmx-data for light shows,...) and can help me out.
    I first thought of something like a proxy since its a web-based protocol but then I noticed the ArtPoll.

  • @FreakinKatGaming
    @FreakinKatGaming 4 года назад

    That hardware so hawt! Oh my gawd I'd kill for sum those tools I swear it!

  • @nicknevco215
    @nicknevco215 5 лет назад

    Thats funny the name of the site and the actual way to execute the glitch are one in the same.

  • @MrValgard
    @MrValgard 5 лет назад

    very accesable presentation for noobs :D thanks

  • @NatetheNintendofan
    @NatetheNintendofan 2 года назад

    Guys why can't we use flashcards just like Gateway or R4

  • @metaorior
    @metaorior 5 лет назад

    Please keep up

  • @FreakinKatGaming
    @FreakinKatGaming 4 года назад

    Looks like I'm not the only Kat on the scene

  • @EcchiRevenge
    @EcchiRevenge 5 лет назад +1

    Piracy is the fault of publishers:
    1. availability.
    2. being forced to pay physical-copy price when game is just a download(fuck gamestop).
    3. lack of demo - why should people go in blind(considering the state of game "journalism" today)?
    4. being forced to pay again to play a game someone already owns for decades on a newer platform, that he could already do for free on emulators, is just an insult to real fans.
    So if Nintendo treats its customers like shit; too bad, piracy it is.

  • @HA7DN
    @HA7DN 5 лет назад

    Hm, what for shall I collect money? Switch or 3D printer?

    • @voxelfusion9894
      @voxelfusion9894 5 лет назад

      I'd get a switch, unless you actually use a 3d printer often. I printed maybe 8 things so far? Now it's dusty.

    • @HA7DN
      @HA7DN 5 лет назад

      @@voxelfusion9894 Well, I might use it more often. The key word is "might".

    • @voxelfusion9894
      @voxelfusion9894 5 лет назад

      @@HA7DN that's kinda where I was at, but maybe you're super into diy mechanics or building gadgets. Then it's a must.

  • @Kavukamari
    @Kavukamari 5 лет назад

    is this the one that just got patched?

    • @YourTVUnplugged
      @YourTVUnplugged 5 лет назад

      Can never be patched... Keep dreaming

    • @LiEnby
      @LiEnby 4 года назад

      @@YourTVUnplugged from what i understand nintendo just tried to ""detect"" when you use it lol

  • @damejelyas
    @damejelyas 5 лет назад +1

    Hackerland is my dreamland

  • @Clancydaenlightened
    @Clancydaenlightened 5 лет назад

    Lmao the nvdia shield may as well be a switch, I wonder if one could get some sort of emulator running on it or be able to run switch software on it since they both use the tegra

    • @haruhisuzumiya6650
      @haruhisuzumiya6650 5 лет назад

      LLE would be harder to emulate due to hardware emulation.

  • @rex_melynas
    @rex_melynas 5 лет назад

    If I remember correctly, it was actually patched in last update, Wich means an "impossible patch" was issued... Nice

    • @LiEnby
      @LiEnby 4 года назад

      i think? there "patch" was to try detect when you did it and then reset the system

  • @Askaholic907
    @Askaholic907 5 лет назад +1

    Classic buffer overflow. Should have written in Rust!

  • @mduckernz
    @mduckernz 5 лет назад

    I don't get why they couldn't just read the code directly off of the ROM with a chip reader..? (and had to resort to a glitching attack)
    If it is truly the root of trust, it can't very well verify a "safe" environment when it starts up (by say, performing a challenge response with another chip over some data lines)

    • @ValdemarCamilo
      @ValdemarCamilo 5 лет назад +1

      the boot ROM is physically inside the CPU. It's on the same bit of silicon in fact. It also has a "kill switch" that when triggered disconnects it. Rebooting will re-connect it. The problem is that it is the FIRST thing the CPU loads code from and this code, once it figures out what to run next, as a final action before moving on, hits the kill switch.
      There is no physical access. The ONLY way to get at it is with code running on the CPU and the ONLY way to get code running on the CPU is to use the boot rom to load it in. hence the need for glitching.

    • @mduckernz
      @mduckernz 5 лет назад

      @@ValdemarCamilo Ah, that wasn't quite clear from the diagram. Yes, that's definitely a problem, then :p

    • @JamEngulfer
      @JamEngulfer 5 лет назад

      Like many things, yeah the data is physically there in the device, but it's basically impossible to actually read it.

    • @mduckernz
      @mduckernz 5 лет назад +1

      @@JamEngulfer Ya, if it's inside the SoC you'd need microprobes or similar if the glitch techniques failed, and considering the complexity of the internals this is rather unlikely to work. You'd need to decap and lap some chips (at a high cost each time!) to even know _where_ to probe, let alone actually doing it successfully!
      (just a case of confusion over how it was described)

    • @TheBackyardChemist
      @TheBackyardChemist 5 лет назад +1

      Technically, if this is true mask ROM instead of PROM, you could try grabbing images with an electron microscope and maybe decode the ROM cells with software. I think I saw a video of a talk where someone did just that, but with a very large feature size chip and an optical microscope.
      There is also a technique of using a FIB machine to dig a trench though the backside of the die (since FCBGA mount this is the top of the chip as it sits on the board). Both of these are of course in the realm of brute force and throwing money at the problem, but cool nevertheless.

  • @GarfieldZ
    @GarfieldZ 5 лет назад

    Could you please do another video about the fix? New says that Nintendo fixed the issue with a system upgrade. And I dont quite understand how a bug at this level could ever be fixed by system update.

    • @LiEnby
      @LiEnby 4 года назад +1

      they tried to "detect" when you boot with RCM mode and then just reset if detected..
      basically

  • @henke37
    @henke37 5 лет назад +9

    I duno about piracy being the big fear. While a real fear, I hear that cheating is an even bigger concern. Especially in online multiplayer where the players are the content. And cheaters make for bad experiences.

    • @Burger_pants
      @Burger_pants 5 лет назад +7

      I can assure you Nintendi could give 2 shits about cheaters, their concern is money, money money money MONEY.

    • @h.celine9303
      @h.celine9303 5 лет назад

      +FuturePants What is wrong with you anyway? Of course they wanna make money. It's callee freedo... err, I mean capitalism

    • @nullnull5976
      @nullnull5976 5 лет назад

      Henrik Andersson they dont care bout the experience.

    • @PixlRainbow
      @PixlRainbow 5 лет назад +1

      @randomguy8196 more accurately, they care a lot about cheating. However, they design most of their games as "offline first" aka meant to be played offline with online functionality added later as an afterthought. They approached Splatoon 2 like PvP Pokemon battles, where consoles are brought together for short range wireless play, which is why save data is stored locally. Since their game engine is hard coded to save locally, they can no longer fix it to add remote storage. Which is why Splatoon 2 is not allowed to backup on cloud: people would do save scumming.

    • @PixlRainbow
      @PixlRainbow 5 лет назад

      @@Burger_pants they are actually not that bad, they go as far as to say "please don't waste money on our DLC" when advertising their DLC.
      Their main problem is they are traditionalist, which is both a good and a bad thing. They are "honourable" to the end and you can expect to get a product that is exactly what they advertise, but they are also stubbornly trapped in old schools of thought and refuse to keep up with trends.

  • @FennecTECH
    @FennecTECH 4 года назад

    Shofel2/F-G?

  • @ChrisPRO44
    @ChrisPRO44 5 лет назад

    Smashing the stack lmao. Anyone remember the Smash Stack exploit on the Wii?

    • @LiEnby
      @LiEnby 4 года назад

      Smashing the stack is common bug

    • @NatetheNintendofan
      @NatetheNintendofan 2 года назад

      @@LiEnby but now because games have updates the updates well do it

    • @LiEnby
      @LiEnby 2 года назад

      @@NatetheNintendofan doesn't matter, if you can find an old 1.0 disc version and load it without internet it would still work

  • @TheActualTed
    @TheActualTed 5 лет назад +2

    Glitch the Switch!