Also, if you try to install HBC/BootMii on a devkit, it just installs them without using any exploits, using legitimate devkit signing keys (which are published with the SDK and thus leaked a long time ago).pic.twitter.com/OWeYMSsFHj
If it ain't broke, I'll fix it!
I'm porting Linux to Apple Silicon Macs at @AsahiLinux.
http://patreon.com/marcan | http://github.com/sponsors/marcan
You can add location information to your Tweets, such as your city or precise location, from the web and via third-party applications. You always have the option to delete your Tweet location history. Learn more
Add this Tweet to your website by copying the code below. Learn more
Add this video to your website by copying the code below. Learn more
By embedding Twitter content in your website or app, you are agreeing to the Twitter Developer Agreement and Developer Policy.
| Country | Code | For customers of |
|---|---|---|
| United States | 40404 | (any) |
| Canada | 21212 | (any) |
| United Kingdom | 86444 | Vodafone, Orange, 3, O2 |
| Brazil | 40404 | Nextel, TIM |
| Haiti | 40404 | Digicel, Voila |
| Ireland | 51210 | Vodafone, O2 |
| India | 53000 | Bharti Airtel, Videocon, Reliance |
| Indonesia | 89887 | AXIS, 3, Telkomsel, Indosat, XL Axiata |
| Italy | 4880804 | Wind |
| 3424486444 | Vodafone | |
| » See SMS short codes for other countries | ||
This timeline is where you’ll spend most of your time, getting instant updates about what matters to you.
Hover over the profile pic and click the Following button to unfollow any account.
When you see a Tweet you love, tap the heart — it lets the person who wrote it know you shared the love.
The fastest way to share someone else’s Tweet with your followers is with a Retweet. Tap the icon to send it instantly.
Add your thoughts about any Tweet with a Reply. Find a topic you’re passionate about, and jump right in.
Get instant insight into what people are talking about now.
Follow more accounts to get instant updates about topics you care about.
See the latest conversations about any topic instantly.
Catch up instantly on the best stories happening as they unfold.
Also, if you try to install HBC/BootMii on a devkit, it just installs them without using any exploits, using legitimate devkit signing keys (which are published with the SDK and thus leaked a long time ago).pic.twitter.com/OWeYMSsFHj
Also we may or may not be sending some strings to devkit/debugger print vectors.pic.twitter.com/qV41v4bmLi
One of the supported IOS exploits is hidden in the middle of the Ioctl Fun Machine. A simpler version of this kind of obfuscation/misdirection was featured in the very first Homebrew Channel Installer that didn't rely on the signature validation bug.pic.twitter.com/wAiquwVdOu
We're not all evil, though. While the installer stops/refuses to work in some cases, HBC never does (not completely). We considered the possibility of someone messing up their system so badly that an existing (broken) install of HBC is the only way to fix it.
Under certain circumstances, HBC will show a scam warning screen and stop working. But it won't really: it lets you proceeed after one hour. Similarly, even in "crashy mode", you can get an app loaded some of the time.
Basically we *hate hate hate* bricks. All of this protection is *also* to ensure the system is in a sane state for installation, so we know it'll work. We do many sanity checks too, *much* more paranoid than Nintendo's update code. We *never* want to be responsible for a brick.
Switching gears, the BootMii boot2 update code contains a functional (not line-by-line) duplication of Nintendo's boot1 loader code, that it uses to confirm the exact layout and state of the existing boot2 installed on the Wii.pic.twitter.com/pUg93gyVwH
We validate that the NAND has two valid, clean, working, hashed-OK, known version copies of boot2. Then we patch BootMii in (in RAM) and hash-check. We run write tests on empty boot2 blocks to ensure they are usable. Only then do we commit and write BootMii to empty blocks.pic.twitter.com/zhcU0L6uBT
The installer is designed to use unused NAND blocks for the install, and, as the last step, writes a newer-generation blockmap that marks the original boot2 blocks as bad. Thus, there is zero failure window (you can power off at any time), and uninstallation = erasing blocks.pic.twitter.com/zbAI1zgivu
Nintendo's boot2 update code is so terribad it writes the new bootloader before even verifying its signature (and leaves it clobbered if the sigcheck fails). Combined with a plaintext HTTP CDN, that leaves the TCP checksum as the only thing preventing a corrupted first copy.
And since shit happens and the second copy could become corrupted, this is how Nintendo managed to brick a good fraction of Wiis, hacked or not, when they pushed a dummy version bump of boot2 as an attempt at uninstalling BootMii.
To my knowledge, we have never bricked a Wii. Ever. With over 6 million users. The closest we came, there was a bug in the boot2 code with bad block handling. Since we'd checked that there was a working second copy, the person who hit it could still boot.
Subsequent runs of the installer detected the bad state and refused to do anything. So we got a bug report, and no consoles were harmed.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.