Dirbaio |
Posted on 08-02-17, 09:04 pm in New spoiler tag!
|
Super Mario
( ͡° ͜ʖ ͡°) Karma: 10081 Posts: 4390/4458 Since: 06-08-11 |
Shit, fixed
And fixed. BOTH FIXED! |
Dirbaio |
Posted on 02-05-18, 05:01 pm in Post bugs and suggestions in this thread
|
Super Mario
( ͡° ͜ʖ ͡°) Karma: 10081 Posts: 4397/4458 Since: 06-08-11 |
Fixed! It was a bug in the board that can happen very rarely. Reverted the post to the last good edit for you.
|
Dirbaio |
Posted on 05-11-18, 06:52 pm in What's wrong with this picture?
|
Super Mario
( ͡° ͜ʖ ͡°) Karma: 10081 Posts: 4418/4458 Since: 06-08-11 |
You uploaded the image to a shit host instead of the board's uploader.
|
Dirbaio |
Posted on 05-13-18, 09:37 am in Nintendo DS dev hardware! IS-NITRO-EMULATOR & co.
|
Super Mario
( ͡° ͜ʖ ͡°) Karma: 10081 Posts: 4423/4458 Since: 06-08-11 |
Posted by Myria We can't simply regenerate the data. While 1600-1647 and 1C00-2BFF are algorithmically generated, 1000-15FF, 1648-1BFF and 2C00-2FFF appear random with no known source. If you corrupt these seemingly unused areas of a cartridge and flash it to a dev cartridge, the dev cartridge still works. The random garbage might be chaff to make it less likely that hackers found it. But the annoying part is that it means we can't simply generate this data and attach it to existing dumps. Is it that important if that data is entirely 100% useless though? Posted by Myria However, a ray of hope exists: if you flash a cartridge with corrupted unused data, it will work fine, but if you then ask the IS-NITRO-EMULATOR (etc.) to verify the dump, it will say that the flash is bad. Try again with the hacked image and it will say that it's correct. In other words, something is able to read the security data. This is not visible in the USB communication with the IS devices. Whatever is happening has to be on the device's side. I don't have the electronics know-how to set up a logic analyzer on the cartridge protocol bus to see what's involved with verifying. Very interesting. Maybe Gericom's REing of the nitroemu firmware can shed some light in this too? I'd be very very interesting to see how the dev card protocol works, for flashing, erasing and verifying. Maybe it's possible to program them from regular DS's if it's just special commands (as opposed to special voltages or weird stuff?) Posted by Myria It's quite possible that only dev cartridges respond to whatever the IS devices are sending. But this is a ray of hope for correct dumps. This is what I fear too, yup. It's very likely, otherwise it'd probably mean you can use that to break encryption... |
Dirbaio |
Posted on 05-20-18, 06:04 pm in Auto-run when event ID 30 is active (rev. 1 by Dirbaio on 05-20-18, 06:05 pm)
|
Super Mario
( ͡° ͜ʖ ͡°) Karma: 10081 Posts: 4425/4458 Since: 06-08-11 |
The activator bitmask is only 64 bits though. ID 72 cant work there...
I don't know if the bitmask is actually an array, or the IDs higher than 64 have special meanings that are calculated from other stuff iirc..? Edit: you edit-ninja'd me lol. |
Dirbaio |
Posted on 05-29-19, 08:43 pm in search function securing.
|
Super Mario
( ͡° ͜ʖ ͡°) Karma: 10081 Posts: 4433/4458 Since: 06-08-11 |
Dirbaio | |
Super Mario
( ͡° ͜ʖ ͡°) Karma: 10081 Posts: 4446/4458 Since: 06-08-11 |
I deleted some certbot certs for a website that was no longer in use, but didn't delete the nginx config for it. During the night certbot renewed stuff and restarted nginx. Aaand it turns out that if nginx config references a cert that doesn't exist, ALL sites fail to come up, not just the broken one.
Sorry about that! Shouldn't happen again |