Editing Nintendo Switch

Jump to: navigation, search

Warning: You are not logged in. Your IP address will be publicly visible if you make any edits. If you log in or create an account, your edits will be attributed to your username, along with other benefits.

The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then save the changes below to finish undoing the edit.
Latest revision Your text
Line 128: Line 128:
 
In April 2018, two separate groups discovered a means to use an exploit chain in the Tegra chip system that can be used to boot other software on the Switch, which could have both beneficial or malicious uses. The exploit is unpatchable as the necessary support to update the Tegra's ROM was not included on the Switch systems as shipped. Both groups had notified Nvidia and Nintendo of the exploit before public announcement of their findings. Users studying the hardware determined that Nintendo has the capacity to permanently ban specific Switch consoles used to obtain software via this exploit from the Nintendo Network, as the Switch console includes a unique device identification code used as part of the validation to the Network. As games downloaded from the Nintendo Network include encrypted information that ties the Nintendo ID to the console, which is transmitted to Nintendo when users start playing games, Nintendo can track unapproved software downloads and take action. Nintendo has reportedly fixed the vulnerability in newer Switch units as of July 2018.
 
In April 2018, two separate groups discovered a means to use an exploit chain in the Tegra chip system that can be used to boot other software on the Switch, which could have both beneficial or malicious uses. The exploit is unpatchable as the necessary support to update the Tegra's ROM was not included on the Switch systems as shipped. Both groups had notified Nvidia and Nintendo of the exploit before public announcement of their findings. Users studying the hardware determined that Nintendo has the capacity to permanently ban specific Switch consoles used to obtain software via this exploit from the Nintendo Network, as the Switch console includes a unique device identification code used as part of the validation to the Network. As games downloaded from the Nintendo Network include encrypted information that ties the Nintendo ID to the console, which is transmitted to Nintendo when users start playing games, Nintendo can track unapproved software downloads and take action. Nintendo has reportedly fixed the vulnerability in newer Switch units as of July 2018.
  
In June 2018, two hackers found a way to be able to run the Switch system's developer software Devmenu on non-developer Switch units, allowing hackers to be able to directly load games onto SD cards or create custom avatars for their user profile, including [[Pornography|pornographic]] and [[Not safe for work|NSFW]] pictures, which violate Nintendo's terms of service. A Nintendo spokesperson responded to ''[[Kotaku]]'' 's article on the topic, saying that "Modified Nintendo Switch systems have been banned”.
+
In June 2018, two hackers found a way to be able to run the Switch system's developer software Devmenu on non-developer Switch units, allowing hackers to be able to directly load games onto SD cards or create custom avatars for their user profile, including [[Pornography|pornographic]] and [[Not safe for work|NSFW]] pictures, which violate Nintendo's terms of service. A Nintendo spokesperson responded to ''[[Kotaku]]''{{'}}s article on the topic, saying that "Modified Nintendo Switch systems have been banned”.
  
 
Shortly after the release of Nintendo Switch Online in September 2018, hackers and modders were able to figure out how to run unauthorized [[Read-only memory|ROMs]] on the Nintendo Switch NES emulator. A Switch hacker who goes by the name DevRin, was the first to discover the hack and posted his findings on [[YouTube]], which prompted a modder who goes by the name KapuccinoHeck to investigate the matter with two others and their findings were later posted on KapuccinoHeck's Twitter account.
 
Shortly after the release of Nintendo Switch Online in September 2018, hackers and modders were able to figure out how to run unauthorized [[Read-only memory|ROMs]] on the Nintendo Switch NES emulator. A Switch hacker who goes by the name DevRin, was the first to discover the hack and posted his findings on [[YouTube]], which prompted a modder who goes by the name KapuccinoHeck to investigate the matter with two others and their findings were later posted on KapuccinoHeck's Twitter account.

Please note that all contributions to Mod My Classic Wiki may be edited, altered, or removed by other contributors. If you do not want your writing to be edited mercilessly, then do not submit it here.
You are also promising us that you wrote this yourself, or copied it from a public domain or similar free resource (see Mod My Classic Wiki:Copyrights for details). Do not submit copyrighted work without permission!

Cancel Editing help (opens in new window)